Skip to main content
Top
Published in: Public Choice 3-4/2019

28-03-2018

Simple analytics of the impact of terror generation on attacker–defender interactions

Authors: Timothy Mathews, Aniruddha Bagchi, João Ricardo Faria

Published in: Public Choice | Issue 3-4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) may attack a single target in the homeland of a government/state (denoted G). The interaction is modelled as a one-shot sequential move game in which G first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T’s benefit from a successful attack is allowed to be increasing in the quantity of resources that G allocates to defense. In the context of terrorism, that assumption has multiple reasonable interpretations, including situations in which: (i) citizens of the target country are terrified to a greater degree when a more heavily fortified target is attacked successfully or (ii) a successful attack on a more heavily fortified target allows the terrorists to recruit more effectively. The amount by which T’s benefit from a successful attack exceeds its baseline owing to greater defensive efforts by G can be thought of as a terror effect. Such an approach differentiates terrorism from traditional conflict in an important way. For the specified model, defensive efforts by G necessary to prevent T from staging an attack are increasing in the magnitude of the terror effect. Moreover, if G inaccurately underestimates the magnitude of the terror effect, then G might choose either less than or more than the optimal level of defense, with the realized outcome depending upon model parameters. The results highlight the importance of correctly understanding the payoffs and motives of terrorists in order to be able to allocate defensive resources optimally.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Baye et al. (2005) apply tools of auction theory to analyze a special case of strategic choices of legal expenditures in the context of litigation under different cost-sharing rules.
 
2
It is important to stress that the increase in \(V_{T}(p)\) resulting from a larger value of p being chosen by G is a true increase in value for T, as opposed to a revelation of information or signal of greater value for the target by G.
 
3
For simplicity, assume that T chooses to not attack when indifferent being doing so and not doing so.
 
Literature
go back to reference Arce, D. G., Kovenock, D., & Roberson, B. (2012). Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics, 59(6), 457–469.CrossRef Arce, D. G., Kovenock, D., & Roberson, B. (2012). Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics, 59(6), 457–469.CrossRef
go back to reference Baye, M. R., Kovenock, D., & de Vries, C. G. (2005). Comparative analysis of litigation systems: An auction-theoretic approach. The Economic Journal, 115(505), 583–601.CrossRef Baye, M. R., Kovenock, D., & de Vries, C. G. (2005). Comparative analysis of litigation systems: An auction-theoretic approach. The Economic Journal, 115(505), 583–601.CrossRef
go back to reference Baye, M. R., Kovenock, D., & de Vries, C. G. (2012). Contests with rank-order spillovers”. Economic Theory, 51(2), 315–350.CrossRef Baye, M. R., Kovenock, D., & de Vries, C. G. (2012). Contests with rank-order spillovers”. Economic Theory, 51(2), 315–350.CrossRef
go back to reference Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.CrossRef Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.CrossRef
go back to reference Bueno de Mesquita, E. (2016). Political economy for public policy. Princeton: Princeton University Press.CrossRef Bueno de Mesquita, E. (2016). Political economy for public policy. Princeton: Princeton University Press.CrossRef
go back to reference Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87(4), 829–844.CrossRef Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87(4), 829–844.CrossRef
go back to reference Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley & T. Sandler (Eds.), Handbook of defense economics (Vol. 1, pp. 213–249). Amsterdam: Elsevier.CrossRef Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley & T. Sandler (Eds.), Handbook of defense economics (Vol. 1, pp. 213–249). Amsterdam: Elsevier.CrossRef
go back to reference Enders, W., & Sandler, T. (2011). Political economy of terrorism. Cambridge: Cambridge University Press.CrossRef Enders, W., & Sandler, T. (2011). Political economy of terrorism. Cambridge: Cambridge University Press.CrossRef
go back to reference Faria, J. R., & Arce, D. (2005). Terror support and recruitment. Defence and Peace Economics, 16(4), 263–273.CrossRef Faria, J. R., & Arce, D. (2005). Terror support and recruitment. Defence and Peace Economics, 16(4), 263–273.CrossRef
go back to reference Faria, J. R., & Arce, D. (2012). Counterterrorism and its impact on terror support and recruitment: Accounting for backlash. Defence and Peace Economics, 23(5), 431–445.CrossRef Faria, J. R., & Arce, D. (2012). Counterterrorism and its impact on terror support and recruitment: Accounting for backlash. Defence and Peace Economics, 23(5), 431–445.CrossRef
go back to reference Gassebner, M., Jong-A-Pin, R., & Mierau, J. O. (2008). Terrorism and electoral accountability: One strike, you’re out!. Economics Letters, 100(1), 126–129.CrossRef Gassebner, M., Jong-A-Pin, R., & Mierau, J. O. (2008). Terrorism and electoral accountability: One strike, you’re out!. Economics Letters, 100(1), 126–129.CrossRef
go back to reference Grossman, H., & Kim, M. (1995). Swords or plowshares? a theory of the security of claims to property. Journal of Political Economy, 103(6), 1275–1288.CrossRef Grossman, H., & Kim, M. (1995). Swords or plowshares? a theory of the security of claims to property. Journal of Political Economy, 103(6), 1275–1288.CrossRef
go back to reference Heal, G., & Kunreuther, H. (2005). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201–217.CrossRef Heal, G., & Kunreuther, H. (2005). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201–217.CrossRef
go back to reference Hirshleifer, J. (1983). From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3), 371–386.CrossRef Hirshleifer, J. (1983). From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3), 371–386.CrossRef
go back to reference Mathews, T., & Lowenberg, A. (2012). The interdependence between homeland security efforts of a state and a terrorist’s choice of attack. Conflict Management and Peace Science, 29(2), 195–218.CrossRef Mathews, T., & Lowenberg, A. (2012). The interdependence between homeland security efforts of a state and a terrorist’s choice of attack. Conflict Management and Peace Science, 29(2), 195–218.CrossRef
go back to reference Phillips, P. J. (2016). The Economics of Terrorism. London: Routledge, Taylor and Francis Group.CrossRef Phillips, P. J. (2016). The Economics of Terrorism. London: Routledge, Taylor and Francis Group.CrossRef
go back to reference Powell, R. (2007a). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.CrossRef Powell, R. (2007a). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.CrossRef
go back to reference Powell, R. (2007b). Allocating defensive resources with private information about vulnerability. American Political Science Review, 101(4), 799–809.CrossRef Powell, R. (2007b). Allocating defensive resources with private information about vulnerability. American Political Science Review, 101(4), 799–809.CrossRef
go back to reference Sandler, T., & Arce, D. (2007). Terrorism: A game-theoretic approach. In T. Sandler & K. Hartley (Eds.), Handbook of defense economics, Vol. 2: Defense in a globalized world (pp. 775–813). Amsterdam: Elsevier North-Holland.CrossRef Sandler, T., & Arce, D. (2007). Terrorism: A game-theoretic approach. In T. Sandler & K. Hartley (Eds.), Handbook of defense economics, Vol. 2: Defense in a globalized world (pp. 775–813). Amsterdam: Elsevier North-Holland.CrossRef
go back to reference Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.CrossRef Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.CrossRef
go back to reference Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76(2), 245–261.CrossRef Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76(2), 245–261.CrossRef
go back to reference Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation and Gaming, 40(2), 164–192.CrossRef Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation and Gaming, 40(2), 164–192.CrossRef
go back to reference Zhuang, J., & Bier, V. M. (2009). Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.CrossRef Zhuang, J., & Bier, V. M. (2009). Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.CrossRef
Metadata
Title
Simple analytics of the impact of terror generation on attacker–defender interactions
Authors
Timothy Mathews
Aniruddha Bagchi
João Ricardo Faria
Publication date
28-03-2018
Publisher
Springer US
Published in
Public Choice / Issue 3-4/2019
Print ISSN: 0048-5829
Electronic ISSN: 1573-7101
DOI
https://doi.org/10.1007/s11127-018-0538-0

Other articles of this Issue 3-4/2019

Public Choice 3-4/2019 Go to the issue

Premium Partner