메뉴 건너뛰기




Volumn 22, Issue 1, 2011, Pages 43-61

Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation

Author keywords

Game theory; Homeland security; Resource allocation; Secrecy and deception; Truthful disclosure

Indexed keywords


EID: 79251511489     PISSN: 10242694     EISSN: 14768267     Source Type: Journal    
DOI: 10.1080/10242694.2010.491668     Document Type: Article
Times cited : (68)

References (54)
  • 2
    • 0040679785 scopus 로고    scopus 로고
    • Measuring the positive externalities from unobservable victim precaution: An empirical analysis of lojack
    • Ayres, I. and Levitt, S. (1998) Measuring the positive externalities from unobservable victim precaution: an empirical analysis of lojack. The Quarterly Journal of Economics 113(1) 43-77.
    • (1998) The Quarterly Journal of Economics , vol.113 , Issue.1 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 3
    • 0000037696 scopus 로고
    • Equilibrium selection in signaling games
    • Banks, J. and Sobel, J. (1987) Equilibrium selection in signaling games. Econometrica 55(3) 647-661.
    • (1987) Econometrica , vol.55 , Issue.3 , pp. 647-661
    • Banks, J.1    Sobel, J.2
  • 4
    • 33748519601 scopus 로고    scopus 로고
    • Hiding in plain sight - using signals to detect terrorists
    • Basuchoudhary, A. and Razzolini, L. (2006) Hiding in plain sight - using signals to detect terrorists. Public Choice 128(1-2) 245-255.
    • (2006) Public Choice , vol.128 , Issue.1-2 , pp. 245-255
    • Basuchoudhary, A.1    Razzolini, L.2
  • 5
    • 78649800959 scopus 로고    scopus 로고
    • Game-theoretic and reliability methods in counter-terrorism and security
    • edited by A. Wilson, N. Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific
    • Bier, V. (2005) Game-theoretic and reliability methods in counter-terrorism and security. In Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics, edited by A. Wilson, N. Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific, pp. 17-28.
    • (2005) Mathematical and Statistical Methods In Reliability, Series On Quality, Reliability and Engineering Statistics , pp. 17-28
    • Bier, V.1
  • 8
    • 23644441812 scopus 로고
    • Deception in simple voting games
    • Brams, S. and Zagare, F. (1977) Deception in simple voting games. Social Science Research 6 257-272.
    • (1977) Social Science Research , vol.6 , pp. 257-272
    • Brams, S.1    Zagare, F.2
  • 9
    • 27344439516 scopus 로고    scopus 로고
    • A two-sided optimization for theater ballistic missile defense
    • Brown, G., Carlyle, M., Diehl, D., Kline, J. and Wood, K. (2005) A two-sided optimization for theater ballistic missile defense. Operations Research 53(5) 263-275.
    • (2005) Operations Research , vol.53 , Issue.5 , pp. 263-275
    • Brown, G.1    Carlyle, M.2    Diehl, D.3    Kline, J.4    Wood, K.5
  • 10
    • 0001139863 scopus 로고
    • Signaling games and stable equilibria
    • Cho, I. and Kreps, D. (1987) Signaling games and stable equilibria. The Quarterly Journal of Economics 102(2) 179-222.
    • (1987) The Quarterly Journal of Economics , vol.102 , Issue.2 , pp. 179-222
    • Cho, I.1    Kreps, D.2
  • 11
    • 77954191562 scopus 로고    scopus 로고
    • Clark, G., Jonson, E. and Caldow, W, St. Leonards, NSW, Australia: Allen & Unwin
    • Clark, G., Jonson, E. and Caldow, W. (Eds) (1997) Accountability and Corruption: Public Sector Ethics. St. Leonards, NSW, Australia: Allen & Unwin.
    • (1997) Accountability and Corruption: Public Sector Ethics
  • 12
    • 79251504782 scopus 로고
    • Cambridge, MA: Educators for Social Responsibility
    • Cohen, S. (1990) Government Secrecy in Democracies. Cambridge, MA: Educators for Social Responsibility.
    • (1990) Government Secrecy In Democracies
    • Cohen, S.1
  • 13
    • 0242433408 scopus 로고    scopus 로고
    • Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions
    • Crawford, V. (2003) Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions. American Economic Review 93(1) 133-149.
    • (2003) American Economic Review , vol.93 , Issue.1 , pp. 133-149
    • Crawford, V.1
  • 14
    • 0000510636 scopus 로고
    • Strategic information transmission
    • Crawford, V. and Sobel, J. (1982) Strategic information transmission. Econometrica 50(6) 1431-1451.
    • (1982) Econometrica , vol.50 , Issue.6 , pp. 1431-1451
    • Crawford, V.1    Sobel, J.2
  • 15
    • 0038127072 scopus 로고    scopus 로고
    • Verbal and nonverbal dynamics of privacy, secrecy, and deceit
    • DePaulo, B., Wetzel, C., Sternglanz, R. and Wilson, M. (2003) Verbal and nonverbal dynamics of privacy, secrecy, and deceit. Journal of Social Issues 59(2) 391-410.
    • (2003) Journal of Social Issues , vol.59 , Issue.2 , pp. 391-410
    • Depaulo, B.1    Wetzel, C.2    Sternglanz, R.3    Wilson, M.4
  • 16
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
    • Dighe, N., Zhuang, J. and Bier, V. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering 5(1) 31-43.
    • (2009) International Journal of Performability Engineering , vol.5 , Issue.1 , pp. 31-43
    • Dighe, N.1    Zhuang, J.2    Bier, V.3
  • 17
    • 30444461505 scopus 로고    scopus 로고
    • Dynamic mechanism design with hidden income and hidden actions
    • Doepke, M. and Townsend, R. (2006) Dynamic mechanism design with hidden income and hidden actions. Journal of Economic Theory 126(1) 235-285.
    • (2006) Journal of Economic Theory , vol.126 , Issue.1 , pp. 235-285
    • Doepke, M.1    Townsend, R.2
  • 19
    • 33744504907 scopus 로고
    • The effectiveness of anti-terrorism policies: Vectorautoregression-intervention analysis
    • Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: Vectorautoregression-intervention analysis. American Political Science Review 87(4) 829-844.
    • (1993) American Political Science Review , vol.87 , Issue.4 , pp. 829-844
    • Enders, W.1    Sandler, T.2
  • 22
    • 84879653564 scopus 로고
    • First mover disadvantages with private information
    • Gal-Or, E. (1987) First mover disadvantages with private information. Review of Economic Studies 54(2) 279-292.
    • (1987) Review of Economic Studies , vol.54 , Issue.2 , pp. 279-292
    • Gal-Or, E.1
  • 24
    • 84965673635 scopus 로고
    • The role of deception in decision theory
    • Greenberg, I. (1982) The role of deception in decision theory. Journal of Conflict Resolution 26(1) 139-156.
    • (1982) Journal of Conflict Resolution , vol.26 , Issue.1 , pp. 139-156
    • Greenberg, I.1
  • 27
    • 79251521158 scopus 로고    scopus 로고
    • Joint doctrine for military deception
    • Joint Chiefs of Staff
    • Joint Chiefs of Staff (1996) Joint doctrine for military deception. Joint Publication, 3-13.4, URL: http://www.c4i.org/jp3_13_4.pdf
    • (1996) Joint Publication , vol.4 , pp. 3-13
  • 28
    • 0000558986 scopus 로고
    • Sequential equilibria
    • Kreps, D. and Wilson, R. (1982) Sequential equilibria. Econometrica 50(4) 863-894.
    • (1982) Econometrica , vol.50 , Issue.4 , pp. 863-894
    • Kreps, D.1    Wilson, R.2
  • 31
    • 34547336458 scopus 로고    scopus 로고
    • Decision making procedures for committees of careerist experts
    • Levy, G. (2007) Decision making procedures for committees of careerist experts. American Economic Review, Papers and Proceedings 97(2) 306-310.
    • (2007) American Economic Review, Papers and Proceedings , vol.97 , Issue.2 , pp. 306-310
    • Levy, G.1
  • 32
    • 0036755349 scopus 로고    scopus 로고
    • Information sharing in a supply chain with horizontal competition
    • Li, L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9) 1196-1212.
    • (2002) Management Science , vol.48 , Issue.9 , pp. 1196-1212
    • Li, L.1
  • 34
    • 0000287182 scopus 로고    scopus 로고
    • First-mover (dis)advantages: Retrospective and link with the resource-based view
    • Lieberman, M. and Montgomery, D. (1998) First-mover (dis)advantages: retrospective and link with the resource-based view. Strategic Management Journal 19 1111-1125.
    • (1998) Strategic Management Journal , vol.19 , pp. 1111-1125
    • Lieberman, M.1    Montgomery, D.2
  • 36
    • 77955845921 scopus 로고    scopus 로고
    • The politician and the judge: Accountability in government
    • Maskin, E. and Tirole, J. (2004) The politician and the judge: accountability in government. American Economic Review 94(4) 1034-1054.
    • (2004) American Economic Review , vol.94 , Issue.4 , pp. 1034-1054
    • Maskin, E.1    Tirole, J.2
  • 39
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell, R. (2007) Allocating defensive resources with private information about vulnerability. The American Political Science Review 101(4) 799-809.
    • (2007) The American Political Science Review , vol.101 , Issue.4 , pp. 799-809
    • Powell, R.1
  • 40
    • 30844436627 scopus 로고    scopus 로고
    • The wrong kind of transparency
    • Prat, A. (2005) The wrong kind of transparency. American Economic Review 95(3) 862-877.
    • (2005) American Economic Review , vol.95 , Issue.3 , pp. 862-877
    • Prat, A.1
  • 43
  • 45
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas, S. (1996) Contest success functions. Economic Theory 7(2) 283-290.
    • (1996) Economic Theory , vol.7 , Issue.2 , pp. 283-290
    • Skaperdas, S.1
  • 47
    • 79251523688 scopus 로고    scopus 로고
    • What should be hidden and open in computer security: Lessons from deception, the art of war, law, and economic theory
    • (p. cs/0109089)
    • Swire, P. (2001) What should be hidden and open in computer security: lessons from deception, the art of war, law, and economic theory. ArXiv Computer Science e-prints, (p. cs/0109089).
    • (2001) ArXiv Computer Science E-prints
    • Swire, P.1
  • 48
    • 33646075395 scopus 로고    scopus 로고
    • A model for when disclosure helps security: What is different about computer and network security?
    • Swire, P. (2004) A model for when disclosure helps security: what is different about computer and network security? Journal on Telecommunications and High Technology Law 2 1-38.
    • (2004) Journal On Telecommunications and High Technology Law , vol.2 , pp. 1-38
    • Swire, P.1
  • 50
    • 1342283753 scopus 로고    scopus 로고
    • Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off
    • Yetman, J. (2004) Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off. Defence & Peace Economics 15(3) 221-230.
    • (2004) Defence & Peace Economics , vol.15 , Issue.3 , pp. 221-230
    • Yetman, J.1
  • 51
    • 2942525472 scopus 로고    scopus 로고
    • Information transparency of business-to-business electronic markets: A game-theoretic analysis
    • Zhu, K. (2004) Information transparency of business-to-business electronic markets: a game-theoretic analysis. Management Science 50(5) 670-685.
    • (2004) Management Science , vol.50 , Issue.5 , pp. 670-685
    • Zhu, K.1
  • 52
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort
    • Zhuang, J. and Bier, V. (2007) Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort. Operations Research 55(5) 976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.2
  • 53
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang, J., Bier, V. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research 203(2) 409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.2    Alagoz, O.3
  • 54
    • 33847259790 scopus 로고    scopus 로고
    • Subsidies in interdependent security with heterogeneous discount rates
    • Zhuang, J., Bier, V. and Gupta, A. (2007) Subsidies in interdependent security with heterogeneous discount rates. The Engineering Economist 52(1) 1-19.
    • (2007) The Engineering Economist , vol.52 , Issue.1 , pp. 1-19
    • Zhuang, J.1    Bier, V.2    Gupta, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.