523
Views
57
CrossRef citations to date
0
Altmetric
Original Articles

SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION

&
Pages 43-61 | Accepted 17 Jul 2009, Published online: 15 Oct 2010
 

Abstract

In this work, we develop a game‐theoretic model for whether and how a first mover should disclose her resource allocation. Our model allows us to explore whether the first mover should disclose correct information about her resource allocation, incorrect information, or no information. Although we study secrecy and deception specifically in the homeland‐security context where the first mover is assumed to be the defender, our work can also provide insights in other contexts, such as business competition.

ACKNOWLEDGMENTS

This research was supported by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) under grant number 2007‐ST‐061‐000001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security. We also thank Professor Larry Samuelson (Yale University), Professor Todd Sandler (University of Texas at Dallas) and Mr Stephen Campbell (Tufts University), and two anonymous referees for their helpful comments. Any errors are ours, of course.

Notes

1 For a general discussion of first‐mover advantage in the economic literature, see for example Lieberman & Montgomery (Citation1988, Citation1998).

2 The case in which the actual defense is guaranteed to be observed by the attacker can be obtained as a degenerate case of our model, by setting the deception and secrecy costs large enough that the defender will always choose truthful disclosure in any equilibrium.

3 Note that the defender utility can in principle also reflect the cost of implementing the signal s (i.e., the cost of implementing secrecy, truthful disclosure, or deceptive disclosure).

4 Several bodies of literature provide refinements on equilibrium concepts for out‐of‐equilibrium signals. These include sequential equilibrium (Kreps and Wilson, Citation1982), divine equilibrium (Banks and Sobel, Citation1987), and stable equilibrium (Cho and Kreps, Citation1987). However, we do not further address this issue in our work, for reasons of simplicity.

5 Note that we no longer need to update the attacker’s belief about the defender type θD , since there is no private information in this game. Therefore, equation (Equation8) in Definition 1 is not needed. For simplicity, we also remove θD from equations (Equation9) and (Equation10), because it is a constant and common knowledge in this case.

6 As in Section 3, for simplicity, we remove θA from equations (Equation13) and (Equation14), because it is a constant and common knowledge.

7 Recall that θD was suppressed in the function ũD in equation (Equation11) for simplicity. Similarly, we suppress A from the function ũD in equation (Equation15).

8 For more general contest success functions, see for example Skaperdas (Citation1996).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 417.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.