2020
Using Game Theory in Public Domains: The Potential and Limitations of Security Games
ŠPAČKOVÁ, Zuzana a David ŠPAČEKZákladní údaje
Originální název
Using Game Theory in Public Domains: The Potential and Limitations of Security Games
Autoři
ŠPAČKOVÁ, Zuzana a David ŠPAČEK
Vydání
NISPAcee Journal of Public Administration and Policy, NISPAcee, 2020, 1337-9038
Další údaje
Jazyk
angličtina
Typ výsledku
Článek v odborném periodiku
Obor
50602 Public administration
Stát vydavatele
Slovensko
Utajení
není předmětem státního či obchodního tajemství
Odkazy
Označené pro přenos do RIV
Ano
Kód RIV
RIV/00216224:14560/20:00115818
Organizační jednotka
Ekonomicko-správní fakulta
UT WoS
EID Scopus
Klíčová slova anglicky
game theory; sequential games; Stackelberg game; security systems; national security
Příznaky
Recenzováno
Změněno: 17. 1. 2023 10:11, Mgr. Pavlína Kurková
Anotace
V originále
Since its origins, when it was mainly connected to the field of economics, game theory has brought important theoretic insights into many domains. Besides biology, philosophy or computer science, its findings have been applied to various fields of public policy. One specific area of public policy is that of security. Within the two last decades we have been witnesses to a significant increase in efforts to model security issues using tools of game theory and to derive political implications. The paper deals with the model of a Stackelberg security game and its real-world applications in security domains. The main aim and purpose of the paper is to provide with a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model in the area of public security and, based on the literature analysis, to discuss the potential and limitations of the model for policy- and decision-makers that are dealing with security measures on various governmental levels. Existing cases clearly indicate that the model can contribute to better designing and implementation of the security policy and help better allocation of resources and thus potentially improve effectiveness of security measures. On the other hand, the paper also discusses some limitations and potential future adjustments of the model together with points for a further research.