The enemy you can’t see: An investigation of the disruption of dark networks
AbstractWe examine the optimal disruption of dark (covert and illegal) networks. Of central importance is that an interventionist will generally have incomplete information about the dark network's architecture. We derive the optimal disruption strategy in a stylized model of dark network intervention with incomplete information and show how it combines features of two types of disruption considered in the literature: random failure and targeted attacks. In particular, the optimal disruption strategy encourages greater risk as less of the architecture is observed. A laboratory experiment finds that subjects tasked with disrupting a dark network qualitatively mimic the theoretical predictions.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
Bibliographic InfoArticle provided by Elsevier in its journal Journal of Economic Behavior & Organization.
Volume (Year): 93 (2013)
Issue (Month): C ()
Contact details of provider:
Web page: http://www.elsevier.com/locate/jebo
Terrorism; Crime; Intervention; Defense;
Find related papers by JEL classification:
- C91 - Mathematical and Quantitative Methods - - Design of Experiments - - - Laboratory, Individual Behavior
- D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Zhang, Lei).
If references are entirely missing, you can add them using this form.