IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v315y2024i2p580-595.html
   My bibliography  Save this article

Fighting pickpocketing using a choice-based resource allocation model

Author

Listed:
  • Schlicher, Loe
  • Lurkin, Virginie

Abstract

Inspired by European actions to fight organized crimes, we develop a choice-based resource allocation model that can help policy makers to reduce the number of pickpocket attempts. In this model, the policy maker needs to allocate a limited budget over local and central protective resources as well as over potential pickpocket locations, while keeping in mind the thieves’ random preferences towards potential pickpocket locations. We prove that the optimal budget allocation is proportional in (i) the thieves’ sensitivity towards protective resources and (ii) the initial attractiveness of the potential pickpocket locations. On top of this, we also study two alternatives of our choice-based resource allocation model: one where pickpocket probabilities are enforced to be equal over the pickpocket locations, and one where the decision-making process of the thief becomes deterministic, with known preferences, as observed by the policy maker. For both alternatives, we also derive the optimal budget allocation and compare it with the initial budget allocation using numerical experiments. Finally, we illustrate how these optimal budget allocations perform against various others budget allocations, proposed by policy makers from the field.

Suggested Citation

  • Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
  • Handle: RePEc:eee:ejores:v:315:y:2024:i:2:p:580-595
    DOI: 10.1016/j.ejor.2023.12.007
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221723009153
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2023.12.007?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Christian Schaack & Richard C. Larson, 1989. "An N Server Cutoff Priority Queue Where Arriving Customers Request a Random Number of Servers," Management Science, INFORMS, vol. 35(5), pages 614-634, May.
    2. Frith, Michael J., 2019. "Modelling taste heterogeneity regarding offence location choices," Journal of choice modelling, Elsevier, vol. 33(C).
    3. Pacheco Paneque, Meritxell & Bierlaire, Michel & Gendron, Bernard & Sharif Azadeh, Shadi, 2021. "Integrating advanced discrete choice models in mixed integer linear optimization," Transportation Research Part B: Methodological, Elsevier, vol. 146(C), pages 26-49.
    4. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    5. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    6. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    7. Sarah Dunnett & Johanna Leigh & Lisa Jackson, 2019. "Optimising police dispatch for incident response in real time," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(2), pages 269-279, February.
    8. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
    9. Camacho-Collados, M. & Liberatore, F. & Angulo, J.M., 2015. "A multi-criteria Police Districting Problem for the efficient and effective design of patrol sector," European Journal of Operational Research, Elsevier, vol. 246(2), pages 674-684.
    10. Jan M. Chaiken & Peter Dormont, 1978. "A Patrol Car Allocation Model: Background," Management Science, INFORMS, vol. 24(12), pages 1280-1290, August.
    11. Manish Jain & Jason Tsai & James Pita & Christopher Kiekintveld & Shyamsunder Rathi & Milind Tambe & Fernando Ordóñez, 2010. "Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service," Interfaces, INFORMS, vol. 40(4), pages 267-290, August.
    12. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    13. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    14. Qi Feng & J. George Shanthikumar & Mengying Xue, 2022. "Consumer Choice Models and Estimation: A Review and Extension," Production and Operations Management, Production and Operations Management Society, vol. 31(2), pages 847-867, February.
    15. Nicole Adler & Alfred Hakkert & Jonathan Kornbluth & Tal Raviv & Mali Sher, 2014. "Location-allocation models for traffic police patrol vehicles on an interurban network," Annals of Operations Research, Springer, vol. 221(1), pages 9-31, October.
    16. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    17. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    18. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    19. Linda Green & Peter Kolesar, 1984. "The Feasibility of One-Officer Patrol in New York City," Management Science, INFORMS, vol. 30(8), pages 964-981, August.
    20. Aros-Vera, Felipe & Marianov, Vladimir & Mitchell, John E., 2013. "p-Hub approach for the optimal park-and-ride facility location problem," European Journal of Operational Research, Elsevier, vol. 226(2), pages 277-285.
    21. Linda Green, 1984. "A Multiple Dispatch Queueing Model of Police Patrol Operations," Management Science, INFORMS, vol. 30(6), pages 653-664, June.
    22. Linda V. Green & Peter J. Kolesar, 2004. "ANNIVERSARY ARTICLE: Improving Emergency Responsiveness with Management Science," Management Science, INFORMS, vol. 50(8), pages 1001-1014, August.
    23. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
    24. Zhen Qian & H. Zhang, 2013. "A Hybrid Route Choice Model for Dynamic Traffic Assignment," Networks and Spatial Economics, Springer, vol. 13(2), pages 183-203, June.
    25. Bo An & Fernando Ordóñez & Milind Tambe & Eric Shieh & Rong Yang & Craig Baldwin & Joseph DiRenzo & Kathryn Moretti & Ben Maule & Garrett Meyer, 2013. "A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard," Interfaces, INFORMS, vol. 43(5), pages 400-420, October.
    26. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    27. Linda Green & Peter Kolesar, 1984. "A Comparison of the Multiple Dispatch and M/M/c Priority Queueing Models of Police Patrol," Management Science, INFORMS, vol. 30(6), pages 665-670, June.
    28. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    29. Kameng Nip & Zhenbo Wang & Zizhuo Wang, 2021. "Assortment Optimization under a Single Transition Choice Model," Production and Operations Management, Production and Operations Management Society, vol. 30(7), pages 2122-2142, July.
    30. Cheung, Kam-Fung & Bell, Michael G.H., 2021. "Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study," European Journal of Operational Research, Elsevier, vol. 291(2), pages 471-481.
    31. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    32. Jan M. Chaiken & Peter Dormont, 1978. "A Patrol Car Allocation Model: Capabilities and Algorithms," Management Science, INFORMS, vol. 24(12), pages 1291-1300, August.
    33. Paat Rusmevichientong & David Shmoys & Chaoxu Tong & Huseyin Topaloglu, 2014. "Assortment Optimization under the Multinomial Logit Model with Random Choice Parameters," Production and Operations Management, Production and Operations Management Society, vol. 23(11), pages 2023-2039, November.
    34. Kevin Curtin & Karen Hayslett-McCall & Fang Qiu, 2010. "Determining Optimal Police Patrol Areas with Maximal Covering and Backup Covering Location Models," Networks and Spatial Economics, Springer, vol. 10(1), pages 125-145, March.
    35. James Dong & A. Serdar Simsek & Huseyin Topaloglu, 2019. "Pricing Problems under the Markov Chain Choice Model," Production and Operations Management, Production and Operations Management Society, vol. 28(1), pages 157-175, January.
    36. Yang, Xinan & Strauss, Arne K., 2017. "An approximate dynamic programming approach to attended home delivery management," European Journal of Operational Research, Elsevier, vol. 263(3), pages 935-945.
    37. G Levitin & K Hausken, 2012. "Individual versus overarching protection against strategic attacks," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(7), pages 969-981, July.
    38. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    39. Peter J. Kolesar & Kenneth L. Rider & Thomas B. Crabill & Warren E. Walker, 1975. "A Queuing-Linear Programming Approach to Scheduling Police Patrol Cars," Operations Research, INFORMS, vol. 23(6), pages 1045-1062, December.
    40. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    41. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    42. Danny Campbell & Seda Erdem, 2019. "Including Opt-Out Options in Discrete Choice Experiments: Issues to Consider," The Patient: Patient-Centered Outcomes Research, Springer;International Academy of Health Preference Research, vol. 12(1), pages 1-14, February.
    43. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    5. Sukanya Samanta & Goutam Sen & Soumya Kanti Ghosh, 2022. "A literature review on police patrolling problems," Annals of Operations Research, Springer, vol. 316(2), pages 1063-1106, September.
    6. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    7. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
    8. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    9. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    10. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    11. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    12. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    13. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    14. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    15. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    16. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    17. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    18. Linda V. Green & Peter J. Kolesar, 2004. "ANNIVERSARY ARTICLE: Improving Emergency Responsiveness with Management Science," Management Science, INFORMS, vol. 50(8), pages 1001-1014, August.
    19. N C Simpson & P G Hancock, 2009. "Fifty years of operational research and emergency response," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 60(1), pages 126-139, May.
    20. Tobias Vlćek & Knut Haase & Malte Fliedner & Tobias Cors, 2024. "Police service district planning," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 46(4), pages 1029-1061, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:315:y:2024:i:2:p:580-595. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.