Simple analytics of the impact of terror generation on attacker–defender interactions
Author
Abstract
Suggested Citation
DOI: 10.1007/s11127-018-0538-0
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Michael R. Baye & Dan Kovenock & Casper G. Vries, 2005.
"Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach,"
Economic Journal, Royal Economic Society, vol. 115(505), pages 583-601, July.
- Michael R. Baye & Dan Kovenock & Casper G. Vries, 2005. "Comparative Analysis Of Litigation Systems: An Auction-Theoretic Approach," Springer Books, in: Roger D. Congleton & Kai A. Konrad & Arye L. Hillman (ed.), 40 Years of Research on Rent Seeking 2, pages 421-439, Springer.
- Michael R. Baye & Dan Kovenock & Casper G. de Vries, 2000. "Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach," Tinbergen Institute Discussion Papers 00-103/2, Tinbergen Institute.
- Michael R. Baye & Dan Kovenock & Casper G. de Vries, 2004. "Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach," Working Papers 2004-24, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
- Michael R. Baye & Dan Kovenock & Casper De Vries & Casper G, de Vries, 2000. "Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach," CESifo Working Paper Series 373, CESifo.
- Michael R. Baye & Dan Kovenock & Casper G. de Vries, 2000. "Comparative Analysis of Litigation Systems: An Auction-Theoretic Approach," CIG Working Papers FS IV 00-13, Wissenschaftszentrum Berlin (WZB), Research Unit: Competition and Innovation (CIG).
- Baye, M.R. & Kovenock D. & De Vries, C.G., 2000. "Comparative Analysis of Litigation Systems: an Auction-Theoretic Approach," Purdue University Economics Working Papers 1137, Purdue University, Department of Economics.
- Ethan Bueno de Mesquita, 2016. "Political Economy for Public Policy," Economics Books, Princeton University Press, edition 1, number 10880.
- Michael Baye & Dan Kovenock & Casper Vries, 2012.
"Contests with rank-order spillovers,"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(2), pages 315-350, October.
- Michael R. Baye & Dan Kovenock & Casper G. de Vries, 2008. "Contests with Rank-Order Spillovers," Working Papers 2008-20, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
- Michael R. Baye & Dan Kovenock & Casper G. de Vries, 2009. "Contests with Rank-Order Spillovers," Tinbergen Institute Discussion Papers 09-066/2, Tinbergen Institute.
- Baye, Michael R. & Kovenock, Dan & Vries, Casper G. de, 2009. "Contests with rank-order spillovers," Discussion Papers, Research Unit: Market Processes and Governance SP II 2009-09, WZB Berlin Social Science Center.
- Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
- Peter J. Phillips, 2011. "The Diseconomies of Terrorism," World Economics, World Economics, 1 Ivory Square, Plantation Wharf, London, United Kingdom, SW11 3UE, vol. 12(4), pages 171-192, October.
- Grossman, Herschel I & Kim, Minseong, 1995. "Swords or Plowshares? A Theory of the Security of Claims to Property," Journal of Political Economy, University of Chicago Press, vol. 103(6), pages 1275-1288, December.
- Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
- Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
- Joao Ricardo Faria & Daniel Arce, 2005. "Terror Support And Recruitment," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(4), pages 263-273.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Gassebner, Martin & Jong-A-Pin, Richard & Mierau, Jochen O., 2008. "Terrorism and electoral accountability: One strike, you're out!," Economics Letters, Elsevier, vol. 100(1), pages 126-129, July.
- Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
- João Ricardo Faria & Daniel Arce, 2012. "Counterterrorism And Its Impact On Terror Support And Recruitment: Accounting For Backlash," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 431-445, October.
- Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
- Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kelejian, Harry H. & Mukerji, Purba, 2022. "Causal factors of terrorist attacks on countries, and corresponding spill-overs between them," European Journal of Political Economy, Elsevier, vol. 72(C).
- Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hadi Yektaş & Magnus Hoffmann & Friedhelm Hentschel & Roland Hodler, 2019.
"Wars of Conquest and Independence,"
Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 175(4), pages 617-640.
- Roland Hodler & Hadi Yektas, 2013. "Wars of Conquest and Independence," CESifo Working Paper Series 4282, CESifo.
- Hentschel, Friedhelm & Hodler, Roland & Yektas, Hadi, 2015. "Wars of Conquest and Independence," Economics Working Paper Series 1516, University of St. Gallen, School of Economics and Political Science.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
- Subhayu Bandyopadhyay & Todd Sandler, 2011.
"The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game,"
Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
- Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
- Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
- Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
- Dan Kovenock & Brian Roberson, 2015.
"The Optimal Defense of Network Connectivity,"
Working Papers
15-24, Chapman University, Economic Science Institute.
- Dan J. Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," CESifo Working Paper Series 5653, CESifo.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
- Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
- Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2015. "The Economics Of Counterterrorism: A Survey," Journal of Economic Surveys, Wiley Blackwell, vol. 29(1), pages 131-157, February.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
- Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
More about this item
Keywords
H56; F52; D74; C70;All these keywords.
JEL classification:
- H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
- F52 - International Economics - - International Relations, National Security, and International Political Economy - - - National Security; Economic Nationalism
- D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
- C70 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - General
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:pubcho:v:179:y:2019:i:3:d:10.1007_s11127-018-0538-0. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.