Secrecy and Deception at Equilibrium, with Applications to Anti‐terrorism Resource Allocation

نویسندگان

  • JUN ZHUANG
  • VICKI M. BIER
چکیده

Defence and Peace Economics 1024-2694 (print)/1476-8267 (online) Original Articl 2 10 Taylor & Francis 0 0 JunZhuang jzhua g@buffalo. du In this work, we develop a game-theoretic model for whether and how a first mover should disclose her resource allocation. Our model allows us to explore whether the first mover should disclose correct information about her resource allocation, incorrect information, or no information. Although we study secrecy and deception specifically in the homeland-security context where the first mover is assumed to be the defender, our work can also provide insights in other contexts, such as business competition.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication

In this paper, we develop a game-theoretic model for whether and what a defender should disclose about her resource allocation in the homeland-security context. Our model allows us to explore whether the defender should disclose correct information about her defensive resource allocation (truthful disclosure), incorrect information (deception), or no information (secrecy). In the case where onl...

متن کامل

Reasons for secrecy and deception in homeland-security resource allocation.

In this article, we explore reasons that a defender might prefer secrecy or deception about her defensive resource allocations, rather than disclosure, in a homeland-security context. Our observations not only summarize and synthesize the results of existing game-theoretic work, but also provide intuitions about promising future research directions.

متن کامل

Modeling secrecy and deception in a multiple-period attacker-defender signaling game

In this paper, we apply game theory to model strategies of secrecy and deception in a multiple-period attacker–defender resource-allocation and signaling game with incomplete information. At each period, we allow one of the three possible types of defender signals—truthful disclosure, secrecy, and deception. We also allow two types of information updating—the attacker updates his knowledge abou...

متن کامل

The Unbalanced Imagery of Anti-terrorism Policy

Balancing the competing demands of security and liberty is commonly said to be the central task of anti-terrorism policy. This Essay begins by distinguishing between the two ways in which the notion of balance is presented—the trade-off thesis and the image of a set of scales—and argues that each is flawed as an analytical aid. The Essay then proceeds to show further limitations of the balancin...

متن کامل

Integrated modeling and solving the resource allocation problem and task scheduling in the cloud computing environment

Cloud computing is considered to be a new service provider technology for users and businesses. However, the cloud environment is facing a number of challenges. Resource allocation in a way that is optimum for users and cloud providers is difficult because of lack of data sharing between them. On the other hand, job scheduling is a basic issue and at the same time a big challenge in reaching hi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011