IDEAS home Printed from https://ideas.repec.org/a/kap/pubcho/v179y2019i3d10.1007_s11127-018-0538-0.html
   My bibliography  Save this article

Simple analytics of the impact of terror generation on attacker–defender interactions

Author

Listed:
  • Timothy Mathews

    (Kennesaw State University)

  • Aniruddha Bagchi

    (Kennesaw State University)

  • João Ricardo Faria

    (University of Texas at El Paso)

Abstract

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) may attack a single target in the homeland of a government/state (denoted G). The interaction is modelled as a one-shot sequential move game in which G first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T’s benefit from a successful attack is allowed to be increasing in the quantity of resources that G allocates to defense. In the context of terrorism, that assumption has multiple reasonable interpretations, including situations in which: (i) citizens of the target country are terrified to a greater degree when a more heavily fortified target is attacked successfully or (ii) a successful attack on a more heavily fortified target allows the terrorists to recruit more effectively. The amount by which T’s benefit from a successful attack exceeds its baseline owing to greater defensive efforts by G can be thought of as a terror effect. Such an approach differentiates terrorism from traditional conflict in an important way. For the specified model, defensive efforts by G necessary to prevent T from staging an attack are increasing in the magnitude of the terror effect. Moreover, if G inaccurately underestimates the magnitude of the terror effect, then G might choose either less than or more than the optimal level of defense, with the realized outcome depending upon model parameters. The results highlight the importance of correctly understanding the payoffs and motives of terrorists in order to be able to allocate defensive resources optimally.

Suggested Citation

  • Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
  • Handle: RePEc:kap:pubcho:v:179:y:2019:i:3:d:10.1007_s11127-018-0538-0
    DOI: 10.1007/s11127-018-0538-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11127-018-0538-0
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11127-018-0538-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Michael R. Baye & Dan Kovenock & Casper G. Vries, 2005. "Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach," Economic Journal, Royal Economic Society, vol. 115(505), pages 583-601, July.
    2. Ethan Bueno de Mesquita, 2016. "Political Economy for Public Policy," Economics Books, Princeton University Press, edition 1, number 10880.
    3. Michael Baye & Dan Kovenock & Casper Vries, 2012. "Contests with rank-order spillovers," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(2), pages 315-350, October.
    4. Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
    5. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    6. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
    7. Peter J. Phillips, 2011. "The Diseconomies of Terrorism," World Economics, World Economics, 1 Ivory Square, Plantation Wharf, London, United Kingdom, SW11 3UE, vol. 12(4), pages 171-192, October.
    8. Grossman, Herschel I & Kim, Minseong, 1995. "Swords or Plowshares? A Theory of the Security of Claims to Property," Journal of Political Economy, University of Chicago Press, vol. 103(6), pages 1275-1288, December.
    9. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    10. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    11. Joao Ricardo Faria & Daniel Arce, 2005. "Terror Support And Recruitment," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(4), pages 263-273.
    12. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    13. Gassebner, Martin & Jong-A-Pin, Richard & Mierau, Jochen O., 2008. "Terrorism and electoral accountability: One strike, you're out!," Economics Letters, Elsevier, vol. 100(1), pages 126-129, July.
    14. Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
    15. João Ricardo Faria & Daniel Arce, 2012. "Counterterrorism And Its Impact On Terror Support And Recruitment: Accounting For Backlash," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 431-445, October.
    16. Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
    17. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    18. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kelejian, Harry H. & Mukerji, Purba, 2022. "Causal factors of terrorist attacks on countries, and corresponding spill-overs between them," European Journal of Political Economy, Elsevier, vol. 72(C).
    2. Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hadi Yektaş & Magnus Hoffmann & Friedhelm Hentschel & Roland Hodler, 2019. "Wars of Conquest and Independence," Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 175(4), pages 617-640.
    2. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    3. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    4. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    5. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    6. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    7. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    8. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    9. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    10. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    11. Dan Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," Working Papers 15-24, Chapman University, Economic Science Institute.
    12. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    13. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    14. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
    15. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    16. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    17. Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
    18. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2015. "The Economics Of Counterterrorism: A Survey," Journal of Economic Surveys, Wiley Blackwell, vol. 29(1), pages 131-157, February.
    19. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    20. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.

    More about this item

    Keywords

    H56; F52; D74; C70;
    All these keywords.

    JEL classification:

    • H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
    • F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
    • C70 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - General

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:pubcho:v:179:y:2019:i:3:d:10.1007_s11127-018-0538-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.