National security vs. human rights: A game theoretic analysis of the tension between these objectives
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ejor.2020.08.017
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Alberto Abadie, 2006.
"Poverty, Political Freedom, and the Roots of Terrorism,"
American Economic Review, American Economic Association, vol. 96(2), pages 50-56, May.
- Abadie, Alberto, 2004. "Poverty, Political Freedom, and the Roots of Terrorism," Working Paper Series rwp04-043, Harvard University, John F. Kennedy School of Government.
- Alberto Abadie, 2004. "Poverty, Political Freedom, and the Roots of Terrorism," NBER Working Papers 10859, National Bureau of Economic Research, Inc.
- Bandyopadhyay, Subhayu & Younas, Javed, 2011.
"Poverty, political freedom, and the roots of terrorism in developing countries: An empirical assessment,"
Economics Letters, Elsevier, vol. 112(2), pages 171-175, August.
- Subhayu Bandyopadhyay & Javed Younas, 2011. "Poverty, political freedom, and the roots of terrorism in developing countries: An empirical assessment," Working Papers 2009-023, Federal Reserve Bank of St. Louis.
- Seung-Whan Choi & James A. Piazza, 2016. "Ethnic groups, political exclusion and domestic terrorism," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(1), pages 37-63, February.
- Bagchi, Aniruddha & Paul, Jomon A., 2018. "Youth unemployment and terrorism in the MENAP (Middle East, North Africa, Afghanistan, and Pakistan) region," Socio-Economic Planning Sciences, Elsevier, vol. 64(C), pages 9-20.
- Holley E. Hansen & Stephen C. Nemeth & Jacob A. Mauslein, 2020. "Ethnic political exclusion and terrorism: Analyzing the local conditions for violence," Conflict Management and Peace Science, Peace Science Society (International), vol. 37(3), pages 280-300, May.
- Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
- Tavares, Jose, 2004. "The open society assesses its enemies: shocks, disasters and terrorist attacks," Journal of Monetary Economics, Elsevier, vol. 51(5), pages 1039-1070, July.
- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- repec:cte:werepe:we075126 is not listed on IDEAS
- Stergios Skaperdas, 1996.
"Contest success functions (*),"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
- Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290, February.
- Stergios Skaperdas, 1996. "Contest success functions," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 263-270, Springer.
- Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Jomon A. Paul & Aniruddha Bagchi, 2019. "Civil Liberties and Terrorism in Middle East, North Africa, Afghanistan, and Pakistan," Annals of Operations Research, Springer, vol. 275(2), pages 623-651, April.
- Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- Moshe Kress & Roberto Szechtman, 2009. "Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations---A Best-Case Scenario," Operations Research, INFORMS, vol. 57(3), pages 578-585, June.
- Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
- Luis Corchón, 2007. "The theory of contests: a survey," Review of Economic Design, Springer;Society for Economic Design, vol. 11(2), pages 69-100, September.
- Walter, Barbara F., 2006. "Information, Uncertainty, and the Decision to Secede," International Organization, Cambridge University Press, vol. 60(1), pages 105-135, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
- Jomon A. Paul & Aniruddha Bagchi, 2019. "Civil Liberties and Terrorism in Middle East, North Africa, Afghanistan, and Pakistan," Annals of Operations Research, Springer, vol. 275(2), pages 623-651, April.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Abbas, Syed Ali & Syed, Shabib Haider, 2021. "Sectarian terrorism in Pakistan: Causes, impact and remedies," Journal of Policy Modeling, Elsevier, vol. 43(2), pages 350-361.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
- Bagchi, Aniruddha & Paul, Jomon A., 2018. "Youth unemployment and terrorism in the MENAP (Middle East, North Africa, Afghanistan, and Pakistan) region," Socio-Economic Planning Sciences, Elsevier, vol. 64(C), pages 9-20.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Rizvi, Syed Muhammad All-e-Raza & Véganzonès-Varoudakis, Marie-Ange, 2023.
"Institutional determinants of internal conflicts in fragile developing countries,"
Journal of Policy Modeling, Elsevier, vol. 45(5), pages 910-934.
- Syed Muhammad All-E-Raza Rizvi & Marie-Ange Véganzonès-Varoudakis, 2023. "Institutional determinants of internal conflicts in fragile developing countries," Post-Print hal-04194036, HAL.
- Shuo She & Qiao Wang & Dana Weimann-Saks, 2020. "Correlation factors influencing terrorist attacks: political, social or economic? A study of terrorist events in 49 “Belt and Road” countries," Quality & Quantity: International Journal of Methodology, Springer, vol. 54(1), pages 125-146, February.
- Aniruddha Bagchi & João Ricardo Faria & Timothy Mathews, 2019. "A model of a multilateral proxy war with spillovers," Public Choice, Springer, vol. 179(3), pages 229-248, June.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
- Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Kazeem Bello Ajide & Olorunfemi Yasiru Alimi, 2023. "Inflation, inflation volatility and terrorism in Africa," International Journal of Finance & Economics, John Wiley & Sons, Ltd., vol. 28(1), pages 493-509, January.
More about this item
Keywords
OR in Defense; Government; Tactics/Strategy; Military; Insurgency;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:290:y:2021:i:2:p:790-805. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.