Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Dan Reiter & Allan C. Stam III, 1998. "Democracy and Battlefield Military Effectiveness," Journal of Conflict Resolution, Peace Science Society (International), vol. 42(3), pages 259-277, June.
- Slantchev, Branislav L., 2003. "The Power to Hurt: Costly Conflict with Completely Informed States," American Political Science Review, Cambridge University Press, vol. 97(1), pages 123-133, February.
- Langlois, Jean-Pierre P. & Langlois, Catherine C., 2012. "Does the Principle of Convergence Really Hold? War, Uncertainty and the Failure of Bargaining," British Journal of Political Science, Cambridge University Press, vol. 42(3), pages 511-536, July.
- Brian Roberson & Dmitriy Kvasov, 2012.
"The non-constant-sum Colonel Blotto game,"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(2), pages 397-433, October.
- Brian Roberson & Dmitriy Kvasov, 2008. "The Non-Constant-Sum Colonel Blotto Game," CESifo Working Paper Series 2378, CESifo.
- Brian Roberson & Dmitriy Kvasov, 2010. "The Non-Constant-Sum Colonel Blotto Game," School of Economics and Public Policy Working Papers 2010-31, University of Adelaide, School of Economics and Public Policy.
- Brian Roberson & Dmitriy Kvasov, 2010. "The Non-Constant-Sum Colonel Blotto Game," Purdue University Economics Working Papers 1252, Purdue University, Department of Economics.
- Robert Powell, 2004. "Bargaining and Learning While Fighting," American Journal of Political Science, John Wiley & Sons, vol. 48(2), pages 344-361, April.
- Darren Filson & Suzanne Werner, 2004. "Bargaining and Fighting: The Impact of Regime Type on War Onset, Duration, and Outcomes," American Journal of Political Science, John Wiley & Sons, vol. 48(2), pages 296-313, April.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Bennett, D. Scott & Stam, Allan C., 1996. "The Duration of Interstate Wars, 1816–1985," American Political Science Review, Cambridge University Press, vol. 90(2), pages 239-257, June.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Sergiu Hart, 2008.
"Discrete Colonel Blotto and General Lotto games,"
International Journal of Game Theory, Springer;Game Theory Society, vol. 36(3), pages 441-460, March.
- Sergiu Hart, 2006. "Discrete Colonel Blotto and General Lotto Games," Discussion Paper Series dp434, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem.
- Sergiu Hart, 2006. "Discrete Colonel Blotto and General Lotto Games," Levine's Bibliography 321307000000000532, UCLA Department of Economics.
- Russell Golman & Scott Page, 2009. "General Blotto: games of allocative strategic mismatch," Public Choice, Springer, vol. 138(3), pages 279-299, March.
- Ian Bellany, 1999. "Modelling War," Journal of Peace Research, Peace Research Institute Oslo, vol. 36(6), pages 729-739, November.
- Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
- Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
- Bahar Leventoğlu & Branislav L. Slantchev, 2007. "The Armed Peace: A Punctuated Equilibrium Theory of War," American Journal of Political Science, John Wiley & Sons, vol. 51(4), pages 755-771, October.
- Alastair Smith, 1998. "Fighting Battles, Winning Wars," Journal of Conflict Resolution, Peace Science Society (International), vol. 42(3), pages 301-320, June.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Matthew Adam Kocher & Thomas B. Pepinsky & Stathis N. Kalyvas, 2011. "Aerial Bombing and Counterinsurgency in the Vietnam War," American Journal of Political Science, John Wiley & Sons, vol. 55(2), pages 201-218, April.
- Slantchev, Branislav L., 2010. "Feigning Weakness," International Organization, Cambridge University Press, vol. 64(3), pages 357-388, July.
- Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
- Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
- Powell, Robert, 2004. "The Inefficient Use of Power: Costly Conflict with Complete Information," American Political Science Review, Cambridge University Press, vol. 98(2), pages 231-241, May.
- Robert Powell, 2012. "Persistent Fighting and Shifting Power," American Journal of Political Science, John Wiley & Sons, vol. 56(3), pages 620-637, July.
- Monica Duffy Toft & Yuri M Zhukov, 2012. "Denial and punishment in the North Caucasus," Journal of Peace Research, Peace Research Institute Oslo, vol. 49(6), pages 785-800, November.
- James D. Fearon, 2004. "Why Do Some Civil Wars Last So Much Longer than Others?," Journal of Peace Research, Peace Research Institute Oslo, vol. 41(3), pages 275-301, May.
- Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
- Scott D. Bennett & Allan C. Stam III, 1998. "The Declining Advantages of Democracy," Journal of Conflict Resolution, Peace Science Society (International), vol. 42(3), pages 344-366, June.
- Slantchev, Branislav L., 2003. "The Principle of Convergence in Wartime Negotiations," American Political Science Review, Cambridge University Press, vol. 97(4), pages 621-632, November.
- Alastair Smith & Allan C. Stam, 2004. "Bargaining and the Nature of War," Journal of Conflict Resolution, Peace Science Society (International), vol. 48(6), pages 783-813, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Nakao, Keisuke, 2019. "Moving Forward vs. Inflicting Costs in a Random-Walk Model of War," MPRA Paper 96071, University Library of Munich, Germany.
- Keisuke Nakao, 2022. "Denial and punishment in war," Journal of Peace Research, Peace Research Institute Oslo, vol. 59(2), pages 166-179, March.
- Nakao, Keisuke, 2022. "Democratic Victory and War Duration: Why Are Democracies Less Likely to Win Long Wars?," MPRA Paper 112849, University Library of Munich, Germany.
- Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
- Dan J. Kovenock & Brian Roberson, 2015.
"The Optimal Defense of Network Connectivity,"
CESifo Working Paper Series
5653, CESifo.
- Dan Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," Working Papers 15-24, Chapman University, Economic Science Institute.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
- Duffy, John & Matros, Alexander, 2017. "Stochastic asymmetric Blotto games: An experimental study," Journal of Economic Behavior & Organization, Elsevier, vol. 139(C), pages 88-105.
- Eric Min, 2021. "Interstate War Battle dataset (1823–2003)," Journal of Peace Research, Peace Research Institute Oslo, vol. 58(2), pages 294-303, March.
- Antoine Pietri, 2017. "Les modèles de « rivalité coercitive » dans l’analyse économique des conflits," Revue d'économie politique, Dalloz, vol. 127(3), pages 307-352.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Richard Jordan, 2021. "Symbolic victories and strategic risk," Journal of Peace Research, Peace Research Institute Oslo, vol. 58(5), pages 973-985, September.
- Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013.
"An experimental investigation of Colonel Blotto games,"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
- Chowdhury, Subhasish M. & Kovenock, Dan & Sheremeta, Roman M., 2009. "An experimental investigation of Colonel Blotto games [Eine experimentelle Untersuchung von „Colonel Blotto“-Spielen]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2009-08, WZB Berlin Social Science Center.
- Subhasish M. Chowdhury & Dan Kovenock J. & Roman M. Sheremeta, 2009. "An Experimental Investigation of Colonel Blotto Games," CESifo Working Paper Series 2688, CESifo.
- Chowdhury, Subhasish & Kovenock, Dan & Sheremeta, Roman, 2011. "An Experimental Investigation of Colonel Blotto Games," MPRA Paper 46810, University Library of Munich, Germany.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Jie Xu & Jun Zhuang, 2016.
"Modeling costly learning and counter-learning in a defender-attacker game with private defender information,"
Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Vahabi,Mehrdad, 2019.
"The Political Economy of Predation,"
Cambridge Books,
Cambridge University Press, number 9781107591370, September.
- Vahabi,Mehrdad, 2015. "The Political Economy of Predation," Cambridge Books, Cambridge University Press, number 9781107133976, October.
- John Duffy & Alexander Matros, 2013. "Stochastic Asymmetric Blotto Games: Theory and Experimental Evidence," Working Paper 509, Department of Economics, University of Pittsburgh, revised Nov 2013.
More about this item
Keywords
aerial bombardment; choice of target; counterforce vs. countervalue; denial vs. punishment; military strategy; reverse causality; use of force;All these keywords.
JEL classification:
- D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
- F51 - International Economics - - International Relations, National Security, and International Political Economy - - - International Conflicts; Negotiations; Sanctions
NEP fields
This paper has been announced in the following NEP Reports:- NEP-MIC-2017-09-24 (Microeconomics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pra:mprapa:81418. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Joachim Winter (email available below). General contact details of provider: https://edirc.repec.org/data/vfmunde.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.