Governments' and Terrorists' Defense and Attack in a T-Period Game
نویسندگان
چکیده
W analyze how a government allocates its resources between attacking to downgrade a terrorist’s resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government’s asset and defending its own resources. A two-stage game is considered where the government moves first and the terrorist moves second. We show that (a) when the terrorist’s resources are low, the government attacks the terrorist’s resources sufficiently to deter the terrorist from attacking and does not defend; (b) when the terrorist’s resources are high, both the government and terrorist defend and attack. We analyze T periods of the two-stage game between two myopic players. First we assume no linkages between periods. We show that after an attack the government may enjoy incoming resources, which deter the terrorist for some periods. Between periods the terrorist’s resources may change because of arithmetically and geometrically changing incoming funds. We allow the government’s and the terrorist’s resources to be determined randomly in each time period. We also allow the government’s resources in one period to depend on the terrorist’s attacks in earlier time periods for three dynamics, where the terrorist’s resources are drawn from a normal distribution or change arithmetically or geometrically.
منابع مشابه
Investment and Defense Strategies, Heuristics, and Games: From the Editor
I our first article, Joseph B. Kadane discusses “Partial-Kelly Strategies and Expected Utility: Small-Edge Asymptotics.” The next article is by Konstantinos V. Katsikopoulos, on “Psychological Heuristics for Making Inferences: Definition, Performance, and the Emerging Theory and Practice.” We then move to papers analyzing strategic national defense. In our third article, David J. Caswell, Ronal...
متن کاملHybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in ...
متن کاملDie to kill: psychological and sociological study of suicide terrorism
One of the principal challenges now days, especially in the countries which are engaged in inland riots, is suicide attack which spreads fear broadly in human societies. More than the legal and political reactions to this social phenomenon, one of the preventive ways, is to analyze the suicide terrorists personally. No doubt, achievement to this understanding can be influential in preventing th...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملGame-Theoretic Risk Management for Counterterrorism
Federal agencies have finite resources. Even for critical purposes related to counterterrorism, resources must be allocated in the most effective ways possible. Statistical risk analysis can help by accounting for uncertainties in the costs and benefits of particular efforts, and game theory can help by accounting for the fact that terrorists adapt their attacks in response to homeland defense ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Decision Analysis
دوره 8 شماره
صفحات -
تاریخ انتشار 2011