Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets
Author
Abstract
Suggested Citation
DOI: 10.2202/1554-8597.1228
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Claude Berrebi & Darius Lakdawalla, 2007. "How Does Terrorism Risk Vary Across Space And Time? An Analysis Based On The Israeli Experience," Defence and Peace Economics, Taylor & Francis Journals, vol. 18(2), pages 113-131.
- Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
- Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
- Lakdawalla, Darius & Zanjani, George, 2005.
"Insurance, self-protection, and the economics of terrorism,"
Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
- Darius Lakdawalla & George Zanjani, 2002. "Insurance, Self-Protection, and the Economics of Terrorism," NBER Working Papers 9215, National Bureau of Economic Research, Inc.
- Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
- Tyler Cowen, 2006. "Terrorism as theater: Analysis and policy implications," Public Choice, Springer, vol. 128(1), pages 233-244, July.
- Dominic Rohner & Bruno Frey, 2007.
"Blood and ink! The common-interest-game between terrorists and the media,"
Public Choice, Springer, vol. 133(1), pages 129-145, October.
- Bruno S. Frey & Dominik Rohner, 2006. "Blood and Ink! The Common-Interest-GameBetween Terrorists and the Media," IEW - Working Papers 285, Institute for Empirical Research in Economics - University of Zurich.
- Bruno S. Frey & Dominic Rohner, 2006. "Blood and Ink! The Common-Interest-Game Between Terrorists and the Media," CREMA Working Paper Series 2006-08, Center for Research in Economics, Management and the Arts (CREMA).
- Bueno de Mesquita, Ethan, 2007. "Politics and the Suboptimal Provision of Counterterror," International Organization, Cambridge University Press, vol. 61(1), pages 9-36, January.
- Treib, Oliver, . "Implementing and complying with EU governance outputs," Living Reviews in European Governance (LREG), Institute for European integration research (EIF).
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
- Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
- Caruso, Raul & Schneider, Friedrich, 2011. "The socio-economic determinants of terrorism and political violence in Western Europe (1994–2007)," European Journal of Political Economy, Elsevier, vol. 27(S1), pages 37-49.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
- Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017.
"What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan,"
Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
- Hendel, Ulrich, 2012. ""Look like the innocent flower, but be the serpent under't": Mimicking behaviour of growth-oriented terrorist organizations," Discussion Papers in Economics 13998, University of Munich, Department of Economics.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010.
"The Economics of Terrorism and Counter-Terrorism: A Survey (Part II),"
Discussion Papers of DIW Berlin
1050, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2011. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Economics of Security Working Paper Series 45, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," CESifo Working Paper Series 3012, CESifo.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," CESifo Working Paper Series 3011, CESifo.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2011. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Economics of Security Working Paper Series 44, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Discussion Papers of DIW Berlin 1049, DIW Berlin, German Institute for Economic Research.
- Tiberiu Dragu & Mattias Polborn, 2009. "Terrorism Prevention and Electoral Accountability," CESifo Working Paper Series 2864, CESifo.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
- Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
- Sergey Zhavoronkov & Konstantin Yanovskiy & Timofey Ginker & Ilia Zatkovetsky, 2016. "To Kill Hope? In Search of a Reliable Strategy to Fight Terrorism," Working Papers 149, Gaidar Institute for Economic Policy, revised 2016.
- Roland Hodler & Dominic Rohner, 2012. "Electoral terms and terrorism," Public Choice, Springer, vol. 150(1), pages 181-193, January.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
More about this item
Keywords
game theory; security; counter-terrorism; transport;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bpj:pepspp:v:17:y:2011:i:1:n:10. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.degruyter.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.