Governments' and Terrorists' Defense and Attack in a T-Period Game

نویسندگان

  • Kjell Hausken
  • Jun Zhuang
چکیده

W analyze how a government allocates its resources between attacking to downgrade a terrorist’s resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government’s asset and defending its own resources. A two-stage game is considered where the government moves first and the terrorist moves second. We show that (a) when the terrorist’s resources are low, the government attacks the terrorist’s resources sufficiently to deter the terrorist from attacking and does not defend; (b) when the terrorist’s resources are high, both the government and terrorist defend and attack. We analyze T periods of the two-stage game between two myopic players. First we assume no linkages between periods. We show that after an attack the government may enjoy incoming resources, which deter the terrorist for some periods. Between periods the terrorist’s resources may change because of arithmetically and geometrically changing incoming funds. We allow the government’s and the terrorist’s resources to be determined randomly in each time period. We also allow the government’s resources in one period to depend on the terrorist’s attacks in earlier time periods for three dynamics, where the terrorist’s resources are drawn from a normal distribution or change arithmetically or geometrically.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investment and Defense Strategies, Heuristics, and Games: From the Editor

I our first article, Joseph B. Kadane discusses “Partial-Kelly Strategies and Expected Utility: Small-Edge Asymptotics.” The next article is by Konstantinos V. Katsikopoulos, on “Psychological Heuristics for Making Inferences: Definition, Performance, and the Emerging Theory and Practice.” We then move to papers analyzing strategic national defense. In our third article, David J. Caswell, Ronal...

متن کامل

Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game

Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in ...

متن کامل

Die to kill: psychological and sociological study of suicide terrorism

One of the principal challenges now days, especially in the countries which are engaged in inland riots, is suicide attack which spreads fear broadly in human societies. More than the legal and political reactions to this social phenomenon, one of the preventive ways, is to analyze the suicide terrorists personally. No doubt, achievement to this understanding can be influential in preventing th...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Game-Theoretic Risk Management for Counterterrorism

Federal agencies have finite resources. Even for critical purposes related to counterterrorism, resources must be allocated in the most effective ways possible. Statistical risk analysis can help by accounting for uncertainties in the costs and benefits of particular efforts, and game theory can help by accounting for the fact that terrorists adapt their attacks in response to homeland defense ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Decision Analysis

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2011