Hostname: page-component-7b9c58cd5d-9k27k Total loading time: 0 Render date: 2025-03-15T22:27:20.934Z Has data issue: false hasContentIssue false

Coordination of strategic responses to security threats: Laboratory evidence

Published online by Cambridge University Press:  14 March 2025

Rachel O. Hess*
Affiliation:
Department of Economics, University of Virginia, PO Box 400182, Charlottesville, VA 22904, USA
Charles A. Holt*
Affiliation:
Department of Economics, University of Virginia, PO Box 400182, Charlottesville, VA 22904, USA
Angela M. Smith*
Affiliation:
Department of Economics, University of Virginia, PO Box 400182, Charlottesville, VA 22904, USA

Abstract

Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high- payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction.

Type
Research Article
Copyright
Copyright © 2007 Economic Science Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Anderson, S. P., Goeree, J. K., & Holt, C. A. (2004). Noisy directional learning and the logit equilibrium. Scandinavian Journal of Economics, 106, 581602.CrossRefGoogle Scholar
Heal, G., & Kunreuther, H. (2004). Interdependent security: A general model (NBER Working Paper 10706).CrossRefGoogle Scholar
Heal, G., & Kunreuther, H. (2005a). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201217.CrossRefGoogle Scholar
Heal, G., & Kunreuther, H. (2005b). You can only die once: Public-private partnerships for managing interdependent risks (Working Paper).Google Scholar
Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26, 231249.CrossRefGoogle Scholar
Monderer, D., & Shapley, L. S. (1996). Potential games. Games and Economic Behavior, 14, 124143.CrossRefGoogle Scholar
Siegal, S., & Castellan, N. J. Jr. (1988). Nonparametric statistics for the behavioral sciences. New York: McGraw-Hill.Google Scholar
Van Huyck, J., Battalio, R., & Beil, R. (1990). Tactic coordination games, strategic uncertainty and coordination failure. American Economic Review, 80, 234248.Google Scholar
Zhuang, J., Bier, V. M., & Gupta, A. (2006). Subsidies in interdependent security with heterogeneous discount rates. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California.Google Scholar