IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v290y2021i2p790-805.html
   My bibliography  Save this article

National security vs. human rights: A game theoretic analysis of the tension between these objectives

Author

Listed:
  • Bagchi, Aniruddha
  • Paul, Jomon A.

Abstract

We explore why human rights violations take place in the midst of a rebellion. Authoritarian governments may not care for human rights but surprisingly several democratic governments have also condoned such violations. We show that the primary cause of such violations is faulty intelligence. There are two type of defective intelligence that can occur viz., missed alarm and false alarm. We consider each of these cases and determine the optimal human rights standard of the government. We then examine the effect of a decrease in the human rights standard on the probability of quelling the rebellion. In our theoretical model, this effect is indeterminate (i.e. can be positive or negative). We empirically quantify this effect using the case of Armed Forces Special Powers Act in India. Since the probability of quelling the rebellion is not directly observable, we use the magnitude of violence as its indicator. The magnitude of violence should be negatively related to the probability of the government’s success. We find that a lowering of the standard of human rights increases violence (i.e. reduces the chance of quelling the rebellion) and this effect is statistically significant.

Suggested Citation

  • Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
  • Handle: RePEc:eee:ejores:v:290:y:2021:i:2:p:790-805
    DOI: 10.1016/j.ejor.2020.08.017
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221720307086
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2020.08.017?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Alberto Abadie, 2006. "Poverty, Political Freedom, and the Roots of Terrorism," American Economic Review, American Economic Association, vol. 96(2), pages 50-56, May.
    2. Bandyopadhyay, Subhayu & Younas, Javed, 2011. "Poverty, political freedom, and the roots of terrorism in developing countries: An empirical assessment," Economics Letters, Elsevier, vol. 112(2), pages 171-175, August.
    3. Seung-Whan Choi & James A. Piazza, 2016. "Ethnic groups, political exclusion and domestic terrorism," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(1), pages 37-63, February.
    4. Bagchi, Aniruddha & Paul, Jomon A., 2018. "Youth unemployment and terrorism in the MENAP (Middle East, North Africa, Afghanistan, and Pakistan) region," Socio-Economic Planning Sciences, Elsevier, vol. 64(C), pages 9-20.
    5. Holley E. Hansen & Stephen C. Nemeth & Jacob A. Mauslein, 2020. "Ethnic political exclusion and terrorism: Analyzing the local conditions for violence," Conflict Management and Peace Science, Peace Science Society (International), vol. 37(3), pages 280-300, May.
    6. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    7. Tavares, Jose, 2004. "The open society assesses its enemies: shocks, disasters and terrorist attacks," Journal of Monetary Economics, Elsevier, vol. 51(5), pages 1039-1070, July.
    8. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    9. Luis Corchón, 2007. "The theory of contests: a survey," Review of Economic Design, Springer;Society for Economic Design, vol. 11(2), pages 69-100, September.
    10. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    11. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    12. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    13. Jomon A. Paul & Aniruddha Bagchi, 2019. "Civil Liberties and Terrorism in Middle East, North Africa, Afghanistan, and Pakistan," Annals of Operations Research, Springer, vol. 275(2), pages 623-651, April.
    14. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    15. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    16. Moshe Kress & Roberto Szechtman, 2009. "Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations---A Best-Case Scenario," Operations Research, INFORMS, vol. 57(3), pages 578-585, June.
    17. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    18. Walter, Barbara F., 2006. "Information, Uncertainty, and the Decision to Secede," International Organization, Cambridge University Press, vol. 60(1), pages 105-135, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Jomon A. Paul & Aniruddha Bagchi, 2019. "Civil Liberties and Terrorism in Middle East, North Africa, Afghanistan, and Pakistan," Annals of Operations Research, Springer, vol. 275(2), pages 623-651, April.
    4. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    5. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    6. Bagchi, Aniruddha & Paul, Jomon A., 2018. "Youth unemployment and terrorism in the MENAP (Middle East, North Africa, Afghanistan, and Pakistan) region," Socio-Economic Planning Sciences, Elsevier, vol. 64(C), pages 9-20.
    7. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    8. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    9. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    10. Abbas, Syed Ali & Syed, Shabib Haider, 2021. "Sectarian terrorism in Pakistan: Causes, impact and remedies," Journal of Policy Modeling, Elsevier, vol. 43(2), pages 350-361.
    11. Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
    12. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    13. Shuo She & Qiao Wang & Dana Weimann-Saks, 2020. "Correlation factors influencing terrorist attacks: political, social or economic? A study of terrorist events in 49 “Belt and Road” countries," Quality & Quantity: International Journal of Methodology, Springer, vol. 54(1), pages 125-146, February.
    14. Aniruddha Bagchi & João Ricardo Faria & Timothy Mathews, 2019. "A model of a multilateral proxy war with spillovers," Public Choice, Springer, vol. 179(3), pages 229-248, June.
    15. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    16. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    17. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    18. Kazeem Bello Ajide & Olorunfemi Yasiru Alimi, 2023. "Inflation, inflation volatility and terrorism in Africa," International Journal of Finance & Economics, John Wiley & Sons, Ltd., vol. 28(1), pages 493-509, January.
    19. Jia, Hao & Skaperdas, Stergios & Vaidya, Samarth, 2013. "Contest functions: Theoretical foundations and issues in estimation," International Journal of Industrial Organization, Elsevier, vol. 31(3), pages 211-222.
    20. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:290:y:2021:i:2:p:790-805. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.