The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker’s objective is to successfully attack at least one target and the defender’s objective is diametrically opposed .We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy - in which a single random target is attacked - more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.
|Date of creation:||Sep 2010|
|Date of revision:|
|Contact details of provider:|| Postal: Krannert Building, West Lafayette, IN 47907|
Web page: http://www.krannert.purdue.edu/programs/phd
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Dan Kovenock & Brian Roberson, 2010.
"Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment,"
Purdue University Economics Working Papers
1253, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
- Charles A. Holt & Susan K. Laury, 2002. "Risk Aversion and Incentive Effects," American Economic Review, American Economic Association, vol. 92(5), pages 1644-1655, December.
- Roman M. Sheremeta, 2009.
"Contest Design: An Experimental Investigation,"
09-05, Chapman University, Economic Science Institute.
- Goeree, Jacob K. & Holt, Charles A. & Palfrey, Thomas R., 2002.
"Quantal Response Equilibrium and Overbidding in Private-Value Auctions,"
Journal of Economic Theory,
Elsevier, vol. 104(1), pages 247-272, May.
- Palfrey, Thomas R. & Goeree, Jacob & Holt, Charles, 2000. "Quantal Response Equilibrium and Overbidding in Private-value Auctions," Working Papers 1073, California Institute of Technology, Division of the Humanities and Social Sciences.
- Jacob K. Goeree & Charles A. Holt & Thomas R. Palfrey, 2000. "Quantal Response Equilibrium and Overbidding in Private-Value Auctions," Virginia Economics Online Papers 345, University of Virginia, Department of Economics.
- Gneezy, Uri & Smorodinsky, Rann, 2006. "All-pay auctions--an experimental study," Journal of Economic Behavior & Organization, Elsevier, vol. 61(2), pages 255-275, October.
- Sergiu Hart, 2006.
"Discrete Colonel Blotto and General Lotto Games,"
Discussion Paper Series
dp434, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem.
- Davis, Douglas D & Reilly, Robert J, 1998.
" Do Too Many Cooks Always Spoil the Stew? An Experimental Analysis of Rent-Seeking and the Role of a Strategic Buyer,"
Springer, vol. 95(1-2), pages 89-115, April.
- Douglas Davis & Robert Reilly, 1998. "Do too many cooks always spoil the stew? An experimental analysis of rent-seeking and the role of a strategic buyer," Public Choice, Springer, vol. 95(1), pages 89-115, April.
- Paul Milgrom, 2007. "Package Auctions and Exchanges," Econometrica, Econometric Society, vol. 75(4), pages 935-965, 07.
- Subhasish M. Chowdhury & Dan Kovenock J. & Roman M. Sheremeta, 2009.
"An Experimental Investigation of Colonel Blotto Games,"
CESifo Working Paper Series
2688, CESifo Group Munich.
- Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer, vol. 52(3), pages 833-861, April.
- Chowdhury, Subhasish & Kovenock, Dan & Sheremeta, Roman, 2011. "An Experimental Investigation of Colonel Blotto Games," MPRA Paper 46810, University Library of Munich, Germany.
- Chowdhury, Subhasish M. & Kovenock, Dan & Sheremeta, Roman M., 2009.
"An experimental investigation of Colonel Blotto games
[Eine experimentelle Untersuchung von „Colonel Blotto“-Spielen]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2009-08, Social Science Research Center Berlin (WZB).
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory,
Association for Public Economic Theory, vol. 9(4), pages 563-587, 08.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- McKelvey Richard D. & Palfrey Thomas R., 1995. "Quantal Response Equilibria for Normal Form Games," Games and Economic Behavior, Elsevier, vol. 10(1), pages 6-38, July.
- Urs Fischbacher, 2007. "z-Tree: Zurich toolbox for ready-made economic experiments," Experimental Economics, Springer, vol. 10(2), pages 171-178, June.
- Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Potters, J.J.M. & de Vries, C.G. & van Winden, F.A.A.M., 1998.
"An experimental examination of rational rentseeking,"
Other publications TiSEM
496ad30e-8453-4c83-a5e1-5, Tilburg University, School of Economics and Management.
- Potters, Jan & de Vries, Casper G. & van Winden, Frans, 1998. "An experimental examination of rational rent-seeking," European Journal of Political Economy, Elsevier, vol. 14(4), pages 783-800, November.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
- John Cadigan & Pamela Schmitt, 2010. "Strategic entry deterrence and terrorism: Theory and experimental evidence," Public Choice, Springer, vol. 143(1), pages 3-22, April.
- Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
When requesting a correction, please mention this item's handle: RePEc:pur:prukra:1256. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Krannert PHD)
If references are entirely missing, you can add them using this form.