IDEAS home Printed from https://ideas.repec.org/a/wut/journl/v3y2020p21-46id1441.html
   My bibliography  Save this article

Governmental combat of migration between competing terrorist organisations

Author

Listed:
  • Kjell Hausken

Abstract

Each terrorist organisation is modelled with four coupled differential time equations for the evolution of ideologues, criminal mercenaries, captive participants, and capital sponsoring. Emigration of ideologues may cause unbounded growth of the organisation receiving ideologues. The organisation losing ideologues may reach a stationary state where ideologues are supported by capital sponsors and mercenaries. Emigration of mercenaries may cause the organisation losing mercenaries to experience growth. The organisation receiving mercenaries may lose capital sponsors permanently, allowing for the presence of mercenaries, or capital sponsors may rebound deterring mercenaries. Emigration of ideologues from one organisation to another requires more government intervention into the latter to ensure termination. Emigration of mercenaries from one organisation to another may require more government intervention into the latter, since mercenaries support ideologues. Competing terrorist organisations may facilitate their mutual extinction. Various intervention strategies are considered: the most threatening organisation is eliminated first, aided by competition from the least threatening, after which the remaining organisation is eliminated. The government’s instantaneous and accumulated utilities are analysed through

Suggested Citation

  • Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
  • Handle: RePEc:wut:journl:v:3:y:2020:p:21-46:id:1441
    DOI: 10.37190/ord200302
    as

    Download full text from publisher

    File URL: https://ord.pwr.edu.pl/assets/papers_archive/1441%20-%20published.pdf
    Download Restriction: no

    File URL: https://libkey.io/10.37190/ord200302?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    2. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    3. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    4. Kjell Hausken & Sheheryar Banuri & Dipak Gupta & Klaus Abbink, 2015. "Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations," Public Choice, Springer, vol. 164(1), pages 57-73, July.
    5. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.
    6. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    7. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    8. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    9. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    10. Firdaus Udwadia & George Leitmann & Luca Lambertini, 2006. "A dynamical model of terrorism," Discrete Dynamics in Nature and Society, Hindawi, vol. 2006, pages 1-32, September.
    11. Hirshleifer, Jack, 1995. "Anarchy and Its Breakdown," Journal of Political Economy, University of Chicago Press, vol. 103(1), pages 26-52, February.
    12. Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
    13. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
    14. Salop, Steven C & Scheffman, David T, 1983. "Raising Rivals' Costs," American Economic Review, American Economic Association, vol. 73(2), pages 267-271, May.
    15. Mark P. Kaminskiy & Bilal M. Ayyub, 2006. "Terrorist Population Dynamics Model," Risk Analysis, John Wiley & Sons, vol. 26(3), pages 747-752, June.
    16. Kjell Hausken & Dipak K. Gupta, 2015. "Government protection against terrorism and crime," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 59-80, April.
    17. G. Feichtinger & A. J. Novak, 2008. "Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution," Journal of Optimization Theory and Applications, Springer, vol. 139(3), pages 541-556, December.
    18. Hausken, Kjell & Moxnes, John F., 2002. "Stochastic conditional and unconditional warfare," European Journal of Operational Research, Elsevier, vol. 140(1), pages 61-87, July.
    19. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    20. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    3. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).
    4. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    5. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    6. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    7. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    8. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    9. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    10. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    11. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    12. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    13. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    14. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    15. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    16. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    17. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    18. Kaplan, Edward H., 2013. "Staffing models for covert counterterrorism agencies," Socio-Economic Planning Sciences, Elsevier, vol. 47(1), pages 2-8.
    19. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    20. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wut:journl:v:3:y:2020:p:21-46:id:1441. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Adam Kasperski (email available below). General contact details of provider: https://edirc.repec.org/data/iopwrpl.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.