Skip to main content
Top
Published in: Public Choice 3-4/2019

21-05-2018

A model of terrorism and counterterrorism with location choices

Authors: Yang Jiao, Zijun Luo

Published in: Public Choice | Issue 3-4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We study a model of terrorism and counterterrorism with three geographic target locations, in which the last location is chosen by the terrorists and is unknown to the defender. We find the choice of location and defender’s allocation of defensive resources to depend on whether the first two locations are attacked simultaneously or sequentially. In the sequential-move game, the final attack is closer to the low-valued target than it is in the simultaneous-move game. In addition, the defender chooses to defend only the location that is attacked first in the sequential game. Results from the model also can shed light on less provocative criminal events such as bank robberies and drug dealings.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Comparatively, there are 4,935 attacks targeted a single geographic location, 3,002 attacks targeted two locations, 467 attacks targeted four locations, 228 attacks targeted five locations, and 553 attacks targeted six or more locations (authors’ calculation).
 
2
Game-theoretic models have provided important insights into the analyses of terrorism and counterterrorism. Notable examples include Sandler et al. (1983) and Bueno de Mesquita (2005a, b, c) on various interactions between government and terrorists, Cadigan and Schmitt (2010) on entry deterrence and terrorism, Bandyopadhyay and Sandler (2011) on the interplay between preemptive and defensive measures, Bandyopadhyay et al. (2011, 2014) on the relationship between foreign aid, terrorism, and counterterrorism, and Das and Chowdhury (2014) on deterrence and preemption. For recent surveys, see Sandler and Arce (2003), Sandler and Siqueira (2009), Sandler (2014, 2015), and Schneider et al. (2015).
 
3
There are numerous models that focus on two locations. See, for example, Sandler and Lapan (1988), Siqueira and Sandler (2008), and Hausken (2012).
 
4
Even though Bier et al. (2007) present a general model that can deal with more than two potential targets, the main derivation of their results is done in a two-target setting.
 
5
Alternatively, one may think of this scenario in the context of two local terrorist groups competing to show their loyalty to the leader by providing “additional” soldiers.
 
6
As outlined in Sect. 2.2, the current model assumes that the defender “chooses” the values of \(w_i\). As a result, whether defense may cause a reversal of valuations of the two locations can not be analyzed in the current framework.
 
7
The sufficient and necessary condition for \({\bar{d}}_1={\tilde{d}}_1\) is
$$\begin{aligned} {\left\{ \begin{array}{ll}w_1=2w_1-w_2;\\ w_1^2+w_2^2=4w_1^2-3w_1w_2+w_2^2;\end{array}\right. } \end{aligned}$$
which hold true if \(w_1=w_2\).
 
8
It is straightforward to verify that
$$\begin{aligned} \frac{\partial ^2{\mathscr {L}}}{\partial w_i^2}=\frac{w_j(w_i+w_j)}{w_i^2(w_i+w_j)^2}>0; \end{aligned}$$
and hence the second order condition of a minimization problem is satisfied.
 
9
In the movie, Texas Ranger Marcus Hamilton, played by Oscar-winning actor Jeff Bridges, needs to determine which branch of a bank will be attacked next by the Howard brothers. The Howard brothers had previously robbed three other branches of the same bank.
 
Literature
go back to reference Bandyopadhyay, S., & Sandler, T. (2011). The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78, 546–564.CrossRef Bandyopadhyay, S., & Sandler, T. (2011). The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78, 546–564.CrossRef
go back to reference Bandyopadhyay, S., Sandler, T., & Younas, J. (2011). Foreign aid as counterterrorism policy. Oxford Economic Papers, 63, 423–447.CrossRef Bandyopadhyay, S., Sandler, T., & Younas, J. (2011). Foreign aid as counterterrorism policy. Oxford Economic Papers, 63, 423–447.CrossRef
go back to reference Bandyopadhyay, S., Sandler, T., & Younas, J. (2014). Foreign direct investment, aid, and terrorism. Oxford Economic Papers, 66, 25–50.CrossRef Bandyopadhyay, S., Sandler, T., & Younas, J. (2014). Foreign direct investment, aid, and terrorism. Oxford Economic Papers, 66, 25–50.CrossRef
go back to reference Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563–587.CrossRef Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563–587.CrossRef
go back to reference Blomberg, B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of eperations. Public Choice, 149, 441–463.CrossRef Blomberg, B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of eperations. Public Choice, 149, 441–463.CrossRef
go back to reference Buchanan, J. M. (1983). Rent seeking, noncompensated transfers, and laws of succession. Journal of Law and Economics, 26, 71–85.CrossRef Buchanan, J. M. (1983). Rent seeking, noncompensated transfers, and laws of succession. Journal of Law and Economics, 26, 71–85.CrossRef
go back to reference Bueno de Mesquita, E. (2005a). Conciliation, counterterrorism, and patterns of terrorist violence. International Organization, 59, 145–176. Bueno de Mesquita, E. (2005a). Conciliation, counterterrorism, and patterns of terrorist violence. International Organization, 59, 145–176.
go back to reference Bueno de Mesquita, E. (2005b). The quality of terror. American Journal of Political Science, 49, 515–530.CrossRef Bueno de Mesquita, E. (2005b). The quality of terror. American Journal of Political Science, 49, 515–530.CrossRef
go back to reference Bueno de Mesquita, E. (2005c). The terrorist endgame: A model with moral hazard and learning. Journal of Conflict Resolution, 49, 237–258.CrossRef Bueno de Mesquita, E. (2005c). The terrorist endgame: A model with moral hazard and learning. Journal of Conflict Resolution, 49, 237–258.CrossRef
go back to reference Cadigan, J., & Schmitt, P. M. (2010). Strategic entry deterrence and terrorism: Theory and experimental evidence. Public Choice, 143, 3–22.CrossRef Cadigan, J., & Schmitt, P. M. (2010). Strategic entry deterrence and terrorism: Theory and experimental evidence. Public Choice, 143, 3–22.CrossRef
go back to reference Chang, Y. M., & Luo, Z. (2015). Endogenous division rules as a family constitution: Strategic altruistic transfers and sibling competition. Journal of Population Economics, 28, 173–194.CrossRef Chang, Y. M., & Luo, Z. (2015). Endogenous division rules as a family constitution: Strategic altruistic transfers and sibling competition. Journal of Population Economics, 28, 173–194.CrossRef
go back to reference Chang, Y. M., & Weisman, D. L. (2005). Sibling rivalry and strategic parental transfers. Southern Economic Journal, 71, 821–836.CrossRef Chang, Y. M., & Weisman, D. L. (2005). Sibling rivalry and strategic parental transfers. Southern Economic Journal, 71, 821–836.CrossRef
go back to reference Das, S. P., & Chowdhury, P. R. (2014). Deterrence, preemption, and panic: A common-enemy problem o terrorism. Economic Inquiry, 52, 219–238.CrossRef Das, S. P., & Chowdhury, P. R. (2014). Deterrence, preemption, and panic: A common-enemy problem o terrorism. Economic Inquiry, 52, 219–238.CrossRef
go back to reference Eaton, C. (2004). The elementary economics of social dilemmas. Canadian Journal of Economics, 37(4), 805–829.CrossRef Eaton, C. (2004). The elementary economics of social dilemmas. Canadian Journal of Economics, 37(4), 805–829.CrossRef
go back to reference Farrow, S. (2007). The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Economic Policy, 25(1), 14–26.CrossRef Farrow, S. (2007). The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Economic Policy, 25(1), 14–26.CrossRef
go back to reference Gal-Or, E. (1985). First mover and second mover advantages. International Economic Review, 26(3), 649–653.CrossRef Gal-Or, E. (1985). First mover and second mover advantages. International Economic Review, 26(3), 649–653.CrossRef
go back to reference Hausken, K. (2012). The economics of terrorism against two targets. Applied Economics Letters, 19, 1135–1138.CrossRef Hausken, K. (2012). The economics of terrorism against two targets. Applied Economics Letters, 19, 1135–1138.CrossRef
go back to reference Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101, 527–541.CrossRef Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101, 527–541.CrossRef
go back to reference Powell, R. (2009). Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack. Games and Economic Behavior, 67, 611–615.CrossRef Powell, R. (2009). Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack. Games and Economic Behavior, 67, 611–615.CrossRef
go back to reference Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.CrossRef Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.CrossRef
go back to reference Sandler, T. (2015). Terrorism and counterterrorism: An overview. Oxford Economic Papers, 67, 1–20.CrossRef Sandler, T. (2015). Terrorism and counterterrorism: An overview. Oxford Economic Papers, 67, 1–20.CrossRef
go back to reference Sandler, T., & Arce, D. G. (2003). Terrorism & game theory. Simulation & Gaming, 34, 319–337.CrossRef Sandler, T., & Arce, D. G. (2003). Terrorism & game theory. Simulation & Gaming, 34, 319–337.CrossRef
go back to reference Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76, 245–261.CrossRef Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76, 245–261.CrossRef
go back to reference Sandler, T., & Siqueira, K. (2006). Global terrorism: Detterence versus pre-emption. Canadian Journal of Economics, 19(4), 1370–1387.CrossRef Sandler, T., & Siqueira, K. (2006). Global terrorism: Detterence versus pre-emption. Canadian Journal of Economics, 19(4), 1370–1387.CrossRef
go back to reference Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation & Gaming, 40, 164–192.CrossRef Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation & Gaming, 40, 164–192.CrossRef
go back to reference Sandler, T., Tschirhart, J. T., & Cauley, J. (1983). A theoretical analysis of transnational terrorism. American Political Science Review, 77, 36–54.CrossRef Sandler, T., Tschirhart, J. T., & Cauley, J. (1983). A theoretical analysis of transnational terrorism. American Political Science Review, 77, 36–54.CrossRef
go back to reference Schneider, F., Brück, T., & Meierrieks, D. (2015). The economics of counterterrorism: A survey. Journal of Economic Surveys, 29, 131–157.CrossRef Schneider, F., Brück, T., & Meierrieks, D. (2015). The economics of counterterrorism: A survey. Journal of Economic Surveys, 29, 131–157.CrossRef
go back to reference Siqueira, K., & Sandler, T. (2008). Defensive counterterrorism measures and domestic politics. Defence and Peace Economics, 19, 405–413.CrossRef Siqueira, K., & Sandler, T. (2008). Defensive counterterrorism measures and domestic politics. Defence and Peace Economics, 19, 405–413.CrossRef
go back to reference Skaperdas, S. (1992). Cooperation, conflict, and power in the absence of property rights. American Economic Review, 82(4), 720–739. Skaperdas, S. (1992). Cooperation, conflict, and power in the absence of property rights. American Economic Review, 82(4), 720–739.
go back to reference Tullock, G. (1980). Efficient rent seeking. In J. Buchanan, R. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–1120). College Station: Texas A&M University Press. Tullock, G. (1980). Efficient rent seeking. In J. Buchanan, R. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–1120). College Station: Texas A&M University Press.
Metadata
Title
A model of terrorism and counterterrorism with location choices
Authors
Yang Jiao
Zijun Luo
Publication date
21-05-2018
Publisher
Springer US
Published in
Public Choice / Issue 3-4/2019
Print ISSN: 0048-5829
Electronic ISSN: 1573-7101
DOI
https://doi.org/10.1007/s11127-018-0559-8

Other articles of this Issue 3-4/2019

Public Choice 3-4/2019 Go to the issue

Premium Partner