Attacker Deterrence and Perceived Risk in a Stackelberg Security Game
Author
Abstract
Suggested Citation
DOI: 10.1111/risa.12547
Download full text from publisher
References listed on IDEAS
- Alex Braithwaite & Dennis M. Foster & David A. Sobek, 2010. "Ballots, Bargains, and Bombs: Terrorist Targeting of Spoiler Opportunities," International Interactions, Taylor & Francis Journals, vol. 36(3), pages 294-305, August.
- Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013.
"An experimental investigation of Colonel Blotto games,"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
- Chowdhury, Subhasish M. & Kovenock, Dan & Sheremeta, Roman M., 2009. "An experimental investigation of Colonel Blotto games [Eine experimentelle Untersuchung von „Colonel Blotto“-Spielen]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2009-08, WZB Berlin Social Science Center.
- Subhasish M. Chowdhury & Dan Kovenock J. & Roman M. Sheremeta, 2009. "An Experimental Investigation of Colonel Blotto Games," CESifo Working Paper Series 2688, CESifo.
- Chowdhury, Subhasish & Kovenock, Dan & Sheremeta, Roman, 2011. "An Experimental Investigation of Colonel Blotto Games," MPRA Paper 46810, University Library of Munich, Germany.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
- Tversky, Amos & Kahneman, Daniel, 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Springer, vol. 5(4), pages 297-323, October.
- Gregory DeAngelo & Gary Charness, 2012. "Deterrence, expected cost, uncertainty and voting: Experimental evidence," Journal of Risk and Uncertainty, Springer, vol. 44(1), pages 73-100, February.
- McKelvey Richard D. & Palfrey Thomas R., 1995.
"Quantal Response Equilibria for Normal Form Games,"
Games and Economic Behavior, Elsevier, vol. 10(1), pages 6-38, July.
- McKelvey, Richard D. & Palfrey, Thomas R., 1994. "Quantal Response Equilibria For Normal Form Games," Working Papers 883, California Institute of Technology, Division of the Humanities and Social Sciences.
- R. McKelvey & T. Palfrey, 2010. "Quantal Response Equilibria for Normal Form Games," Levine's Working Paper Archive 510, David K. Levine.
- Nicholas Scurich & Richard S. John, 2014. "Perceptions of Randomized Security Schedules," Risk Analysis, John Wiley & Sons, vol. 34(4), pages 765-770, April.
- Tversky, Amos & Slovic, Paul & Kahneman, Daniel, 1990. "The Causes of Preference Reversal," American Economic Review, American Economic Association, vol. 80(1), pages 204-217, March.
- Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
- Paul Slovic & Melissa L. Finucane & Ellen Peters & Donald G. MacGregor, 2004. "Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality," Risk Analysis, John Wiley & Sons, vol. 24(2), pages 311-322, April.
- Daniel Kahneman & Amos Tversky, 2013.
"Prospect Theory: An Analysis of Decision Under Risk,"
World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127,
World Scientific Publishing Co. Pte. Ltd..
- Kahneman, Daniel & Tversky, Amos, 1979. "Prospect Theory: An Analysis of Decision under Risk," Econometrica, Econometric Society, vol. 47(2), pages 263-291, March.
- Amos Tversky & Daniel Kahneman, 1979. "Prospect Theory: An Analysis of Decision under Risk," Levine's Working Paper Archive 7656, David K. Levine.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
- Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Lana Friesen, 2012. "Certainty of Punishment versus Severity of Punishment: An Experimental Investigation," Southern Economic Journal, John Wiley & Sons, vol. 79(2), pages 399-421, October.
- Slovic, Paul & Finucane, Melissa L. & Peters, Ellen & MacGregor, Donald G., 2007. "The affect heuristic," European Journal of Operational Research, Elsevier, vol. 177(3), pages 1333-1352, March.
- Catherine C. Eckel & Philip J. Grossman, 2008. "Forecasting Risk Attitudes: An Experimental Study Using Actual and Forecast Gamble Choices," Monash Economics Working Papers archive-01, Monash University, Department of Economics.
- K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Špačková Zuzana & Špaček David, 2020. "Using Game Theory in Public Domains: The Potential and Limitations of Security Games," NISPAcee Journal of Public Administration and Policy, Sciendo, vol. 13(2), pages 249-272, December.
- Sarah A. Kusumastuti & Jim Blythe & Heather Rosoff & Richard S. John, 2020. "Behavioral Determinants of Target Shifting and Deterrence in an Analog Cyber‐Attack Game," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 476-493, March.
- Tamara Stotz & Angela Bearth & Signe Maria Ghelfi & Michael Siegrist, 2020. "Evaluating the Perceived Efficacy of Randomized Security Measures at Airports," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1469-1480, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015.
"A survey of experimental research on contests, all-pay auctions and tournaments,"
Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
- Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2012. "A Survey of Experimental Research on Contests, All-Pay Auctions and Tournaments," Working Papers 12-22, Chapman University, Economic Science Institute.
- Dechenaux, Emmanuel & Kovenock, Dan & Sheremeta, Roman, 2014. "A Survey of Experimental Research on Contests, All-Pay Auctions and Tournaments," MPRA Paper 59714, University Library of Munich, Germany.
- Dechenaux, Emmanuel & Kovenock, Dan & Sheremeta, Roman M., 2012. "A survey of experimental research on contests, all-pay auctions and tournaments," Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism" SP II 2012-109, WZB Berlin Social Science Center.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Sheremeta, Roman, 2014. "Behavior in Contests," MPRA Paper 57451, University Library of Munich, Germany.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Rianne Duinen & Tatiana Filatova & Wander Jager & Anne Veen, 2016. "Going beyond perfect rationality: drought risk, economic choices and the influence of social networks," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 57(2), pages 335-369, November.
- Bart de Langhe & Stefano Puntoni, 2015. "Bang for the Buck: Gain-Loss Ratio as a Driver of Judgment and Choice," Management Science, INFORMS, vol. 61(5), pages 1137-1163, May.
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- repec:elg:eechap:15325_10 is not listed on IDEAS
- Roman M. Sheremeta, 2013.
"Overbidding And Heterogeneous Behavior In Contest Experiments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 27(3), pages 491-514, July.
- Sheremeta, Roman, 2013. "Overbidding and Heterogeneous Behavior in Contest Experiments," MPRA Paper 44124, University Library of Munich, Germany.
- Roman M. Sheremeta, 2013. "Overbidding and Heterogeneous Behavior in Contest Experiments," Working Papers 13-06, Chapman University, Economic Science Institute.
- Sheremeta, Roman, 2014.
"Behavioral Dimensions of Contests,"
MPRA Paper
57751, University Library of Munich, Germany.
- Roman M. Sheremeta, 2014. "Behavioral Dimensions of Contests," Working Papers 14-14, Chapman University, Economic Science Institute.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Wei Pan & Yi-Shin Chen, 2018. "Network approach for decision making under risk—How do we choose among probabilistic options with the same expected value?," PLOS ONE, Public Library of Science, vol. 13(4), pages 1-19, April.
- Tomas Bonavia & Josué Brox-Ponce, 2018. "Shame in decision making under risk conditions: Understanding the effect of transparency," PLOS ONE, Public Library of Science, vol. 13(2), pages 1-16, February.
- Alarie, Yves & Dionne, Georges, 2005.
"Testing explanations of preference reversal: A model,"
Working Papers
05-2, HEC Montreal, Canada Research Chair in Risk Management.
- Yves Alarie & Georges Dionne, 2005. "Testing Explanations of Preference Reversal: a Model," Cahiers de recherche 0510, CIRPEE.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:36:y:2016:i:8:p:1666-1681. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.