344
Views
9
CrossRef citations to date
0
Altmetric
Operations Engineering & Analytics

Incorporating risk preferences in stochastic noncooperative games

ORCID Icon & ORCID Icon
Pages 1-13 | Received 23 Sep 2014, Accepted 13 Sep 2017, Published online: 04 Dec 2017

References

  • Alpcan, T. and Basar, T. (2010) Network Security: A Decision and Game-Theoretic Approach, Cambridge University Press, Cambridge, UK.
  • Bell, M.G.H., Kanturska, U., Schmocker, J.D. and Fonzone, A. (2008) Attacker-defender models and road network vulnerability. Philosophical Transactions of the Royal Society Series A, 366(1872), 1893–1906.
  • Conitzer, V. (2012) Computing game-theoretic solutions and applications to security, in Proceeedings of the 26th Conference on Artificial Intelligence, J. Hoffman and B. Selman (eds). The AAAI Press, Menlo Park, CA, pp. 2106–2112.
  • Corchón, L.C. (2007) The theory of contests: A survey. Review of Economic Design, 11(2), 69–100.
  • Cormican, K.J., Morton, D.P. and Wood, R.K. (1998) Stochastic network interdiction. Operations Research, 46(2), 184–197.
  • Debreu, G. (1952) A social equilibrium existence theorem. Proceedings of the National Academy of Sciences, 38(10), 886–893.
  • Eeckhoudt, L., Rey, B. and Schlesigner, H. (2007) A good sign for multivariate risk taking. Management Science, 53(1), 117–124.
  • Gatti, N. (2008) Game theoretical insights in strategic patrolling: Model and algorithm in normal-form, in 18th European Conference on Artificial Intelligence, M. Ghallab et al. (eds), IOS Press, Amsterdam, Netherlands, pp. 403–407.
  • Glicksberg, I.L. (1952) A further generalization of the Kakutani fixed point theorem with application to Nash equilibrium points. Proceedings of the American Mathematical Society, 3(1), 170–174.
  • Golalikhani, M. and Zhuang, J. (2011) Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis, 31(4), 533–547.
  • Gonzalez, F.M. (2007) Effective property rights, conflict and growth. Journal of Economic Theory, 137(1), 127–139.
  • Guthrie, C. (2003) Prospect theory, risk preferences, and the law. Northwestern University Law Review, 97(3), 1115–1163.
  • Hausken, K. (2011) Strategic defense and attack of series systems when agents move sequentially. IIE Transactions, 43(7), 483–504.
  • Keeney, R.L. (2007) Modeling values for anti-terrorism analysis. Risk Analysis, 27(3), 585–596.
  • Keeney, R.L. and von Winterfeldt, D. (2011) A value model for evaluating homeland security decisions. Risk Analysis, 31(9), 1470–1487.
  • Levy, J.S. (1997) Prospect theory, rational choice, and international relations. International Studies Quarterly, 41, 87–112.
  • Levy, J.S. (2003) Applications of prospect theory to political science. Synthese, 135(2), 215–241.
  • Liu, Y., Comaniciu, C. and Man, H. (2011) Modeling misbehavior in ad hoc networks: A game-theoretic approach for intrusion detection. International Journal on Security and Networks, 1(3/4), 243–254.
  • Long, N.V. (2010) A Survey of Dynamic Games in Economics, Vol. 1, World Scientific, Singapore.
  • Madasseri Payyappalli, V., Zhuang, J. and Jose, V.R.R. (2017) Deterrence and risk preferences in a sequential attacker-defender game with continuous defense effort. Risk Analysis, 37(11), 2229–2245.
  • Major, J. (2002) Advanced techniques for modeling terrorism risk. Journal of Risks in Finance, 4(1), 15–24.
  • Nikoofal, M.E. and Zhuang, J. (2015) On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness. European Journal of Operational Research, 246(1), 320–330.
  • Phillips, P.J. (2013) The end of Al-qaida: Rationality, survivability and risk aversion. International Journal of Economic Sciences, 2(1), 61–81.
  • Phillips, P.J. and Pohl, G. (2012) Economic profiling of the lone wolf terrorist: Can economics provide behavioural investigative advice?Journal of Applied Security Research, 7(2), 151–177.
  • Pratt, J.W. (1964) Risk aversion in the small and in the large. Econometrica, 32(1), 122–136.
  • Richard, S.F. (1975) Multivariate risk aversion, utility independence, and separable utility functions. Management Science, 22(1), 12–21.
  • Rothschild, M. and Stiglitz, J. (1976) Equilibrium in competitive insurance markets: An essay on the economics of imperfect information. Quarterly Journal on Economics, 90(4), 629–649.
  • Sandler, T. and Siquiera, K. (2009) Games and terrorism: Recent developments. Simulation & Gaming, 40(2), 164–192.
  • Shan, X. and Zhuang, J. (2014) Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection—A three-stage game. Decision and Analysis, 11(1), 43–62.
  • Shapiro, A. (2012) Minimax and risk averse multistage stochastic programming. European Journal of Operational Research, 219, 719–722.
  • Sharpe, W.F. (1965) Risk aversion in the stock market: Some empirical evidence. Journal of Finance, 20(3), 416–422.
  • Siquiera, K. and Sandler, T. (2006) Terrorists versus the government: Strategic interaction, support, and sponsorship. Journal of Conflict Resolution, 50(6), 1–21.
  • Skaperdas, S. and Gan, L. (1995) Risk aversion in contests. Economics Journal, 105(431), 951–962.
  • Song, C. and Zhuang, J. (2017) N-stage security screening strategies in the face of strategic applicants. Reliability Engineering & System Safety, 165, 292–301.
  • Stewart, M.G., Ellingwood, B.R. and Mueller, J. (2011) Homeland security: A case study in risk aversion for public decision making. International Journal of Risk Assessment and Management, 15(5/6), 367–386.
  • U.S. Army. (2007) A Military Guide to Terrorism in the Twenty-First Century, Handbook No. 1, U.S. Army Training and Doctrine Command, Available at: http://www.fas.org/irp/threat/terror.htm. Accessed 1 September 2017.
  • Von Neumann, J. and Morgenstern, O. (1944) Theory of Games and Economic Behavior, Princeton University Press, Princeton, NJ.
  • Wang, X. and Zhuang, J. (2011) Balancing congestion and security in the presence of strategic applicants with private information. Eurpean Journal of Operational Research, 212(1), 100–111.
  • Yin, Z., Jain, M., Tambe, M. and Ordonez, F. (2011) Risk-averse strategies for security games with execution and observational uncertainty, in Proceedings of 25th AAAI Conference on Artificial Intelligence, W. Burgard and D. Roth (eds), The AAAI Press, Menlo Park, CA, pp. 758–763.
  • Zhang, J., Zhuang, J. and Jose, V.R.R. (2018) The role of risk preferences in a multi-target attacker-defender resource allocation game. Reliability Engineering & System Safety, 169(1), 95–104.
  • Zhuang, J. and Bier, V. (2007) Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.
  • Zhuang, J. and Bier, V. (2011) Secrecy and deception at equilibrium with applications to anti-terrorism resource allocation. Defence Peace Economics, 22(1), 43–61.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.