Trade-offs between target hardening and overarching protection
Author
Abstract
Suggested Citation
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
- Mas-Colell, Andreu & Whinston, Michael D. & Green, Jerry R., 1995. "Microeconomic Theory," OUP Catalogue, Oxford University Press, number 9780195102680.
- Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Edwards, Ward & Barron, F. Hutton, 1994. "SMARTS and SMARTER: Improved Simple Methods for Multiattribute Utility Measurement," Organizational Behavior and Human Decision Processes, Elsevier, vol. 60(3), pages 306-325, December.
- Cooke, Roger M. & Nauta, Maarten & Havelaar, Arie H. & van der Fels, Ine, 2006. "Probabilistic inversion for chicken processing lines," Reliability Engineering and System Safety, Elsevier, vol. 91(10), pages 1364-1372.
- Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
- Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
- Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
- Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.
- Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
- Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
- Nicholas T. Boardman & Brian J. Lunday & Matthew J. Robbins, 2017. "Heterogeneous surface-to-air missile defense battery location: a game theoretic approach," Journal of Heuristics, Springer, vol. 23(6), pages 417-447, December.
- Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
- Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
- Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
- Kurth, Margaret & Keisler, Jeffrey M. & Bates, Matthew E. & Bridges, Todd S. & Summers, Jeffrey & Linkov, Igor, 2017. "A portfolio decision analysis approach to support energy research and development resource allocation," Energy Policy, Elsevier, vol. 105(C), pages 128-135.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
- Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
- Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
- Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
- Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
More about this item
Keywords
Decision analysis Game theory Resource allocation Terrorism Natural disaster;Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:213:y:2011:i:1:p:320-328. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.