IDEAS home Printed from https://ideas.repec.org/a/cup/intorg/v61y2007i01p9-36_07.html
   My bibliography  Save this article

Politics and the Suboptimal Provision of Counterterror

Author

Listed:
  • Bueno de Mesquita, Ethan

Abstract

I present a model of interactions between voters, a government, and a terrorist organization. The model focuses on a previously unexplored conceptualization of counterterrorism as divided into tactic-specific observable and general unobservable tactics. When there is divergence between voters and government preferences, strategic substitution among different modes of attack by terrorists and agency problems between the voters and government create a situation in which the politically optimal counterterrorism strategy pursued by the government in response to electoral and institutional incentives is quite different from the security maximizing counterterrorism strategy. In particular, in response to electoral pressure, the government allocates resources to observable counterterror in excess of the social optimum. This problem is particularly severe when governments put great weight on rent-seeking or care less about counterterror than do voters and when terrorists have a large set of tactics from which to choose. Voters can decrease the magnitude of the agency problem by increasing the benefits of reelection by, for example, slackening requirements for nonsecurity related public goods.I have received valuable comments and advice from Bruce Bueno de Mesquita, Randy Calvert, Martin Cripps, James Fearon, Amanda Friedenberg, Robert Powell, Matthew Stephenson, and Barbara Walter. I thank the Weidenbaum Center on the Economy, Government, and Public Policy at Washington University for financial support.

Suggested Citation

  • Bueno de Mesquita, Ethan, 2007. "Politics and the Suboptimal Provision of Counterterror," International Organization, Cambridge University Press, vol. 61(1), pages 9-36, January.
  • Handle: RePEc:cup:intorg:v:61:y:2007:i:01:p:9-36_07
    as

    Download full text from publisher

    File URL: https://www.cambridge.org/core/product/identifier/S0020818307070087/type/journal_article
    File Function: link to article abstract page
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    2. John Cadigan & Pamela Schmitt, 2010. "Strategic entry deterrence and terrorism: Theory and experimental evidence," Public Choice, Springer, vol. 143(1), pages 3-22, April.
    3. Tiberiu Dragu, 2017. "On repression and its effectiveness," Journal of Theoretical Politics, , vol. 29(4), pages 599-622, October.
    4. Roland Hodler & Dominic Rohner, 2012. "Electoral terms and terrorism," Public Choice, Springer, vol. 150(1), pages 181-193, January.
    5. Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
    6. Efraim Benmelech & Claude Berrebi & Esteban Klor, 2010. "Counter-Suicide-Terrorism: Evidence from House Demolitions," NBER Working Papers 16493, National Bureau of Economic Research, Inc.
    7. Thomas Jensen, 2012. "National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision," Discussion Papers 12-22, University of Copenhagen. Department of Economics.
    8. Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
    9. Michael Gibilisco, 2023. "Mowing the grass," Journal of Theoretical Politics, , vol. 35(3), pages 204-231, July.
    10. Kim, Jin Yeub, 2018. "Counterthreat of attack to deter aggression," Economics Letters, Elsevier, vol. 167(C), pages 112-114.
    11. Nicola Limodio, 2022. "Terrorism Financing, Recruitment, and Attacks," Econometrica, Econometric Society, vol. 90(4), pages 1711-1742, July.
    12. Sandeep Baliga & Tomas Sjostrom, 2012. "The Strategy of Manipulating Conflict," American Economic Review, American Economic Association, vol. 102(6), pages 2897-2922, October.
    13. Bueno de Mesquita, Ethan & Landa, Dimitri, 2015. "Political accountability and sequential policymaking," Journal of Public Economics, Elsevier, vol. 132(C), pages 95-108.
    14. Haritz Garro, 2019. "Terrorism prevention with reelection concerns and valence competition," Journal of Theoretical Politics, , vol. 31(3), pages 330-369, July.
    15. Raphael Bossong, 2011. "Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy," Economics of Security Working Paper Series 42, DIW Berlin, German Institute for Economic Research.
    16. Courtenay R Conrad & Daniel W Hill Jr & Will H Moore, 2018. "Torture and the limits of democratic institutions," Journal of Peace Research, Peace Research Institute Oslo, vol. 55(1), pages 3-17, January.
    17. Jin Yeub Kim, 2022. "Negotiation statements with promise and threat," Review of Economic Design, Springer;Society for Economic Design, vol. 26(2), pages 149-164, June.
    18. Tiberiu Dragu & Mattias Polborn, 2009. "Terrorism Prevention and Electoral Accountability," CESifo Working Paper Series 2864, CESifo.
    19. Fox, Justin & Van Weelden, Richard, 2015. "Hoping for the best, unprepared for the worst," Journal of Public Economics, Elsevier, vol. 130(C), pages 59-65.
    20. Arthur Lupia & Jesse O. Menning, 2009. "When Can Politicians Scare Citizens Into Supporting Bad Policies?," American Journal of Political Science, John Wiley & Sons, vol. 53(1), pages 90-106, January.
    21. Sergey Zhavoronkov & Konstantin Yanovskiy & Timofey Ginker & Ilia Zatkovetsky, 2016. "To Kill Hope? In Search of a Reliable Strategy to Fight Terrorism," Working Papers 149, Gaidar Institute for Economic Policy, revised 2016.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cup:intorg:v:61:y:2007:i:01:p:9-36_07. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Kirk Stebbing (email available below). General contact details of provider: https://www.cambridge.org/ino .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.