SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION

In this work, we develop a game‐theoretic model for whether and how a first mover should disclose her resource allocation. Our model allows us to explore whether the first mover should disclose correct information about her resource allocation, incorrect information, or no information. Although we study secrecy and deception specifically in the homeland‐security context where the first mover is assumed to be the defender, our work can also provide insights in other contexts, such as business competition.

[1]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[2]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[3]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[4]  J. V. Tucker,et al.  Unifying computers and dynamical systems using the theory of synchronous concurrent algorithms , 2009, Appl. Math. Comput..

[5]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[6]  Todd Sandler,et al.  Terrorist Signalling and the Value of Intelligence , 2007, British Journal of Political Science.

[7]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[8]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Gilat Levy Decision–Making Procedures for Committees of Careerist Experts , 2007 .

[10]  V. Bier,et al.  Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .

[11]  A. Basuchoudhary,et al.  Hiding in plain sight – using signals to detect terrorists , 2006 .

[12]  L. Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[13]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[14]  Gilbert Laporte,et al.  A Continuous Model for Multistore Competitive Location , 2005, Oper. Res..

[15]  Kenneth Hendricks,et al.  Feints , 2004 .

[16]  Peter P. Swire A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.

[17]  Eric Maskin,et al.  The Politician and the Judge: Accountability in Government , 2004 .

[18]  James Yetman,et al.  SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .

[19]  Kevin Zhu,et al.  Information Transparency of Business-to-Business Electronic Markets: A Game-Theoretic Analysis , 2004, Manag. Sci..

[20]  James H. Clifford,et al.  Protecting the American Homeland: A Preliminary Analysis , 2003 .

[21]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[22]  Molly J. Walker Wilson,et al.  Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .

[23]  V. Crawford Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .

[24]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[25]  Andrea Prat,et al.  The Wrong Kind of Transparency , 2002 .

[26]  Peter R. Orszag,et al.  Protecting the American Homeland: A Preliminary Analysis , 2002 .

[27]  Lode Li Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..

[28]  Robert M. Townsend,et al.  Dynamic Mechanism Design with Hidden Income and Hidden Actions , 2002, J. Econ. Theory.

[29]  Peter P. Swire What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory , 2001, ArXiv.

[30]  D. B. Montgomery,et al.  First-mover (dis)advantages: Retrospective and link with the resource-based view , 1998 .

[31]  Steven D. Levitt,et al.  Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .

[32]  S. Skaperdas Contest success functions , 1996 .

[33]  Mark J. Rozell Executive Privilege: The Dilemma of Secrecy and Democratic Accountability , 1994 .

[34]  Walter Enders,et al.  The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.

[35]  Harvey E. Lapan,et al.  Terrorism and signalling , 1993 .

[36]  David M. Kreps,et al.  Signaling Games and Stable Equilibria , 1987 .

[37]  J. Sobel,et al.  Equilibrium Selection in Signaling Games , 1987 .

[38]  Esther Gal-Or,et al.  First Mover Disadvantages with Private Information , 1987 .

[39]  Steven J. Brams,et al.  Superpower Games: Applying Game Theory to Superpower Conflict , 1985 .

[40]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[41]  Irwin Greenberg,et al.  The Role of Deception in Decision Theory , 1982 .

[42]  S. Brams,et al.  Deception in simple voting games , 1977 .

[43]  M. Spence Job Market Signaling , 1973 .

[44]  F. E. Rourke,et al.  Secrecy and Publicity: Dilemmas of Democracy. , 1962 .

[45]  David M Levinson,et al.  First Mover Advantages , 2011 .

[46]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[47]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[48]  J. Morgan,et al.  Cheap Talk , 2005 .

[49]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[50]  Joao P. Hespanha,et al.  Deception in Non-Cooperative Games with Partial Information , 2000 .

[51]  G. Clark,et al.  Accountability and corruption : public sector ethics , 1997 .

[52]  I. Galnoor Government secrecy in democracies , 1977 .

[53]  D. Wise The politics of lying;: Government deception, secrecy, and power , 1973 .