IDEAS home Printed from https://ideas.repec.org/a/bpj/pepspp/v17y2011i1n10.html
   My bibliography  Save this article

Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets

Author

Listed:
  • Meyer Sunniva F.

    (Institute of Transport Economics)

Abstract

This paper (1) translates theoretical notions of optimal security allocations into concrete policy recommendations and (2) compares these recommendations with actual transport security policy and transport security allocations in Norway. I argue that when protecting against mass-casualty attacks, priority should be given to potential targets that would suffer high casualties and that have a high number of foreign travelers, low employee density, many hiding places, many entry/exit points, high passenger anonymity, and high system fragility. Interviews with Norwegian transport authorities suggest that budget constraints and international commitments, rather than concerns for efficiency at the aggregate (national) level, determine the authorities’ allocation of security resources.

Suggested Citation

  • Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
  • Handle: RePEc:bpj:pepspp:v:17:y:2011:i:1:n:10
    DOI: 10.2202/1554-8597.1228
    as

    Download full text from publisher

    File URL: https://doi.org/10.2202/1554-8597.1228
    Download Restriction: For access to full text, subscription to the journal or payment for the individual article is required.

    File URL: https://libkey.io/10.2202/1554-8597.1228?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Claude Berrebi & Darius Lakdawalla, 2007. "How Does Terrorism Risk Vary Across Space And Time? An Analysis Based On The Israeli Experience," Defence and Peace Economics, Taylor & Francis Journals, vol. 18(2), pages 113-131.
    2. Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
    3. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    4. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    5. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
    6. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    7. Tyler Cowen, 2006. "Terrorism as theater: Analysis and policy implications," Public Choice, Springer, vol. 128(1), pages 233-244, July.
    8. Dominic Rohner & Bruno Frey, 2007. "Blood and ink! The common-interest-game between terrorists and the media," Public Choice, Springer, vol. 133(1), pages 129-145, October.
    9. Bueno de Mesquita, Ethan, 2007. "Politics and the Suboptimal Provision of Counterterror," International Organization, Cambridge University Press, vol. 61(1), pages 9-36, January.
    10. Treib, Oliver, . "Implementing and complying with EU governance outputs," Living Reviews in European Governance (LREG), Institute for European integration research (EIF).
    11. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    12. Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
    13. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    14. Caruso, Raul & Schneider, Friedrich, 2011. "The socio-economic determinants of terrorism and political violence in Western Europe (1994–2007)," European Journal of Political Economy, Elsevier, vol. 27(S1), pages 37-49.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    2. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    3. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    4. Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
    5. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    6. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    7. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    8. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    9. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    10. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    11. Hendel, Ulrich, 2012. ""Look like the innocent flower, but be the serpent under't": Mimicking behaviour of growth-oriented terrorist organizations," Discussion Papers in Economics 13998, University of Munich, Department of Economics.
    12. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    13. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Discussion Papers of DIW Berlin 1050, DIW Berlin, German Institute for Economic Research.
    14. Tiberiu Dragu & Mattias Polborn, 2009. "Terrorism Prevention and Electoral Accountability," CESifo Working Paper Series 2864, CESifo.
    15. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    16. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    17. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    18. Sergey Zhavoronkov & Konstantin Yanovskiy & Timofey Ginker & Ilia Zatkovetsky, 2016. "To Kill Hope? In Search of a Reliable Strategy to Fight Terrorism," Working Papers 149, Gaidar Institute for Economic Policy, revised 2016.
    19. Roland Hodler & Dominic Rohner, 2012. "Electoral terms and terrorism," Public Choice, Springer, vol. 150(1), pages 181-193, January.
    20. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bpj:pepspp:v:17:y:2011:i:1:n:10. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.degruyter.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.