Modeling secrecy and deception in a multiple-period attacker-defender signaling game
Author
Abstract
Suggested Citation
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Neeman, Zvika, 2004.
"The relevance of private information in mechanism design,"
Journal of Economic Theory, Elsevier, vol. 117(1), pages 55-77, July.
- Zvika Neeman, 1998. "The Relevance of Private Information in Mechanism Design," Papers 0093, Boston University - Industry Studies Programme.
- Neeman, Z., 1998. "The Relevance of Private Infromation in Mechanism Design," Papers 93, Boston University - Department of Economics.
- Cole, Harold L. & Kocherlakota, Narayana, 2001.
"Dynamic Games with Hidden Actions and Hidden States,"
Journal of Economic Theory, Elsevier, vol. 98(1), pages 114-126, May.
- Harold L. Cole & Narayana R. Kocherlakota, 1997. "Dynamic games with hidden actions and hidden states," Working Papers 583, Federal Reserve Bank of Minneapolis.
- Harold L. Cole & Narayana R. Kocherlakota, 1998. "Dynamic games with hidden actions and hidden states," Staff Report 254, Federal Reserve Bank of Minneapolis.
- Mingming Leng & Mahmut Parlar, 2009. "Allocation of Cost Savings in a Three-Level Supply Chain with Demand Information Sharing: A Cooperative-Game Approach," Operations Research, INFORMS, vol. 57(1), pages 200-213, February.
- Andrea Prat, 2005.
"The Wrong Kind of Transparency,"
American Economic Review, American Economic Association, vol. 95(3), pages 862-877, June.
- Andrea Prat, 2002. "The Wrong Kind of Transparency," STICERD - Theoretical Economics Paper Series 439, Suntory and Toyota International Centres for Economics and Related Disciplines, LSE.
- Prat, Andrea, 2002. "The wrong kind of transparency," LSE Research Online Documents on Economics 3679, London School of Economics and Political Science, LSE Library.
- Prat, Andrea, 2004. "The wrong kind of transparency," LSE Research Online Documents on Economics 24712, London School of Economics and Political Science, LSE Library.
- Prat, Andrea, 2003. "The Wrong Kind of Transparency," CEPR Discussion Papers 3859, C.E.P.R. Discussion Papers.
- Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
- Doepke, Matthias & Townsend, Robert M., 2006.
"Dynamic mechanism design with hidden income and hidden actions,"
Journal of Economic Theory, Elsevier, vol. 126(1), pages 235-285, January.
- Matthias Doepke & Robert M. Townsend, 2002. "Dynamic Mechanism Design With Hidden Income and Hidden Actions," UCLA Economics Working Papers 818, UCLA Department of Economics.
- Townsend, Robert & Doepke, Matthias, 2004. "Dynamic Mechanism Design with Hidden Income and Hidden Auctions," CEPR Discussion Papers 4455, C.E.P.R. Discussion Papers.
- Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
- Yao, Z. & Leung, Stephen C.H. & Lai, K.K., 2008. "Manufacturer's revenue-sharing contract and retail competition," European Journal of Operational Research, Elsevier, vol. 186(2), pages 637-651, April.
- Stergios Skaperdas, 1996.
"Contest success functions (*),"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
- Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290, February.
- Stergios Skaperdas, 1996. "Contest success functions," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 263-270, Springer.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
- Lode Li, 2002.
"Information Sharing in a Supply Chain with Horizontal Competition,"
Management Science, INFORMS, vol. 48(9), pages 1196-1212, September.
- Lode Li, 2002. "Information Sharing in a Supply Chain with Horizontal Competition," Yale School of Management Working Papers ysm288, Yale School of Management.
- Hao Zhang & Stefanos Zenios, 2008. "A Dynamic Principal-Agent Model with Hidden Information: Sequential Optimality Through Truthful State Revelation," Operations Research, INFORMS, vol. 56(3), pages 681-696, June.
- Vincent P. Crawford, 2003.
"Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions,"
American Economic Review, American Economic Association, vol. 93(1), pages 133-149, March.
- Crawford, Vincent P., 2001. "Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions," University of California at San Diego, Economics Working Paper Series qt6k65014s, Department of Economics, UC San Diego.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- Gerald Brown & Matthew Carlyle & Douglas Diehl & Jeffrey Kline & Kevin Wood, 2005. "A Two-Sided Optimization for Theater Ballistic Missile Defense," Operations Research, INFORMS, vol. 53(5), pages 745-763, October.
- Raghunathan, Srinivasan, 2003. "Impact of demand correlation on the value of and incentives for information sharing in a supply chain," European Journal of Operational Research, Elsevier, vol. 146(3), pages 634-649, May.
- Chu, Wai Hung Julius & Lee, Ching Chyi, 2006. "Strategic information sharing in a supply chain," European Journal of Operational Research, Elsevier, vol. 174(3), pages 1567-1579, November.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
- Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
- Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
- Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
- Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
- Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
- Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
More about this item
Keywords
Game theory Signaling game Secrecy and deception Truthful disclosure Dynamic programming Multi-period game;Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:203:y:2010:i:2:p:409-418. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.