IDEAS home Printed from https://ideas.repec.org/a/sae/jocore/v51y2007i1p33-57.html
   My bibliography  Save this article

Rational Terrorists and Optimal Network Structure

Author

Listed:
  • Walter Enders

    (Department of Economics, Finance and Legal Studies, University of Alabama, Tuscaloosa)

  • Xuejuan Su

    (Department of Economics, Finance and Legal Studies, University of Alabama, Tuscaloosa)

Abstract

After the events of 9/11, U.S. counterterrorism became more proactive in that the Patriot Act allowed the authorities far more freedom to directly attack terrorist network structures. We argue that rational terrorists will attempt to thwart such policies and restructure themselves to be less penetrable. We model the trade-off between security and intragroup communication faced by terrorists. The model is used to derive the anticipated changes in network structure and the consequent changes in the type, complexity, and success rate of potential terrorist attacks.

Suggested Citation

  • Walter Enders & Xuejuan Su, 2007. "Rational Terrorists and Optimal Network Structure," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 33-57, February.
  • Handle: RePEc:sae:jocore:v:51:y:2007:i:1:p:33-57
    DOI: 10.1177/0022002706296155
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0022002706296155
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0022002706296155?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Ethan Bueno De Mesquita, 2005. "The Quality of Terror," American Journal of Political Science, John Wiley & Sons, vol. 49(3), pages 515-530, July.
    2. Joao Ricardo Faria & Daniel Arce, 2005. "Terror Support And Recruitment," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(4), pages 263-273.
    3. Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hinkkainen Kaisa, 2013. "Homegrown Terrorism: The Known Unknown," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 19(2), pages 157-182, August.
    2. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    3. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2010. "One-Mode Projection Analysis and Design of Covert Affiliation Networks," Other publications TiSEM 22cf26dc-7fbc-431d-967f-c, Tilburg University, School of Economics and Management.
    4. Villani, Salvatore & Mosca, Michele & Castiello, Mauro, 2019. "A virtuous combination of structural and skill analysis to defeat organized crime," Socio-Economic Planning Sciences, Elsevier, vol. 65(C), pages 51-65.
    5. Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
    6. Mauro Castiello & Michele Mosca & Salvatore Villani, 2015. "Analisi di resilienza delle reti complesse ed efficacia delle politiche pubbliche di contrasto alla criminalit? organizzata," STUDI ECONOMICI, FrancoAngeli Editore, vol. 2015(116), pages 39-73.
    7. McBride, Michael & Hewitt, David, 2013. "The enemy you can’t see: An investigation of the disruption of dark networks," Journal of Economic Behavior & Organization, Elsevier, vol. 93(C), pages 32-50.
    8. Husslage, B.G.M. & Lindelauf, R. & Hamers, H.J.M., 2012. "Leaderless Covert Networks : A Quantitative Approach," Discussion Paper 2012-057, Tilburg University, Center for Economic Research.
    9. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Other publications TiSEM 0469c068-22ad-4521-8d87-9, Tilburg University, School of Economics and Management.
    10. B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
    11. Walter Enders & Paan Jindapon, 2010. "Network Externalities and the Structure of Terror Networks," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 262-280, April.
    12. Ozgul, Fatih, 2016. "Analysis of topologies and key players in terrorist networks," Socio-Economic Planning Sciences, Elsevier, vol. 56(C), pages 40-54.
    13. Ho-Chun Herbert Chang & Brooke Harrington & Feng Fu & Daniel Rockmore, 2023. "Complex Systems of Secrecy: The Offshore Networks of Oligarchs," Papers 2303.03371, arXiv.org.
    14. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2010. "One-Mode Projection Analysis and Design of Covert Affiliation Networks," Discussion Paper 2010-53, Tilburg University, Center for Economic Research.
    15. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    16. Hinkkainen, Kaisa, 2012. "Homegrown terrorism; the known unknown," NEPS Working Papers 1/2012, Network of European Peace Scientists.
    17. Jana Diesner & Kathleen M. Carley & Laurent Tambayong, 2012. "Extracting socio-cultural networks of the Sudan from open-source, large-scale text data," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 328-339, September.
    18. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Discussion Paper 2009-85, Tilburg University, Center for Economic Research.
    19. Alexandra-Maria Bocse, 2021. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 21(2), pages 285-303, June.
    20. Husslage, B.G.M. & Lindelauf, R. & Hamers, H.J.M., 2012. "Leaderless Covert Networks : A Quantitative Approach," Other publications TiSEM c4111fba-0f6c-42cd-976a-1, Tilburg University, School of Economics and Management.
    21. Bradley E. Holland & Viridiana Rios, 2017. "Informally Governing Information: How Criminal Rivalry Leads to Violence against the Press in Mexico," Journal of Conflict Resolution, Peace Science Society (International), vol. 61(5), pages 1095-1119, May.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Michael McBride & Gary Richardson, 2012. "Stopping Suicide Attacks: Optimal Strategies and Unintended Consequences," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 413-429, October.
    2. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    3. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    4. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    5. L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
    6. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    7. James T. Bang & Atin Basuchoudhary & Aniruddha Mitra, 2021. "Validating Game-Theoretic Models of Terrorism: Insights from Machine Learning," Games, MDPI, vol. 12(3), pages 1-20, June.
    8. Levan Elbakidze & Yanhong Jin, 2012. "Victim Countries of Transnational Terrorism: An Empirical Characteristics Analysis," Risk Analysis, John Wiley & Sons, vol. 32(12), pages 2152-2165, December.
    9. Nauro F. Campos & Martin Gassebner, 2013. "International Terrorism, Domestic Political Instability, and the Escalation Effect," Economics and Politics, Wiley Blackwell, vol. 25(1), pages 27-47, March.
    10. Pierre-Emmanuel Ly, 2007. "The charitable activities of terrorist organizations," Public Choice, Springer, vol. 131(1), pages 177-195, April.
    11. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2015. "The Economics Of Counterterrorism: A Survey," Journal of Economic Surveys, Wiley Blackwell, vol. 29(1), pages 131-157, February.
    12. Aaron M Hoffman, 2010. "Voice and silence: Why groups take credit for acts of terror," Journal of Peace Research, Peace Research Institute Oslo, vol. 47(5), pages 615-626, September.
    13. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    14. Christophe Muller & Pierre Pecher, 2021. "Terrorism, Insurgency, State Repression, and Cycles of Violence," Working Papers halshs-03134347, HAL.
    15. Entorf, Horst, 2005. "Islamistischer Terrorismus : Analysen, Entwicklungen und Anti-Terrorpolitik aus der Sicht ökonomischer Forschung," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 24551, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    16. Detotto, Claudio & Pulina, Manuela, 2010. "Assessing substitution and complementary effects amongst crime typologies," MPRA Paper 20046, University Library of Munich, Germany.
    17. Asaf Zussman & Noam Zussman, 2005. "Targeted Killings: Evaluating the Effectiveness of a Counterterrorism Policy," Bank of Israel Working Papers 2005.02, Bank of Israel.
    18. Sylvain Baumann, 2018. "Protection, Technological Transfer and Alliance against Terrorist Conflict," Post-Print hal-02949083, HAL.
    19. Eugen Dimant & Tim Krieger & Daniel Meierrieks, 2024. "Paying Them to Hate US: The Effect of US Military Aid on Anti-American Terrorism, 1968–2018," The Economic Journal, Royal Economic Society, vol. 134(663), pages 2772-2802.
    20. Blank Larry & Enomoto Carl E. & Gegax Douglas & McGuckin Thomas & Simmons Cade, 2008. "A Dynamic Model of Insurgency: The Case of the War in Iraq," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 14(2), pages 1-28, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:jocore:v:51:y:2007:i:1:p:33-57. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://pss.la.psu.edu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.