IDEAS home Printed from https://ideas.repec.org/a/taf/defpea/v31y2020i6p659-676.html
   My bibliography  Save this article

Decentralized Defence of a (Directed) Network Structure

Author

Listed:
  • Marco Pelliccia

Abstract

We model the decentralized defence choice of agents connected in a directed graph and exposed to an external threat. The network allows players to receive goods from one or more producers through directed paths. Each agent is endowed with a finite and divisible defence resource that can be allocated to their own security or to that of their peers. The external threat is represented by either a random attack on one of the nodes or by an intelligent attacker who aims to maximize the flow-disruption by seeking to destroy one node. We show that under certain conditions a decentralized defence allocation is efficient when we assume the attacker to be strategic: a centralized allocation of defence resources which minimizes the flow-disruption coincides with a decentralized equilibrium allocation. On the other hand, when we assume a random attack, the decentralized allocation is likely to diverge from the central planner’s allocation.

Suggested Citation

  • Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
  • Handle: RePEc:taf:defpea:v:31:y:2020:i:6:p:659-676
    DOI: 10.1080/10242694.2019.1587679
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/10242694.2019.1587679
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/10242694.2019.1587679?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to look for a different version below or search for a different version of it.

    Other versions of this item:

    References listed on IDEAS

    as
    1. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015. "Contagion Risk and Network Design," Climate Change and Sustainable Development 206416, Fondazione Eni Enrico Mattei (FEEM).
    4. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    5. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    6. Lapan, Harvey E. & Sandler, Todd, 1993. "Terrorism and signalling," European Journal of Political Economy, Elsevier, vol. 9(3), pages 383-397, August.
    7. repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
    8. Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
    9. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    10. Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment. Are efficient networks too complex?," Working Papers CIE 101, Paderborn University, CIE Center for International Economics.
    2. Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment - Are Efficient Networks too Complex?," Working Papers 2017.30, Fondazione Eni Enrico Mattei.
    3. Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    4. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
    5. Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
    6. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    7. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    8. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    9. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    10. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    11. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    12. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    13. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    14. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    15. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    16. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
    17. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
    18. Landwehr, Jakob, 2015. "Network design and imperfect defense," Center for Mathematical Economics Working Papers 537, Center for Mathematical Economics, Bielefeld University.
    19. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    20. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.

    More about this item

    JEL classification:

    • C69 - Mathematical and Quantitative Methods - - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling - - - Other

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:defpea:v:31:y:2020:i:6:p:659-676. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/GDPE20 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.