A Game Between a Terrorist and a Passive Defender
Author
Abstract
Suggested Citation
DOI: 10.1111/poms.12803
Download full text from publisher
References listed on IDEAS
- Enders,Walter & Sandler,Todd, 2012.
"The Political Economy of Terrorism,"
Cambridge Books,
Cambridge University Press, number 9780521181006, November.
- Enders,Walter & Sandler,Todd, 2012. "The Political Economy of Terrorism," Cambridge Books, Cambridge University Press, number 9781107004566, November.
- Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
- Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
- Rubinstein, Ariel, 1991. "Comments on the Interpretation of Game Theory," Econometrica, Econometric Society, vol. 59(4), pages 909-924, July.
- James W. Friedman, 1971. "A Non-cooperative Equilibrium for Supergames," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 38(1), pages 1-12.
- Subhayu Bandyopadhyay & Todd Sandler, 2011.
"The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game,"
Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
- Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
- Todd Sandler & Kevin Siqueira, 2006.
"Global terrorism: deterrence versus pre-emption,"
Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
- Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre‐emption," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 39(4), pages 1370-1387, November.
- Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
- Fudenberg, Drew & Maskin, Eric, 1991.
"On the dispensability of public randomization in discounted repeated games,"
Journal of Economic Theory, Elsevier, vol. 53(2), pages 428-438, April.
- Drew Fudenberg & Eric Maskin, 1987. "On the Dispensability of Public Randomization in Discounted Repeated Games," Working papers 467, Massachusetts Institute of Technology (MIT), Department of Economics.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
- Drew Fudenberg & Eric Maskin, 2008.
"The Folk Theorem In Repeated Games With Discounting Or With Incomplete Information,"
World Scientific Book Chapters, in: Drew Fudenberg & David K Levine (ed.), A Long-Run Collaboration On Long-Run Games, chapter 11, pages 209-230,
World Scientific Publishing Co. Pte. Ltd..
- Fudenberg, Drew & Maskin, Eric, 1986. "The Folk Theorem in Repeated Games with Discounting or with Incomplete Information," Econometrica, Econometric Society, vol. 54(3), pages 533-554, May.
- Edward H. Kaplan & Moshe Kress & Roberto Szechtman, 2010. "Confronting Entrenched Insurgents," Operations Research, INFORMS, vol. 58(2), pages 329-341, April.
- Avinash Dixit, 2006. "Thomas Schelling's Contributions to Game Theory," Scandinavian Journal of Economics, Wiley Blackwell, vol. 108(2), pages 213-229, July.
- Govindan, Srihari & Reny, Philip J. & Robson, Arthur J., 2003. "A short proof of Harsanyi's purification theorem," Games and Economic Behavior, Elsevier, vol. 45(2), pages 369-374, November.
- Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
- Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
- Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Mailath, George J. & Samuelson, Larry, 2006. "Repeated Games and Reputations: Long-Run Relationships," OUP Catalogue, Oxford University Press, number 9780195300796.
- de Mesquita, Ethan Bueno, 2005. "Conciliation, Counterterrorism, and Patterns of Terrorist Violence," International Organization, Cambridge University Press, vol. 59(1), pages 145-176, January.
- Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Oded Berman & Arieh Gavious & Rongbing Huang, 2011. "Location of response facilities: a simultaneous game between state and terrorist," International Journal of Operational Research, Inderscience Enterprises Ltd, vol. 10(1), pages 102-120.
- N. D. Cohen, 1966. "An attack‐defense game with matrix strategies," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 13(4), pages 391-402, December.
- Michael J. Armstrong, 2014. "Modeling Short-Range Ballistic Missile Defense and Israel's Iron Dome System," Operations Research, INFORMS, vol. 62(5), pages 1028-1039, October.
- Daniel Arce, 1997. "Correlated strategies as Institutions," Theory and Decision, Springer, vol. 42(3), pages 271-285, May.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Jónas Oddur Jónasson & Kamalini Ramdas & Alp Sungu, 2022. "Social impact operations at the global base of the pyramid," Production and Operations Management, Production and Operations Management Society, vol. 31(12), pages 4364-4378, December.
- Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
- Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
- Catherine C. Langlois & Jean-Pierre P. Langlois, 2011. "The Escalation of Terror: Hate and the Demise of Terrorist Organizations," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(5), pages 497-521, November.
- Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Voluntary participation in a terror group and counterterrorism policy,"
Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
- João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Politically influenced counterterrorism policy and welfare efficiency,"
European Journal of Political Economy, Elsevier, vol. 76(C).
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Politically influenced counterterrorism policy and welfare efficiency," Working Papers 2022-007, Federal Reserve Bank of St. Louis.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Jie Xu & Jun Zhuang, 2016.
"Modeling costly learning and counter-learning in a defender-attacker game with private defender information,"
Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2020.
"Terms-of-trade and counterterrorism externalities,"
Oxford Economic Papers, Oxford University Press, vol. 72(2), pages 293-318.
- Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2017. "Terms-of-Trade and Counterterrorism Externalities," Working Papers 2017-17, Federal Reserve Bank of St. Louis.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:popmgt:v:27:y:2018:i:3:p:433-457. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1937-5956 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.