Skip to main content Accessibility help
×
Home
Hostname: page-component-59b7f5684b-569ts Total loading time: 0.298 Render date: 2022-09-25T14:40:05.449Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "displayNetworkTab": true, "displayNetworkMapGraph": false, "useSa": true } hasContentIssue true

Allocating Defensive Resources with Private Information about Vulnerability

Published online by Cambridge University Press:  08 November 2007

ROBERT POWELL
Affiliation:
University of California, Berkeley

Abstract

In many resources-allocation problems, strategic adversaries move sequentially and are likely to have private information about the effectiveness of their spending. A defender, for example, often has to allocate its defensive resources before an attacker (e.g., a terrorist group) decides where to strike. Defenders are also likely to have private information about the vulnerability of the things they are trying to protect. Sequential decisions and private information about effectiveness creates a dilemma for a defender. Allocating more to a highly vulnerable site reduces the expected losses should that site be attacked but may also signal that that site is more vulnerable and thereby increase the probability of an attack. Modeling this tradeoff as a signaling game, the analysis shows that secrecy concerns generally swamp vulnerability concerns when more vulnerable sites are weakly harder to protect on the margin. The defender pools in equilibrium, that is, allocates its resources in the same way, regardless of the level of vulnerability. If more vulnerable sites are easier to protect on the margin, vulnerability concerns may swamp secrecy concerns.

Type
ARTICLES
Copyright
© 2007 by the American Political Science Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bier Vicki, Santiago Oliveros, and Larry Samuelson. 2005. “Choosing What to Protect.” Journal of Public Economics (forthcoming). Available at: http://www.ssc.wisc.edu/$\sim$ larrysam/publications.htm.Google Scholar
Blackett D. W. 1958. “Pure Strategy Solutions to Blotto Games.” Naval Research Logistics Quarterly 5: 107109.Google Scholar
Borel Emile. 1921[1953]. “The Theory of Play and Integral Equations with Skew Symmetric Kernels.” Econometrica 21: 97100.Google Scholar
Golman Russell, and Scott E. Page. 2006. “General Blotto: Games of Allocative Strategic Mismatch.” Manuscript, Center for Complex Systems, University of Michigan. Accessed November 3, 2006 at http://www.cscs.umich.edu/~spage/papers_files/blotto.pdf.Google Scholar
Groseclose Tim, and James M. Snyder. 1996. Buying Supermajorities.” American Political Science Review 90 (June): 30315.Google Scholar
Kvasov Dmitriy. 2007. “Contests with Limited Resources.” Journal of Economic Theory 136: 73848.Google Scholar
Laslier Jean-Francois, and Nathalie Picard. 2002. “Distributive Politics and Electoral Competition.” Journal of Economic Theory 103: 10630.Google Scholar
Luce R. Duncan, and Howard Raiffa. 1957. Games and Decisions. New York: Wiley.
Mas-Colell Andreu, Michael Whinston, and Jerry Green. 1995. Microeconomic Theory. New York: Oxford University Press.
Morgan John, and Felix Vardy. 2007. “On the Buyability of Voting Bodies.” Haas School of Business, UC Berkeley. Available at: http://faculty.haas.berkeley.edu/rjmorgan/Buyability.pdf. Accessed on May 15, 2007.Google Scholar
Moteff John. 2006. “Critical Infrastructures: Background, Policy, and Implementation.” Washington, DC: Congressional Research Service.
Myerson Roger. 1993. “Incentives to Cultivate Favored Minorities under Alternative Electoral Systems.” American Political Science Review 87: 85669.Google Scholar
Powell Robert. 2006. “Defending Against Terrorist Attacks with Private Information about Vulnerability.” Manuscript, Department of Political Science, UC Berkeley.
Powell Robert. 2007a. “Allocating Defensive Resources Prior to Attack.” Manuscript, Department of Political Science, UC Berkeley.
Powell Robert. 2007b. “Defending Against Terrorist Attacks with Limited Resources.” American Political Science Review (forthcoming).Google Scholar
Ramey Gary. 1996. “D1 Signaling Equilibria with Mulitple Signals and a Continuum of Types.” Journal of Economic Theory 69 (May): 508531.Google Scholar
Roberson Brian. 2006. “The Colonel Blotto Game.” Economic Theory 29: 124.Google Scholar
Shubik Martin. 1982. Game Theory in the Social Sciences, vol. 1. Cambridge: MIT Press.
Shubik Martin and Robert Weber. 1981. “Systems Defense Games.” Naval Research Logistics Quarterly 28: 28187.Google Scholar
Snyder James. 1989. “Election Goals and the Allocation of Campaign Resources.” Econometrica 57 (May): 63760.Google Scholar
Tukey John W. 1949. “A Problem of Strategy.” Econometrica 17: 73.Google Scholar
66
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Allocating Defensive Resources with Private Information about Vulnerability
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

Allocating Defensive Resources with Private Information about Vulnerability
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

Allocating Defensive Resources with Private Information about Vulnerability
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *