IDEAS home Printed from https://ideas.repec.org/a/wly/syseng/v18y2015i4p365-376.html
   My bibliography  Save this article

Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources

Author

Listed:
  • Edouard Kujawski

Abstract

Today's de facto game‐theoretic models assume payoffs given by the von Neumann–Morgenstern expected utility theory. This is not necessarily descriptive of terrorist behavior in real‐world contexts. Terrorists often exhibit a type of strategy‐induced substitution or behavior referred to as transference. Modified prospect theory decision weights are proposed to model transference. To account for the defender's incomplete information, terrorists’ target choice probabilities are modeled with a logit distribution using endogenously determined decision weights. The strategic logit risk analysis (SLRA) method is developed as a framework for integrating the two behavioral models. It accounts for the feedback loop between the allocation of defensive resources and attack probabilities characteristic of adversarial dynamics. For the resource‐allocation optimization problem, SLRA provides a link between traditional safety probabilistic risk analysis (PRA) and game‐theoretic models. A simple but realistic example consisting of three potential targets is used to explore the impact of the proposed behavioral models and differences between minmax, Nash equilibrium, traditional safety PRA, and SLRA strategies. There are profound differences between these models with significant impact on the allocation of counterterrorism defensive resources.

Suggested Citation

  • Edouard Kujawski, 2015. "Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources," Systems Engineering, John Wiley & Sons, vol. 18(4), pages 365-376, July.
  • Handle: RePEc:wly:syseng:v:18:y:2015:i:4:p:365-376
    DOI: 10.1002/sys.21309
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/sys.21309
    Download Restriction: no

    File URL: https://libkey.io/10.1002/sys.21309?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Edouard Kujawski & Mariana L. Alvaro & William R. Edwards, 2004. "Incorporating psychological influences in probabilistic cost analysis," Systems Engineering, John Wiley & Sons, vol. 7(3), pages 195-216.
    2. R. J. Aumann & M. Maschler, 1972. "Some Thoughts on the Minimax Principle," Management Science, INFORMS, vol. 18(5-Part-2), pages 54-63, January.
    3. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    4. Martin Shubik & Robert James Weber, 1981. "Systems defense games: Colonel blotto, command and control," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 28(2), pages 281-287, June.
    5. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    6. Barry M. Horowitz & Yacov Y. Haimes, 2003. "Risk‐based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism," Systems Engineering, John Wiley & Sons, vol. 6(3), pages 152-169.
    7. Bernheim, B Douglas, 1984. "Rationalizable Strategic Behavior," Econometrica, Econometric Society, vol. 52(4), pages 1007-1028, July.
    8. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    9. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    10. Jules H. van Binsbergen & Leslie M. Marx, 2007. "Exploring Relations Between Decision Analysis and Game Theory," Decision Analysis, INFORMS, vol. 4(1), pages 32-40, March.
    11. Train,Kenneth E., 2009. "Discrete Choice Methods with Simulation," Cambridge Books, Cambridge University Press, number 9780521747387, October.
    12. Enders,Walter & Sandler,Todd, 2012. "The Political Economy of Terrorism," Cambridge Books, Cambridge University Press, number 9780521181006, October.
    13. Bernard Harris, 2004. "Mathematical Methods in Combatting Terrorism," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 985-988, August.
    14. Pearce, David G, 1984. "Rationalizable Strategic Behavior and the Problem of Perfection," Econometrica, Econometric Society, vol. 52(4), pages 1029-1050, July.
    15. Martin J. Osborne & Ariel Rubinstein, 1994. "A Course in Game Theory," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262650401, April.
    16. Prajit K. Dutta, 1999. "Strategies and Games: Theory and Practice," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262041693, April.
    17. Seth Guikema, 2012. "Modeling Intelligent Adversaries for Terrorism Risk Assessment: Some Necessary Conditions for Adversary Models," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1117-1121, July.
    18. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    19. Carlos Barros & Isabel Proença, 2005. "Mixed Logit Estimation Of Radical Islamic Terrorism In Europe And North America: A Comparative Study," Microeconomics 0508005, University Library of Munich, Germany.
    20. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    2. Mumtaz Karatas & Ertan Yakıcı & Abdullah Dasci, 2022. "Solving a bi-objective unmanned aircraft system location-allocation problem," Annals of Operations Research, Springer, vol. 319(2), pages 1631-1654, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    3. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    4. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. van Damme, E.E.C., 2000. "Non-cooperative Games," Discussion Paper 2000-96, Tilburg University, Center for Economic Research.
    7. van Damme, E.E.C., 2015. "Game theory : Noncooperative games," Other publications TiSEM ff518f2b-501f-4d99-817b-c, Tilburg University, School of Economics and Management.
    8. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    9. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    10. Asheim, G.B. & Dufwenberg, M., 1996. "Admissibility and Common Knowledge," Discussion Paper 1996-16, Tilburg University, Center for Economic Research.
    11. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    12. Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2012. "Rationalizable Implementation," World Scientific Book Chapters, in: Robust Mechanism Design The Role of Private Information and Higher Order Beliefs, chapter 11, pages 375-404, World Scientific Publishing Co. Pte. Ltd..
    13. Xiao Luo & Xuewen Qian & Chen Qu, 2020. "Iterated elimination procedures," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 70(2), pages 437-465, September.
    14. Nagel, Rosemarie & Bühren, Christoph & Frank, Björn, 2017. "Inspired and inspiring: Hervé Moulin and the discovery of the beauty contest game," Mathematical Social Sciences, Elsevier, vol. 90(C), pages 191-207.
    15. Joseph Y. Halpern & Rafael Pass, 2018. "Game theory with translucent players," International Journal of Game Theory, Springer;Game Theory Society, vol. 47(3), pages 949-976, September.
    16. Chen, Yi-Chun & Sun, Yifei, 2015. "Full implementation in backward induction," Journal of Mathematical Economics, Elsevier, vol. 59(C), pages 71-76.
    17. Vitaly Pruzhansky, 2011. "Some interesting properties of maximin strategies," International Journal of Game Theory, Springer;Game Theory Society, vol. 40(2), pages 351-365, May.
    18. Joseph Greenberg & Sudheer Gupta & Xiao Luo, 2003. "Towering over Babel: Worlds Apart but Acting Together," IEAS Working Paper : academic research 03-A009, Institute of Economics, Academia Sinica, Taipei, Taiwan.
    19. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    20. Holler Manfred J., 2002. "Classical, Modern, and New Game Theory / Klassische, Moderne und Neue Spieltheorie," Journal of Economics and Statistics (Jahrbuecher fuer Nationaloekonomie und Statistik), De Gruyter, vol. 222(5), pages 556-583, October.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:syseng:v:18:y:2015:i:4:p:365-376. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6858 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.