IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v313y2024i3p1191-1199.html
   My bibliography  Save this article

The collective security dilemma of preemptive strikes

Author

Listed:
  • Konrad, Kai A.

Abstract

Players who are targets of potential raids can sometimes preempt some of these raids and neutralize the raiders. These threatened players have different values to the attackers as raid targets, and they act independently of each other and sometimes sequentially. The order in which the threatened players make their neutralization decisions turns out to be critical to the number of raids and the resulting probability of being attacked. The lowest number of raids results when the threatened players act in ascending order of attractiveness as targets for preemptive strikes. The analysis characterizes game-theoretic equilibrium as a function of action sequencing. It also discusses variations in the game situation, such as if the same threatened player can make multiple preemptive strikes, or if threatened players all act simultaneously rather than in a sequential order. The results are relevant in many contexts, including cybercrime, military threats from revisionist states, international terrorism, sabotage among employees in firms and other organizations, and defense of corporations against hostile takeover attempts.

Suggested Citation

  • Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
  • Handle: RePEc:eee:ejores:v:313:y:2024:i:3:p:1191-1199
    DOI: 10.1016/j.ejor.2023.10.010
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221723007671
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2023.10.010?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Konrad, Kai A., 2020. "Attacking and defending multiple valuable secrets in a big data world," European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
    2. Kris De Jaegher & Britta Hoyer, 2016. "Collective action and the common enemy effect," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 644-664, September.
    3. Konrad, Kai A., 2009. "Strategy and Dynamics in Contests," OUP Catalogue, Oxford University Press, number 9780199549603.
    4. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    5. Konrad, Kai A. & Kovenock, Dan, 2012. "The lifeboat problem," European Economic Review, Elsevier, vol. 56(3), pages 552-559.
    6. Stefano Barbieri & Kai A. Konrad & David A. Malueg, 2020. "Preemption contests between groups," RAND Journal of Economics, RAND Corporation, vol. 51(3), pages 934-961, September.
    7. Ross Hickey & Steeve Mongrain & Joanne Roberts & Tanguy van Ypersele, 2021. "Private protection and public policing," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 23(1), pages 5-28, February.
    8. (Jennifer) Wu, Szu-Yin & Chung, Kee H., 2019. "Corporate innovation, likelihood to be acquired, and takeover premiums," Journal of Banking & Finance, Elsevier, vol. 108(C).
    9. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    10. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    11. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    12. Bliss, Christopher & Nalebuff, Barry, 1984. "Dragon-slaying and ballroom dancing: The private supply of a public good," Journal of Public Economics, Elsevier, vol. 25(1-2), pages 1-12, November.
    13. Bergstrom, Theodore & Blume, Lawrence & Varian, Hal, 1986. "On the private provision of public goods," Journal of Public Economics, Elsevier, vol. 29(1), pages 25-49, February.
    14. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    15. Fudenberg, Drew & Tirole, Jean, 1986. "A Theory of Exit in Duopoly," Econometrica, Econometric Society, vol. 54(4), pages 943-960, July.
    16. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    17. Kai A. Konrad & Florian Morath, 2021. "The volunteer’s dilemma in finite populations," Journal of Evolutionary Economics, Springer, vol. 31(4), pages 1277-1290, September.
    18. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    19. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    20. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    21. Kong-Pin Chen, 2003. "Sabotage in Promotion Tournaments," The Journal of Law, Economics, and Organization, Oxford University Press, vol. 19(1), pages 119-140, April.
    22. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    23. Abongeh Tunyi, 2021. "Fifty years of research on takeover target prediction: a historical perspective," Qualitative Research in Financial Markets, Emerald Group Publishing Limited, vol. 13(4), pages 482-502, June.
    24. Andreas Diekmann, 1985. "Volunteer's Dilemma," Journal of Conflict Resolution, Peace Science Society (International), vol. 29(4), pages 605-610, December.
    25. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    26. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    3. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    6. Yixuan Shi, 2022. "Dynamic Volunteer's Dilemma with Procrastinators," Working Papers tax-mpg-rps-2022-17, Max Planck Institute for Tax Law and Public Finance.
    7. Konrad, Kai A. & Morath, Florian, 2020. "The Volunteer’s Dilemma in Finite Populations," CEPR Discussion Papers 15536, C.E.P.R. Discussion Papers.
    8. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Kai A. Konrad & Florian Morath, 2021. "The volunteer’s dilemma in finite populations," Journal of Evolutionary Economics, Springer, vol. 31(4), pages 1277-1290, September.
    11. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    12. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    13. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    14. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    15. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    16. Amegashie, J. Atsu, 2019. "Quantity-cum-quality contests," European Journal of Political Economy, Elsevier, vol. 58(C), pages 289-297.
    17. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    18. Maaser, Nicola & Stratmann, Thomas, 2024. "Costly voting in weighted committees: The case of moral costs," European Economic Review, Elsevier, vol. 162(C).
    19. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    20. Li, Hongcheng, 2019. "Multi-Player War of Attrition with Asymmetric Incomplete Information," MPRA Paper 109511, University Library of Munich, Germany, revised 31 Aug 2021.

    More about this item

    Keywords

    OR in defense; Preemptive strikes; Security dilemma; War; Cyber attacks;
    All these keywords.

    JEL classification:

    • D72 - Microeconomics - - Analysis of Collective Decision-Making - - - Political Processes: Rent-seeking, Lobbying, Elections, Legislatures, and Voting Behavior
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:313:y:2024:i:3:p:1191-1199. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.