Skip to main content
Erschienen in: Public Choice 3-4/2019

28.03.2018

Simple analytics of the impact of terror generation on attacker–defender interactions

verfasst von: Timothy Mathews, Aniruddha Bagchi, João Ricardo Faria

Erschienen in: Public Choice | Ausgabe 3-4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) may attack a single target in the homeland of a government/state (denoted G). The interaction is modelled as a one-shot sequential move game in which G first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T’s benefit from a successful attack is allowed to be increasing in the quantity of resources that G allocates to defense. In the context of terrorism, that assumption has multiple reasonable interpretations, including situations in which: (i) citizens of the target country are terrified to a greater degree when a more heavily fortified target is attacked successfully or (ii) a successful attack on a more heavily fortified target allows the terrorists to recruit more effectively. The amount by which T’s benefit from a successful attack exceeds its baseline owing to greater defensive efforts by G can be thought of as a terror effect. Such an approach differentiates terrorism from traditional conflict in an important way. For the specified model, defensive efforts by G necessary to prevent T from staging an attack are increasing in the magnitude of the terror effect. Moreover, if G inaccurately underestimates the magnitude of the terror effect, then G might choose either less than or more than the optimal level of defense, with the realized outcome depending upon model parameters. The results highlight the importance of correctly understanding the payoffs and motives of terrorists in order to be able to allocate defensive resources optimally.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Baye et al. (2005) apply tools of auction theory to analyze a special case of strategic choices of legal expenditures in the context of litigation under different cost-sharing rules.
 
2
It is important to stress that the increase in \(V_{T}(p)\) resulting from a larger value of p being chosen by G is a true increase in value for T, as opposed to a revelation of information or signal of greater value for the target by G.
 
3
For simplicity, assume that T chooses to not attack when indifferent being doing so and not doing so.
 
Literatur
Zurück zum Zitat Arce, D. G., Kovenock, D., & Roberson, B. (2012). Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics, 59(6), 457–469.CrossRef Arce, D. G., Kovenock, D., & Roberson, B. (2012). Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics, 59(6), 457–469.CrossRef
Zurück zum Zitat Baye, M. R., Kovenock, D., & de Vries, C. G. (2005). Comparative analysis of litigation systems: An auction-theoretic approach. The Economic Journal, 115(505), 583–601.CrossRef Baye, M. R., Kovenock, D., & de Vries, C. G. (2005). Comparative analysis of litigation systems: An auction-theoretic approach. The Economic Journal, 115(505), 583–601.CrossRef
Zurück zum Zitat Baye, M. R., Kovenock, D., & de Vries, C. G. (2012). Contests with rank-order spillovers”. Economic Theory, 51(2), 315–350.CrossRef Baye, M. R., Kovenock, D., & de Vries, C. G. (2012). Contests with rank-order spillovers”. Economic Theory, 51(2), 315–350.CrossRef
Zurück zum Zitat Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.CrossRef Bier, V., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.CrossRef
Zurück zum Zitat Bueno de Mesquita, E. (2016). Political economy for public policy. Princeton: Princeton University Press.CrossRef Bueno de Mesquita, E. (2016). Political economy for public policy. Princeton: Princeton University Press.CrossRef
Zurück zum Zitat Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87(4), 829–844.CrossRef Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87(4), 829–844.CrossRef
Zurück zum Zitat Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley & T. Sandler (Eds.), Handbook of defense economics (Vol. 1, pp. 213–249). Amsterdam: Elsevier.CrossRef Enders, W., & Sandler, T. (1995). Terrorism: Theory and applications. In K. Hartley & T. Sandler (Eds.), Handbook of defense economics (Vol. 1, pp. 213–249). Amsterdam: Elsevier.CrossRef
Zurück zum Zitat Enders, W., & Sandler, T. (2011). Political economy of terrorism. Cambridge: Cambridge University Press.CrossRef Enders, W., & Sandler, T. (2011). Political economy of terrorism. Cambridge: Cambridge University Press.CrossRef
Zurück zum Zitat Faria, J. R., & Arce, D. (2005). Terror support and recruitment. Defence and Peace Economics, 16(4), 263–273.CrossRef Faria, J. R., & Arce, D. (2005). Terror support and recruitment. Defence and Peace Economics, 16(4), 263–273.CrossRef
Zurück zum Zitat Faria, J. R., & Arce, D. (2012). Counterterrorism and its impact on terror support and recruitment: Accounting for backlash. Defence and Peace Economics, 23(5), 431–445.CrossRef Faria, J. R., & Arce, D. (2012). Counterterrorism and its impact on terror support and recruitment: Accounting for backlash. Defence and Peace Economics, 23(5), 431–445.CrossRef
Zurück zum Zitat Gassebner, M., Jong-A-Pin, R., & Mierau, J. O. (2008). Terrorism and electoral accountability: One strike, you’re out!. Economics Letters, 100(1), 126–129.CrossRef Gassebner, M., Jong-A-Pin, R., & Mierau, J. O. (2008). Terrorism and electoral accountability: One strike, you’re out!. Economics Letters, 100(1), 126–129.CrossRef
Zurück zum Zitat Grossman, H., & Kim, M. (1995). Swords or plowshares? a theory of the security of claims to property. Journal of Political Economy, 103(6), 1275–1288.CrossRef Grossman, H., & Kim, M. (1995). Swords or plowshares? a theory of the security of claims to property. Journal of Political Economy, 103(6), 1275–1288.CrossRef
Zurück zum Zitat Heal, G., & Kunreuther, H. (2005). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201–217.CrossRef Heal, G., & Kunreuther, H. (2005). IDS models of airline security. Journal of Conflict Resolution, 49(2), 201–217.CrossRef
Zurück zum Zitat Hirshleifer, J. (1983). From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3), 371–386.CrossRef Hirshleifer, J. (1983). From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3), 371–386.CrossRef
Zurück zum Zitat Mathews, T., & Lowenberg, A. (2012). The interdependence between homeland security efforts of a state and a terrorist’s choice of attack. Conflict Management and Peace Science, 29(2), 195–218.CrossRef Mathews, T., & Lowenberg, A. (2012). The interdependence between homeland security efforts of a state and a terrorist’s choice of attack. Conflict Management and Peace Science, 29(2), 195–218.CrossRef
Zurück zum Zitat Phillips, P. J. (2016). The Economics of Terrorism. London: Routledge, Taylor and Francis Group.CrossRef Phillips, P. J. (2016). The Economics of Terrorism. London: Routledge, Taylor and Francis Group.CrossRef
Zurück zum Zitat Powell, R. (2007a). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.CrossRef Powell, R. (2007a). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527–541.CrossRef
Zurück zum Zitat Powell, R. (2007b). Allocating defensive resources with private information about vulnerability. American Political Science Review, 101(4), 799–809.CrossRef Powell, R. (2007b). Allocating defensive resources with private information about vulnerability. American Political Science Review, 101(4), 799–809.CrossRef
Zurück zum Zitat Sandler, T., & Arce, D. (2007). Terrorism: A game-theoretic approach. In T. Sandler & K. Hartley (Eds.), Handbook of defense economics, Vol. 2: Defense in a globalized world (pp. 775–813). Amsterdam: Elsevier North-Holland.CrossRef Sandler, T., & Arce, D. (2007). Terrorism: A game-theoretic approach. In T. Sandler & K. Hartley (Eds.), Handbook of defense economics, Vol. 2: Defense in a globalized world (pp. 775–813). Amsterdam: Elsevier North-Holland.CrossRef
Zurück zum Zitat Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.CrossRef Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.CrossRef
Zurück zum Zitat Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76(2), 245–261.CrossRef Sandler, T., & Lapan, H. E. (1988). The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese, 76(2), 245–261.CrossRef
Zurück zum Zitat Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation and Gaming, 40(2), 164–192.CrossRef Sandler, T., & Siqueira, K. (2009). Games and terrorism: Recent developments. Simulation and Gaming, 40(2), 164–192.CrossRef
Zurück zum Zitat Zhuang, J., & Bier, V. M. (2009). Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.CrossRef Zhuang, J., & Bier, V. M. (2009). Balancing terrorism and natural disasters–defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976–991.CrossRef
Metadaten
Titel
Simple analytics of the impact of terror generation on attacker–defender interactions
verfasst von
Timothy Mathews
Aniruddha Bagchi
João Ricardo Faria
Publikationsdatum
28.03.2018
Verlag
Springer US
Erschienen in
Public Choice / Ausgabe 3-4/2019
Print ISSN: 0048-5829
Elektronische ISSN: 1573-7101
DOI
https://doi.org/10.1007/s11127-018-0538-0

Weitere Artikel der Ausgabe 3-4/2019

Public Choice 3-4/2019 Zur Ausgabe

Premium Partner