Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wzw2p Total loading time: 0 Render date: 2024-04-30T18:57:50.642Z Has data issue: false hasContentIssue false

27 - Homeland Security Resource Allocation Games: Considering Partially Strategic Attackers and Equity

Published online by Cambridge University Press:  13 December 2017

Ali E. Abbas
Affiliation:
University of Southern California
Milind Tambe
Affiliation:
University of Southern California
Detlof von Winterfeldt
Affiliation:
University of Southern California
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ackman, D. (2001). The cost of being Osama bin Laden. www.forbes.com/2001/09/14/0914ladenmoney.html. Accessed in February 2015.Google Scholar
Associated Press. (2011). Cities affected by anti-terrorism grant cuts. Washington Post. www.foxnews.com/us/2011/05/19/cities-affected-anti-terrorism-grant-cuts/. Accessed in August 2012.Google Scholar
Atkinson, M. P., Cao, Z., & Wein, L. M. (2008). Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack. Risk Analysis, 28(2), 353371.CrossRefGoogle ScholarPubMed
Bertsimas, D., Farias, V. F., & Trichakis, N. (2011). The price of fairness. Operations Research, 59(1), 1731.CrossRefGoogle Scholar
Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763770.Google ScholarPubMed
Brown, G., Carlyle, M., Diehl, D., Kline, J., & Wood, K. (2005). A two-sided optimization for theater ballistic missile defense. Operations Research, 53(5), 263275.CrossRefGoogle Scholar
Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530544.Google Scholar
Chanta, S., Mayorga, M. E., Kurz, M. E., & McLay, L. A. (2011). The minimum p-envy location problem: A new model for equitable distribution of emergency resources. IIE Transactions on Healthcare Systems Engineering, 1(2), 101115.Google Scholar
Cox, L. A. (2009). Game theory and risk analysis. Risk Analysis, 29(8), 10621068.CrossRefGoogle Scholar
Crawford, V. P. (2003). Lying for strategic advantages: Rational and boundedly rational misrepresentation of intentions. American Economic Review, 93(1), 133149.Google Scholar
Davidson, R. A., Nozick, L. K., Xu, N., & Dodo, A. (2005, June 19–23). Equity in regional earthquake risk mitigation investment decisions. Safety and reliability of engineering systems and structures. Proceedings of the Ninth International Conference on Structural Safety and Reliability ICOSSAR ‘05, Rome, Italy (pp. 2721–2728).Google Scholar
de Rugy, V. (2005). Homeland security pork. Washington Times. www.aei.org/publication/homeland-security-pork/. Accessed in February 2015.Google Scholar
Dillon, R. L., John, R., & von Winterfeldt, D. (2002). Assessment of cost uncertainties for large technology projects: A methodology and an application. Interfaces, 32(4), 5266.CrossRefGoogle Scholar
Ezell, B. C., Bennett, S. P., von Winterfeldt, D., Sokolowski, J., & Collins, A. J. (2010). Probabilistic risk analysis and terrorism risk. Risk Analysis, 30(4), 575589.Google Scholar
Fishburn, P. C. (1984). Equity axioms for public risks. Operations Research, 32(5), 901908.Google Scholar
Fishburn, P. C., & Sarin, R. K. (1991). Dispersive equity and social risk. Management Science, 37(7), 751769.Google Scholar
Georgeff, M., Pell, P., Pollack, M., Tambe, M., & Wooldridge, M. (1999). The belief-desire-intention model of agency. In Intelligent agents V: Agents theories, architectures, and languages (pp. 1–10). Berlin Heidelberg: Springer.Google Scholar
Gigerenzer, G., & Selten, R. (2002). Bounded rationality: The adaptive toolbox. Cambridge, MA: MIT Press.Google Scholar
Gillborn, D., & Youdell, D. (1999). Rationing education: Policy, practice, reform and equity. Philadelphia, PA: Open University Press.Google Scholar
Golalikhani, M., & Zhuang, J. (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis, 31(4), 533547.CrossRefGoogle ScholarPubMed
Gomez, D. C., & Miguel, J. (2010). A financial profile of the terrorism of Al-Qaeda and its affiliates. Perspectives on Terror, 4(4), 327.Google Scholar
Hao, M., Jin, S., & Zhuang, J. (2009). Robustness of optimal defensive resource allocations in the face of less fully rational attacker. Proceedings of the 2009 Industrial Engineering Research Conference (pp. 886–891).Google Scholar
Harris, B. (2004). Mathematical methods in combating terrorism. Risk Analysis, 24(4), 985988.Google Scholar
Hausken, K. (2002). Probabilistic risk analysis and game theory. Risk Analysis, 22(1), 1727.Google Scholar
Hu, J., Homem-de Mello, T., & Mehrotra, S. (2011). Risk adjusted budget allocation models with application in homeland security. IIE Transactions, 43(12), 819839.Google Scholar
Illich, I. (2000). Energy and equity. London: Marion Boyars Publishers Ltd.Google Scholar
Jiang, A. X., Yin, Z., Zhang, C., Tambe, M., & Kraus, S. (2013). Game-theoretic randomization for security patrolling with dynamic execution uncertainty. Proceedings of the 2013 International Conference on Autonomous Agents and Multiagent Systems (pp. 207214).Google Scholar
Jose, V. R. R., & Zhuang, J. (2013). Technology adoption, accumulation, and competition in multi-period attacker-defender games. Military Operations Research, 18(2), 3347.Google Scholar
Kahneman, D. (2003). A perspective on judgment and choice: Mapping bounded rationality. American Psychologist, 58(9), 697720.Google Scholar
Kaplan, E. H. (2010). Terror queues. Operations Research, 58(4), 773784.Google Scholar
Kaplan, E. H., & Kress, M. (2005). Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis. Proceedings of the National Academy of Science, 102(29), 1039910404.Google Scholar
Kaplan, E. H., Kress, M., & Szechtman, R. (2010). Confronting entrenched insurgents. Operations Research, 58(2), 329341.Google Scholar
Keeney, R. L. (2007). Modeling values for anti-terrorism analysis. Risk Analysis, 27(3), 585596.Google Scholar
Keller, L. R., & Sarin, R. K. (1988). Equity in social risk: Some empirical observations. Risk Analysis, 8(1), 135146.CrossRefGoogle Scholar
Keller, L. R., & Sarin, R. K. (1995). Fair processes for societal decisions involving distributional inequalities. Risk Analysis, 15(1), 4959.Google Scholar
Kress, M., & Szechtman, R. (2009). Why defeating insurgencies is hard: The effect of intelligence in counterinsurgency operations – a best case scenario. Operations Research, 57(3), 578585.CrossRefGoogle Scholar
Lambert, P. J., & Aronson, J. R. (1993). Inequality decomposition analysis and the Gini coefficient revisited. The Economic Journal, 103(420), 12211227.Google Scholar
Levitin, G., & Hausken, K. (2009). Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts. IEEE Transactions on Reliability, 58(4), 679690.Google Scholar
Lin, K. Y., Kress, M., & Szechtman, R. (2009). Scheduling policies for an antiterrorist surveillance system. Naval Research Logistics, 56(2). 113126.Google Scholar
Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., & Tambe, M. (2013). Analyzing the effectiveness of adversary modeling in security games.Google Scholar
Nikoofal, M. E., & Zhuang, J. (2012). Robust allocation of a defensive budget considering an attacker’s private information. Risk Analysis, 32(5), 930943.Google Scholar
Parnell, G. S., Smith, C. M., & Moxley, F. I. (2010). Intelligent adversary risk analysis: a bioterrorism risk management model. Risk Analysis, 30(1), 3248.CrossRefGoogle ScholarPubMed
Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527541.CrossRefGoogle Scholar
Powell, R. (2009). Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack. Games and Economic Behavior, 67(2), 611615.Google Scholar
Rio Insua, D., Jesus, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841854.Google Scholar
Rose, A., Stevens, B., Edmonds, J., & Wise, M. (1998). International equity and differentiation in global warming policy. Environmental and Resource Economics, 12(1), 2551.CrossRefGoogle Scholar
Rosoff, H., & von Winterfeldt, D. (2007). A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach. Risk Analysis, 27(3), 533546.CrossRefGoogle ScholarPubMed
Shan, X., & Zhuang, J. (2013a). Cost of equity in homeland security resource allocations in the face of a strategic attacker. Risk Analysis, 33(6), 10831099.Google Scholar
Shan, X., & Zhuang, J. (2013b). Hybrid defensive resource allocations in the face of a partially strategic attacker. European Journal of Operational Research, 228(1), 262272.Google Scholar
Shan, X., & Zhuang, J. (2014a). Modeling credible retaliation in deterring smuggling of nuclear weapons – A three-stage game. Decision Analysis, 11(1), 4362.Google Scholar
Shan, X., & Zhuang, J. (2014b). Subsidizing to disrupt a terrorism supply chain – a four-player game. Journal of the Operational Research Society, 65(7), 11081119.Google Scholar
Simon, H. A. (1957). Model of man: Social and rational. New York: Wiley.Google Scholar
Simon, H. A. (1982). Models of bounded rationality: Empirically grounded economic reason, vol. 3. Cambridge, MA: MIT Press.Google Scholar
Sounderpandian, J. (1989). Ex ante equity in public risk. Operations Research, 37(4), 528530.CrossRefGoogle Scholar
Stillwell, W. G., Von Winterfeldt, D., & John, R. S. (1987). Comparing hierarchical and nonhierarchical weighting methods for eliciting multiattribute value models. Management Science, 33(4), 442450.Google Scholar
U.S. Congress. (1998). Transportation Equity Act for the 21st Century. www.fhwa.dot.gov/tea21/h2400enr.htm. Accessed in February 2015.Google Scholar
U.S. Department of Homeland Security. (2004). Fiscal Year 2004 Urban Areas Security Initiative Grant Program. http://web.archive.org/web/*/http://www.ojp.usdoj.gov/odp/docs/fy04uasi.pdf. Accessed in February 2015.Google Scholar
U. S. Department of Homeland Security. (2013). Budget and performance. www.dhs.gov/xabout/budget/dhs-budget.shtm. Accessed in February 2015.Google Scholar
U.S. Government Accountability Office. (2008). DHS risk-based grant methodology is reasonable, but current version’s measure of vulnerability is limited. www.gao.gov/new.items/d08852.pdf. Accessed in February 2015.Google Scholar
Wang, C., & Bier, V. M. (2010). Impact of intelligence on target-hardening decisions based on multiattribute terrorist utility. HST’09. IEEE Conference on Technologies for Homeland Security (pp. 373–380).Google Scholar
Wang, C., & Bier, V. M. (2011). Target-hardening decisions based on uncertain multiattribute terrorist utility. Decision Analysis, 8(4), 286302.Google Scholar
Wang, X., & Zhuang, J. (2011). Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 212(1), 100111.Google Scholar
Wein, L. M. (2009). Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse lecture. Operations Research, 57(4), 801811.Google Scholar
Willis, H. H., Morral, A. R., Kelly, T. K., & Medby, J. J. (2005). Estimating terrorism risk. www.rand.org/pubs/monographs/MG388.html. Accessed in February 2015.CrossRefGoogle Scholar
Winterfeldt, D., John, R. S., & Borcherding, K. (1981). Cognitive components of risk ratings. Risk Analysis, 1(4), 277287.Google Scholar
Xu, J., Zhuang, J., & Liu, Z. (2015). Modeling and mitigating the effects of supply chain disruption in a defender-attacker game. Annals of Operations Research, 236(1), 255–270.Google Scholar
Yetman, J. (2004). Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off. Defence and Peace Economics, 15(3), 221230.Google Scholar
Young, P. (1994). Equity: In theory and practice. Princeton, NJ: Princeton University Press.Google Scholar
Zhuang, J. (2010). Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with error. The Engineering Economist, 55(2), 131149.Google Scholar
Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters – Defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976991.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×