IDEAS home Printed from https://ideas.repec.org/a/vrs/njopap/v13y2020i2p249-272n14.html
   My bibliography  Save this article

Using Game Theory in Public Domains: The Potential and Limitations of Security Games

Author

Listed:
  • Špačková Zuzana

    (University of Defence in Brno, Czech Republic.)

  • Špaček David

    (Faculty of Economics and Administration, Masaryk University, Czech Republic.)

Abstract

Since its origins, when it was mainly connected to the field of economics, game theory has brought important theoretic insights into many domains. Besides biology, philosophy or computer science, its findings have been applied to various fields of public policy. One specific area of public policy is that of security. Within the last two decades we have been witnesses to a significant increase in efforts to model security issues using tools of game theory and to derive political implications. The paper deals with the model of a Stackelberg security game and its real-world applications in security domains. The main aim and purpose of the paper is to provide a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model in the area of public security and, based on the literature analysis, to discuss the potential and limitations of the model for policy- and decision-makers that are dealing with security measures on various governmental levels. Existing cases clearly indicate that the model can contribute to a better design and implementation of the security policy and help implement a better allocation of resources and thus potentially improve the effectiveness of security measures. On the other hand, the paper also discusses some limitations and potential future adjustments of the model together with points for further research.

Suggested Citation

  • Špačková Zuzana & Špaček David, 2020. "Using Game Theory in Public Domains: The Potential and Limitations of Security Games," NISPAcee Journal of Public Administration and Policy, Sciendo, vol. 13(2), pages 249-272, December.
  • Handle: RePEc:vrs:njopap:v:13:y:2020:i:2:p:249-272:n:14
    DOI: 10.2478/nispa-2020-0024
    as

    Download full text from publisher

    File URL: https://doi.org/10.2478/nispa-2020-0024
    Download Restriction: no

    File URL: https://libkey.io/10.2478/nispa-2020-0024?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Thomas A. Birkland, 2009. "Disasters, Catastrophes, and Policy Failure in the Homeland Security Era1," Review of Policy Research, Policy Studies Organization, vol. 26(4), pages 423-438, July.
    2. Susan E. Clarke & Erica Chenoweth, 2006. "The Politics of Vulnerability: Constructing Local Performance Regimes for Homeland Security," Review of Policy Research, Policy Studies Organization, vol. 23(1), pages 95-114, January.
    3. Mikhael Shor, 2003. "Game Theory .net," The Journal of Economic Education, Taylor & Francis Journals, vol. 34(4), pages 388-388, December.
    4. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    5. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    4. Peter Egger & Martin Gassebner, 2015. "International terrorism as a trade impediment?," Oxford Economic Papers, Oxford University Press, vol. 67(1), pages 42-62.
    5. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    6. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    7. Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
    8. Deniz Aksoy & David Carlson, 2022. "Electoral support and militants’ targeting strategies," Journal of Peace Research, Peace Research Institute Oslo, vol. 59(2), pages 229-241, March.
    9. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    10. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    11. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    12. Lei Du & Yingbin Feng & Li Yaning Tang & Wei Kang & Wei Lu, 2020. "Networks in disaster emergency management: a systematic review," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1-27, August.
    13. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    14. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    15. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    16. Inbar Livnat & Michal Almog-Bar, 2023. "Who Provides Resilience to the Community Resilience Providers?," Societies, MDPI, vol. 13(7), pages 1-14, July.
    17. Catherine C. Langlois & Jean-Pierre P. Langlois, 2011. "The Escalation of Terror: Hate and the Demise of Terrorist Organizations," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(5), pages 497-521, November.
    18. Pagliacci, Francesco & Russo, Margherita, 2018. "Be (and have) good neighbours! Factors of vulnerability in the case of multiple hazards," MPRA Paper 98044, University Library of Munich, Germany, revised 25 Nov 2019.
    19. J. Michael Angstadt, 2020. "Applying Stone in a Western Landscape: Ranchers, Conservationists, and Causal Stories in the “American Serengeti”," Review of Policy Research, Policy Studies Organization, vol. 37(2), pages 244-259, March.
    20. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:vrs:njopap:v:13:y:2020:i:2:p:249-272:n:14. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.