Advanced Search
MyIDEAS: Login to save this article or follow this journal

Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation

Contents:

Author Info

  • Jun Zhuang
  • Vicki Bier
Registered author(s):

    Abstract

    In this work, we develop a game-theoretic model for whether and how a first mover should disclose her resource allocation. Our model allows us to explore whether the first mover should disclose correct information about her resource allocation, incorrect information, or no information. Although we study secrecy and deception specifically in the homeland-security context where the first mover is assumed to be the defender, our work can also provide insights in other contexts, such as business competition.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.tandfonline.com/doi/abs/10.1080/10242694.2010.491668
    Download Restriction: Access to full text is restricted to subscribers.

    As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.

    Bibliographic Info

    Article provided by Taylor & Francis Journals in its journal Defence and Peace Economics.

    Volume (Year): 22 (2011)
    Issue (Month): 1 ()
    Pages: 43-61

    as in new window
    Handle: RePEc:taf:defpea:v:22:y:2011:i:1:p:43-61

    Contact details of provider:
    Web page: http://www.tandfonline.com/GDPE20

    Order Information:
    Web: http://www.tandfonline.com/pricing/journal/GDPE20

    Related research

    Keywords: Secrecy and deception; Truthful disclosure; Homeland security; Resource allocation; Game theory;

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as in new window

    Cited by:
    1. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:taf:defpea:v:22:y:2011:i:1:p:43-61. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Michael McNulty).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.