Skip to main content
Erschienen in: Public Choice 3-4/2019

21.05.2018

A model of terrorism and counterterrorism with location choices

verfasst von: Yang Jiao, Zijun Luo

Erschienen in: Public Choice | Ausgabe 3-4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We study a model of terrorism and counterterrorism with three geographic target locations, in which the last location is chosen by the terrorists and is unknown to the defender. We find the choice of location and defender’s allocation of defensive resources to depend on whether the first two locations are attacked simultaneously or sequentially. In the sequential-move game, the final attack is closer to the low-valued target than it is in the simultaneous-move game. In addition, the defender chooses to defend only the location that is attacked first in the sequential game. Results from the model also can shed light on less provocative criminal events such as bank robberies and drug dealings.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Comparatively, there are 4,935 attacks targeted a single geographic location, 3,002 attacks targeted two locations, 467 attacks targeted four locations, 228 attacks targeted five locations, and 553 attacks targeted six or more locations (authors’ calculation).
 
2
Game-theoretic models have provided important insights into the analyses of terrorism and counterterrorism. Notable examples include Sandler et al. (1983) and Bueno de Mesquita (2005a, b, c) on various interactions between government and terrorists, Cadigan and Schmitt (2010) on entry deterrence and terrorism, Bandyopadhyay and Sandler (2011) on the interplay between preemptive and defensive measures, Bandyopadhyay et al. (2011, 2014) on the relationship between foreign aid, terrorism, and counterterrorism, and Das and Chowdhury (2014) on deterrence and preemption. For recent surveys, see Sandler and Arce (2003), Sandler and Siqueira (2009), Sandler (2014, 2015), and Schneider et al. (2015).
 
3
There are numerous models that focus on two locations. See, for example, Sandler and Lapan (1988), Siqueira and Sandler (2008), and Hausken (2012).
 
4
Even though Bier et al. (2007) present a general model that can deal with more than two potential targets, the main derivation of their results is done in a two-target setting.
 
5
Alternatively, one may think of this scenario in the context of two local terrorist groups competing to show their loyalty to the leader by providing “additional” soldiers.
 
6
As outlined in Sect. 2.2, the current model assumes that the defender “chooses” the values of \(w_i\). As a result, whether defense may cause a reversal of valuations of the two locations can not be analyzed in the current framework.
 
7
The sufficient and necessary condition for \({\bar{d}}_1={\tilde{d}}_1\) is
$$\begin{aligned} {\left\{ \begin{array}{ll}w_1=2w_1-w_2;\\ w_1^2+w_2^2=4w_1^2-3w_1w_2+w_2^2;\end{array}\right. } \end{aligned}$$
which hold true if \(w_1=w_2\).
 
8
It is straightforward to verify that
$$\begin{aligned} \frac{\partial ^2{\mathscr {L}}}{\partial w_i^2}=\frac{w_j(w_i+w_j)}{w_i^2(w_i+w_j)^2}>0; \end{aligned}$$
and hence the second order condition of a minimization problem is satisfied.
 
9
In the movie, Texas Ranger Marcus Hamilton, played by Oscar-winning actor Jeff Bridges, needs to determine which branch of a bank will be attacked next by the Howard brothers. The Howard brothers had previously robbed three other branches of the same bank.
 
Literatur
Zurück zum Zitat Bandyopadhyay, S., & Sandler, T. (2011). The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78, 546–564.CrossRef Bandyopadhyay, S., & Sandler, T. (2011). The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78, 546–564.CrossRef
Zurück zum Zitat Bandyopadhyay, S., Sandler, T., & Younas, J. (2011). Foreign aid as counterterrorism policy. Oxford Economic Papers, 63, 423–447.CrossRef Bandyopadhyay, S., Sandler, T., & Younas, J. (2011). Foreign aid as counterterrorism policy. Oxford Economic Papers, 63, 423–447.CrossRef
Zurück zum Zitat Bandyopadhyay, S., Sandler, T., & Younas, J. (2014). Foreign direct investment, aid, and terrorism. Oxford Economic Papers, 66, 25–50.CrossRef Bandyopadhyay, S., Sandler, T., & Younas, J. (2014). Foreign direct investment, aid, and terrorism. Oxford Economic Papers, 66, 25–50.CrossRef
Zurück zum Zitat Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563–587.CrossRef Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563–587.CrossRef
Zurück zum Zitat Blomberg, B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of eperations. Public Choice, 149, 441–463.CrossRef Blomberg, B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of eperations. Public Choice, 149, 441–463.CrossRef
Zurück zum Zitat Buchanan, J. M. (1983). Rent seeking, noncompensated transfers, and laws of succession. Journal of Law and Economics, 26, 71–85.CrossRef Buchanan, J. M. (1983). Rent seeking, noncompensated transfers, and laws of succession. Journal of Law and Economics, 26, 71–85.CrossRef
Zurück zum Zitat Bueno de Mesquita, E. (2005a). Conciliation, counterterrorism, and patterns of terrorist violence. International Organization, 59, 145–176. Bueno de Mesquita, E. (2005a). Conciliation, counterterrorism, and patterns of terrorist violence. International Organization, 59, 145–176.
Zurück zum Zitat Bueno de Mesquita, E. (2005b). The quality of terror. American Journal of Political Science, 49, 515–530.CrossRef Bueno de Mesquita, E. (2005b). The quality of terror. American Journal of Political Science, 49, 515–530.CrossRef
Zurück zum Zitat Bueno de Mesquita, E. (2005c). The terrorist endgame: A model with moral hazard and learning. Journal of Conflict Resolution, 49, 237–258.CrossRef Bueno de Mesquita, E. (2005c). The terrorist endgame: A model with moral hazard and learning. Journal of Conflict Resolution, 49, 237–258.CrossRef
Zurück zum Zitat Cadigan, J., & Schmitt, P. M. (2010). Strategic entry deterrence and terrorism: Theory and experimental evidence. Public Choice, 143, 3–22.CrossRef Cadigan, J., & Schmitt, P. M. (2010). Strategic entry deterrence and terrorism: Theory and experimental evidence. Public Choice, 143, 3–22.CrossRef
Zurück zum Zitat Chang, Y. M., & Luo, Z. (2015). Endogenous division rules as a family constitution: Strategic altruistic transfers and sibling competition. Journal of Population Economics, 28, 173–194.CrossRef Chang, Y. M., & Luo, Z. (2015). Endogenous division rules as a family constitution: Strategic altruistic transfers and sibling competition. Journal of Population Economics, 28, 173–194.CrossRef
Zurück zum Zitat Chang, Y. M., & Weisman, D. L. (2005). Sibling rivalry and strategic parental transfers. Southern Economic Journal, 71, 821–836.CrossRef Chang, Y. M., & Weisman, D. L. (2005). Sibling rivalry and strategic parental transfers. Southern Economic Journal, 71, 821–836.CrossRef
Zurück zum Zitat Das, S. P., & Chowdhury, P. R. (2014). Deterrence, preemption, and panic: A common-enemy problem o terrorism. Economic Inquiry, 52, 219–238.CrossRef Das, S. P., & Chowdhury, P. R. (2014). Deterrence, preemption, and panic: A common-enemy problem o terrorism. Economic Inquiry, 52, 219–238.CrossRef
Zurück zum Zitat Eaton, C. (2004). The elementary economics of social dilemmas. Canadian Journal of Economics, 37(4), 805–829.CrossRef Eaton, C. (2004). The elementary economics of social dilemmas. Canadian Journal of Economics, 37(4), 805–829.CrossRef
Zurück zum Zitat Farrow, S. (2007). The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Economic Policy, 25(1), 14–26.CrossRef Farrow, S. (2007). The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Economic Policy, 25(1), 14–26.CrossRef
Zurück zum Zitat Gal-Or, E. (1985). First mover and second mover advantages. International Economic Review, 26(3), 649–653.CrossRef Gal-Or, E. (1985). First mover and second mover advantages. International Economic Review, 26(3), 649–653.CrossRef
Zurück zum Zitat Hausken, K. (2012). The economics of terrorism against two targets. Applied Economics Letters, 19, 1135–1138.CrossRef Hausken, K. (2012). The economics of terrorism against two targets. Applied Economics Letters, 19, 1135–1138.CrossRef
Zurück zum Zitat Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101, 527–541.CrossRef Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101, 527–541.CrossRef
Zurück zum Zitat Powell, R. (2009). Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack. Games and Economic Behavior, 67, 611–615.CrossRef Powell, R. (2009). Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack. Games and Economic Behavior, 67, 611–615.CrossRef
Zurück zum Zitat Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.CrossRef Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.CrossRef
Zurück zum Zitat Sandler, T. (2015). Terrorism and counterterrorism: An overview. Oxford Economic Papers, 67, 1–20.CrossRef Sandler, T. (2015). Terrorism and counterterrorism: An overview. Oxford Economic Papers, 67, 1–20.CrossRef
Zurück zum Zitat Sandler, T., & Arce, D. G. (2003). Terrorism & game theory. Simulation & Gaming, 34, 319–337.CrossRef Sandler, T., & Arce, D. G. (2003). Terrorism & game theory. Simulation & Gaming, 34, 319–337.CrossRef
Zurück zum Zitat Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76, 245–261.CrossRef Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76, 245–261.CrossRef
Zurück zum Zitat Sandler, T., & Siqueira, K. (2006). Global terrorism: Detterence versus pre-emption. Canadian Journal of Economics, 19(4), 1370–1387.CrossRef Sandler, T., & Siqueira, K. (2006). Global terrorism: Detterence versus pre-emption. Canadian Journal of Economics, 19(4), 1370–1387.CrossRef
Zurück zum Zitat Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation & Gaming, 40, 164–192.CrossRef Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation & Gaming, 40, 164–192.CrossRef
Zurück zum Zitat Sandler, T., Tschirhart, J. T., & Cauley, J. (1983). A theoretical analysis of transnational terrorism. American Political Science Review, 77, 36–54.CrossRef Sandler, T., Tschirhart, J. T., & Cauley, J. (1983). A theoretical analysis of transnational terrorism. American Political Science Review, 77, 36–54.CrossRef
Zurück zum Zitat Schneider, F., Brück, T., & Meierrieks, D. (2015). The economics of counterterrorism: A survey. Journal of Economic Surveys, 29, 131–157.CrossRef Schneider, F., Brück, T., & Meierrieks, D. (2015). The economics of counterterrorism: A survey. Journal of Economic Surveys, 29, 131–157.CrossRef
Zurück zum Zitat Siqueira, K., & Sandler, T. (2008). Defensive counterterrorism measures and domestic politics. Defence and Peace Economics, 19, 405–413.CrossRef Siqueira, K., & Sandler, T. (2008). Defensive counterterrorism measures and domestic politics. Defence and Peace Economics, 19, 405–413.CrossRef
Zurück zum Zitat Skaperdas, S. (1992). Cooperation, conflict, and power in the absence of property rights. American Economic Review, 82(4), 720–739. Skaperdas, S. (1992). Cooperation, conflict, and power in the absence of property rights. American Economic Review, 82(4), 720–739.
Zurück zum Zitat Tullock, G. (1980). Efficient rent seeking. In J. Buchanan, R. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–1120). College Station: Texas A&M University Press. Tullock, G. (1980). Efficient rent seeking. In J. Buchanan, R. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–1120). College Station: Texas A&M University Press.
Metadaten
Titel
A model of terrorism and counterterrorism with location choices
verfasst von
Yang Jiao
Zijun Luo
Publikationsdatum
21.05.2018
Verlag
Springer US
Erschienen in
Public Choice / Ausgabe 3-4/2019
Print ISSN: 0048-5829
Elektronische ISSN: 1573-7101
DOI
https://doi.org/10.1007/s11127-018-0559-8

Weitere Artikel der Ausgabe 3-4/2019

Public Choice 3-4/2019 Zur Ausgabe

Premium Partner