Choosing what to protect

被引:52
作者
Bier, Vicki M. [1 ]
机构
[1] Univ Wisconsin, Dept Ind & Syst Engn, Madison, WI 53706 USA
关键词
externalities; game theory; resource allocation; security; uncertainty;
D O I
10.1111/j.1539-6924.2007.00906.x
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
We study a strategic model in which a defender must allocate defensive resources to a collection of locations, and an attacker must choose a location to attack. The defender does not know the attacker's preferences, while the attacker observes the defender's resource allocation. The defender's problem gives rise to negative externalities, in the sense that increasing the resources allocated to one location increases the likelihood of an attack at other locations. In equilibrium, the defender exploits these externalities to manipulate the attacker's behavior, sometimes optimally leaving a location undefended, and sometimes preferring a higher vulnerability at a particular location even if a lower risk could be achieved at zero cost. Key results of our model are as follows: (1) the defender prefers to allocate resources in a centralized (rather than decentralized) manner; (2) as the number of locations to be defended grows, the defender can cost effectively reduce the probability of a successful attack only if the number of valuable targets is bounded; (3) the optimal allocation of resources can be nonmonotonic in the relative value of the attacker's outside option; and (4) the defender prefers his or her defensive allocation to be public rather than secret.
引用
收藏
页码:607 / 620
页数:14
相关论文
共 37 条
[1]  
[Anonymous], 2006, STAT METHODS COUNTER
[2]  
[Anonymous], NEW YORK TIMES 0508
[3]  
[Anonymous], 2004, Research on Terrorism: Trends, Achievements Failures
[4]  
Arce D.G., 2001, EUROPEAN J POLITICAL, V17, P493, DOI [DOI 10.1016/S0176-2680(01)00042-8, 10.1016/S0176-2680(01)00042-8]
[5]   Computer security impaired by legitimate users [J].
Besnard, D ;
Arief, B .
COMPUTERS & SECURITY, 2004, 23 (03) :253-264
[6]   Protection of simple series and parallel systems with components of different values [J].
Bier, VM ;
Nagaraj, A ;
Abhichandani, V .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2005, 87 (03) :315-323
[7]  
BIER VM, 2005, UNPUB J PUBLIC EC TH
[8]  
BIER VM, 2002, RISK BASED DECISIONM, V10, P59
[9]  
BRUNET A, 2005, GRAND FUNDING STATE
[10]  
CARAFANO JJ, 2004, HOMELAND SECURITY DO