modeling and mitigating the effects of supply chain ...jzhuang/papers/xzl_supply_anor_2015.pdf ·...

16
Ann Oper Res (2016) 236:255–270 DOI 10.1007/s10479-015-1810-z Modeling and mitigating the effects of supply chain disruption in a defender–attacker game Jie Xu · Jun Zhuang · Zigeng Liu Published online: 18 February 2015 © Springer Science+Business Media New York 2015 Abstract The outcomes of a defender–attacker game depend on the defender’s resources delivered through military supply chains. These are subject to disruptions from various sources, such as natural disasters, social disasters, and terrorism. The attacker and defender are at war; the defender needs resources to defeat the attacker, but those resources may not be available due to a supply chain disruption that occurs exogenously to the game. In this paper, we integrate a defender–attacker game with supply chain risk management, and study the defender’s optimal preparation strategy. We provide analytical solutions, conduct numerical analysis, and compare the combined strategy with other protection strategies. Our results indicate that: (a) the defender benefits in a defender–attacker game by utilizing supply chain risk management tools; and (b) the attacker’s best response resource allocation would not be deterred by capacity backup protection and/or inventory protection. The feature of this paper is that the defender, being the downstream user of the supply chain, is involved in a strategic contest against the attacker. This model is different than game theory applied to private-sector supply chains because most game theoretic models of private sector supply chains usually explore relationships between suppliers and firms in the same supply chain or between multiple firms competing in the marketplace for customers. Therefore, supply chain risk management for such a military application imposes effects that have not been studied before. This research was partially supported by the United States Department of Homeland Security (DHS) through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Award Number 2010-ST-061-RE0001. This research was also partially supported by the United States National Science Foundation under Award Numbers 1200899 and 1334930. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the DHS, CREATE, or NSF. We thank guest editors Drs. Katherine Daniell, Alec Morton, and David Rios Insua and two anonymous referees for their helpful comments. J. Xu · J. Zhuang (B ) Department of Industrial and Systems Engineering, SUNY at Buffalo, Buffalo, NY 14260, USA e-mail: [email protected] Z. Liu Department of Physics and Astronomy, Northwestern University, Evanston, IL 60208, USA 123

Upload: others

Post on 25-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270DOI 10.1007/s10479-015-1810-z

Modeling and mitigating the effects of supply chaindisruption in a defender–attacker game

Jie Xu · Jun Zhuang · Zigeng Liu

Published online: 18 February 2015© Springer Science+Business Media New York 2015

Abstract The outcomes of a defender–attacker game depend on the defender’s resourcesdelivered through military supply chains. These are subject to disruptions from varioussources, such as natural disasters, social disasters, and terrorism. The attacker and defenderare at war; the defender needs resources to defeat the attacker, but those resources may not beavailable due to a supply chain disruption that occurs exogenously to the game. In this paper,we integrate a defender–attacker game with supply chain risk management, and study thedefender’s optimal preparation strategy. We provide analytical solutions, conduct numericalanalysis, and compare the combined strategy with other protection strategies. Our resultsindicate that: (a) the defender benefits in a defender–attacker game by utilizing supply chainrisk management tools; and (b) the attacker’s best response resource allocation would notbe deterred by capacity backup protection and/or inventory protection. The feature of thispaper is that the defender, being the downstream user of the supply chain, is involved in astrategic contest against the attacker. This model is different than game theory applied toprivate-sector supply chains because most game theoretic models of private sector supplychains usually explore relationships between suppliers and firms in the same supply chain orbetween multiple firms competing in the marketplace for customers. Therefore, supply chainrisk management for such a military application imposes effects that have not been studiedbefore.

This research was partially supported by the United States Department of Homeland Security (DHS) throughthe National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Award Number2010-ST-061-RE0001. This research was also partially supported by the United States National ScienceFoundation under Award Numbers 1200899 and 1334930. However, any opinions, findings, and conclusionsor recommendations in this document are those of the authors and do not necessarily reflect views of theDHS, CREATE, or NSF. We thank guest editors Drs. Katherine Daniell, Alec Morton, and David Rios Insuaand two anonymous referees for their helpful comments.

J. Xu · J. Zhuang (B)Department of Industrial and Systems Engineering, SUNY at Buffalo, Buffalo, NY 14260, USAe-mail: [email protected]

Z. LiuDepartment of Physics and Astronomy, Northwestern University, Evanston, IL 60208, USA

123

Page 2: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

256 Ann Oper Res (2016) 236:255–270

Keywords Supply chain disruption · Defender–attacker game · Pre-disruption protection

1 Introduction

Among crucial elements contributing to military success, military logistics plays a veryimportant role (Kane 2001). Military logistics operations have been used to accommodatea new security environment, change the way logistic functions perform, and revise tradi-tions and organization structures (Simon 2001). The overall military fighting power directlyincreases in logistics efficiency (Kane 2001). Military logistics and supply chains can defeatan enemy’s force without direct engagement (von Clausewitz 2004). As a Chinese sayinggoes, “supply goes before troops” emphasizes the importance of military supply chains in adefender–attacker game. The military force must have supplies (e.g., food, water, and fuel)to survive or win in the contest (Simon 2001). Such supplies may be subject to disruptionssuch as natural disasters, social disasters and terrorism. For example, the U.S. military expe-rienced a fuel shortage in Iraq and Afghanistan, which disrupted U.S. efforts to win in thewar (National Public Radio 2011).

Risk classification and protection mechanisms have been studied in supply chain riskmanagement. For example, Christopher and Lee (2004) argued that supply chains could beaffected by uncertain changes in business strategies. Christopher and Peck (2004) empha-sized that it is critical to understand the nature of supply chain risks while building resilientsupply chain networks. Chopra and Sodhi (2004) classified supply chain risks into ninecategories (capacity risks, delays, disruptions, forecasting risks, intellectual property risks,inventory risks, procurement risks, receivables and system risks) and discussed the corre-sponding mitigation strategies. Chopra et al. (2007) highlighted the importance of distin-guishing between recurrent supply risks and disruptive risks. Hopp et al. (2010) introducedtwo pre-disruption protection mechanisms, capacity backup (including subtree capacity pro-tection and single-node capacity protection) and inventory protection, to mitigate risks onsupply chain networks.

Since the9/11/2011attacks,many researchers have studiedprotection in defender–attackergames (Bier et al. 2005; Sandler and Siqueira 2006; Zhuang and Bier 2007; Insua et al. 2009;Bier and Haphuriwat 2011; Paul and Hariharan 2012). The outcomes of a defender–attackergame are impacted by the defender’s resources delivered through military supply chains.Various types of risks (e.g., social disasters, natural disasters, and terrorism) could disruptmilitary supply chain networks and cause economic losses and casualties. To win the game,players need to understand the characteristics of the game (armed conflict) and be preparedwith resources and responding capabilities (Kress 2012). However, to the best of our knowl-edge, few studies have investigated protection mechanisms on the military supply chain riskmanagement in a defender–attacker game. [An exception is Jin et al. (2010), who simulatedthe inventory and capacity backup disruption preparation strategies separately with exoge-nous attacker efforts]. Our paper fills this gap by studying the protection strategies for bothcapacity backup and inventory against endogenous attacker efforts, providing both analyticaland numerical solutions, and comparing different preparation strategies (e.g., having capac-ity backup or holding inventory). Our paper enriches the literature of both supply chain riskmanagement and defender–attacker games by providing a newmodeling framework to studythe impact and optimal use of supply chain risk management tools to mitigate the supplychain disruptions.

Unlike traditional (private-sector) supply chain management, the decision maker in mili-tary supply chains may have different objectives (e.g., maximizing the payoffs in the contest

123

Page 3: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 257

or minimizing risk during the disruption period), operational environments (e.g., in a war orbattle), and decision choices (e.g., recourses allocated in the contest). Thus, the outcomes ofmilitary supply chain risk management may differ from that of traditional supply chains. Inaddition, the strategic interactions between the defender and attacker and the correspondingpayoff structure have not been studied in the traditional supply chain management literature.Unlikewhen the player is involved in a vertical supply–demand relationship and/or a horizon-tal competition with other manufacturers in a private-sector supply chain, the defender, as thedownstream user of themilitary supply chain, strategically contests with the attacker.Militarysupply chain risk management imposes effects that have not been studied before, since theattacker collects a stream of payoffs that would not arise in a typical vertical demand–supplyrelationship or horizontal competition.

The remainder of this paper is organized as follows. Section 2 introduces the modelframework and the notation. Section 3 presents the defender’s and attacker’s optimizationproblems, derives analytical solutions, and illustrates the attacker’s best responses for variousprotection strategies. Section 4 numerically illustrates the players’ equilibrium strategies andpayoffs, and provides sensitivity results. Section 5 concludes the paper and provides somefuture research directions. An Appendix provides proofs.

2 Modeling framework

We consider a game between one attacker and one defender. Common knowledge about therules of the game is assumed among the players (Dutta 1999). In our defender–attacker game,the defender and the attacker contest and interact strategically with each other considering theexogenous military supply chain disruptions for the defender. During the contesting period,the defender may face supply chain disruptions which would cause a shortage of supplies.1

For example, the United States had an armed conflict with Iraq and Afghanistan, whilethe U.S. faced supply shortages due to exogenous supply chain disruptions. We considera sequential game (Shan and Zhuang 2013; Zhuang et al. 2014) between the defender andthe attacker. First, the defender decides what kind of pre-disruption preparation strategiesshe should take (the combined strategy, capacity backup protection, inventory protection, orno protection). In the above example, the U.S. decides resource allocation and preparationstrategies which would be used to contest against opponents in Iraq or Afghanistan. Then,the attacker decides what resources to allocate to contest against the defender. Rebels in Iraqor Afghanistan would allocate resources to contest against the U.S. The defender and theattacker jointly determine their efforts (i.e., the amount of resource allocation) at equilibrium,and their equilibrium payoffs depend on the available resources in the contest, which aresubject to exogenous military supply chain disruptions. Figure 1 shows the framework forintegrating the defender–attacker game with the (military) supply chain risk managementproblem. Both the defender and the attacker at war need to relocate resources which may beunavailable due to exogenous disruptions to contest against each other. In particular, we allowthe defender to decide the amount of resources allocated in the game and the investment in riskmanagement (capacity backup, inventory, or both) against disruptions. All of these protectionmechanisms are realistic. For example, after a disruption occurs, some expendable resources(such as bombs and bullets) are difficult to supply through backup capacity providers intime and need to be stored in inventory, while some perishable resources (such as food and

1 We acknowledge that resource means all kinds of supplies that would be used to defend/attack against theother adversary; e.g., weapons or armaments.

123

Page 4: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

258 Ann Oper Res (2016) 236:255–270

Defender

A�acker

Conflict

Original Supply Provider

Inventory

Backup Capacity Provider

Combined Strategy

Disrup�on

Supply

Supply

Supply

Fig. 1 Research framework: integrating a defender–attacker gamewithmilitary supply chain riskmanagement

Fig. 2 Periods and timing for peace, outage and disruption

Table 1 Notation used throughout the paper

Characteristics parameters Cost parametersx Peace time (before disruption) m Daily revenue per unit of resourcel Outage time in the disruption α Reservation cost of capacity backupd Delay time required for capacity backup β Daily usage cost of capacity backupv Defender’s asset valuation γG Daily resource cost of defenderV Attacker’s asset valuation γT Daily resource cost of attackerfX (x) Probability density function of peace time h Holding cost of unit inventoryfL (l) Probability density function of outage timefD(d) Probability density function of delay timeDecision variables Payoffsr Daily resource of defender UG Payoff of the governmentR Daily resource of attacker UT Payoff of the attackerk Binary variable on capacity backupI Inventory level

medicines) can not be held in inventory for a long time and need backup capacity. Otherresources could use both protection mechanisms.

We acknowledge that, in reality, the supply chain network could be very complex (e.g.,different nodes could be supported by different inventories or backup suppliers). However, inthis paper, for simplicity, we consider a single generic resource and a single capacity backupprovider.

Figure 2 shows the period and timing, consisting of peace time2 (which starts at the end ofthe previous-period disruption and ends at the beginning of the current-period disruption) andoutage time (which starts from the beginning of the current-period disruption and ends whenthe disruption influence disappears) for one period. Hence, the length of each period dependson two factors: the peace time and the outage time. Table 1 introduces the notation that isused in this paper, including characteristics parameters, cost parameters, decision variables,

2 The peace time (x) means time with no disruption or outage.

123

Page 5: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 259

Table 2 Baseline values forparameters

Parameter Value Parameter Value Parameter Value

α 0.02 β 0.05 V 2

v 2 h 0.5 γG 0.2

γT 0.3 m 0.1 E[X ] 6

E[L] 5 E[D] 1

and payoffs. Table 2 provides baseline values for parameters that are used throughout thispaper. Note that the baseline values for parameters are chosen for illustration purposes andmay not carry actual meanings. In realistic applications, those parameter values could beestimated based on historical data or expert elicitation. In addition, players’ target valuationscould be approximated using the expected economic losses or casualties (Shan and Zhuang2013); unit costs of reservation, usage, and resource could be based on the cost estimationson labor, equipment, supply, and other costs necessary for the corresponding operations; andparameters for probability density functions could be estimated using experiments.

3 Models and analytical results

In this section,we present the defender’s and the attacker’s optimization problems and provideanalytical solutions to the attacker’s best response function. In particular, Sect. 3.1 studies thespecial cases for combined protection, including no protection, capacity backup protection,and inventory protection, respectively; Sect. 3.2 studies combined protection.

We assume that the defender’s expected payoff for each day in the contest period is rvr+R

(Skaperdas 1996; Zhuang and Bier 2007), which increases in the defender’s daily resourceallocation, r , and the defender’s asset valuation, v, and decreases in the attacker’s dailyresource allocation, R. The attacker’s expected payoff for each day in the contest period isRVr+R , which increases in the attacker’s daily resource allocation, R, and the attacker’s assetvaluation, V , and decreases in the defender’s daily resource allocation, r . During disruptions,the attacker would get the valuation V when the defender does not use capacity backupprotection or experiences the delay time. The missing revenue in disruption periodm may bedifferent from the revenue in peace time v due to damages during the disruption period. Inmost cases, the revenuem in the disruption periodwould be smaller than v in the peace period.

Randomness comes from the length of peace time before disruptions, x , the length ofoutage time in the disruption, l, and the length of delay time, d . We assume that the lowerbound for the outage time in the disruption is larger than the upper bound for the delay timerequired to provide capacity backup. This is reasonable because the delay time is usuallymuch shorter than the disruption time, and the defender would choose not to use capacitybackup protection whenever the delay time is longer than the disruption time. When thedefender is indifferent between using and not using disruption protection mechanisms, weassume that the defender will not use them.

3.1 Basic strategies

3.1.1 No protection

Equation (1) provides the defender’s optimization problemwithout protection strategy. Thereare two components: the expected payoff in contest and the expected loss during disruptions.

123

Page 6: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

260 Ann Oper Res (2016) 236:255–270

maxr≥0

uG(r) =(

r · v

r + R− γG · r

)∫xx · fX (x)dx

︸ ︷︷ ︸expected payoff in contest

− m · r ·∫ll · fL(l)dl

︸ ︷︷ ︸expected loss during disruptions

(1)

The attacker decides his resources after observing the defender’s decisions. There are twocomponents in the attacker’s objective function shown in Eq. (2): the expected payoff incontest and the expected payoff during disruptions.

maxR≥0

uT (r, R, k, I ) =(R · Vr + R

− γT · R)∫

xx · fX (x)dx

︸ ︷︷ ︸expected payoff in contest

+ (V − γT · R) ·∫ll · fL(l)dl

︸ ︷︷ ︸expected payoff during disruptions

(2)

We consider a one-shot sequential game between the defender and the attacker, wherethe defender makes the first move. The attacker observes the defender’s choices, and thendetermines his resource. The strategy pair (r∗, R∗) is a Subgame Perfect Nash Equilibrium(Mas-Colell et al. 1995) if and only if R∗ = R̂(r∗) and r∗ = arg maxr uT (r, R̂(r)), wherethe attacker’s best response function R̂(r) ≡ arg maxRuT (r, R) is solved from Eq. (2) as:

R̂(r) ={G, if r < V ·E[X ]

γT ·[E[X ]+E[L]]0, if r ≥ V ·E[X ]

γT ·[E[X ]+E[L]](3)

for r ≥ 0, where G ≡√

V ·r ·E[X ]γT ·[E[X ]+E[L]] − r . (See “Appendix 1” for the proof.)

Equation (3) shows that the attacker’s best resource allocation R could be either zero(deterred by a high defender’s resource) or positive. Keeping r constant, when R is positive,R = G increases in the attacker’s asset valuation V and the expected peace time E[X ], anddecreases in the attacker’s daily resource cost γT and the expected outage time E[L]. Theattacker’s best response (resource allocation) without protection strategy is shown in Fig. 4.However, the attacker would win if he uses resources R > 0 while the defender does not useany resources r = 0.

3.1.2 Capacity backup protection only

Figure 3 shows the period and timing, consisting of peace time, delay time, and outage time.The delay time starts from the beginning of the current-period disruption and ends when thesupplies are provided to the defender.

Equation (4) provides the defender’s optimization problem when using capacity backupprotection only. There are three components: (a) the expected payoff in contest; (b) theexpected reservation and usage cost of capacity backup protection; and(c) the expected lossduring disruptions. The defender pays the reservation fee at a rate ofα per unit of resource dur-ing the entire period and the usage fee at a rate ofβ per unit of resource during the outage time.

Current PeriodPrevious Period Next Period

Peace Time TimeOutage TimeDisrup�on endsDisrup�on ends Disrup�on starts

Delay Time

Fig. 3 Periods and timing for peace, delay, outage and disruption

123

Page 7: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 261

The defender experiences the loss at a rate of m per unit of resource during the period ofdisruption without backup supplies.

maxr≥0,k∈{0,1} uG(r, k, R) =

(r · v

r + R− γG · r

)∫x

∫l

(x+k ·

∫d(l − d) fD(d)dd

)fX (x) fL (l)dldx

︸ ︷︷ ︸expected payoff in contest

− k ·[α · r

(∫xx · fX (x)dx +

∫ll · fL (l)dl

)+ β · r

∫l

∫d(l − d) fL (l) fD(d)dddl

]︸ ︷︷ ︸

expected reservation and usage cost of capacity backup protection

− m · r[∫

dd · fD(d)dddl + (1 − k)

∫l

∫d(l − d) fL (l) fD(d)dddl

]︸ ︷︷ ︸

expected loss during disruptions

(4)

The attacker decides his resources R to allocate after observing the defender’s choices.There are two components in the attacker’s objective function shown in Eq. (5) below: theexpected payoff in contest, and the expected payoff when the defender experiences disrup-tions.

maxR≥0

uT (r, k, R)=(R · Vr+R

− γT · R)∫

x

∫l

(x+k

∫d

(l − d) fD(d)dd

)fX (x) fL(l)dldx

︸ ︷︷ ︸expected payoff in contest

+ (V − γT · R) ·[(1 − k)

∫ll · fL(l)dl + k

(∫dd · fD(d)dddl

)]︸ ︷︷ ︸

expected payoff when the defender experiences disruptions

(5)

As calculated from Eq. (5), the strategy pair (r∗, k∗, R∗) is a Subgame Perfect NashEquilibrium if and only if R∗ = R̂(r∗, k∗) and (r∗, k∗) = arg max(r,k)uT (r, k, R̂(r, k)),

where the attacker’s best response function R̂(r, k) ≡ arg maxRuT (r, k, R) is as follows:

R̂(r, k) =⎧⎨⎩Gk, if r <

V ·[E[X ]+k(E[L]−E[D])]γT ·(E[X ]+E[L])

0, if r ≥ V ·[E[X ]+k(E[L]−E[D])]γT ·(E[X ]+E[L])

(6)

for r ≥ 0 and k ∈ {0, 1}, where Gk ≡√

V ·r ·[E[X ]+k(E[L]−E[D])]γT ·(E[X ]+E[L]) − r . (See “Appendix 1” for

the proof).Equation (6) is a general case of Eq. (3). It shows that the attacker’s best resource allo-

cation, R, could be either zero (deterred by a high defender’s resource and capacity backupprotection) or positive. Keeping r constant, when R is positive, R = Gk is higher whencapacity backup protection is used (k = 1) than when there is no capacity backup protec-tion (k = 0). Keeping r constant, when R is positive, R = Gk increases in the attacker’sasset valuation, V , and the expected peace time, E[X ], and decreases in the attacker’s dailyresource cost, γT , and the expected delay time, E[D]. Similarly, keeping r constant, when thedefender uses the capacity backup protection (k = 1), the attacker’s best resource allocation,R, increases in the expected outage time, E[L]; while when the defender does not use thecapacity backup protection (k = 0), the attacker’s best resource allocation, R, decreases inthe expected outage time, E[L].

Figure 4 shows the attacker’s best response as a function of the defender’s daily resourceallocation with or without the capacity backup protection. From Fig. 4, we observe that the

123

Page 8: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

262 Ann Oper Res (2016) 236:255–270

0 2 4 6 8 100

0.5

1

1.5

2

2.5

r: Defender's daily resource

R: A

ttack

er's

reso

urce k=1 Using Capacity Backup

k=0 Not Using Capacity Backup

Fig. 4 Attacker’s best response as a function of the defender’s daily resource allocation when using or notcapacity backup protection

attacker’s best response resource first increases and then decreases in the defender’s dailyresource. It is interesting to observe that the attackerwould not be deterred by capacity backupprotection and would actually use more resources when the defender uses capacity backupprotection, in order to remain competitive in the contest.

3.1.3 Inventory protection only

Equation (7) provides the defender’s optimization problem using inventory protection only.As with Eq. (4), there are three components: the expected payoff in contest, the expectedholding cost of inventory protection, and the expected loss during disruptions. During dis-ruptions, if the defender uses inventory protection, she could use inventory to satisfy the needin the contest. Therefore, during the periods of peace time, x , and time with inventory, I , thedefender would defend against the attacker in the contest. If the defender uses r resourcesper day and has I level of inventory, the defender has I

r days of inventory. By using theinventory mechanism, the defender would need to pay for the holding cost, h. The defenderalso experiences loss at a rate of m per unit of resource during the period of disruption, l,without inventory.

maxr≥0,I≥0

uG(r, R, I ) =(

r · v

r + R− γG · r

)[∫xx · fX (x)dx +

∫lmin

{I

r, l

}fL(l)dl

]︸ ︷︷ ︸

expected payoff in contest

− h ·[I ·

∫xx · fX (x)dx +

∫l

∫ l

z=0[I − r z]+ fL(l)dzdl

]︸ ︷︷ ︸

expected holding cost of inventory

− m · r ·∫l

[l − I

r

]+fL(l)dl

︸ ︷︷ ︸expected loss during disruptions

(7)

After observing the defender’s choices, the attacker decides his resource level allocated.There are two major components in the attacker’s objective function shown in Eq. (8): theexpected payoff in contest and the expected payoffwhen the defender experiences disruptions.

123

Page 9: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 263

maxR≥0

uT (r, R, I ) =(R · Vr + R

− γT · R)[∫

xx · fX (x)dx +

∫lmin

{I

r, l

}fL(l)dl

]︸ ︷︷ ︸

expected payoff in contest

+ (V − γT · R) ·∫l

[l − I

r

]+fL(l)dl

︸ ︷︷ ︸expected payoff during disruptions

(8)

The strategy pair (r∗, I ∗, R∗) is a Subgame Perfect Nash Equilibrium if and only if:R∗ = R̂(r∗, I ∗) and (r∗, I ∗) = arg max(r,I )uT (r, I, R̂(r, I )), where the attacker’s best

response function R̂(r, I ) ≡ arg maxRuT (r, I, R) could be solved from Eq. (8) as:

R̂(r, I ) =

⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

GI , if r <V ·

[E[X ]+∫

l min{Ir ,l

}fL (l)dl

]

γT ·[E[X ]+∫

l min{Ir ,l

}fL (l)dl+∫

l

[l− I

r

]+fL (l)dl

]

0, if r ≥ V ·[E[X ]+∫

l min{Ir ,l

}fL (l)dl

]

γT ·[E[X ]+∫

l min{Ir ,l

}fL (l)dl+∫

l

[l− I

r

]+fL (l)dl

](9)

for r ≥ 0 and I ≥ 0, where GI ≡√√√√ V ·r ·

[E[X ]+∫

l min{Ir ,l

}fL (l)dl

]

γT ·[E[X ]+∫

l min{Ir ,l

}fL (l)dl+∫

l

[l− I

r

]+fL (l)dl

] − r . (See

“Appendix 1” for the proof).Equation (9) shows that the attacker’s best resource allocation R could be either zero

(deterred by a high level of the defender’s resources and inventory protection) or positive.Keeping r constant, when R is positive, R = GI increases in the attacker’s asset valuation, V ,and decreases in the attacker’s daily resource cost, γT . Figure 5 illustrates that the attacker’sbest response resource first increases in the defender’s daily resource, r , and then decreasesin r . The attacker’s best response resource increases in inventory level, I , in order to remaincompetitive. This means that the attacker would not be deterred by the inventory protectionstrategy.

0.5 0.51 1

1.52

(a) Without capacity backup (k=0)

r: Defender's daily resource

I: In

vent

ory

leve

l

0 2 4 6 8 100

2

4

6

8

10

0.5 0.51 11.5 1.52 2

2.5

2.5

(b) With capacity backup (k=1)

r: Defender's daily resource

I: In

vent

ory

leve

l

0 2 4 6 8 100

2

4

6

8

10

Fig. 5 Contours for the attacker’s best response, as a function of the defender’s daily resource and inventorylevel with and without capacity backup protection

123

Page 10: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

264 Ann Oper Res (2016) 236:255–270

3.2 Combining capacity backup protection and inventory protection

Equation (10) provides the defender’s optimization problem using the combined strategy.There are four components: the expected payoff in contest, the expected reservation andusage cost of capacity backup protection, the expected holding cost of inventory protection,and the expected loss during disruptions.

maxr≥0,k∈{0,1},I≥0

uG (r, R, k, I )

=(

r · v

r + R− γG · r

)∫x

∫l

∫d

(x + min

{I

r, (1 − k)l + kd

}+ k(l − d)

)fD(d) fX (x) fL (l)dddldx

︸ ︷︷ ︸expected payoff in contest

− k · r[α

(∫xx · fX (x)dx +

∫ll · fL (l)dl

)+ β ·

∫l

∫d(l − d) fL (l) fD(d)dddl

]︸ ︷︷ ︸

expected reservation and usage cost of backup

− h ·[I ·

∫xx · fX (x)dx +

∫l

∫ l

z=0[I − r z]+ fL (l)dzdl

]

︸ ︷︷ ︸expected holding cost of inventory

− m · r∫l

∫d

[kd + (1 − k)l − I

r

]+fD(d) fL (l)dddl

︸ ︷︷ ︸expected loss during disruptions

(10)

After observing the defender’s decisions, the attacker decides to allocate his resources.There are two components in the attacker’s objective function shown in Eq. (11): the expectedpayoff in contest and the expected payoff when the defender experiences disruptions.

maxR≥0

uT (r, R, k, I )

=(R · Vr + R

− γT · R)∫

x

∫l

∫d

(x + min

{I

r, (1 − k)l + kd

}+ k(l − d)

)fD(d) fX (x) fL (l)dddldx

︸ ︷︷ ︸expected payoff in contest

+ (V − γT · R) ·∫l

∫d

[kd + (1 − k)l − I

r

]+fD(d) fL (l)dddl

︸ ︷︷ ︸expected payoff when the defender experiences disruptions

(11)

The strategy pair (r∗, k∗, I ∗, R∗) is a Subgame Perfect Nash Equilibrium if and onlyif R∗ = R̂(r∗, k∗, I ∗) and (r∗, k∗, I ∗) = arg max(r,k,I )uT (r, k, I, R̂(r, k, I )), where the

attacker’s best response function R̂(r, k, I ) ≡ arg maxRuT (r, k, I, R) could be solved fromEq. (11) as:

R̂(r, k, I )

=

⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩

Gk,I , if r <V ·

[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT

[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl+∫

l

∫d

[kd+(1−k)l− I

r

]+fD (d) fL (l)dddl

]

0, if r ≥ V ·[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT

[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl+∫

l

∫d

[kd+(1−k)l− I

r

]+fD (d) fL (l)dddl

](12)

where Gk,I ≡√√√√ V ·r ·

[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT ·[E[X ]+k(E[L]−E[d])+∫

l

∫d min

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl+∫

l

∫d

[kd+(1−k)l− I

r

]+fD (d) fL (l)dddl

] −r for

r ≥ 0, k ∈ {0, 1} and I ≥ 0. (See “Appendix 1” for the proof).

123

Page 11: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 265

Equation (12) shows that the attacker’s best resource allocation, R, could be either zero(deterred by the combination of a high level of the defender’s resources and capacity backupprotection/inventory protection) or positive. When R is positive, R = Gk,I is higher whencapacity protection is used, k = 1, than when there is no capacity protection, k = 0. Inaddition, R increases in the attacker’s asset valuation, V , and decreases in the attacker’s dailyresource cost, γT , when R is positive.

Figure 5 shows that the attacker’s best response (resource allocation) first increases inthe defender’s daily resource, and eventually decreases in the defender’s daily resource.The attacker’s best response (resource allocation) becomes higher when the defender usescapacity backup protection or increases in inventory level, which means that the attackerwould not be deterred only by capacity backup protection or inventory protection.

When the defender is more risk averse or when the attacker is more risk seeking, it ismore likely that the defender would choose the combined strategy (combination of capacitybackup protection and inventory protection) since she could reduce the uncertainty or riskand assure a relatively high revenue.

4 Numerical analysis for equilibrium strategies and payoffs

Considering the uncertainties of each parameter, we conduct extensive numerical analysis toinvestigate the sensitivity of the parameters on the optimal disruption preparation strategiesand the player payoffs.

According to the baseline data, as shown in Table 2, we conduct the following experimentsto analyze the numerical sensitivity of the defender’s and the attacker’s equilibrium strategiesand payoffs.

4.1 Combining capacity backup protection and inventory protection

Combining capacity backup protection and inventory protection is the most general casewhich allows for I = 0 and k = 0, including capacity backup protection (I = 0), inventoryprotection (k = 0), or no protection (k = I = 0).

There are four decision variables in combined protection: the defender’s daily resource, r ,binary variable on capacity backup protection, k, inventory level, I , and the attacker’s dailyresource, R. Depending on whether these four variables are positive or zero, Table 3 lists allsixteen potential cases. Note that in Table 3 “

√” means the case would show or appear in

some situations, while “×” means that the case is dominated by other case(s) and would notshow.

Table 3 Sixteen cases for combined strategy

Defender resource and inventory Attacker resource R > 0 Attacker resource R = 0

Backup No backup Backup No backupk = 1 k = 0 k = 1 k = 0

r > 0, I > 0 #1√

#9√

#3√

#11√

r > 0, I = 0 #2√

#10√

#5√

#13√

r = 0, I > 0 #4× #12× #7× #15×r = 0, I = 0 #6× #14× #8× #16

123

Page 12: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

266 Ann Oper Res (2016) 236:255–270

Fig. 6 Optimal player strategies for combined protection with cases defined in Table 3 and baseline valuesdefined in Table 2

Proposition 1 Under combined protection, six out of sixteen cases, #4, #6, #7, #12, #14 and#15 are dominated, and #8 in Table 3 is weakly dominated.

See “Appendix 2” for the proof of Proposition 1.

Remark Proposition 1 shows that the defender would use resources (r > 0) in eight cases,#1, #2, #3, #5, #9, #10, #11 and #13. However, the defender would not use the resource(r = 0) only when the attacker does not use the resource (R = 0), or when capacity backupprotection and inventory protection are notworthy (#16). In reality, it does notmake any sensefor the defender to invest in managing the risk of supply chain disruptions if the defenderis not willing to exert any resources to win the contest. Therefore, there are nine possiblecases: #1, #2, #3, #5, #9, #10, #11, #13 and #16, which illustrate the optimal strategies ofdefender and the attacker. The defender would not pick cases #4, #7, #8, #12 and #16, whilethe attacker would not pick cases #6 and #14.

Observation As seen from Fig. 6, the defender would use combined protection (cases #1and #3) when (a) the attacker’s asset valuation is low; (b) the defender’s holding cost is low;or (c) the expected peace time is low.

4.2 Comparing four protection mechanisms

We compare the expected defender’s payoffs under the four protection mechanisms in Fig. 7using the baseline values shown in Table 2.

Based on the one-way sensitivity analysis in Fig. 7, we find that:

1. The defender benefits in counter-terrorism games by utilizing supply chain risk manage-ment tools such as capacity backup or inventory protection, as shown by the gap between

123

Page 13: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 267

0 0.05 0.1 0.15 0.2

44.24.44.6

(a) : Unit reservation cost on backup 0 0.1 0.2 0.3 0.4

44.24.44.6

(b) : Unit usage cost on backup0 1 2 3 4 5 6

0

10

20

30

(c) v: Asset valuation of defender

0 1 2 3 4 5 6

510152025

(d) V: Asset valuation of attacker0 0.1 0.2 0.3 0.4 0.5

2

3

4

5

(e) m: Daily revenue of unit resource

0 0.1 0.2 0.3 0.4

5

10

15

(f) G: Defender's unit resource cost

0 0.5 1 1.5 2 2.5

5

10

15

(g) T: Attacker's unit resource cost 0 0.1 0.2 0.3 0.4 0.5 0.6

4

5

6

(h) h: Defender's holding cost of unit inventory

0 5 10 1502468

(i) E[X]: Expected peace length

0 2 4 6 8 103

4

5

6

(j) E[L]: Expected outage length

0 1 2 3 43.5

4

4.5

(k) E[D]: Expected delay length

UG1*: Capacity backup protectionUG2*: Inventory protectionUG3*: Combining capacity backup & inventoryUG4*: No protectionBaseline values

Fig. 7 Comparing defender’s payoffs under four protection mechanisms

U∗G4 and others. Combined protection always leads to (weakly) higher defender payoffs.

This is not surprising because the other two strategies are special cases of the combinedstrategy.

2. Combined protection is better than capacity backup protection when the attacker’s assetvaluation, V , the defender’s holding cost of unit inventory, h, and the expected peace time,E[X ], are low.

3. Combined protection is significantly better than inventory protection, when: (a) the unitreservation cost, α, the unit usage cost of capacity backup, β, the attacker’s asset valuation,V , the defender’s unit resource cost, γG , the holding cost of unit inventory, h, the expectedpeace length, E[X ], and the expected delay length, E[D], are low; and (b) the defender’sasset valuation v, daily revenue rate per unit of resource,m, the attacker’s unit of resourcecost, γT , the holding cost of unit inventory, h, and the expected outage length, E[L], arehigh.

4. Capacity backup protection is significantly better than using inventory protection, when:(a) the unit reservation cost, α, the unit usage cost, β, the defender’s unit of resourcecost, γG , the expected peace length, E[X ], and the expected delay length, E[D], are low;(b) the defender’s asset valuation v, the daily revenue rate per unit of resource, m, theattacker’s unit resource cost, γT , the holding cost of unit inventory, h, and the expectedoutage length, E[L], are high.

5 Conclusions and future research

Defenders’ performancemay be affected by disruptions tomilitary supply chains. The impactof disruptions could bemitigated by pre-disruption preparationmechanisms. In this paper, weinvestigate the combined protection mechanism (capacity backup protection and inventoryprotection), and its impacts on the defender’s total expected payoff in a sequential defender–attacker game. We provide a modeling framework to study the impact and optimal use ofsupply chain risk management tools to mitigate the supply chain disruptions.

123

Page 14: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

268 Ann Oper Res (2016) 236:255–270

Under the combined protection model, the defender’s objective is to maximize the totalexpected payoff by balancing the trade-offs between the protection costs of preparation (e.g.,reservation and/or inventory costs) and the disadvantage caused by military supply chaindisruptions. We conduct extensive numerical analysis to investigate the optimal protectionmechanism. Our results show that the defender does benefit in counter-terrorism gamesby utilizing supply chain risk management tools such as capacity backup and/or inventoryprotection, and we document the conditions when such benefit is significant. However, whilesupply chain risk management tools are beneficial, it is interesting to note that the attacker’sbest response resource could be higher if the defender uses capacity backup protection andincreases in inventory level, which means that the attacker would not be easily deterred bycapacity backup protection and/or inventory protection.

Interesting future research directions in this under-studied field of integrating supplychain risk management in a defender–attacker game include: (a) investigating a multi-periodinventory protection plan, integrated with a multi-period defender–attacker game (Jose andZhuang 2013;Wang andZhuang 2011); (b) extending the single-resourcemodel to amultiple-resource model; (c) considering that both the defender and the attacker could react to dis-ruption by adapting or changing their resource allocations (the defender’s daily resource rand the attacker’s daily resource R); and (d) extending the single capacity backup model to amore complex model that considers multiple capacity backup providers, and selecting suit-able capacity backup supplier(s) from the candidate pool, according to capacity flexibility,cost, and reliability.

Appendices

In this section,weprovide proofs for different protection strategies, including capacity backupprotection, inventory protection, and combined protection, aswell as dominated cases (Propo-sition 1).

Appendix 1: Proof of best response function for different protections

From the attacker’s utility function (Eq. 11), since the attacker’s resource allocation R is acontinuous variable, we could calculate the optimum of R as a function of the defender’sresource allocation, r , decision on using capacity backup, k, and on using inventory, I . Inparticular, if R ≥ 0, the first derivative should be zero:

dE[uT ]dR

=(V (r+R)−RV

(r+R)2−γT

)[E[X ]+

∫l

∫dmin

{I

r, (1 − k)l+kd

}fD(d) fL(l)dddl

+ k(E[L] − E[D])] − γT

∫l

∫d

[(1 − k)l + kd − I

r

]+fD(d) fL(l)dddl = 0

We solve this equation and get:

R̂(r, k, I )

=

⎧⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎩

Gk,I , if r <V ·

[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT

[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d)fL (l)dddl+∫

l∫d

[kd+(1−k)l− I

r

]+fD (d)fL (l)dddl

]

0, if r ≥ V ·[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT

[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d)fL (l)dddl+∫

l∫d

[kd+(1−k)l− I

r

]+fD (d)fL (l)dddl

]

123

Page 15: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

Ann Oper Res (2016) 236:255–270 269

where Gk,I =√√√√√ V ·r ·

[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d) fL (l)dddl

]

γT

[E[X ]+k(E[L]−E[d])+∫

l∫dmin

{Ir ,(1−k)l+kd

}fD (d)fL (l)dddl+∫

l∫d

[kd+(1−k)l− I

r

]+fD (d)fL (l)dddl

]

− r.

The second order condition is satisfied, since

d2E[uT ]d2R

=−2Vr[E[X ]+k(E[L] − E[d])+∫

l

∫d min

{ Ir , (1 − k)l+kd

}fD(d) fL(l)dddl

](r+R)3

≤ 0.

Best response functions for no protection in Eq. (3), capacity backup protection in Eq. (6),and inventory protection in Eq. (9) are special cases of best response functions for combinedprotection in Eq. (12) when I = k = 0, I = 0, and k = 0, respectively. Please see above forthe proof.

Appendix 2: Proof of dominated cases as shown in Table 3

There are four cases as shown in the following:

1. When k = 1 and r = 0, from Eq. (10), the payoff function of the defender becomes:

maxk=1,r=0,I≥0

E[uG(k, r, R, I )] = −[h · I ·

∫xx · fX (x)dx + h ·

∫l[I − rl]+ fL(l)dl

]

When I = 0, E[uG(k, r, R, I )] reaches a maximum at 0 due to the first derivativedE[uG ]

d I ≤ 0. So, for the defender, case #4 is dominated by cases #6 and #8. Similarly, forthe defender, case #7 is dominated by cases #6 and #8.

2. When k = 1 and r = 0, from Eq. (11), the payoff function of the attacker becomes:

maxR≥0

E[uT (k, r, R, I )] = (V − γT R)

(∫x

∫l

∫d

(x+min

{I

r,(1 − k)l + kd

}+k(l−d)

)

× fX (x)fL(l)fD(d)dddldx

+∫l

∫d

[kd + (1 − k)l − I

r

]+fL(l) fD(d)dddl

)

When R = 0, E[uT (k, r, R, I )] reaches amaximumatV ·(∫x x · fX (x)dx+∫l l · fL(l)dl

)due to the first derivative dE[uT ]

dR ≤ 0. Therefore, for the attacker, case #6 is dominatedby cases #7 and #8.

3. When k = 0 and r = 0, Eq. (10) implies:

maxk=0,r=0,I≥0

E[uG(k, r, R, I )]=−[h · I ·

∫xx · fX (x)dx+h ·

∫l

∫ l

z=0[I−r z]+ fL (l)dzdl

]

When I = 0, E[uG(k, r, R, I )] reaches a maximum at 0 due to the first derivativedE[uG ]

d I ≤ 0. So, for the defender, case #12 is dominated by cases #15 and #16. Similarly,case #15 is dominated by cases #14 and #16.

4. When k = 0 and r = 0, from Eq. (11), the payoff function of the attacker becomes:

maxR≥0

E[uT (r, R, I )]

=(V−γT · R) ·[∫

x

∫l

(x+min

{I

r, l

})fX (x) fL(l)dldx+

∫l

[l− I

r

]+fL(l)dl

]

123

Page 16: Modeling and mitigating the effects of supply chain ...jzhuang/Papers/XZL_Supply_ANOR_2015.pdf · Modeling and mitigating the effects of supply chain ... sized that it is critical

270 Ann Oper Res (2016) 236:255–270

When R = 0, E[uT (r, R, I )] reaches amaximumat[∫

x

∫l

(x + min

{ Ir , l

})fX (x) fL(l)

dldx + ∫l

[l − I

r

]+fL(l)dl

]· V due to the first derivative dE[uT ]

dR ≤ 0. Therefore, for

the attacker, case #14 is dominated by cases #15 and #16.In summary, there are nine possible cases: #1, #2, #3, #5, #9, #10, #11, #13 and #16, as shownin Table 3.

References

Bier, V. M., & Haphuriwat, N. (2011). Analytical method to identify the number of containers to inspect at usports to deter terrorist attacks. Annals of Operations Research, 187(1), 137–158.

Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems withcomponents of different values. Reliability Engineering and System Safety, 87(3), 315–323.

Chopra, S., Reinhardt, G., & Mohan, U. (2007). The importance of decoupling recurrent and disruption risksin a supply chain. Naval Research Logistics, 54(5), 544–555.

Chopra, S., & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown.MIT Sloan ManagementReview, 46(1), 53–61.

Christopher, M., & Lee, H. (2004). Mitigating supply chain risk through improved confidence. InternationalJournal of Physical Distribution and Logistics Management, 34(5), 388–396.

Christopher, M., & Peck, H. (2004). Building the resilient supply chain. International Journal of LogisticsManagement, 15(2), 1–13.

Dutta, P. K. (1999). Strategies and games: Theory and practice. Cambridge, MA: MIT Press.Hopp, J. W., Liu, M., & Liu, Z. (2010). Protecting supply chain networks against catastrophic failures.

Working paper, Department of Operations and InformationManagement, Wisconsin School of Business,University of Wisconsin-Madison.

Insua, D. R., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American StatisticalAssociation, 104(486), 841–854.

Jin, S., Liu, Z., & Zhuang, J. (2010). Monte carlo simulation-based supply chain disruption management forwargames. In Proceedings of the 2010 winter simulation conference (pp. 2682–2693).

Jose, V. R. R., & Zhuang, J. (2013). Technology adoption, accumulation, and competition in multi-periodattacker–defender games. Military Operations Research, 18(2), 33–47.

Kane, T. M. (2001).Military logistics and strategic performance (Vol. 1). Taylor: Psychology Press.Kress, M. (2012). Modeling armed conflicts. Science, 336(6083), 865–869.Mas-Colell, A., Whinston, M. D., & Green, J. R. (1995). Microeconomic theory. New York, NY: Oxford

University Press.National Public Radio. (2011). Among the costs of war: Billions a year in A.C.? http://www.npr.org/2011/06/

25/137414737/among-the-costs-of-war-20b-in-air-conditioning/. Accessed in January, 2015.Paul, J. A., &Hariharan, G. (2012). Location-allocation planning of stockpiles for effective disaster mitigation.

Annals of Operations Research, 196(1), 469–490.Sandler, T., & Siqueira, K. (2006). Global terrorism: Deterrence versus pre-emption. Canadian Journal of

Economics, 39(4), 1370–1387.Shan, X., & Zhuang, J. (2013a). Cost of equity in homeland security resource allocation in the face of a

strategic attacker. Risk Analysis, 33(6), 1083–1099.Shan, X., &Zhuang, J. (2013b). Hybrid defensive resource allocations in the face of partially strategic attackers

in a sequential defender–attacker game. European Journal of Operational Research, 228(1), 262–272.Simon, S. J. (2001). The art of military logistics. Communications of the ACM, 44(6), 62–66.Skaperdas, S. (1996). Contest success functions. Economic Theory, 7(2), 283–290.von Clausewitz, C. (2004). On war. Boston: Digireads.com Publishing.Wang, X., & Zhuang, J. (2011). Balancing congestion and security in the presence of strategic applicants with

private information. European Journal of Operational Research, 212(1), 100–111.Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters—Defensive strategy with endoge-

nous attacker effort. Operations Research, 55(5), 976–991.Zhuang, J., Saxton,G.D.,&Wu,H. (2014). Publicity vs. impact in nonprofit disclosures and donor preferences:

A sequential gamewith one nonprofit organization andN donors.Annals of Operations Research, 221(1),469–491.

123