Abstract
Due to the strategic and adaptive nature of adversaries, the deployment of new technologies is common practice in the arenas of security and defense (e.g., new baggage scanners at airports). History has shown that the deployment of these technologies has often been disclosed to the public, allowing malicious actors to potentially understand which venues are defended, and how. There is limited research examining how information disclosed about the deployment of new security measures can impact the beliefs and decisions of adversaries. Studying these beliefs and decisions is critical in obtaining insights into adversarial behavior, which can inform the allocation of defensive resources and the design of related information disclosures. This article aims to address this gap by studying how people—who are motivated to attack one among multiple targets—respond when receiving information from a defender regarding the deployment of new security measures at those targets. We address whether attackers (i) believe the information they receive from the defender and (ii) choose to attack after learning that new security measures may be deployed at their target(s) of interest. We find that attackers’ beliefs regarding where new security measures are deployed, and their decisions to attack particular targets, are impacted by the information they receive from the defender and by their understanding of the defender’s target valuations, highlighting the importance of strategic information disclosure in counterterrorism operations. In an experimental setting with two targets, when attackers (
Get full access to this article
View all access options for this article.
References
Supplementary Material
Please find the following supplemental material available below.
For Open Access articles published under a Creative Commons License, all supplemental material carries the same license as the article it is associated with.
For non-Open Access articles published, all supplemental material carries a non-exclusive license, and permission requests for re-use of supplemental material or any part of supplemental material shall be sent directly to the copyright owner as specified in the copyright notice associated with the article.
