IDEAS home Printed from https://ideas.repec.org/p/ces/ceswps/_2753.html
   My bibliography  Save this paper

Suicide Terrorism and the Weakest Link

Author

Listed:
  • Daniel G. Arce
  • Dan Kovenock J.
  • Brian Roberson

Abstract

In this paper we examine a model of terrorism which focuses on the tradeoffs facing a terrorist organization that has the ability to utilize either or both suicide and conventional terrorism tactics. The terrorist organization’s objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize suicide attacks when other modes of attack are available, and the optimal anti-terrorism measures.

Suggested Citation

  • Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
  • Handle: RePEc:ces:ceswps:_2753
    as

    Download full text from publisher

    File URL: https://www.cesifo.org/DocDL/cesifo1_wp2753.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Richard Cornes, 1993. "Dyke Maintenance and Other Stories: Some Neglected Types of Public Goods," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 108(1), pages 259-271.
    2. Brian Roberson & Dmitriy Kvasov, 2012. "The non-constant-sum Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(2), pages 397-433, October.
    3. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    4. Dan Kovenock & Michael R. Baye & Casper G. de Vries, 1996. "The all-pay auction with complete information (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 8(2), pages 291-305.
    5. Kvasov, Dmitriy, 2007. "Contests with limited resources," Journal of Economic Theory, Elsevier, vol. 136(1), pages 738-748, September.
    6. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
    7. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
    8. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    9. Sergiu Hart, 2008. "Discrete Colonel Blotto and General Lotto games," International Journal of Game Theory, Springer;Game Theory Society, vol. 36(3), pages 441-460, March.
    10. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    11. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    12. Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
    13. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
    14. B. Peter Rosendorff & Todd Sandler, 2004. "Too Much of a Good Thing?," Journal of Conflict Resolution, Peace Science Society (International), vol. 48(5), pages 657-671, October.
    15. Derek J. Clark & Kai A. Konrad, 2007. "Asymmetric Conflict," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(3), pages 457-469, June.
    16. Raymond E. Franck & Francois Melese, 2004. "Exploring the structure of terrorists' WMD decisions: A game theory approach," Defense & Security Analysis, Taylor & Francis Journals, vol. 20(4), pages 355-372, December.
    17. Gassebner, Martin & Jong-A-Pin, Richard & Mierau, Jochen O., 2008. "Terrorism and electoral accountability: One strike, you're out!," Economics Letters, Elsevier, vol. 100(1), pages 126-129, July.
    18. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    19. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
    20. Sandler, Todd & Arce, Daniel G., 2007. "Terrorism: A Game-Theoretic Approach," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 25, pages 775-813, Elsevier.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Yu‐Fu Chen & Michael Funke, 2010. "Booms, Recessions And Financial Turmoil: A Fresh Look At Investment Decisions Under Cyclical Uncertainty," Scottish Journal of Political Economy, Scottish Economic Society, vol. 57(3), pages 290-317, July.
    2. Raphael Bossong, 2011. "Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy," Economics of Security Working Paper Series 42, DIW Berlin, German Institute for Economic Research.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    2. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    3. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    4. Dan J. Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," CESifo Working Paper Series 5653, CESifo.
    5. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    6. Dan Kovenock & Brian Roberson, 2021. "Generalizations of the General Lotto and Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 71(3), pages 997-1032, April.
    7. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.
    8. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    9. David Rietzke & Brian Roberson, 2013. "The robustness of ‘enemy-of-my-enemy-is-my-friend’ alliances," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 40(4), pages 937-956, April.
    10. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    11. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    12. Kimbrough, Erik O. & Laughren, Kevin & Sheremeta, Roman, 2020. "War and conflict in economics: Theories, applications, and recent trends," Journal of Economic Behavior & Organization, Elsevier, vol. 178(C), pages 998-1013.
    13. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.
    14. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.
    15. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    16. Enric Boix-Adser`a & Benjamin L. Edelman & Siddhartha Jayanti, 2020. "The Multiplayer Colonel Blotto Game," Papers 2002.05240, arXiv.org, revised May 2021.
    17. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    18. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    19. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "The Attack-And-Defense Group Contests: Best Shot Versus Weakest Link," Economic Inquiry, Western Economic Association International, vol. 54(1), pages 548-557, January.
    20. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.

    More about this item

    Keywords

    conflict; suicide terrorism; weakest link; Colonel Blotto;
    All these keywords.

    JEL classification:

    • C70 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - General
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ces:ceswps:_2753. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Klaus Wohlrabe (email available below). General contact details of provider: https://edirc.repec.org/data/cesifde.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.