IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v9y2012i3p238-252.html
   My bibliography  Save this article

Resource Allocation for Homeland Defense: Dealing with the Team Effect

Author

Listed:
  • Andrew Samuel

    (Loyola University Maryland, Baltimore, Maryland 21210)

  • Seth D. Guikema

    (Johns Hopkins University, Baltimore, Maryland 21218)

Abstract

The federal government's allocation of resources for defense against potential attacks generally involves depending on a multitiered organization consisting of federal, state, and local agencies for information on the risks faced in their jurisdictions and the costs and benefits of defensive actions they may take. These agencies then receive resources, ideally based on the collectively reported risks and resource needs. With private information about local risks and defensive actions and limited resources at the federal level, there are ample opportunities for agencies to take advantage of such a system for their benefit. This yields a suboptimal allocation of limited defensive resources. In this paper we describe this allocation problem formally as a game between a single principal (e.g., Congress) and agents representing more local agencies. This differs substantially from the treatment of the attacker--defender problem in the literature, where the defender is treated as a single, unified decision maker. We show that ignoring the within-team defender interactions in modeling the attacker--defender game leads to a suboptimal resource allocation. Existing results from agency theory are applied to this problem together with new results and insights into the interactions between an attacker and a multilevel defender.

Suggested Citation

  • Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
  • Handle: RePEc:inm:ordeca:v:9:y:2012:i:3:p:238-252
    DOI: 10.1287/deca.1120.0242
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/deca.1120.0242
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.1120.0242?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Patrick Bolton & Mathias Dewatripont, 2005. "Contract Theory," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262025760, April.
    2. Groves, Theodore & Radner, Roy, 1972. "Allocation of resources in a team," Journal of Economic Theory, Elsevier, vol. 4(3), pages 415-441, June.
    3. Duncan P. Mann & Jennifer P. Wissink, 1988. "Money-Back Contracts with Double Moral Hazard," RAND Journal of Economics, The RAND Corporation, vol. 19(2), pages 285-292, Summer.
    4. Russell Cooper & Thomas W. Ross, 1985. "Product Warranties and Double Moral Hazard," RAND Journal of Economics, The RAND Corporation, vol. 16(1), pages 103-113, Spring.
    5. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    6. Seth D. Guikema, 2009. "Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 2, pages 13-31, Springer.
    7. Todd Sandler, 2003. "Collective Action and Transnational Terrorism," The World Economy, Wiley Blackwell, vol. 26(6), pages 779-802, June.
    8. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    9. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    10. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    11. Frey, Bruno S. & Luechinger, Simon, 2004. "Decentralization as a disincentive for terror," European Journal of Political Economy, Elsevier, vol. 20(2), pages 509-515, June.
    12. Sandler, Todd & Tschirhart, John T. & Cauley, Jon, 1983. "A Theoretical Analysis of Transnational Terrorism," American Political Science Review, Cambridge University Press, vol. 77(1), pages 36-54, March.
    13. Anil Arya & John C. Fellingham & Richard A. Young, 1993. "The Effects of Risk Aversion on Production Decisions in Decentralized Organizations," Management Science, INFORMS, vol. 39(7), pages 794-805, July.
    14. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    15. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
    16. Todd Sandler & John L. Scott, 1987. "Terrorist Success in Hostage-Taking Incidents," Journal of Conflict Resolution, Peace Science Society (International), vol. 31(1), pages 35-53, March.
    17. Groves, Theodore, 1973. "Incentives in Teams," Econometrica, Econometric Society, vol. 41(4), pages 617-631, July.
    18. Theodore Groves & Martin Loeb, 1979. "Incentives in a Divisionalized Firm," Management Science, INFORMS, vol. 25(3), pages 221-230, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Alexandre Belloni & Giuseppe Lopomo & Shouqiang Wang, 2017. "Resource Allocation Under Demand Uncertainty and Private Information," Management Science, INFORMS, vol. 63(12), pages 4219-4235, December.
    3. Zhang, C. & Liu, X. & Jiang, YP. & Fan, B. & Song, X., 2016. "A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis," European Journal of Operational Research, Elsevier, vol. 250(3), pages 855-864.
    4. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    5. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    6. Allison C. Reilly & Andrew Samuel & Seth D. Guikema, 2015. "“Gaming the System”: Decision Making by Interdependent Critical Infrastructure," Decision Analysis, INFORMS, vol. 12(4), pages 155-172, December.
    7. L. Robin Keller & Kelly M. Kophazi, 2012. "From the Editors ---Copulas, Group Preferences, Multilevel Defenders, Sharing Rewards, and Communicating Analytics," Decision Analysis, INFORMS, vol. 9(3), pages 213-218, September.
    8. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    9. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    10. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    11. Gülpınar, Nalan & Çanakoğlu, Ethem & Branke, Juergen, 2018. "Heuristics for the stochastic dynamic task-resource allocation problem with retry opportunities," European Journal of Operational Research, Elsevier, vol. 266(1), pages 291-303.
    12. M. Hosein Zare & Oleg A. Prokopyev & Denis Sauré, 2020. "On Bilevel Optimization with Inexact Follower," Decision Analysis, INFORMS, vol. 17(1), pages 74-95, March.
    13. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    14. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    3. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    4. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    5. Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
    6. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    7. Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
    8. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    9. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    10. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    11. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    12. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    13. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    14. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    15. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    16. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    17. Sprinkle, Geoffrey B., 2003. "Perspectives on experimental research in managerial accounting," Accounting, Organizations and Society, Elsevier, vol. 28(2-3), pages 287-318.
    18. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    19. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    20. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:9:y:2012:i:3:p:238-252. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.