Literature DB >> 23256552

Cost of equity in homeland security resource allocation in the face of a strategic attacker.

Xiaojun Shan1, Jun Zhuang.   

Abstract

Hundreds of billions of dollars have been spent in homeland security since September 11, 2001. Many mathematical models have been developed to study strategic interactions between governments (defenders) and terrorists (attackers). However, few studies have considered the tradeoff between equity and efficiency in homeland security resource allocation. In this article, we fill this gap by developing a novel model in which a government allocates defensive resources among multiple potential targets, while reserving a portion of defensive resources (represented by the equity coefficient) for equal distribution (according to geographical areas, population, density, etc.). Such a way to model equity is one of many alternatives, but was directly inspired by homeland security resource allocation practice. The government is faced with a strategic terrorist (adaptive adversary) whose attack probabilities are endogenously determined in the model. We study the effect of the equity coefficient on the optimal defensive resource allocations and the corresponding expected loss. We find that the cost of equity (in terms of increased expected loss) increases convexly in the equity coefficient. Furthermore, such cost is lower when: (a) government uses per-valuation equity; (b) the cost-effectiveness coefficient of defense increases; and (c) the total defense budget increases. Our model, results, and insights could be used to assist policy making.
© 2012 Society for Risk Analysis.

Mesh:

Year:  2012        PMID: 23256552     DOI: 10.1111/j.1539-6924.2012.01919.x

Source DB:  PubMed          Journal:  Risk Anal        ISSN: 0272-4332            Impact factor:   4.000


  2 in total

1.  Defense Strategies for Asymmetric Networked Systems with Discrete Components.

Authors:  Nageswara S V Rao; Chris Y T Ma; Kjell Hausken; Fei He; David K Y Yau; Jun Zhuang
Journal:  Sensors (Basel)       Date:  2018-05-03       Impact factor: 3.576

Review 2.  Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

Authors:  Mohamed S Abdalzaher; Karim Seddik; Maha Elsabrouty; Osamu Muta; Hiroshi Furukawa; Adel Abdel-Rahman
Journal:  Sensors (Basel)       Date:  2016-06-29       Impact factor: 3.576

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.