Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models
نویسندگان
چکیده
There are a growing number of automated decision aids based on game-theoretic algorithms in daily use by security agencies to assist in allocating or scheduling their limited security resources. These applications of game theory, based on the “security games” paradigm, are leading to fundamental research challenges: one major challenge is modeling human bounded rationality. More specifically, the security agency, assisted with an automated decision aid, is assumed to act with perfect rationality against a human adversary; it is important to investigate the bounded rationality of these human adversaries to improve effectiveness of security resource allocation. This paper for the first time provides an empirical investigation of adversary bounded rationality in opportunistic crime settings, where modeling bounded rationality is particularly crucial. We conduct extensive human subject experiments, comparing ten different bounded rationality models, and illustrate that: (a) while previous research proposed the use of the stochastic choice “quantal response” model of human adversary, this model is significantly outperformed by more advanced models of “subjective utility quantal response”; (b) Combinations of the well-known prospect theory model with these advanced models lead to an even better performance in modeling human adversary behavior; (c) while it is important to model the non-linear human weighing of probability, as advocated by prospect theory, our findings are the exact opposite of prospect theory in terms of how humans are seen to weigh this non-linear probability.
منابع مشابه
Human Adversaries in Security Games: Integrating Models of Bounded Rationality and Fast Algorithms
Security is a world-wide concern in a diverse set of settings, such as protecting ports, airport and other critical infrastructures, interdicting the illegal flow of drugs, weapons and money, preventing illegal poaching/hunting of endangered species and fish, suppressing crime in urban areas and securing cyberspace. Unfortunately, with limited security resources, not all the potential targets c...
متن کاملDesigning Better Resource Allocation Strategy against Human Adversaries in Security Games
Stackelberg games have garnered significant attention in recent years given their deployment for real world security, such as ARMOR, IRIS and GUARDS. Most of these systems have adopted the standard game-theoretical assumption that adversaries are perfectly rational, which may not hold in real-world security problems due to the bounded rationality of human adversaries and could potentially reduc...
متن کاملDivide to Defend: Collusive Security Games
Research on security games has focused on settings where the defender must protect against either a single adversary or multiple, independent adversaries. However, there are a variety of real-world security domains where adversaries may benefit from colluding in their actions against the defender, e.g., wildlife poaching, urban crime and drug trafficking. Given such adversary collusion may be m...
متن کاملImproving Resource Allocation Strategy against Human Adversaries in Security Games
Recent real-world deployments of Stackelberg security games make it critical that we address human adversaries’ bounded rationality in computing optimal strategies. To that end, this paper provides three key contributions: (i) new efficient algorithms for computing optimal strategic solutions using Prospect Theory and Quantal Response Equilibrium; (ii) the most comprehensive experiment to date ...
متن کاملReal-world security games: toward addressing human decision-making uncertainty
Game theory is a useful tool for reasoning about interactions between agents and in turn aiding in the decisions of those agents. In fact, Stackelberg games are natural models for many important applications such as oligopolistic markets and security domains. Indeed, Stackelberg games are at the heart of three deployed systems, ARMOR; IRIS; and GUARDS, for aiding security officials in making cr...
متن کامل