Defending against multiple different attackers
AbstractOne defender defends, and multiple heterogeneous attackers attack, an asset. Three scenarios are considered: the agents move simultaneously; the defender moves first; or the attackers move first. We show how the agents' unit costs of defense and attack, their asset evaluations, and the number of attackers influence their investments, profits, and withdrawal decisions. Withdrawal does not occur in one-period (simultaneous) games between two agents, at least with the commonly used ratio-form contest success function, but can occur in two-period games between two agents. The presence of one particularly strong attacker can cause other attackers to withdraw from the contest if the advantaged attacker appropriates so much of the defender's asset that it is no longer sufficiently attractive to interest other attackers. In such cases, the defender focuses exclusively on the strong attacker. An advantaged defender may be able to deter attacks by moving first, but will continue to suffer from attacks if moving second. This suggests the importance of proactive rather than reactive defense.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
Bibliographic InfoArticle provided by Elsevier in its journal European Journal of Operational Research.
Volume (Year): 211 (2011)
Issue (Month): 2 (June)
Contact details of provider:
Web page: http://www.elsevier.com/locate/eor
War Attack Defense Asset Conflict Contest success function;
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Durham, Yvonne & Hirshleifer, Jack & Smith, Vernon L, 1998.
"Do the Rich Get Richer and the Poor Poorer? Experimental Tests of a Model of Power,"
American Economic Review,
American Economic Association, vol. 88(4), pages 970-83, September.
- Yvonne Durham & Jack Hirshleifer & Vernon L. Smith, 1997. "Do the Richer get Richer and the Poor Poorer? Experimental Tests of a Model of Power," UCLA Economics Working Papers 770, UCLA Department of Economics.
- Halvor Mehlum & Karl Moene, 2006.
"Fighting against the odds,"
Economics of Governance,
Springer, vol. 7(1), pages 75-87, 01.
- Jack Hirshleifer, 1991. "The Paradox Of Power," Economics and Politics, Wiley Blackwell, vol. 3(3), pages 177-200, November.
- Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
- Posner, Richard A, 1975. "The Social Costs of Monopoly and Regulation," Journal of Political Economy, University of Chicago Press, vol. 83(4), pages 807-27, August.
- Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
- Skaperdas, Stergios, 1996.
"Contest Success Functions,"
Springer, vol. 7(2), pages 283-90, February.
- Nitzan, Shmuel, 1994. "Modelling rent-seeking contests," European Journal of Political Economy, Elsevier, vol. 10(1), pages 41-60, May.
- J. Amegashie, 2006. "A contest success function with a tractable noise parameter," Public Choice, Springer, vol. 126(1), pages 135-144, January.
- Todd Sandler, 2005. "Collective versus unilateral responses to terrorism," Public Choice, Springer, vol. 124(1), pages 75-93, July.
- Krueger, Anne O, 1974. "The Political Economy of the Rent-Seeking Society," American Economic Review, American Economic Association, vol. 64(3), pages 291-303, June.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Kunreuther, Howard & Heal, Geoffrey, 2003. " Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-49, March-May.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. " The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-29, March-May.
- Kjell Hausken, 2004. "Mutual Raiding of Production and the Emergence of Exchange," Economic Inquiry, Western Economic Association International, vol. 42(4), pages 572-586, October.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Wendy Shamier).
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.