IDEAS home Printed from https://ideas.repec.org/a/sae/compsc/v29y2012i2p195-218.html
   My bibliography  Save this article

The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack

Author

Listed:
  • Timothy Mathews
  • Anton D. Lowenberg

Abstract

Consider a state that chooses security levels at two sites (Targets A and B ), after which a terrorist chooses which site to attack (and potentially a scope of attack). The state values A more highly. If the state knows which target the terrorist values more highly, he will choose a higher level of security at this site. Under complete information, if the terrorist’s only choice is which site to attack, the state will set security levels for which the terrorist prefers to attack A over B if and only if the ratio of the value of B to the value of A is greater for the state than for the terrorist. When the state has incomplete information on the terrorist’s target values, the optimal security levels may be such that: a target is completely undefended (but attacked with positive probability); the probability of attack is greater at A than at B ; and the expected damage from an attack is greater at A than at B . In total, the results reveal that the state’s choice of security is heavily influenced by the terrorist’s target valuations.

Suggested Citation

  • Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
  • Handle: RePEc:sae:compsc:v:29:y:2012:i:2:p:195-218
    DOI: 10.1177/0738894211434678
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0738894211434678
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0738894211434678?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Patrick T. Brandt & Todd Sandler, 2010. "What Do Transnational Terrorists Target? Has It Changed? Are We Safer?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 214-236, April.
    2. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre-emption," Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
    3. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    4. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    5. Keith Hartley & Todd Sandler (ed.), 2007. "Handbook of Defense Economics," Handbook of Defense Economics, Elsevier, edition 1, volume 2, number 1.
    6. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
    7. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    8. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    9. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    10. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    11. John Cadigan & Pamela Schmitt, 2010. "Strategic entry deterrence and terrorism: Theory and experimental evidence," Public Choice, Springer, vol. 143(1), pages 3-22, April.
    12. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
    13. Enders, Walter & Sandler, Todd, 1995. "Terrorism: Theory and applications," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 1, chapter 9, pages 213-249, Elsevier.
    14. Linda Bilmes, 2006. "The Economic Costs of the Iraq War: An Appraisal Three Years After the Beginning of the Conflict," Working Papers id:387, eSocialSciences.
    15. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    16. Sandler,Todd & Hartley,Keith, 1995. "The Economics of Defense," Cambridge Books, Cambridge University Press, number 9780521447287.
    17. Keith Hartley & Todd Sandler (ed.), 1995. "Handbook of Defense Economics," Handbook of Defense Economics, Elsevier, edition 1, volume 1, number 1.
    18. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    19. Sandler, Todd & Arce, Daniel G., 2007. "Terrorism: A Game-Theoretic Approach," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 25, pages 775-813, Elsevier.
    20. Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
    21. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    3. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    4. Josiah Marineau & Henry Pascoe & Alex Braithwaite & Michael Findley & Joseph Young, 2020. "The local geography of transnational terrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 37(3), pages 350-381, May.
    5. Timothy Mathews & Shane Sanders, 2019. "Strategic and experimental analyses of conflict and terrorism," Public Choice, Springer, vol. 179(3), pages 169-174, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    2. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    3. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    4. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    5. Coyne,Christopher J., 2020. "Defense, Peace, and War Economics," Cambridge Books, Cambridge University Press, number 9781108724036.
    6. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    7. Todd Sandler & Daniel G. Arce & Walter Enders, 2011. "An Evaluation of Interpol's Cooperative-Based Counterterrorism Linkages," Journal of Law and Economics, University of Chicago Press, vol. 54(1), pages 79-110.
    8. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    9. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    10. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    11. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    12. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    13. Walter Enders & Todd Sandler, 2000. "Is Transnational Terrorism Becoming More Threatening?," Journal of Conflict Resolution, Peace Science Society (International), vol. 44(3), pages 307-332, June.
    14. Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2007. "Calculating Tragedy: Assessing The Costs Of Terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 21(1), pages 1-24, February.
    15. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    16. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    17. Bruno S. Frey & Simon Luechinger, 2005. "Measuring terrorism," Chapters, in: Alain Marciano & Jean-Michel Josselin (ed.), Law and the State, chapter 6, Edward Elgar Publishing.
    18. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    19. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    20. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:compsc:v:29:y:2012:i:2:p:195-218. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://pss.la.psu.edu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.