Game Theory in an Age of Terrorism: How Can Statisticians Contribute?

نویسنده

  • Ronald D. Fricker
چکیده

In The Law of Loopholes in Action [Gel05], David Gelernter argues that “every loophole will eventually be exploited; every loophole will eventually be closed.” His thesis applied to terrorism means that terrorists will find security loopholes via continual exploration and that, once discovered, specific defensive measures have to be put in place to close each loophole. The net effect of the Law of Loopholes, as anyone who flies regularly today knows, is an ever-expanding set of security rules and requirements. Such rules and requirements are useful for helping prevent the reoccurrence of a particular type of incident. But, when a determined adversary’s focus is on causing general destruction and mayhem, then as one loophole is plugged, the adversary simply shifts its attention and energies to looking for and trying to exploit a different loophole. The problem, of course, is that it is impossible to defend all potential targets (and their associated loopholes) against all threats all of the time. While it is important to implement certain new and improved defensive tactics, precisely because it is impossible to protect everything at all times, it is equally as important (and arguably more important) to implement offensive strategies to deter and disrupt these adversaries. The question is, how to identify effective offensive and defensive strategies and tactics? One approach is through the use of game theory, the mathematically based study and analysis of adversarial conflicts. The classic text The Compleat Strategyst [Wil66] characterizes games of strategy as having the following characteristics:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative aggregate production planning: a game theory approach

Production costs in general, and workforce and inventory costs in particular, constitute a large fraction of the operating costs of many manufacturing plants. We introduce cooperative aggregate production planning as a way to decrease these costs. That is, when production planning of two or more facilities (plants) is integrated, they can interchange workforce and products inventory; thus, thei...

متن کامل

Split Appearance. Patchy and Coherent Features in Fragments of Gameplay, Mohenjo-daro, Sindh

This paper centers on ancient, generally rather scattered and elusive remains of gameplay. Focusing on a discreteassemblage of game-related artefacts from the Bronze Age Indus Valley urban settlement of Mohenjo-daro, it conductsa detailed study of some of the patchy features to see whether more structured elements thereby can be distinguished.The finds are approached situated in a broader, game...

متن کامل

Cooperative network flow problem with pricing decisions and allocation of benefits: A game theory approach

Several real problems in telecommunication, transportation, and distribution industries can be well analyzed by network flow models. In revenue management, pricing plays a primary role which increases the profit generated from a limited supply of assets. Pricing decision directly affects the amount of service or product demand. Hence, in traditional maximum flow problem, we assume that the dema...

متن کامل

A JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS

Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...

متن کامل

Defending Cyber Terrorism - A Game Theoretic Modeling Approach

In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006