메뉴 건너뛰기




Volumn 30, Issue 12, 2010, Pages 1737-1743

Reasons for Secrecy and Deception in Homeland-Security Resource Allocation

Author keywords

Deception; Game theory; Private information; Secrecy; Truthful disclosure

Indexed keywords

DECEPTION; FUTURE RESEARCH DIRECTIONS; PRIVATE INFORMATION; SECRECY; SECURITY CONTEXT; TRUTHFUL DISCLOSURE;

EID: 78649762419     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2010.01455.x     Document Type: Article
Times cited : (54)

References (36)
  • 1
    • 78649800959 scopus 로고    scopus 로고
    • Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics
    • Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Singapore, World Scientific.
    • Bier VM. Game-theoretic and reliability methods in counter-terrorism and security. Pp. 17-28 in Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics. Singapore World Scientific, 2005.
    • (2005) Game-theoretic and reliability methods in counter-terrorism and security , pp. 17-28
    • Bier, V.M.1
  • 2
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
    • Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 3
    • 34547336458 scopus 로고    scopus 로고
    • Decision making procedures for committees of careerist experts
    • Levy G. Decision making procedures for committees of careerist experts. American Economic Review, 2007; 97(2):306-310.
    • (2007) American Economic Review , vol.97 , Issue.2 , pp. 306-310
    • Levy, G.1
  • 6
    • 78649774438 scopus 로고    scopus 로고
    • Porter Goss' Op-Ed: "Ignoturn per Ignotius"!, 2006. Available at, Accessed March 2010.
    • Edmonds S. Porter Goss' Op-Ed: "Ignoturn per Ignotius"!, 2006. Available at:, Accessed March 2010.
    • Edmonds, S.1
  • 7
    • 78649769882 scopus 로고    scopus 로고
    • Joint Chiefs of Staff. Joint Publication 3-13.4. Joint Doctrine for Military Deception, 1996. Available at, Accessed March 2010.
    • Joint Chiefs of Staff. Joint Publication 3-13.4. Joint Doctrine for Military Deception, 1996. Available at:, Accessed March 2010.
  • 9
    • 78649773582 scopus 로고    scopus 로고
    • ArXiv Computer Science E-Prints. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory, 2001. Available at, Accessed March 2010.
    • Swire PP. ArXiv Computer Science E-Prints. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory, 2001. Available at:, Accessed March 2010.
    • Swire, P.P.1
  • 10
    • 33646075395 scopus 로고    scopus 로고
    • A model for when disclosure helps security: What is different about computer and network security?
    • Swire PP. A model for when disclosure helps security: What is different about computer and network security? Journal on Telecommunications and High Technology Law, 2004; 2:1-38.
    • (2004) Journal on Telecommunications and High Technology Law , vol.2 , pp. 1-38
    • Swire, P.P.1
  • 11
  • 13
    • 78649793101 scopus 로고    scopus 로고
    • Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at, Accessed March 2010.
    • Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at:, Accessed March 2010.
  • 14
    • 0003674114 scopus 로고
    • Secrets: On the Ethics of Concealment and Revelation
    • New York, Pantheon Books.
    • Bok S. Secrets: On the Ethics of Concealment and Revelation. New York Pantheon Books, 1982.
    • (1982)
    • Bok, S.1
  • 15
    • 78649765668 scopus 로고    scopus 로고
    • Secrecy: A Cross-Cultural Perspective
    • Tefft SK (ed). New York, Human Sciences Press.
    • Tefft SK (ed). Secrecy: A Cross-Cultural Perspective. New York Human Sciences Press, 1997.
    • (1997)
  • 16
    • 78649789828 scopus 로고    scopus 로고
    • Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at, Accessed March 2010.
    • Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at:, Accessed March 2010.
  • 18
    • 78649777157 scopus 로고    scopus 로고
    • Equilibrium bluffs: A model of rational feints., University of California-Berkeley, Haas School of Business, Working paper.
    • Oliveros S. Equilibrium bluffs: A model of rational feints. University of California-Berkeley, Haas School of Business, Working paper, 2010.
    • (2010)
    • Oliveros, S.1
  • 19
    • 27344439516 scopus 로고    scopus 로고
    • A two-sided optimization for theater ballistic missile defense
    • Brown G, Carlyle M, Diehl D, Kline J, Wood K. A two-sided optimization for theater ballistic missile defense. Operations Research, 2005; 53(5):263-275.
    • (2005) Operations Research , vol.53 , Issue.5 , pp. 263-275
    • Brown, G.1    Carlyle, M.2    Diehl, D.3    Kline, J.4    Wood, K.5
  • 20
    • 0042385597 scopus 로고    scopus 로고
    • The deception of the Greeks: Generalizing the information structure of extensive form games
    • Board OJ. The deception of the Greeks: Generalizing the information structure of extensive form games. Greek Economic Review, 2002; 22:1-16.
    • (2002) Greek Economic Review , vol.22 , pp. 1-16
    • Board, O.J.1
  • 21
    • 0009340590 scopus 로고
    • Secrecy and Publicity: Dilemmas of Democracy
    • Baltimore, MD, Johns Hopkins Press.
    • Rourke FE. Secrecy and Publicity: Dilemmas of Democracy. Baltimore, MD Johns Hopkins Press, 1961.
    • (1961)
    • Rourke, F.E.1
  • 22
    • 0003487308 scopus 로고    scopus 로고
    • Secrets and Lies: Digital Security in a Networked World
    • Hoboken, NJ, John Wiley & Sons.
    • Schneier B. Secrets and Lies: Digital Security in a Networked World. Hoboken, NJ John Wiley & Sons, 2000.
    • (2000)
    • Schneier, B.1
  • 23
    • 77955845921 scopus 로고    scopus 로고
    • The politician and the judge: Accountability in government
    • Maskin E, Tirole J. The politician and the judge: Accountability in government. American Economic Review, 2004; 94(4):1034-1054.
    • (2004) American Economic Review , vol.94 , Issue.4 , pp. 1034-1054
    • Maskin, E.1    Tirole, J.2
  • 24
    • 77951635530 scopus 로고    scopus 로고
    • Is this paper dangerous? Balancing secrecy and openness in counterterrorism
    • Shapiro JN, Siegel DA. Is this paper dangerous? Balancing secrecy and openness in counterterrorism. Security Studies, 2010; 19(1):66-98.
    • (2010) Security Studies , vol.19 , Issue.1 , pp. 66-98
    • Shapiro, J.N.1    Siegel, D.A.2
  • 25
    • 78649798617 scopus 로고    scopus 로고
    • Modeling Secrecy and Deception in Homeland Security Resource Allocation, Ph.D. dissertation, Department of Industrial and Systems Engineering, University of Wisconsin-Madison
    • Zhuang J. Modeling Secrecy and Deception in Homeland Security Resource Allocation, Ph.D. dissertation, Department of Industrial and Systems Engineering, University of Wisconsin-Madison, 2008.
    • (2008)
    • Zhuang, J.1
  • 26
    • 78649798366 scopus 로고    scopus 로고
    • Robustness of optimal defensive resource allocations in the face of less than fully rational attackers. Proceedings of the 2009 Industrial Engineering Research Conference.
    • Hao M, Jin S, Zhuang J. Robustness of optimal defensive resource allocations in the face of less than fully rational attackers. Pp. 886-891 in Proceedings of the 2009 Industrial Engineering Research Conference, 2009.
    • (2009) , pp. 886-891
    • Hao, M.1    Jin, S.2    Zhuang, J.3
  • 28
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review, 2007; 101(4):799-809.
    • (2007) American Political Science Review , vol.101 , Issue.4 , pp. 799-809
    • Powell, R.1
  • 30
    • 77953205441 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
    • Zhuang J, Bier VM. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 2010.
    • (2010) Defence and Peace Economics
    • Zhuang, J.1    Bier, V.M.2
  • 31
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
    • Dighe NS, Zhuang J, Bier VM. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 2009; 5(1):31-43.
    • (2009) International Journal of Performability Engineering , vol.5 , Issue.1 , pp. 31-43
    • Dighe, N.S.1    Zhuang, J.2    Bier, V.M.3
  • 32
    • 0040679785 scopus 로고    scopus 로고
    • Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack
    • Ayres I, Levitt S. Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack. Quarterly Journal of Economics, 1998; 113(1):43-77.
    • (1998) Quarterly Journal of Economics , vol.113 , Issue.1 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 33
    • 78649790301 scopus 로고    scopus 로고
    • Washington Times. Air Marshals-Secrecy Ruined by Dress Code, July 9, 2004. Available at, Accessed March 2010.
    • Hudson A. Washington Times. Air Marshals-Secrecy Ruined by Dress Code, July 9, 2004. Available at:, Accessed March 2010.
    • Hudson, A.1
  • 34
    • 78649798367 scopus 로고    scopus 로고
    • Cover blown, but air marshal still flies. USA Today, June 1, 2006.
    • Frank T. Cover blown, but air marshal still flies. USA Today, June 1, 2006.
    • Frank, T.1
  • 35
    • 78649801675 scopus 로고    scopus 로고
    • Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks., DOI: Available at.
    • Bier VM, Haphuriwat N. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. DOI: Available at.
    • Bier, V.M.1    Haphuriwat, N.2
  • 36
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang J, Bier VM, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.