game_hw01.docx

advertisement
Zhao Wu 50024849
Fall 2011 IE 675 Homework No. 1
Due: September 14, 2011
1. Briefly describe one simple story happened to your real life in the past week, which could be
modeled as a game. Specify the key components of this game, including: the players (who),
options/moves (what to do) for each player, sequences of moves (who move first/second; or
simultaneously), objectives/payoffs of each player (and dependence on others), information
(complete vs. incomplete information), time (one-shot or repeated; ending points), and what
is (or should be) equilibrium.
Answer:
In the past week, I was looking for a nice car and I actually found my ideal car but I failed to
get it.
The players: Me(Zhao Wu), the unknown guy X
Objectives: To buy a car in a relatively low price and good condition
Sequences of moves: 1.Zhao Wu 2.X
Information: We both heard some information from the seller and only have a basic test drive,
so we both have incomplete information. We both think it’s might be a good deal.
Options for me:
A.Pay some subscription and ask the seller not to sell the car until I can do a complete check
on this car.
B.Buy the car immediately.
C.Not paying the subscription, just make an appointment that I will do a complete check the
day after tomorrow.
Zhao Wu 50024849
Options for X:
If A: Not paying the subscription, just make an appointment that he will do a complete check
if Zhao Wu don’t buy or give up.
If B: Give up.
If C: Buy the car immediately or Pay some subscription and ask the seller not to sell the car
until I can do a complete check on this car.
Time: Buying is of course an one-shot
Equilibrium: I think equilibrium should be that Zhao Wu should choose A and X choose to
make an appointment.
Well, the real situation is that Zhao Wu chose C and X chose to buy the car immediately
without a complete check.
2. What is your favorite food (or any discrete consumption of goods)? Try to identify and draw
your relative preferences over all possible quantities 0, 1, 2, ..., N, where N is a large
number such that you really hate the Nth consecutive consumption of your favorite food.
Provide what your N equals to.
Answer:
My favorite food would be steamed dumplings.
Blue lines represent the number of steamed dumplings I supposed to have, and red lines
represent my relative preferences over them.
Zhao Wu 50024849
25
20
15
10
Series1
5
Series2
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
-5
-10
-15
In my case, when I have about 22 steamed dumplings I would start to hate them.
3. Only using definitions and rationality assumptions and axioms introduced in lectures, prove
the following proposition:
Proposition: If  is rational then:
※> is both irreflective (x > x never holds) and transitive (if x > y and y > z, then x > z).
※∼ is reflective (x ∼ x for all x), transitive (if x ∼ y and y ∼ z, then x ∼ z), and
symmetric (if x ∼ y, then y ∼ x).
※If x > y  z, then x > z.
Answer:
1.1 With the definition of strict preference,
we can know that if x>x holds then we would have the conclustion that x  x but not x
Zhao Wu 50024849
 x, which is obviously self-contradiction.
1.2
With the definition of rationality,
we can know that if x>y then x  y but not y  x; if y>z then y  z but not z  y.
So we can draw the conclusion that x  z but not z  x, and we can use the definition
of strict preference again to deduce that x>z.
2.1
With the definition of indifference relation,
We can know that if x  x and x  x, which obviously holds, then x x holds.
2.2
Still based on the definition of indifference relation, we can see that if x y then x  y
and y  x; if y z then y  z and z  y. So we have x  y  z and z  y  x. Then based
on the transitivity property of rationality,
We can deduce that x  z and z  x. Based on the definition of the indifference
relation, we can conclude that x z.
2.3
Based on the definition of indifference relation, if x y, then x  y and y  x.
Vice Versa, if y  x and x  y then we can deduce that y x.
3.1
We can think about 2 situations
i. if y>z, then we can have x>y>z. According to 1.2 , we can deduce that x>z.
ii. if y z, then we can simply deduce that x>z.
As a conclusion, if x>y  z, then x>z.
Zhao Wu 50024849
4. Using the definition of utility functions, prove the following: For any strictly increasing function f : ℜ → ℜ,v(x)= f (u(x)) is a new utility function representing the same preferences as
u(·).
Answer:
Assume that we have a,b  ℜ and a  b. With the definition of utility functions,
We can conclude that u(a)  u(b). (u(a),u(b)  ℜ)
For v(x)=f(u(x)), we can insert u(a) and u(b), so we can get v(a)=f(u(a) and v(b)=f(u(b).
Because u(a)  u(b), we can deduce that v(a)  v(b).
Finally, we can see that if a,b  ℜ and a  b, then u(a)  u(b) and v(a)  v(b). So we can
prove the assumption in the problem.
5. Back to our original lottery example...
$10 w.p. 0.4
Option A: $1 vs. Option B:
$0 w.p. 0.6
$10M w.p. 0.4
Option A’: $1M vs. Option B’:
$0 w.p. 0.6
Suppose a decision maker is an expected utility maximizer with each of following four
2
utility functions u1(x)= 1 + 2x, u2(x)= x , u3(x)=
√
x, u4(x)= log(x)
Maybe redesign such that we prefer A but not A’... exponential..
Zhao Wu 50024849
(a) Draw the utility diagram
Answer:
1. u1(x)=1+2x
2. u2(x)=x2
Zhao Wu 50024849
3. u3(x)=
x
4. u4(x)=log(x)
(b) What are the certainty equivalents?
Answer:
1. U1(x)=1+2x
For Option A and B:
U(x=10)=11
U(x=0)=1
EU=11X0.4+1X0.6=5
U(c)=EU  1+2c=5  c=2
For Option A’ and B’:
Zhao Wu 50024849
U’(x=10^7)=1+2X10^7
U’(x=0)=1
EU’=0.4X(1+2X10^7)+0.6X1=0.8X10^7
U(c’)=EU’  1+2c=0.8X10^7  c=0.4X10^7
2. U2(x)= x 2
For Option A and B:
U(x=10)=100
U(x=0)=0
EU=100X0.4+0X0.6=40
U(c)=EU  c 2 =40  c=6.32
For Option A’ and B’:
U’(x=10^7)=10^14
U’(x=0)=0
EU’=0.4X10^14+0.6X0=4X10^13
U(c')=EU’  c 2 =4X10^13  c=6.32X10^6
3. U3(x)= x
For Option A and B:
U(x=10)=3.16
U(x=0)=0
EU=3.16X0.4+0X0.6=1.265
U(c)=EU 
c =1.265  c=1.6
For Option A’ and B’:
U’(x=10^7)=3.16X10^3
Zhao Wu 50024849
U’(x=0)=0
EU’=0.4X3.16X10^3+0.6X0=1.265X10^3
U(c')=EU’  c =1.265X10^3  c=1.6X10^6
4. U4(x)=log(x)
For Option A and B:
U(x=10)=1
U(x=0)=0
EU=1X0.4+0X0.6=0.4
U(c)=EU  log(c)=0.4  c=2.512
For Option A’ and B’:
U’(x=10^7)=7
U’(x=0)=0
EU’=0.4X7+0.6X0=2.8
U(c')=EU’  log(c)=2.8  c=630.96
Zhao Wu 50024849
(c) Should we choose A or B; and A’ or B’, using these four utility functions? Why?
Answer:
1. For U1(x)=1+2x,
For A and B,We can find utility of expected value=8.4, and the utility of $1=3,so we
would choose B.
For A’ and B’, We can find utility of expected value=8M, and the utility of $1M=2M,so we
would choose B.
Zhao Wu 50024849
2. For U2(x)= x 2
For A and B,We can find utility of expected value=40, and the utility of $1=1,so we would
choose B.
For A’ and B’, We can find utility of expected value=4X10^13, and the utility of
$1M=10^12,so we would choose B.
Zhao Wu 50024849
3. For U3(x)=
x,
For A and B, We can find utility of expected value=1.265, and the utility of $1=1,so we
would choose B.
For A’ and B’, We can find utility of expected value=1265, and the utility of $1M=1000,so
we would choose B.
Zhao Wu 50024849
4. For U4(x)=log(x)
For A and B, We can find utility of expected value=0.4, and the utility of $1=0,so we
would choose B.
For A’ and B’, We can find utility of expected value=2.8, and the utility of $1M=6,so we
would choose A.
Zhao Wu 50024849
(d) Which utility function better fit yours? why?
Answer:
I think U4(x) would better fit mine since it is more accurate than the former three.
Because I think I can’t afford the “loss” of 1M even if I would have a chance to win 10M.
Besides, 1M is already enough for me. Maybe I would choose to B’ when I have 5M.
6. Preparing for your project proposal:
(a) Tell me what general research area you want to work on for your project (e.g., supply chain
management, transportation, computer network, homeland security, health care, politics,
communication, etc.)
(b) Identify the top 2 academic journals (or conferences proceedings if more prestigious) in your
specialty.
(c) With the help of UB-subscribed databases (e.g., “ISI Web of Knowledge”), find a total
number of three full papers from of the top 2 journals you identified in (b), related to the general
research area you identified in (a) AND game theory. Provide the full citation for those three
papers. (Look at the “reference” section of those papers for citation styles.)
1
(d) For each of the three papers, (quantitively and/or qualitatively) identify the key component of
the games:
2
.
Players (who?)
.
Options/moves (what to do?)
.
Sequences of moves (who move first/second? simultaneously?)
.
Objectives/Payoffs (and dependence on others)
.
Information (complete vs. incomplete information)
.
Time (repeated? Ending point?)
.
Equilibrium (solution to the game; how to calculate?)
(e) Suppose you were going to do a project extending any of the above three papers. Briefly
describe what do you plan to do, and how you would do it.
Zhao Wu 50024849
Hint: During your searching process, you may use some key words like “game
1
theory/game-theoretic” “equilibrium/equilibria,” “collaboration/collaborative,” “interaction/interactive,”
“competition/competitive,” “multi-agent,” “multi-player,” “signaling,” “screening.” Be smart and good luck!!
You can focus on one game for each paper if there are multiple games in one paper.
2
Anwer:
(a).I would like to focus on the area of homeland security.
(b).
Defence and Peace Economics
ANNALS OF OPERATIONS RESEARCH
(c). In fact , there is one full paper that I am interested in but it’s not on the listed journals in (b).
I think it would be helpful for my proposal so I still put it here.
From:Economica
The Interplay Between Preemptive and Defensive Counterterrorism
Measures: A Two-stage Game
By SUBHAYU BANDYOPADHYAY and TODD SANDLER
REFERENCES
ARCE, D. G. and SANDLER, T. (2005). Counterterrorism: a game-theoretic analysis. Journal of Conflict
Resolution, 49, 183–200.
BIER, V., OLIVEROS, S. and SAMUELSON, L. (2007). Choosing what to protect: strategic defensive allocation
against an unknown attacker. Journal of Public Economic Theory, 9, 563–87.
CLARK, D. J. and RIIS, C. (1998). Contest success functions: an extension. Economic Theory, 11, 201–4.
DIXIT, A. (1987). Strategic behavior in contests. American Economic Review, 77, 891–8.
ENDERS, W. and SANDLER, T. (1993). The effectiveness of anti-terrorism policies: a vector-autoregressionintervention
analysis. American Political Science Review, 87, 829–44.
FFF and FFF (2000). Is transnational terrorism becoming more threatening? A time-series investigation.
Journal of Conflict Resolution, 44, 307–32.
FFF and FFF (2006a). The Political Economy of Terrorism. Cambridge: Cambridge University Press.
FFF and FFF (2006b). Distribution of transnational terrorism among countries by income class and
geography after 9/11. International Studies Quarterly, 50, 367–93.
HIRSHLEIFER, J. (2000). The macrotechnology of conflict. Journal of Conflict Resolution, 44, 773–92.
HOFFMAN, B. (1998). Inside Terrorism. New York: Columbia University Press.
FFF (2006). Islam and the West: searching for common ground: the terrorist threat and the counterterrorism
effort. RAND Testimony, http://www.rand.org/pubs/testimonies/2006/RAND_CT263.pdf (accessed
20 June 2009).
KEOHANE, N. O. and ZECKHAUSER, R. J. (2003). The ecology of terror defense. Journal of Risk and Uncertainty,
26, 201–29.
KUNREUTHER, H. and HEAL, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26, 231–49.
2011] COUNTERTERRORISM MEASURES 563
POVEDA, E. C. and TAUMAN, Y. (2007). Strategic analysis of the war against transnational terrorism.
Unpublished manuscript.
ROSENDORFF, B. P. and SANDLER, T. (2004). Too much of a good thing? The proactive response dilemma.
Journal of Conflict Resolution, 48, 657–71.
SANDLER, T. and ARCE, D. G. (2007). Terrorism: a game-theoretic approach. In T. Sandler and K. Hartley
(eds), Handbook of Defense Economics, Vol. 2: Defense in a Globalized World. Amsterdam: North-Holland.
FFF, FFF and ENDERS, W. (2009). Transnational terrorism. In B. Lomborg (ed.), Global Crises, Global
Solutions. Cambridge: Cambridge University Press.
FFF and ENDERS, W. (2004). An economic perspective on transnational terrorism. European Journal of
Political Economy, 20, 301–16.
Zhao Wu 50024849
FFF and SIQUEIRA, K. (2006). Global terrorism: deterrence versus pre-emption. Canadian Journal of
Economics, 39, 1370–87.
SKAPERDAS, S. (1996). Contest success functions. Economic Theory, 7, 283–90.
TRAJTENBERG, M. (2006). Defense R&D in the anti-terrorism era. Defence and Peace Economics, 17, 177–99.r
From:Defence and Peace Economics
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH
APPLICATIONS TO ANTI-TERRORISM RESOURCE
ALLOCATION
By Jun Zhuang and Vicki M. Bier
Arce, D.G. and Sandler, T. (2007) Terrorist signalling and the value of intelligence. British Journal of Political
Science 37 573–586.
Ayres, I. and Levitt, S. (1998) Measuring the positive externalities from unobservable victim precaution: an empirical
analysis of lojack. The Quarterly Journal of Economics 113(1) 43–77.
Banks, J. and Sobel, J. (1987) Equilibrium selection in signaling games. Econometrica 55(3) 647–661.
Basuchoudhary, A. and Razzolini, L. (2006) Hiding in plain sight – using signals to detect terrorists. Public Choice
128(1–2) 245–255.
Bier, V. (2005) Game-theoretic and reliability methods in counter-terrorism and security. In Mathematical and Statistical
Methods in Reliability, Series on Quality, Reliability and Engineering Statistics, edited by A. Wilson, N.
Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific, pp. 17–28.
Bier, V., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect. Journal of Public Economic Theory 9(4)
563–587.
Brams, S. (1985) Superpower Games: Applying Game Theory to Superpower Conflict. New Haven, CT: Yale University
Press.
Brams, S. and Zagare, F. (1977) Deception in simple voting games. Social Science Research 6 257–272.
Brown, G., Carlyle, M., Diehl, D., Kline, J. and Wood, K. (2005) A two-sided optimization for theater ballistic missile
defense. Operations Research 53(5) 263–275.
Cho, I. and Kreps, D. (1987) Signaling games and stable equilibria. The Quarterly Journal of Economics 102(2)
179–222.
Clark, G., Jonson, E. and Caldow, W. (Eds) (1997) Accountability and Corruption: Public Sector Ethics. St.
Leonards, NSW, Australia: Allen & Unwin.
Cohen, S. (1990) Government Secrecy in Democracies. Cambridge, MA: Educators for Social Responsibility.
Crawford, V. (2003) Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions.
American Economic Review 93(1) 133–149.
Crawford, V. and Sobel, J. (1982) Strategic information transmission. Econometrica 50(6) 1431–1451.
DePaulo, B., Wetzel, C., Sternglanz, R. and Wilson, M. (2003) Verbal and nonverbal dynamics of privacy, secrecy,
and deceit. Journal of Social Issues 59(2) 391–410.
Dighe, N., Zhuang, J. and Bier, V. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective
attacker deterrence. International Journal of Performability Engineering 5(1) 31–43.
Doepke, M. and Townsend, R. (2006) Dynamic mechanism design with hidden income and hidden actions. Journal
of Economic Theory 126(1) 235–285.
Edmonds, S. (2006) Porter Goss’ op-ed: ‘ignoturn per ignotius’! Accessed January 2010. URL: http://
www.truthout.org/article/sibel-edmonds-porter-gosss-op-ed-ignoturn-ignotius
Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: Vectorautoregression-intervention
analysis. American Political Science Review 87(4) 829–844.
Farrell, J. and Rabin, M. (1996) Cheap talk. The Journal of Economic Perspectives 10(3) 103–118.
Fudenberg, D. and Tirole, J. (1991) Game Theory. Cambridge, MA: The MIT Press.
Gal-Or, E. (1987) First mover disadvantages with private information. Review of Economic Studies 54(2) 279–292.
Galnoor, I. (1977) Government Secrecy in Democracies. New York, NY: Harper & Row.
Greenberg, I. (1982) The role of deception in decision theory. Journal of Conflict Resolution 26(1) 139–156.
Hendricks, K. and McAfee, P. (2006) Feints. Journal of Economics & Management Strategy 15(2) 431–456.
Hespanha, J., Ateskan, Y. and Kizilocak, H. (2000) Deception in non-cooperative games with partial information. In
Proceedings of the Second DARPA-JFACC Symposium on Advances in Enterprise Control. URL: http://
www.ece.ucsb.edu/~hespanha/published/deception.pdf
Joint Chiefs of Staff (1996) Joint doctrine for military deception. Joint Publication, 3-13.4, URL: http://www.c4i.org/
jp3_13_4.pdf
Kreps, D. and Wilson, R. (1982) Sequential equilibria. Econometrica 50(4) 863–894.
Kunreuther, H. and Heal, G. (2003) Interdependent security. Journal of Risk and Uncertainty 26 231–249.
Lapan, H.E. and Sandler, T. (1993) Terrorism and signalling. European Journal of Political Economy 9(3) 383–397.
Levy, G. (2007) Decision making procedures for committees of careerist experts. American Economic Review,
Papers and Proceedings 97(2) 306–310.
Li, L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9)
1196–1212.
Zhao Wu 50024849
Lieberman, M. and Montgomery, D. (1988) First-mover advantages. Strategic Management Journal 9 41–58.
Lieberman, M. and Montgomery, D. (1998) First-mover (dis)advantages: retrospective and link with the resourcebased
view. Strategic Management Journal 19 1111–1125.
Mas-Colel, A., Whinston, M. and Green, J. (1995) Microeconomic Theory. New York: Oxford University Press.
Maskin, E. and Tirole, J. (2004) The politician and the judge: accountability in government. American Economic
Review 94(4) 1034–1054.
O’Hanlon, M., Orszag, P., Daalder, I., Destler, I., Gunter, D., Litan, R. and Steinberg, J. (2002) Protecting the
American Homeland: A Preliminary Analysis. Washington, DC: Brookings Institution Press.
Oliveros, S. (2005) Equilibrium bluffs: a model of rational feints. Working paper, University of Wisconsin-Madison,
Department of Economics.
Powell, R. (2007) Allocating defensive resources with private information about vulnerability. The American
Political Science Review 101(4) 799–809.
Prat, A. (2005) The wrong kind of transparency. American Economic Review 95(3) 862–877.
Rourke, F. (1961) Secrecy and Publicity: Dilemmas of Democracy. Baltimore, MD: Johns Hopkins Press.
Rozell, M. (1994) Executive Privilege: The Dilemma of Secrecy and Democratic Accountability. Baltimore, MD: The
Johns Hopkins University Press.
Sandler, T. and Arce, D.G. (2003) Terrorism and game theory. Simulation & Gaming 34 319–337.
Schneier, B. (2000) Secrets and Lies: Digital Security in a Networked World. Hoboken, NJ: Wiley.
Skaperdas, S. (1996) Contest success functions. Economic Theory 7(2) 283–290.
Spence, A. (1973). Job market signaling. Quarterly Journal of Economics 87(3) 355–374.
Swire, P. (2001) What should be hidden and open in computer security: lessons from deception, the art of war, law,
and economic theory. ArXiv Computer Science e-prints, (p. cs/0109089).
Swire, P. (2004) A model for when disclosure helps security: what is different about computer and network security?
Journal on Telecommunications and High Technology Law 2 1–38.
Wise, D. (1969) The Politics of Lying: Government Deception, Secrecy, and Power. New York: Random House.
Yetman, J. (2004) Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off. Defence & Peace
Economics 15(3) 221–230.
Zhu, K. (2004) Information transparency of business-to-business electronic markets: a game-theoretic analysis.
Management Science 50(5) 670–685.
Zhuang, J. and Bier, V. (2007) Balancing terrorism and natural disasters – defensive strategy with endogenous
attacker effort. Operations Research 55(5) 976–991.
Zhuang, J., Bier, V. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender
signaling game. European Journal of Operational Research 203(2) 409–418.
Zhuang, J., Bier, V. and Gupta, A. (2007) Subsidies in interdependent security with heterogeneous discount rates. The
Engineering Economist 52(1) 1–19.
From:Annals of Operations Research
A Stackelberg game model for resource allocation
in cargo container security
By Niyazi Onur Bakır
References
Allison, G. (2004). Nuclear terrorism. New York: Times Books.
Allison, G. (2006). The will to prevent. Harvard International Review, 28(3), 50–55.
Bakır, N. O. (2008). A decision tree model for evaluating countermeasures to secure cargo at United States
southwestern ports of entry. Decision Analysis, 5(4), 230–248.
Bakshi, N., Flynn, S. E., & Gans, N. (2009). Estimating the operational impact of container inspections
at international ports (Working Paper No. 2009-05-01). The Wharton School Risk Management and
Decision Processes Center.
Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation
against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.
Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation
for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763–770.
Boros, E., Fedzhora, L., Kantor, P. B., Saeger, K., & Stroud, P. (2006). Large scale LP model for finding
optimal container inspection strategies (Rutcor Research Report No. RRR-26-2006).
Bunn, M., &Wier, A. (2006). Terrorist nuclear weapon construction: How difficult? The Annals of the American
Academy of Political and Social Science, 607(1), 133–149.
Cohen, S. S. (2006). Boom boxes: Containers and terrorism. In J.D. Haveman & H.J. Shatz (Eds.), Protecting
the nation’s seaports: Balancing security and cost (pp. 91–128).
Cooper, M. H. (2004). Nuclear proliferation and terrorism. CQ Researcher, 14(13), 297–320.
DHS (2005). National planning scenarios: Executive summaries. http://cees.tamiu.edu/covertheborder/
TOOLS/NationalPlanningSen.pdf.
Elsayed, E. A., Young, C. M., Xie, M., Zhang, H., & Zhu, Y. (2007). Port-of-entry inspection: Sensor deployment
Zhao Wu 50024849
policy optimization (Rutgers IE Working Paper 07-012).
Ferguson, C. D. (2006). Preventing catastrophic nuclear terrorism. Council on Foreign Relations Special
Report, Washington, DC.
GAO (2005a). Cargo security: Partnership program grants importers reduced scrutiny with limited assurance
of improved security. U.S. Government Accountability Office, GAO-05-404, Washington, DC.
GAO (2005b). Homeland security: Key cargo security programs can be improved. U.S. Government Accountability
Office, GAO-05-466T, Washington, DC.
GAO (2008a). Supply chain security: Examinations of high-risk cargo at foreign seaports have increased,
but improved data collection and performance measures are needed. U.S. Government Accountability
Office, GAO-08-187, Washington, DC.
GAO (2008b). U.S. customs and border protection has enhanced its partnership with import trade sectors,
but challenges remain in verifying security practices. U.S. Government Accountability Office, GAO08-240, Washington, DC.
Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice—terrorists do not:
Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational
Research, 192(1), 198–208.
Hoffman, B. (2006). The use of the Internet by Islamic extremists. RAND Testimony, Santa Monica, CA.
IAEA (2006). Illicit trafficking and other unauthorized activities involving nuclear and radioactive materials.
IAEA 2005 Fact Sheet.
Karde,s, E. (2007). Discounted robust stochastic games with applications to homeland security and flow control.
Ph.D. Dissertation, University of Southern California.
Langewiesche, W. (2007). The atomic bazaar. New York: Farrar, Straus and Giroux.
Maerli, B. M., Schaper, A., & Barnaby, F. (2003). The characteristics of nuclear terrorist weapons. American
Behavioral Scientist, 46(6), 727–744.
Major, J. A. (2002). Advanced techniques for modeling terrorism risk. Journal of Risk Finance, 4(1), 15–24.
Martin, B. (2007). Nuclear power and antiterrorism: Obscuring the policy contradictions. Prometheus, 25(1),
19–29.
Paruchuri, P., Tambe, M., Ordonez, F., & Kraus, S. (2006a). Increasing security through communication and
policy randomization in multiagent systems. In Proceedings of the AAMAS-2006 conference, Hakodate,
Japan.
Paruchuri, P., Tambe, M., Ordonez, F., & Kraus, S. (2006b). Security in multiagent systems by policy randomization.
In Proceedings of the AAMAS-2006 conference, Hakodate, Japan.
Paruchuri, P., Pearce, J., Tambe, M., Ordonez, F., & Kraus, S. (2007). An efficient heuristic approach for
security against multiple adversaries. In Proceedings of the AAMAS-2007 Conference, Honolulu, HI.
Paruchuri, P., Pearce, J., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games for security:
An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the AAMAS2008 conference, Estoril, Portugal.
Pita, J., Jain, M.,Marecki, J., Ordonez, F., Portway, C., Tambe,M., Western, C., Paruchuri, P., & Kraus, S.
(2008). Deployed ARMOR protection: The application of a game theoretic model for security at the Los
Angeles international airport. In Proceedings of the AAMAS-2008 conference, Estoril, Portugal.
Powell, R. (2007). Defending against terrorist attacks with limited resources. The American Political Science
Review, 101(3), 527–541.
Wein, L. M., Wilkins, A. H., Baveja, M., & Flynn, S. E. (2006). Preventing the importation of illicit nuclear
materials in shipping containers. Risk Analysis, 26(5), 1377–1393.
Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous
attacker effort. Operations Research, 55(5), 976–991.
Zhao Wu 50024849
(d).
The Interplay Between Preemptive and Defensive Counterterrorism
Measures: A Two-stage Game
Players: Homeland (H) and Foreign Country (F)
Background: H and F are the potential targets of a terrorist group
Options: H and F can choose to be preemptive or defensive
Sequences: It is the problem.
Objectives: To protect homeland at an optimal cost.
Information: Both have incomplete information because no country would show the
homeland security to others.
Time: Once
Equilibrium:
There are five key determinants: the countries’ relative defensive costs, their relative
preemption costs, their relative assets abroad, their relative damage assessment at home,
and terrorists’ attack preferences.
The high-cost defender will often provide preemption that benefits both targeted countries.
In addition, the prime-target country is prone to preempt in order to reduce its subsequent
defence spending.
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS
TO ANTI--TERRORISM RESOURCE ALLOCATION
Players: the attacker(A) and the defender(D)
Options: For D, she can choose from secrecy, truthful disclosure, and deceptive disclosure.
Sequences: first, nature chooses the types of the attacker and defender (θA and θD),
according to the probability distributions pA(θA) and pD(θD). (Recall that the realization
of the random variable θA is observable only to the attacker, and the realization of θD is
observable only to the defender.) Second, a defender of type θD chooses a (possibly mixed)
strategy σD(θD) and a signal s(θD). Finally, an attacker of type θA responds to the
observed signal s by choosing a (possibly mixed) attacker effort σA(s,θA), leading to
attacker and defender total utilities given by UA[σA(s,θA), σD(θD),θA,θD]) and
UD[σA(s,θA), σD(θD),s(θD),θA,θD]), respectively. The attacker’s response σA(s,θA) is
determined endogenously in this model.
FIGURE 1
Sequence of actions for defender and attacker with private information
Zhao Wu 50024849
Objectives: A wants to maximize the probability of a successful attack. D wants to minimize
the expected attack consequences.
Information: Both have incomplete information.
Time: Repeated.
Equilibrium:
For general situation,
Zhao Wu 50024849
A Stackelberg game model for resource allocation in cargo container security
Players: defender(D) and attacker(A)
Options: There are multiple container routes for A to choose to transport weapons and D
has to allocate money and human resources on observing these routes.
Sequences: D allocates first and A decides where to attack later.
Objectives: A wants to maximize the probability of a successful attack. D wants to minimize
the sum of the total cost and expected attack consequences.
Information: Both are incomplete.
Time: Repeated.
Equilibrium:
(e).I would like to do a project extending A Stackelberg game model for resource
allocation in cargo container security.
I am thinking about what if we let attackers move first and defenders react later. As long
as the reaction is taken without delay, defenders can also protect their homeland and
reduce the loss to a minimum.
I plan to read more papers and try to fully understand what they say and what the
function mean because I just have a basic idea now and I need more specialist knowledge
to support my project.
I also plan to learn some cases about homeland security in order to be familiar with all
variables involved.
.
Download