Terrorism: Theory and applications
In: Handbook of Defense Economics
AbstractThis chapter reviews game-theoretic and choice-theoretic depictions of terrorist behavior. A simple game-theoretic framework is presented to ascertain under what circumstances a government would want to precommit itself to a no-negotiation strategy. In another game model, we analyze whether two governments (nations) that are targeted by the same terrorist group would overdeter or underdeter terrorist attacks. Moreover, we demonstrate that piecemeal policy, which allows the governments to share intelligence but not deterrence decisions, can be worse than no coordination. Choice-theoretic models identify substitution and complementarity possibilities among diverse modes of terrorist attacks as terrorists respond optimally to government actions. A host of time-series techniques are used to study the effectiveness of alternative antiterrorism policies. Vector-autoregression intervention procedures are particularly suited. Time-series analyses are also used to identify cycles, trends, and irregular components for forecasting purposes.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
This chapter was published in:
This item is provided by Elsevier in its series Handbook of Defense Economics with number 1-09.
Contact details of provider:
Web page: http://www.elsevier.com/wps/find/bookseriesdescription.cws_home/BS_HE/description
You can help add them by filling out this form.
CitEc Project, subscribe to its RSS feed for this item.
This item has more than 25 citations. To prevent cluttering this page, these citations are listed on a separate page. reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Wendy Shamier).
If references are entirely missing, you can add them using this form.