IDEAS home Printed from https://ideas.repec.org/a/bla/popmgt/v27y2018i3p433-457.html
   My bibliography  Save this article

A Game Between a Terrorist and a Passive Defender

Author

Listed:
  • Opher Baron
  • Oded Berman
  • Arieh Gavious

Abstract

In the last two decades, terrorism has become a major issue around the world. We analyze a continuous conflict between a terrorist (Terrorist) and a passive defender (Defender). Defender is passive because her actions can influence only the costs (damages) when Terrorist attacks. We focus on high†trajectory fire attacks and passive responses to them in the conflict between Israel and the various terrorist groups in the Gaza Strip in accordance with scientific principles. We first consider three sources of data on this part of the conflict and based on these data we make several observations on the sustainability of cease fires, the use of technologies, different attacks, and the frequency of attacks, using high†trajectory fire. To explain these observations, we present several stylized game theoretical models. Specifically, we consider single†and multi†period games. In each period, Terrorist may attack Defender, who may in turn try to prevent damage. We show that given this conflict's political situation, our models are in agreement with the observations from the data. We also present an extension that considers an active defender. This extension also agrees with the observations from the data.

Suggested Citation

  • Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
  • Handle: RePEc:bla:popmgt:v:27:y:2018:i:3:p:433-457
    DOI: 10.1111/poms.12803
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/poms.12803
    Download Restriction: no

    File URL: https://libkey.io/10.1111/poms.12803?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Enders,Walter & Sandler,Todd, 2012. "The Political Economy of Terrorism," Cambridge Books, Cambridge University Press, number 9780521181006.
    2. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    3. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    4. Rubinstein, Ariel, 1991. "Comments on the Interpretation of Game Theory," Econometrica, Econometric Society, vol. 59(4), pages 909-924, July.
    5. James W. Friedman, 1971. "A Non-cooperative Equilibrium for Supergames," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 38(1), pages 1-12.
    6. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    7. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre-emption," Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
    8. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    9. Fudenberg, Drew & Maskin, Eric, 1991. "On the dispensability of public randomization in discounted repeated games," Journal of Economic Theory, Elsevier, vol. 53(2), pages 428-438, April.
    10. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    11. Drew Fudenberg & Eric Maskin, 2008. "The Folk Theorem In Repeated Games With Discounting Or With Incomplete Information," World Scientific Book Chapters, in: Drew Fudenberg & David K Levine (ed.), A Long-Run Collaboration On Long-Run Games, chapter 11, pages 209-230, World Scientific Publishing Co. Pte. Ltd..
    12. Edward H. Kaplan & Moshe Kress & Roberto Szechtman, 2010. "Confronting Entrenched Insurgents," Operations Research, INFORMS, vol. 58(2), pages 329-341, April.
    13. Avinash Dixit, 2006. "Thomas Schelling's Contributions to Game Theory," Scandinavian Journal of Economics, Wiley Blackwell, vol. 108(2), pages 213-229, July.
    14. Govindan, Srihari & Reny, Philip J. & Robson, Arthur J., 2003. "A short proof of Harsanyi's purification theorem," Games and Economic Behavior, Elsevier, vol. 45(2), pages 369-374, November.
    15. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
    16. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    17. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    18. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    19. Mailath, George J. & Samuelson, Larry, 2006. "Repeated Games and Reputations: Long-Run Relationships," OUP Catalogue, Oxford University Press, number 9780195300796, Decembrie.
    20. de Mesquita, Ethan Bueno, 2005. "Conciliation, Counterterrorism, and Patterns of Terrorist Violence," International Organization, Cambridge University Press, vol. 59(1), pages 145-176, January.
    21. Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
    22. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    23. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    24. Oded Berman & Arieh Gavious & Rongbing Huang, 2011. "Location of response facilities: a simultaneous game between state and terrorist," International Journal of Operational Research, Inderscience Enterprises Ltd, vol. 10(1), pages 102-120.
    25. N. D. Cohen, 1966. "An attack‐defense game with matrix strategies," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 13(4), pages 391-402, December.
    26. Michael J. Armstrong, 2014. "Modeling Short-Range Ballistic Missile Defense and Israel's Iron Dome System," Operations Research, INFORMS, vol. 62(5), pages 1028-1039, October.
    27. Daniel Arce, 1997. "Correlated strategies as Institutions," Theory and Decision, Springer, vol. 42(3), pages 271-285, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jónas Oddur Jónasson & Kamalini Ramdas & Alp Sungu, 2022. "Social impact operations at the global base of the pyramid," Production and Operations Management, Production and Operations Management Society, vol. 31(12), pages 4364-4378, December.
    2. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    3. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    4. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    5. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    6. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    7. Catherine C. Langlois & Jean-Pierre P. Langlois, 2011. "The Escalation of Terror: Hate and the Demise of Terrorist Organizations," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(5), pages 497-521, November.
    8. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    9. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    10. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    11. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    12. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    13. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    14. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    15. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    16. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    17. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    18. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    19. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2020. "Terms-of-trade and counterterrorism externalities," Oxford Economic Papers, Oxford University Press, vol. 72(2), pages 293-318.
    20. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:popmgt:v:27:y:2018:i:3:p:433-457. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1937-5956 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.