On the adoption of new technology to enhance counterterrorism measures: An attacker-defender game with risk preferences

被引:8
|
作者
Hunt, Kyle [1 ]
Agarwal, Puneet [2 ]
Zhuang, Jun [1 ]
机构
[1] Univ Buffalo, Dept Ind & Syst Engn, Buffalo, NY 14260 USA
[2] Calif Polytech State Univ San Luis Obispo, Dept Ind & Mfg Engn, San Luis Obispo, CA 93407 USA
基金
美国国家科学基金会;
关键词
Counterterrorism; Homeland security; Game theory; Risk preferences; Continuous attack effort; RESOURCE-ALLOCATION; HOMELAND SECURITY; DETERRENCE; TERRORISM; FRAMEWORK; TARGETS; SERIES;
D O I
10.1016/j.ress.2021.108151
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
To address the adaptive and dynamic threats that terrorists bring to our global society, it is imperative that counterterrorism agencies continue to improve their capabilities. To this end, one important challenge that has received scarce attention in the research community is the adoption of new counterterrorism technologies. Given that the adoption of new technology is common in practice (e.g., baggage scanners at airports, UAVs for border surveillance, maritime monitoring systems, port screening systems), it is essential to study the strategic advantages of doing so. To help fill the gap in the literature, in this article, we develop an attacker-defender model in which a defender seeks to adopt new technology, and an adversary seeks to attack a target. We model a discrete choice defender and a continuous choice attacker, where the contest success function is endogenously determined. Aside from proposing a novel game-theoretic model, we also extensively study the risk attitudes of the players. Among other interesting insights, we find that the risk averse defender plays a more cautious game, and when she is very risk averse or very risk seeking, she does not adopt technology. For the adversary, when he is risk seeking he generally devotes more effort to an attack. This paper helps to fill a significant gap in the literature concerning the adoption of new counterterrorism technology when facing a strategic adversary, and the role of the players' risk preferences in this game environment.
引用
收藏
页数:14
相关论文
共 49 条
  • [1] An Attacker-Defender Game for Honeynets
    Cai, Jin-Yi
    Yegneswaran, Vinod
    Alfeld, Chris
    Barford, Paul
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 7 - +
  • [2] Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
    Hunt, Kyle
    Agarwal, Puneet
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 207
  • [3] Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
    Jose, Victor Richmond R.
    Zhuang, Jun
    MILITARY OPERATIONS RESEARCH, 2013, 18 (02) : 33 - +
  • [4] An Attacker-Defender Game Model with Constrained Strategies
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    ENTROPY, 2024, 26 (08)
  • [5] Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts
    Payyappalli, Vineet M.
    Zhuang, Jun
    Jose, Victor Richmond R.
    RISK ANALYSIS, 2017, 37 (11) : 2229 - 2245
  • [6] Modeling a Multitarget Attacker-Defender Game with Budget Constraints
    Guan, Peiqiu
    He, Meilin
    Zhuang, Jun
    Hora, Stephen C.
    DECISION ANALYSIS, 2017, 14 (02) : 87 - 107
  • [7] Attacker-defender game from a network science perspective
    Li, Ya-Peng
    Tan, Suo-Yi
    Deng, Ye
    Wu, Jun
    CHAOS, 2018, 28 (05)
  • [8] An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects
    Al Aziz, Ridwan
    He, Meilin
    Zhuang, Jun
    RISK ANALYSIS, 2020, 40 (07) : 1481 - 1506
  • [9] An experimental analysis of risk effects in attacker-defender games
    Holt, Charles A.
    Sahu, Ricky
    Smith, Angela M.
    SOUTHERN ECONOMIC JOURNAL, 2022, 89 (01) : 185 - 215
  • [10] Attacker-Defender Signaling Game in Multi-Period Based on Technology Accumulation and Bayesian Learning
    Zhou, Xiaoyan
    Huang, Jincai
    Cheng, Guangquan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 1528 - 1534