Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models

There are a growing number of automated decision aids based on game-theoretic algorithms in daily use by security agencies to assist in allocating or scheduling their limited security resources. These applications of game theory, based on the “security games” paradigm, are leading to fundamental research challenges: one major challenge is modeling human bounded rationality. More specifically, the security agency, assisted with an automated decision aid, is assumed to act with perfect rationality against a human adversary; it is important to investigate the bounded rationality of these human adversaries to improve effectiveness of security resource allocation. This paper for the first time provides an empirical investigation of adversary bounded rationality in opportunistic crime settings, where modeling bounded rationality is particularly crucial. We conduct extensive human subject experiments, comparing ten different bounded rationality models, and illustrate that: (a) while previous research proposed the use of the stochastic choice “quantal response” model of human adversary, this model is significantly outperformed by more advanced models of “subjective utility quantal response”; (b) Combinations of the well-known prospect theory model with these advanced models lead to an even better performance in modeling human adversary behavior; (c) while it is important to model the non-linear human weighing of probability, as advocated by prospect theory, our findings are the exact opposite of prospect theory in terms of how humans are seen to weigh this non-linear probability.

[1]  Baruch Fischhoff,et al.  Subjective expected utility: A model of decision-making , 1981, J. Am. Soc. Inf. Sci..

[2]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[3]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[4]  Miguel A. Costa-Gomes,et al.  Cognition and Behavior in Normal-Form Games: An Experimental Study , 1998 .

[5]  Richard Gonzalez,et al.  On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.

[6]  Georges Dionne,et al.  Lottery Decisions and Probability Weighting Function , 2001 .

[7]  Colin Camerer,et al.  A Cognitive Hierarchy Model of Games , 2004 .

[8]  Shai Ben-David,et al.  Detecting Change in Data Streams , 2004, VLDB.

[9]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[10]  Ya'akov Gal,et al.  Modeling Reciprocal Behavior in Human Bilateral Negotiation , 2007, AAAI.

[11]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[12]  Sarit Kraus,et al.  ARMOR Security for Los Angeles International Airport , 2008, AAAI.

[13]  Andrea L. Bertozzi,et al.  c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .

[14]  Avi Pfeffer,et al.  Simultaneously modeling humans' preferences and their beliefs about others' preferences , 2008, AAMAS.

[15]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[16]  Erroll G. Southers Security and Game Theory: LAX – Terror Target: The History, the Reason, the Countermeasure , 2011 .

[17]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[18]  Shrisha Rao,et al.  Improving resource allocation in multi-tier cloud systems , 2012, 2012 IEEE International Systems Conference SysCon 2012.

[19]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[20]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[21]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[22]  Milind Tambe,et al.  Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.

[23]  Richard S. John,et al.  Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games , 2014, GameSec.

[24]  Mark O. Riedl,et al.  Examining Game World Topology Personalization , 2015, CHI.

[25]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .