Zhao Wu 50024849 Fall 2011 IE 675 Homework No. 1 Due: September 14, 2011 1. Briefly describe one simple story happened to your real life in the past week, which could be modeled as a game. Specify the key components of this game, including: the players (who), options/moves (what to do) for each player, sequences of moves (who move first/second; or simultaneously), objectives/payoffs of each player (and dependence on others), information (complete vs. incomplete information), time (one-shot or repeated; ending points), and what is (or should be) equilibrium. Answer: In the past week, I was looking for a nice car and I actually found my ideal car but I failed to get it. The players: Me(Zhao Wu), the unknown guy X Objectives: To buy a car in a relatively low price and good condition Sequences of moves: 1.Zhao Wu 2.X Information: We both heard some information from the seller and only have a basic test drive, so we both have incomplete information. We both think it’s might be a good deal. Options for me: A.Pay some subscription and ask the seller not to sell the car until I can do a complete check on this car. B.Buy the car immediately. C.Not paying the subscription, just make an appointment that I will do a complete check the day after tomorrow. Zhao Wu 50024849 Options for X: If A: Not paying the subscription, just make an appointment that he will do a complete check if Zhao Wu don’t buy or give up. If B: Give up. If C: Buy the car immediately or Pay some subscription and ask the seller not to sell the car until I can do a complete check on this car. Time: Buying is of course an one-shot Equilibrium: I think equilibrium should be that Zhao Wu should choose A and X choose to make an appointment. Well, the real situation is that Zhao Wu chose C and X chose to buy the car immediately without a complete check. 2. What is your favorite food (or any discrete consumption of goods)? Try to identify and draw your relative preferences over all possible quantities 0, 1, 2, ..., N, where N is a large number such that you really hate the Nth consecutive consumption of your favorite food. Provide what your N equals to. Answer: My favorite food would be steamed dumplings. Blue lines represent the number of steamed dumplings I supposed to have, and red lines represent my relative preferences over them. Zhao Wu 50024849 25 20 15 10 Series1 5 Series2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 -5 -10 -15 In my case, when I have about 22 steamed dumplings I would start to hate them. 3. Only using definitions and rationality assumptions and axioms introduced in lectures, prove the following proposition: Proposition: If is rational then: ※> is both irreflective (x > x never holds) and transitive (if x > y and y > z, then x > z). ※∼ is reflective (x ∼ x for all x), transitive (if x ∼ y and y ∼ z, then x ∼ z), and symmetric (if x ∼ y, then y ∼ x). ※If x > y z, then x > z. Answer: 1.1 With the definition of strict preference, we can know that if x>x holds then we would have the conclustion that x x but not x Zhao Wu 50024849 x, which is obviously self-contradiction. 1.2 With the definition of rationality, we can know that if x>y then x y but not y x; if y>z then y z but not z y. So we can draw the conclusion that x z but not z x, and we can use the definition of strict preference again to deduce that x>z. 2.1 With the definition of indifference relation, We can know that if x x and x x, which obviously holds, then x x holds. 2.2 Still based on the definition of indifference relation, we can see that if x y then x y and y x; if y z then y z and z y. So we have x y z and z y x. Then based on the transitivity property of rationality, We can deduce that x z and z x. Based on the definition of the indifference relation, we can conclude that x z. 2.3 Based on the definition of indifference relation, if x y, then x y and y x. Vice Versa, if y x and x y then we can deduce that y x. 3.1 We can think about 2 situations i. if y>z, then we can have x>y>z. According to 1.2 , we can deduce that x>z. ii. if y z, then we can simply deduce that x>z. As a conclusion, if x>y z, then x>z. Zhao Wu 50024849 4. Using the definition of utility functions, prove the following: For any strictly increasing function f : ℜ → ℜ,v(x)= f (u(x)) is a new utility function representing the same preferences as u(·). Answer: Assume that we have a,b ℜ and a b. With the definition of utility functions, We can conclude that u(a) u(b). (u(a),u(b) ℜ) For v(x)=f(u(x)), we can insert u(a) and u(b), so we can get v(a)=f(u(a) and v(b)=f(u(b). Because u(a) u(b), we can deduce that v(a) v(b). Finally, we can see that if a,b ℜ and a b, then u(a) u(b) and v(a) v(b). So we can prove the assumption in the problem. 5. Back to our original lottery example... $10 w.p. 0.4 Option A: $1 vs. Option B: $0 w.p. 0.6 $10M w.p. 0.4 Option A’: $1M vs. Option B’: $0 w.p. 0.6 Suppose a decision maker is an expected utility maximizer with each of following four 2 utility functions u1(x)= 1 + 2x, u2(x)= x , u3(x)= √ x, u4(x)= log(x) Maybe redesign such that we prefer A but not A’... exponential.. Zhao Wu 50024849 (a) Draw the utility diagram Answer: 1. u1(x)=1+2x 2. u2(x)=x2 Zhao Wu 50024849 3. u3(x)= x 4. u4(x)=log(x) (b) What are the certainty equivalents? Answer: 1. U1(x)=1+2x For Option A and B: U(x=10)=11 U(x=0)=1 EU=11X0.4+1X0.6=5 U(c)=EU 1+2c=5 c=2 For Option A’ and B’: Zhao Wu 50024849 U’(x=10^7)=1+2X10^7 U’(x=0)=1 EU’=0.4X(1+2X10^7)+0.6X1=0.8X10^7 U(c’)=EU’ 1+2c=0.8X10^7 c=0.4X10^7 2. U2(x)= x 2 For Option A and B: U(x=10)=100 U(x=0)=0 EU=100X0.4+0X0.6=40 U(c)=EU c 2 =40 c=6.32 For Option A’ and B’: U’(x=10^7)=10^14 U’(x=0)=0 EU’=0.4X10^14+0.6X0=4X10^13 U(c')=EU’ c 2 =4X10^13 c=6.32X10^6 3. U3(x)= x For Option A and B: U(x=10)=3.16 U(x=0)=0 EU=3.16X0.4+0X0.6=1.265 U(c)=EU c =1.265 c=1.6 For Option A’ and B’: U’(x=10^7)=3.16X10^3 Zhao Wu 50024849 U’(x=0)=0 EU’=0.4X3.16X10^3+0.6X0=1.265X10^3 U(c')=EU’ c =1.265X10^3 c=1.6X10^6 4. U4(x)=log(x) For Option A and B: U(x=10)=1 U(x=0)=0 EU=1X0.4+0X0.6=0.4 U(c)=EU log(c)=0.4 c=2.512 For Option A’ and B’: U’(x=10^7)=7 U’(x=0)=0 EU’=0.4X7+0.6X0=2.8 U(c')=EU’ log(c)=2.8 c=630.96 Zhao Wu 50024849 (c) Should we choose A or B; and A’ or B’, using these four utility functions? Why? Answer: 1. For U1(x)=1+2x, For A and B,We can find utility of expected value=8.4, and the utility of $1=3,so we would choose B. For A’ and B’, We can find utility of expected value=8M, and the utility of $1M=2M,so we would choose B. Zhao Wu 50024849 2. For U2(x)= x 2 For A and B,We can find utility of expected value=40, and the utility of $1=1,so we would choose B. For A’ and B’, We can find utility of expected value=4X10^13, and the utility of $1M=10^12,so we would choose B. Zhao Wu 50024849 3. For U3(x)= x, For A and B, We can find utility of expected value=1.265, and the utility of $1=1,so we would choose B. For A’ and B’, We can find utility of expected value=1265, and the utility of $1M=1000,so we would choose B. Zhao Wu 50024849 4. For U4(x)=log(x) For A and B, We can find utility of expected value=0.4, and the utility of $1=0,so we would choose B. For A’ and B’, We can find utility of expected value=2.8, and the utility of $1M=6,so we would choose A. Zhao Wu 50024849 (d) Which utility function better fit yours? why? Answer: I think U4(x) would better fit mine since it is more accurate than the former three. Because I think I can’t afford the “loss” of 1M even if I would have a chance to win 10M. Besides, 1M is already enough for me. Maybe I would choose to B’ when I have 5M. 6. Preparing for your project proposal: (a) Tell me what general research area you want to work on for your project (e.g., supply chain management, transportation, computer network, homeland security, health care, politics, communication, etc.) (b) Identify the top 2 academic journals (or conferences proceedings if more prestigious) in your specialty. (c) With the help of UB-subscribed databases (e.g., “ISI Web of Knowledge”), find a total number of three full papers from of the top 2 journals you identified in (b), related to the general research area you identified in (a) AND game theory. Provide the full citation for those three papers. (Look at the “reference” section of those papers for citation styles.) 1 (d) For each of the three papers, (quantitively and/or qualitatively) identify the key component of the games: 2 . Players (who?) . Options/moves (what to do?) . Sequences of moves (who move first/second? simultaneously?) . Objectives/Payoffs (and dependence on others) . Information (complete vs. incomplete information) . Time (repeated? Ending point?) . Equilibrium (solution to the game; how to calculate?) (e) Suppose you were going to do a project extending any of the above three papers. Briefly describe what do you plan to do, and how you would do it. Zhao Wu 50024849 Hint: During your searching process, you may use some key words like “game 1 theory/game-theoretic” “equilibrium/equilibria,” “collaboration/collaborative,” “interaction/interactive,” “competition/competitive,” “multi-agent,” “multi-player,” “signaling,” “screening.” Be smart and good luck!! You can focus on one game for each paper if there are multiple games in one paper. 2 Anwer: (a).I would like to focus on the area of homeland security. (b). Defence and Peace Economics ANNALS OF OPERATIONS RESEARCH (c). In fact , there is one full paper that I am interested in but it’s not on the listed journals in (b). I think it would be helpful for my proposal so I still put it here. From:Economica The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two-stage Game By SUBHAYU BANDYOPADHYAY and TODD SANDLER REFERENCES ARCE, D. G. and SANDLER, T. (2005). Counterterrorism: a game-theoretic analysis. Journal of Conflict Resolution, 49, 183–200. BIER, V., OLIVEROS, S. and SAMUELSON, L. (2007). Choosing what to protect: strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563–87. CLARK, D. J. and RIIS, C. (1998). Contest success functions: an extension. Economic Theory, 11, 201–4. DIXIT, A. (1987). Strategic behavior in contests. American Economic Review, 77, 891–8. ENDERS, W. and SANDLER, T. (1993). The effectiveness of anti-terrorism policies: a vector-autoregressionintervention analysis. American Political Science Review, 87, 829–44. FFF and FFF (2000). Is transnational terrorism becoming more threatening? A time-series investigation. Journal of Conflict Resolution, 44, 307–32. FFF and FFF (2006a). The Political Economy of Terrorism. Cambridge: Cambridge University Press. FFF and FFF (2006b). Distribution of transnational terrorism among countries by income class and geography after 9/11. International Studies Quarterly, 50, 367–93. HIRSHLEIFER, J. (2000). The macrotechnology of conflict. Journal of Conflict Resolution, 44, 773–92. HOFFMAN, B. (1998). Inside Terrorism. New York: Columbia University Press. FFF (2006). Islam and the West: searching for common ground: the terrorist threat and the counterterrorism effort. RAND Testimony, http://www.rand.org/pubs/testimonies/2006/RAND_CT263.pdf (accessed 20 June 2009). KEOHANE, N. O. and ZECKHAUSER, R. J. (2003). The ecology of terror defense. Journal of Risk and Uncertainty, 26, 201–29. KUNREUTHER, H. and HEAL, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26, 231–49. 2011] COUNTERTERRORISM MEASURES 563 POVEDA, E. C. and TAUMAN, Y. (2007). Strategic analysis of the war against transnational terrorism. Unpublished manuscript. ROSENDORFF, B. P. and SANDLER, T. (2004). Too much of a good thing? The proactive response dilemma. Journal of Conflict Resolution, 48, 657–71. SANDLER, T. and ARCE, D. G. (2007). Terrorism: a game-theoretic approach. In T. Sandler and K. Hartley (eds), Handbook of Defense Economics, Vol. 2: Defense in a Globalized World. Amsterdam: North-Holland. FFF, FFF and ENDERS, W. (2009). Transnational terrorism. In B. Lomborg (ed.), Global Crises, Global Solutions. Cambridge: Cambridge University Press. FFF and ENDERS, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20, 301–16. Zhao Wu 50024849 FFF and SIQUEIRA, K. (2006). Global terrorism: deterrence versus pre-emption. Canadian Journal of Economics, 39, 1370–87. SKAPERDAS, S. (1996). Contest success functions. Economic Theory, 7, 283–90. TRAJTENBERG, M. (2006). Defense R&D in the anti-terrorism era. Defence and Peace Economics, 17, 177–99.r From:Defence and Peace Economics SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION By Jun Zhuang and Vicki M. Bier Arce, D.G. and Sandler, T. (2007) Terrorist signalling and the value of intelligence. British Journal of Political Science 37 573–586. Ayres, I. and Levitt, S. (1998) Measuring the positive externalities from unobservable victim precaution: an empirical analysis of lojack. The Quarterly Journal of Economics 113(1) 43–77. Banks, J. and Sobel, J. (1987) Equilibrium selection in signaling games. Econometrica 55(3) 647–661. Basuchoudhary, A. and Razzolini, L. (2006) Hiding in plain sight – using signals to detect terrorists. Public Choice 128(1–2) 245–255. Bier, V. (2005) Game-theoretic and reliability methods in counter-terrorism and security. In Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics, edited by A. Wilson, N. Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific, pp. 17–28. Bier, V., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect. Journal of Public Economic Theory 9(4) 563–587. Brams, S. (1985) Superpower Games: Applying Game Theory to Superpower Conflict. New Haven, CT: Yale University Press. Brams, S. and Zagare, F. (1977) Deception in simple voting games. Social Science Research 6 257–272. Brown, G., Carlyle, M., Diehl, D., Kline, J. and Wood, K. (2005) A two-sided optimization for theater ballistic missile defense. Operations Research 53(5) 263–275. Cho, I. and Kreps, D. (1987) Signaling games and stable equilibria. The Quarterly Journal of Economics 102(2) 179–222. Clark, G., Jonson, E. and Caldow, W. (Eds) (1997) Accountability and Corruption: Public Sector Ethics. St. Leonards, NSW, Australia: Allen & Unwin. Cohen, S. (1990) Government Secrecy in Democracies. Cambridge, MA: Educators for Social Responsibility. Crawford, V. (2003) Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions. American Economic Review 93(1) 133–149. Crawford, V. and Sobel, J. (1982) Strategic information transmission. Econometrica 50(6) 1431–1451. DePaulo, B., Wetzel, C., Sternglanz, R. and Wilson, M. (2003) Verbal and nonverbal dynamics of privacy, secrecy, and deceit. Journal of Social Issues 59(2) 391–410. Dighe, N., Zhuang, J. and Bier, V. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering 5(1) 31–43. Doepke, M. and Townsend, R. (2006) Dynamic mechanism design with hidden income and hidden actions. Journal of Economic Theory 126(1) 235–285. Edmonds, S. (2006) Porter Goss’ op-ed: ‘ignoturn per ignotius’! Accessed January 2010. URL: http:// www.truthout.org/article/sibel-edmonds-porter-gosss-op-ed-ignoturn-ignotius Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: Vectorautoregression-intervention analysis. American Political Science Review 87(4) 829–844. Farrell, J. and Rabin, M. (1996) Cheap talk. The Journal of Economic Perspectives 10(3) 103–118. Fudenberg, D. and Tirole, J. (1991) Game Theory. Cambridge, MA: The MIT Press. Gal-Or, E. (1987) First mover disadvantages with private information. Review of Economic Studies 54(2) 279–292. Galnoor, I. (1977) Government Secrecy in Democracies. New York, NY: Harper & Row. Greenberg, I. (1982) The role of deception in decision theory. Journal of Conflict Resolution 26(1) 139–156. Hendricks, K. and McAfee, P. (2006) Feints. Journal of Economics & Management Strategy 15(2) 431–456. Hespanha, J., Ateskan, Y. and Kizilocak, H. (2000) Deception in non-cooperative games with partial information. In Proceedings of the Second DARPA-JFACC Symposium on Advances in Enterprise Control. URL: http:// www.ece.ucsb.edu/~hespanha/published/deception.pdf Joint Chiefs of Staff (1996) Joint doctrine for military deception. Joint Publication, 3-13.4, URL: http://www.c4i.org/ jp3_13_4.pdf Kreps, D. and Wilson, R. (1982) Sequential equilibria. Econometrica 50(4) 863–894. Kunreuther, H. and Heal, G. (2003) Interdependent security. Journal of Risk and Uncertainty 26 231–249. Lapan, H.E. and Sandler, T. (1993) Terrorism and signalling. European Journal of Political Economy 9(3) 383–397. Levy, G. (2007) Decision making procedures for committees of careerist experts. American Economic Review, Papers and Proceedings 97(2) 306–310. Li, L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9) 1196–1212. Zhao Wu 50024849 Lieberman, M. and Montgomery, D. (1988) First-mover advantages. Strategic Management Journal 9 41–58. Lieberman, M. and Montgomery, D. (1998) First-mover (dis)advantages: retrospective and link with the resourcebased view. Strategic Management Journal 19 1111–1125. Mas-Colel, A., Whinston, M. and Green, J. (1995) Microeconomic Theory. New York: Oxford University Press. Maskin, E. and Tirole, J. (2004) The politician and the judge: accountability in government. American Economic Review 94(4) 1034–1054. O’Hanlon, M., Orszag, P., Daalder, I., Destler, I., Gunter, D., Litan, R. and Steinberg, J. (2002) Protecting the American Homeland: A Preliminary Analysis. Washington, DC: Brookings Institution Press. Oliveros, S. (2005) Equilibrium bluffs: a model of rational feints. Working paper, University of Wisconsin-Madison, Department of Economics. Powell, R. (2007) Allocating defensive resources with private information about vulnerability. The American Political Science Review 101(4) 799–809. Prat, A. (2005) The wrong kind of transparency. American Economic Review 95(3) 862–877. Rourke, F. (1961) Secrecy and Publicity: Dilemmas of Democracy. Baltimore, MD: Johns Hopkins Press. Rozell, M. (1994) Executive Privilege: The Dilemma of Secrecy and Democratic Accountability. Baltimore, MD: The Johns Hopkins University Press. Sandler, T. and Arce, D.G. (2003) Terrorism and game theory. Simulation & Gaming 34 319–337. Schneier, B. (2000) Secrets and Lies: Digital Security in a Networked World. Hoboken, NJ: Wiley. Skaperdas, S. (1996) Contest success functions. Economic Theory 7(2) 283–290. Spence, A. (1973). Job market signaling. Quarterly Journal of Economics 87(3) 355–374. Swire, P. (2001) What should be hidden and open in computer security: lessons from deception, the art of war, law, and economic theory. ArXiv Computer Science e-prints, (p. cs/0109089). Swire, P. (2004) A model for when disclosure helps security: what is different about computer and network security? Journal on Telecommunications and High Technology Law 2 1–38. Wise, D. (1969) The Politics of Lying: Government Deception, Secrecy, and Power. New York: Random House. Yetman, J. (2004) Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off. Defence & Peace Economics 15(3) 221–230. Zhu, K. (2004) Information transparency of business-to-business electronic markets: a game-theoretic analysis. Management Science 50(5) 670–685. Zhuang, J. and Bier, V. (2007) Balancing terrorism and natural disasters – defensive strategy with endogenous attacker effort. Operations Research 55(5) 976–991. Zhuang, J., Bier, V. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research 203(2) 409–418. Zhuang, J., Bier, V. and Gupta, A. (2007) Subsidies in interdependent security with heterogeneous discount rates. The Engineering Economist 52(1) 1–19. From:Annals of Operations Research A Stackelberg game model for resource allocation in cargo container security By Niyazi Onur Bakır References Allison, G. (2004). Nuclear terrorism. New York: Times Books. Allison, G. (2006). The will to prevent. Harvard International Review, 28(3), 50–55. Bakır, N. O. (2008). A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Analysis, 5(4), 230–248. Bakshi, N., Flynn, S. E., & Gans, N. (2009). Estimating the operational impact of container inspections at international ports (Working Paper No. 2009-05-01). The Wharton School Risk Management and Decision Processes Center. Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587. Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763–770. Boros, E., Fedzhora, L., Kantor, P. B., Saeger, K., & Stroud, P. (2006). Large scale LP model for finding optimal container inspection strategies (Rutcor Research Report No. RRR-26-2006). Bunn, M., &Wier, A. (2006). Terrorist nuclear weapon construction: How difficult? The Annals of the American Academy of Political and Social Science, 607(1), 133–149. Cohen, S. S. (2006). Boom boxes: Containers and terrorism. In J.D. Haveman & H.J. Shatz (Eds.), Protecting the nation’s seaports: Balancing security and cost (pp. 91–128). Cooper, M. H. (2004). Nuclear proliferation and terrorism. CQ Researcher, 14(13), 297–320. DHS (2005). National planning scenarios: Executive summaries. http://cees.tamiu.edu/covertheborder/ TOOLS/NationalPlanningSen.pdf. Elsayed, E. A., Young, C. M., Xie, M., Zhang, H., & Zhu, Y. (2007). Port-of-entry inspection: Sensor deployment Zhao Wu 50024849 policy optimization (Rutgers IE Working Paper 07-012). Ferguson, C. D. (2006). Preventing catastrophic nuclear terrorism. Council on Foreign Relations Special Report, Washington, DC. GAO (2005a). Cargo security: Partnership program grants importers reduced scrutiny with limited assurance of improved security. U.S. Government Accountability Office, GAO-05-404, Washington, DC. GAO (2005b). Homeland security: Key cargo security programs can be improved. U.S. Government Accountability Office, GAO-05-466T, Washington, DC. GAO (2008a). Supply chain security: Examinations of high-risk cargo at foreign seaports have increased, but improved data collection and performance measures are needed. U.S. Government Accountability Office, GAO-08-187, Washington, DC. GAO (2008b). U.S. customs and border protection has enhanced its partnership with import trade sectors, but challenges remain in verifying security practices. U.S. Government Accountability Office, GAO08-240, Washington, DC. Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice—terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198–208. Hoffman, B. (2006). The use of the Internet by Islamic extremists. RAND Testimony, Santa Monica, CA. IAEA (2006). Illicit trafficking and other unauthorized activities involving nuclear and radioactive materials. IAEA 2005 Fact Sheet. Karde,s, E. (2007). Discounted robust stochastic games with applications to homeland security and flow control. Ph.D. Dissertation, University of Southern California. Langewiesche, W. (2007). The atomic bazaar. New York: Farrar, Straus and Giroux. Maerli, B. M., Schaper, A., & Barnaby, F. (2003). The characteristics of nuclear terrorist weapons. American Behavioral Scientist, 46(6), 727–744. Major, J. A. (2002). Advanced techniques for modeling terrorism risk. Journal of Risk Finance, 4(1), 15–24. Martin, B. (2007). Nuclear power and antiterrorism: Obscuring the policy contradictions. Prometheus, 25(1), 19–29. Paruchuri, P., Tambe, M., Ordonez, F., & Kraus, S. (2006a). Increasing security through communication and policy randomization in multiagent systems. In Proceedings of the AAMAS-2006 conference, Hakodate, Japan. Paruchuri, P., Tambe, M., Ordonez, F., & Kraus, S. (2006b). Security in multiagent systems by policy randomization. In Proceedings of the AAMAS-2006 conference, Hakodate, Japan. Paruchuri, P., Pearce, J., Tambe, M., Ordonez, F., & Kraus, S. (2007). An efficient heuristic approach for security against multiple adversaries. In Proceedings of the AAMAS-2007 Conference, Honolulu, HI. Paruchuri, P., Pearce, J., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the AAMAS2008 conference, Estoril, Portugal. Pita, J., Jain, M.,Marecki, J., Ordonez, F., Portway, C., Tambe,M., Western, C., Paruchuri, P., & Kraus, S. (2008). Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles international airport. In Proceedings of the AAMAS-2008 conference, Estoril, Portugal. Powell, R. (2007). Defending against terrorist attacks with limited resources. The American Political Science Review, 101(3), 527–541. Wein, L. M., Wilkins, A. H., Baveja, M., & Flynn, S. E. (2006). Preventing the importation of illicit nuclear materials in shipping containers. Risk Analysis, 26(5), 1377–1393. Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991. Zhao Wu 50024849 (d). The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two-stage Game Players: Homeland (H) and Foreign Country (F) Background: H and F are the potential targets of a terrorist group Options: H and F can choose to be preemptive or defensive Sequences: It is the problem. Objectives: To protect homeland at an optimal cost. Information: Both have incomplete information because no country would show the homeland security to others. Time: Once Equilibrium: There are five key determinants: the countries’ relative defensive costs, their relative preemption costs, their relative assets abroad, their relative damage assessment at home, and terrorists’ attack preferences. The high-cost defender will often provide preemption that benefits both targeted countries. In addition, the prime-target country is prone to preempt in order to reduce its subsequent defence spending. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI--TERRORISM RESOURCE ALLOCATION Players: the attacker(A) and the defender(D) Options: For D, she can choose from secrecy, truthful disclosure, and deceptive disclosure. Sequences: first, nature chooses the types of the attacker and defender (θA and θD), according to the probability distributions pA(θA) and pD(θD). (Recall that the realization of the random variable θA is observable only to the attacker, and the realization of θD is observable only to the defender.) Second, a defender of type θD chooses a (possibly mixed) strategy σD(θD) and a signal s(θD). Finally, an attacker of type θA responds to the observed signal s by choosing a (possibly mixed) attacker effort σA(s,θA), leading to attacker and defender total utilities given by UA[σA(s,θA), σD(θD),θA,θD]) and UD[σA(s,θA), σD(θD),s(θD),θA,θD]), respectively. The attacker’s response σA(s,θA) is determined endogenously in this model. FIGURE 1 Sequence of actions for defender and attacker with private information Zhao Wu 50024849 Objectives: A wants to maximize the probability of a successful attack. D wants to minimize the expected attack consequences. Information: Both have incomplete information. Time: Repeated. Equilibrium: For general situation, Zhao Wu 50024849 A Stackelberg game model for resource allocation in cargo container security Players: defender(D) and attacker(A) Options: There are multiple container routes for A to choose to transport weapons and D has to allocate money and human resources on observing these routes. Sequences: D allocates first and A decides where to attack later. Objectives: A wants to maximize the probability of a successful attack. D wants to minimize the sum of the total cost and expected attack consequences. Information: Both are incomplete. Time: Repeated. Equilibrium: (e).I would like to do a project extending A Stackelberg game model for resource allocation in cargo container security. I am thinking about what if we let attackers move first and defenders react later. As long as the reaction is taken without delay, defenders can also protect their homeland and reduce the loss to a minimum. I plan to read more papers and try to fully understand what they say and what the function mean because I just have a basic idea now and I need more specialist knowledge to support my project. I also plan to learn some cases about homeland security in order to be familiar with all variables involved. .