IDEAS home Printed from https://ideas.repec.org/a/eme/igdrpp/igdr-08-2019-0090.html
   My bibliography  Save this article

Terrorism risk and optimal policy response: theory and empirics

Author

Listed:
  • Hamid Mohtadi
  • Bryan Weber

Abstract

Purpose - The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even radioactive and nuclear attacks (commonly abbreviated as CBRN) which are potentially much more dangerous. The authors make three contributions toward a better understanding of this risk and how it responds to counterterrorism measures. Design/methodology/approach - The authors develop a game that captures the terrorists’ potential strategic substitution between conventional and CBRN-type attacks; the authors calibrate the parameters of the game to real data using a novel calibration method and a partially unique dataset; they estimate the heavy-tailed distribution of attack severity and thus the probability of a successful attack, the underlying effort to launch an attack and the intrinsic difficulty of launching different types of attacks. Findings - The authors find that in equilibrium, CBRN attacks, though less likely and more difficult to execute, are more deadly. In the end, the trade-off between, on one hand, the greater difficulty of carrying out a CBRN attack, and on the other, the greater deadliness of such an attack, points to a level of optimal counterterrorism spending by governments that weighs toward defending against CBRN attacks. The authors discuss these results and compare them with the actual level of counterterrorism spending by the US Government. Originality/value - The framework of the game allows for substitution between the conventional and CBRN weapon types. These aspects of this paper, together with the unique calibration methodology, and the use of some unique terrorism data for the first time, are what distinguish this work from similar game theoretic papers in this area.

Suggested Citation

  • Hamid Mohtadi & Bryan Weber, 2019. "Terrorism risk and optimal policy response: theory and empirics," Indian Growth and Development Review, Emerald Group Publishing Limited, vol. 13(2), pages 449-468, October.
  • Handle: RePEc:eme:igdrpp:igdr-08-2019-0090
    DOI: 10.1108/IGDR-08-2019-0090
    as

    Download full text from publisher

    File URL: https://www.emerald.com/insight/content/doi/10.1108/IGDR-08-2019-0090/full/html?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://www.emerald.com/insight/content/doi/10.1108/IGDR-08-2019-0090/full/pdf?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1108/IGDR-08-2019-0090?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    2. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    3. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    4. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    5. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    6. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    7. Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
    8. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    9. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    10. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    11. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    12. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    13. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    14. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    15. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    16. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    17. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    18. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    19. Julei Fu & Duoyong Sun & Jian Chai & Jin Xiao & Shouyang Wang, 2015. "The “six-element” analysis method for the research on the characteristics of terrorist activities," Annals of Operations Research, Springer, vol. 234(1), pages 17-35, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:igdrpp:igdr-08-2019-0090. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.