Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker
AbstractWe study a strategic model in which a defender must allocate defensive resources to a collection of locations and an attacker must choose a location to attack. In equilibrium, the defender sometimes optimally leaves a location undefended and sometimes prefers a higher vulnerability at a particular location even if a lower risk could be achieved at zero cost. The defender prefers to allocate resources in a centralized (rather than decentralized) manner, the optimal allocation of resources can be non-monotonic in the value of the attacker's outside option, and the defender prefers her defensive allocation to be public rather than secret. Copyright 2007 Blackwell Publishing, Inc..
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by UCLA Department of Economics in its series Levine's Bibliography with number 321307000000000158.
Date of creation: 21 Jun 2006
Date of revision:
Contact details of provider:
Web page: http://www.dklevine.com/
Other versions of this item:
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, 08.
- NEP-ALL-2006-07-02 (All new papers)
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
- Bruno S. Frey & Simon Luechinger, . "Terrorism: Deterrence May Backfire," IEW - Working Papers 136, Institute for Empirical Research in Economics - University of Zurich.
- Martin Shubik & Robert J. Weber, 1978. "Systems Defense Games: Colonel Blotto, Command and Control," Cowles Foundation Discussion Papers 489, Cowles Foundation for Research in Economics, Yale University.
- Arce M., Daniel G. & Sandler, Todd, 2001. "Transnational public goods: strategies and institutions," European Journal of Political Economy, Elsevier, vol. 17(3), pages 493-516, September.
- Kunreuther, Howard & Heal, Geoffrey, 2003. " Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-49, March-May.
- Darius Lakdawalla & George Zanjani, 2002.
"Insurance, Self-Protection, and the Economics of Terrorism,"
NBER Working Papers
9215, National Bureau of Economic Research, Inc.
- Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
- Todd Sandler, 2003. "Collective Action and Transnational Terrorism," The World Economy, Wiley Blackwell, vol. 26(6), pages 779-802, 06.
- Bruno S. Frey & Simon Luechinger, . "How to Fight Terrorism: Alternatives to Deterrence," IEW - Working Papers 137, Institute for Empirical Research in Economics - University of Zurich.
- Lapan, Harvey E. & Sandler, Todd, 1993.
"Terrorism and signalling,"
European Journal of Political Economy,
Elsevier, vol. 9(3), pages 383-397, August.
- Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
- Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers 10818, Iowa State University, Department of Economics.
- Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo Group Munich.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010.
"The Attack and Defense of Weakest-Link Networks,"
10-14, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo Group Munich.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
- Perea, Federico & Puerto, Justo, 2013. "Revisiting a game theoretic framework for the robust railway network design against intentional attacks," European Journal of Operational Research, Elsevier, vol. 226(2), pages 286-292.
- Subhayu Bandyopadhyay & Todd Sandler, 2009.
"The interplay between preemptive and defensive counterterrorism measures: a two-stage game,"
2008-034, Federal Reserve Bank of St. Louis.
- Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, 07.
- Eiselt, H.A. & Bhadury, Joy & Burkey, Mark L., 2011. "An optimization-based framework for modeling counterterrorism strategies," MPRA Paper 36117, University Library of Munich, Germany.
- Christopher Cotton & Cheng Li, 2012. "Profiling, Screening and Criminal Recruitment," Working Papers 2013-02, University of Miami, Department of Economics.
- Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (David K. Levine).
If references are entirely missing, you can add them using this form.