Secrecy and Deception at Equilibrium, with Applications to Anti‐terrorism Resource Allocation
نویسندگان
چکیده
Defence and Peace Economics 1024-2694 (print)/1476-8267 (online) Original Articl 2 10 Taylor & Francis 0 0 JunZhuang jzhua g@buffalo. du In this work, we develop a game-theoretic model for whether and how a first mover should disclose her resource allocation. Our model allows us to explore whether the first mover should disclose correct information about her resource allocation, incorrect information, or no information. Although we study secrecy and deception specifically in the homeland-security context where the first mover is assumed to be the defender, our work can also provide insights in other contexts, such as business competition.
منابع مشابه
Secrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication
In this paper, we develop a game-theoretic model for whether and what a defender should disclose about her resource allocation in the homeland-security context. Our model allows us to explore whether the defender should disclose correct information about her defensive resource allocation (truthful disclosure), incorrect information (deception), or no information (secrecy). In the case where onl...
متن کاملReasons for secrecy and deception in homeland-security resource allocation.
In this article, we explore reasons that a defender might prefer secrecy or deception about her defensive resource allocations, rather than disclosure, in a homeland-security context. Our observations not only summarize and synthesize the results of existing game-theoretic work, but also provide intuitions about promising future research directions.
متن کاملModeling secrecy and deception in a multiple-period attacker-defender signaling game
In this paper, we apply game theory to model strategies of secrecy and deception in a multiple-period attacker–defender resource-allocation and signaling game with incomplete information. At each period, we allow one of the three possible types of defender signals—truthful disclosure, secrecy, and deception. We also allow two types of information updating—the attacker updates his knowledge abou...
متن کاملThe Unbalanced Imagery of Anti-terrorism Policy
Balancing the competing demands of security and liberty is commonly said to be the central task of anti-terrorism policy. This Essay begins by distinguishing between the two ways in which the notion of balance is presented—the trade-off thesis and the image of a set of scales—and argues that each is flawed as an analytical aid. The Essay then proceeds to show further limitations of the balancin...
متن کاملIntegrated modeling and solving the resource allocation problem and task scheduling in the cloud computing environment
Cloud computing is considered to be a new service provider technology for users and businesses. However, the cloud environment is facing a number of challenges. Resource allocation in a way that is optimum for users and cloud providers is difficult because of lack of data sharing between them. On the other hand, job scheduling is a basic issue and at the same time a big challenge in reaching hi...
متن کامل