IDEAS home Printed from https://ideas.repec.org/a/eee/gamebe/v64y2008i2p548-564.html
   My bibliography  Save this article

Whether to attack a terrorist's resource stock today or tomorrow

Author

Listed:
  • Hausken, Kjell

Abstract

A terrorist defends an asset which grows from the first to the second period and is attacked. With large asset growth, the terrorist's first period outcome is low caused by a large attack. With no expenditure constraint, the terrorist's total outcome is positive. With equal attack and defense inefficiencies, when the terrorist as defender requires his first period outcome to be positive, the attacker eliminates the asset in the first period when asset growth multiplied with the square roots of the terrorist's and attacker's discount parameters exceed . This gives maximum conflict in the first period. Growth and the two discount parameters are strategic complements. The range for the attack inefficiency divided by defense inefficiency, which causes negative first period outcome for the terrorist, increases with asset growth. The attacker refrains from asset elimination in the first period due to strength (weakness) if the ratio is below (above) the range.

Suggested Citation

  • Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
  • Handle: RePEc:eee:gamebe:v:64:y:2008:i:2:p:548-564
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0899-8256(08)00042-0
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    2. Drew Fudenberg & Eric Maskin, 2008. "The Folk Theorem In Repeated Games With Discounting Or With Incomplete Information," World Scientific Book Chapters, in: Drew Fudenberg & David K Levine (ed.), A Long-Run Collaboration On Long-Run Games, chapter 11, pages 209-230, World Scientific Publishing Co. Pte. Ltd..
    3. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    4. Hirshleifer, Jack, 1995. "Anarchy and Its Breakdown," Journal of Political Economy, University of Chicago Press, vol. 103(1), pages 26-52, February.
    5. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    6. Benhabib, Jess & Rustichini, Aldo, 1996. "Social Conflict and Growth," Journal of Economic Growth, Springer, vol. 1(1), pages 125-142, March.
    7. Suresh P. Sethi, 1979. "Optimal Pilfering Policies for Dynamic Continuous Thieves," Management Science, INFORMS, vol. 25(6), pages 535-542, June.
    8. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    9. Maxwell, John W. & Reuveny, Rafael, 2005. "Continuing conflict," Journal of Economic Behavior & Organization, Elsevier, vol. 58(1), pages 30-52, September.
      • John W. Maxwell & Rafael Reuveny, 2004. "Continuing Conflict," Working Papers 2004-27, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
    10. Rafael Reuveny & John W. Maxwell, 2001. "Conflict and Renewable Resources," Journal of Conflict Resolution, Peace Science Society (International), vol. 45(6), pages 719-742, December.
    11. Durham, Yvonne & Hirshleifer, Jack & Smith, Vernon L., 2008. "The Paradox of Power," Handbook of Experimental Economics Results, in: Charles R. Plott & Vernon L. Smith (ed.), Handbook of Experimental Economics Results, edition 1, volume 1, chapter 16, pages 127-137, Elsevier.
    12. Skaperdas, Stergios, 1991. "Conflict and Attitudes toward Risk," American Economic Review, American Economic Association, vol. 81(2), pages 116-120, May.
    13. Hausken, Kjell, 2005. "The battle of the sexes when the future is important," Economics Letters, Elsevier, vol. 87(1), pages 89-93, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    3. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    4. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    5. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    6. Satya P. Das & Prabal Roy Chowdhury, 2014. "Deterrence, Preemption, And Panic: A Common-Enemy Problem Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 52(1), pages 219-238, January.
    7. J. Atsu Amegashie & Marco Runkel, 2012. "The Paradox of Revenge in Conflicts," Journal of Conflict Resolution, Peace Science Society (International), vol. 56(2), pages 313-330, April.
    8. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.
    9. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    10. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    11. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    12. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    13. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    14. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    15. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    16. Satya P. Das & Sajal Lahiri, 2021. "Why direct counter‐terrorism measures only may fail: An analysis of direct and preventive counter‐terrorism measures," International Journal of Economic Theory, The International Society for Economic Theory, vol. 17(4), pages 416-445, December.
    17. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    18. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    19. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    20. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.
    21. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    22. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    23. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    2. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    3. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    4. Gonzalez, Francisco M., 2007. "Effective property rights, conflict and growth," Journal of Economic Theory, Elsevier, vol. 137(1), pages 127-139, November.
    5. Garfinkel, Michelle R. & Skaperdas, Stergios, 2007. "Economics of Conflict: An Overview," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 22, pages 649-709, Elsevier.
    6. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    7. Eggert, Wolfgang & Itaya, Jun-ichi & Mino, Kazuo, 2011. "A dynamic model of conflict and appropriation," Journal of Economic Behavior & Organization, Elsevier, vol. 78(1), pages 167-182.
    8. Rajan, Raghuram G. & Zingales, Luigi, 2000. "The tyranny of inequality," Journal of Public Economics, Elsevier, vol. 76(3), pages 521-558, June.
    9. John W. Maxwell & Rafael Reuveny & Jefferson Davis, 2007. "Dynamic Winner-take-all Conflict," Working Papers 2007-12, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
    10. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    11. Kjell Hausken & Mthuli Ncube, 2016. "How Elections are Impacted by Production, Economic Growth and Conflict," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-29, March.
    12. David Croix & Davide Dottori, 2008. "Easter Island’s collapse: a tale of a population race," Journal of Economic Growth, Springer, vol. 13(1), pages 27-55, March.
    13. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    14. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    15. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    16. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    17. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    18. Esteban, Joan & Ray, Debraj, 1999. "Conflict and Distribution," Journal of Economic Theory, Elsevier, vol. 87(2), pages 379-415, August.
    19. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.
    20. Martin Wittenberg, 2008. "To Prey Or Not To Prey? Welfare And Individual Losses In A Conflict Model1," South African Journal of Economics, Economic Society of South Africa, vol. 76(2), pages 239-265, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:gamebe:v:64:y:2008:i:2:p:548-564. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/inca/622836 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.