Advanced Search
MyIDEAS: Login to save this article or follow this journal

The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack

Contents:

Author Info

  • Timothy Mathews
  • Anton D. Lowenberg

Abstract

Consider a state that chooses security levels at two sites (Targets A and B), after which a terrorist chooses which site to attack (and potentially a scope of attack). The state values A more highly. If the state knows which target the terrorist values more highly, he will choose a higher level of security at this site. Under complete information, if the terrorist’s only choice is which site to attack, the state will set security levels for which the terrorist prefers to attack A over B if and only if the ratio of the value of B to the value of A is greater for the state than for the terrorist. When the state has incomplete information on the terrorist’s target values, the optimal security levels may be such that: a target is completely undefended (but attacked with positive probability); the probability of attack is greater at A than at B; and the expected damage from an attack is greater at A than at B. In total, the results reveal that the state’s choice of security is heavily influenced by the terrorist’s target valuations.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://cmp.sagepub.com/content/29/2/195.abstract
Download Restriction: no

Bibliographic Info

Article provided by Peace Science Society (International) in its journal Conflict Management and Peace Science.

Volume (Year): 29 (2012)
Issue (Month): 2 (April)
Pages: 195-218

as in new window
Handle: RePEc:sae:compsc:v:29:y:2012:i:2:p:195-218

Contact details of provider:
Web page: http://pss.la.psu.edu/

Related research

Keywords: applied game theory; counterterrorism; defensive measures; homeland security;

References

No references listed on IDEAS
You can help add them by filling out this form.

Citations

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:sae:compsc:v:29:y:2012:i:2:p:195-218. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (SAGE Publications).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.