IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v36y2016i8p1666-1681.html
   My bibliography  Save this article

Attacker Deterrence and Perceived Risk in a Stackelberg Security Game

Author

Listed:
  • Garret Ridinger
  • Richard S. John
  • Michael McBride
  • Nicholas Scurich

Abstract

In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense schemes, the key treatment variable being whether the defender picks one target at random to guard or imperfectly guards all targets. The two schemes are expected‐payoff equivalent, and when provided separately we found no effect of having one scheme or the other. Yet, when both are present, we found that subjects had a preference for the fixed scheme, a preference that cannot be reduced to differences in beliefs. Overall, our results suggest that understanding how individuals perceive risk is vital to understand the behavior of attackers.

Suggested Citation

  • Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
  • Handle: RePEc:wly:riskan:v:36:y:2016:i:8:p:1666-1681
    DOI: 10.1111/risa.12547
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12547
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12547?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Alex Braithwaite & Dennis M. Foster & David A. Sobek, 2010. "Ballots, Bargains, and Bombs: Terrorist Targeting of Spoiler Opportunities," International Interactions, Taylor & Francis Journals, vol. 36(3), pages 294-305, August.
    2. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    3. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    4. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    5. Tversky, Amos & Kahneman, Daniel, 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Springer, vol. 5(4), pages 297-323, October.
    6. Gregory DeAngelo & Gary Charness, 2012. "Deterrence, expected cost, uncertainty and voting: Experimental evidence," Journal of Risk and Uncertainty, Springer, vol. 44(1), pages 73-100, February.
    7. McKelvey Richard D. & Palfrey Thomas R., 1995. "Quantal Response Equilibria for Normal Form Games," Games and Economic Behavior, Elsevier, vol. 10(1), pages 6-38, July.
    8. Nicholas Scurich & Richard S. John, 2014. "Perceptions of Randomized Security Schedules," Risk Analysis, John Wiley & Sons, vol. 34(4), pages 765-770, April.
    9. Tversky, Amos & Slovic, Paul & Kahneman, Daniel, 1990. "The Causes of Preference Reversal," American Economic Review, American Economic Association, vol. 80(1), pages 204-217, March.
    10. Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
    11. Paul Slovic & Melissa L. Finucane & Ellen Peters & Donald G. MacGregor, 2004. "Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality," Risk Analysis, John Wiley & Sons, vol. 24(2), pages 311-322, April.
    12. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    13. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    14. Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
    15. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    16. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    17. Lana Friesen, 2012. "Certainty of Punishment versus Severity of Punishment: An Experimental Investigation," Southern Economic Journal, John Wiley & Sons, vol. 79(2), pages 399-421, October.
    18. Slovic, Paul & Finucane, Melissa L. & Peters, Ellen & MacGregor, Donald G., 2007. "The affect heuristic," European Journal of Operational Research, Elsevier, vol. 177(3), pages 1333-1352, March.
    19. Catherine C. Eckel & Philip J. Grossman, 2008. "Forecasting Risk Attitudes: An Experimental Study Using Actual and Forecast Gamble Choices," Monash Economics Working Papers archive-01, Monash University, Department of Economics.
    20. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Špačková Zuzana & Špaček David, 2020. "Using Game Theory in Public Domains: The Potential and Limitations of Security Games," NISPAcee Journal of Public Administration and Policy, Sciendo, vol. 13(2), pages 249-272, December.
    2. Sarah A. Kusumastuti & Jim Blythe & Heather Rosoff & Richard S. John, 2020. "Behavioral Determinants of Target Shifting and Deterrence in an Analog Cyber‐Attack Game," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 476-493, March.
    3. Tamara Stotz & Angela Bearth & Signe Maria Ghelfi & Michael Siegrist, 2020. "Evaluating the Perceived Efficacy of Randomized Security Measures at Airports," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1469-1480, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    2. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    3. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    4. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    5. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    6. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    7. Sheremeta, Roman, 2014. "Behavior in Contests," MPRA Paper 57451, University Library of Munich, Germany.
    8. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    9. Rianne Duinen & Tatiana Filatova & Wander Jager & Anne Veen, 2016. "Going beyond perfect rationality: drought risk, economic choices and the influence of social networks," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 57(2), pages 335-369, November.
    10. Bart de Langhe & Stefano Puntoni, 2015. "Bang for the Buck: Gain-Loss Ratio as a Driver of Judgment and Choice," Management Science, INFORMS, vol. 61(5), pages 1137-1163, May.
    11. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    12. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    13. repec:elg:eechap:15325_10 is not listed on IDEAS
    14. Roman M. Sheremeta, 2013. "Overbidding And Heterogeneous Behavior In Contest Experiments," Journal of Economic Surveys, Wiley Blackwell, vol. 27(3), pages 491-514, July.
    15. Sheremeta, Roman, 2014. "Behavioral Dimensions of Contests," MPRA Paper 57751, University Library of Munich, Germany.
    16. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    17. Wei Pan & Yi-Shin Chen, 2018. "Network approach for decision making under risk—How do we choose among probabilistic options with the same expected value?," PLOS ONE, Public Library of Science, vol. 13(4), pages 1-19, April.
    18. Tomas Bonavia & Josué Brox-Ponce, 2018. "Shame in decision making under risk conditions: Understanding the effect of transparency," PLOS ONE, Public Library of Science, vol. 13(2), pages 1-16, February.
    19. Alarie, Yves & Dionne, Georges, 2005. "Testing explanations of preference reversal: A model," Working Papers 05-2, HEC Montreal, Canada Research Chair in Risk Management.
    20. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    21. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:36:y:2016:i:8:p:1666-1681. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.