2012
DOI: 10.1111/j.1539-6924.2012.01919.x
|View full text |Cite
|
Sign up to set email alerts
|

Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker

Abstract: Hundreds of billions of dollars have been spent in homeland security since September 11, 2001. Many mathematical models have been developed to study strategic interactions between governments (defenders) and terrorists (attackers). However, few studies have considered the tradeoff between equity and efficiency in homeland security resource allocation. In this article, we fill this gap by developing a novel model in which a government allocates defensive resources among multiple potential targets, while reservi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 94 publications
(48 citation statements)
references
References 33 publications
0
46
0
Order By: Relevance
“…Furthermore, the expected damage is decreasing in d i , but increasing in a i and λ. Consider an exponential damage function Golalikhani & Zhuang, 2011;Nikoofal & Zhuang, 2012;Shan & Zhuang, 2013a) …”
Section: Model Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the expected damage is decreasing in d i , but increasing in a i and λ. Consider an exponential damage function Golalikhani & Zhuang, 2011;Nikoofal & Zhuang, 2012;Shan & Zhuang, 2013a) …”
Section: Model Formulationmentioning
confidence: 99%
“…We employ data from Willis, Morral, Kelly, and Medby (2005) which provide estimates of the expected annual terrorism losses to the seven most valuable urban areas of the United States (Table 2). We assume that the expected property loss represents the defender's valuation of the target Hao et al, 2009;Hu et al, 2011;Nikoofal & Zhuang, 2012;Shan & Zhuang, 2013a) and that the total defender budget is $270 million (Willis et al, 2005).…”
Section: Numerical Studymentioning
confidence: 99%
“…(Bier, 2006) Tradeoff analysis in the distribution of resources for the protection of several targets Analysis of how considering equity and efficiency impacts on the distribution of resources for the protection of various targets. (Shan & Zhuang, 2012) question. However, it is important to point out here that allocating resources to protect oneself from the worst scenario (the one the opponent has in mind to cause and the one the defense will seek to avoid) is not tantamount to protecting against all other less harmful scenarios.…”
Section: Redundant Protection Of Critical Targetsmentioning
confidence: 99%
“…Also, it has the following regularity properties: (i) P(D i , A i ) is twice differentiable with respect to A i and D i and (ii) lim A i →0 P(D i , A i ) = 0, and lim D i →∞ P(D i , A i ) = 0. An appropriate candidate for the damage probability function that parsimoniously satisfies the above properties is the cumulative exponential function (Gerchak and Safayeni, 1996;Bier et al, 2008;Golalikhani and Zhuang, 2011;Shan and Zhuang, 2013b):…”
Section: Model Frameworkmentioning
confidence: 99%