IDEAS home Printed from https://ideas.repec.org/a/kap/pubcho/v179y2019i3d10.1007_s11127-018-0559-8.html
   My bibliography  Save this article

A model of terrorism and counterterrorism with location choices

Author

Listed:
  • Yang Jiao

    (Fort Hays State University)

  • Zijun Luo

    (Sam Houston State University)

Abstract

We study a model of terrorism and counterterrorism with three geographic target locations, in which the last location is chosen by the terrorists and is unknown to the defender. We find the choice of location and defender’s allocation of defensive resources to depend on whether the first two locations are attacked simultaneously or sequentially. In the sequential-move game, the final attack is closer to the low-valued target than it is in the simultaneous-move game. In addition, the defender chooses to defend only the location that is attacked first in the sequential game. Results from the model also can shed light on less provocative criminal events such as bank robberies and drug dealings.

Suggested Citation

  • Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
  • Handle: RePEc:kap:pubcho:v:179:y:2019:i:3:d:10.1007_s11127-018-0559-8
    DOI: 10.1007/s11127-018-0559-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11127-018-0559-8
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11127-018-0559-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Todd Sandler, 2015. "Terrorism and counterterrorism: an overview," Oxford Economic Papers, Oxford University Press, vol. 67(1), pages 1-20.
    2. Gal-Or, Esther, 1985. "First Mover and Second Mover Advantages," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 26(3), pages 649-653, October.
    3. B. Curtis Eaton, 2004. "The elementary economics of social dilemmas," Canadian Journal of Economics, Canadian Economics Association, vol. 37(4), pages 805-829, November.
    4. Kjell Hausken, 2012. "The economics of terrorism against two targets," Applied Economics Letters, Taylor & Francis Journals, vol. 19(12), pages 1135-1138, August.
    5. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2015. "The Economics Of Counterterrorism: A Survey," Journal of Economic Surveys, Wiley Blackwell, vol. 29(1), pages 131-157, February.
    6. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
    7. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    8. Satya P. Das & Prabal Roy Chowdhury, 2014. "Deterrence, Preemption, And Panic: A Common-Enemy Problem Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 52(1), pages 219-238, January.
    9. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    10. John Cadigan & Pamela Schmitt, 2010. "Strategic entry deterrence and terrorism: Theory and experimental evidence," Public Choice, Springer, vol. 143(1), pages 3-22, April.
    11. Todd Sandler, 2014. "The analytical study of terrorism," Journal of Peace Research, Peace Research Institute Oslo, vol. 51(2), pages 257-271, March.
    12. S. Blomberg & Khusrav Gaibulloev & Todd Sandler, 2011. "Terrorist group survival: ideology, tactics, and base of operations," Public Choice, Springer, vol. 149(3), pages 441-463, December.
    13. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2011. "Foreign aid as counterterrorism policy," Oxford Economic Papers, Oxford University Press, vol. 63(3), pages 423-447, July.
    14. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    15. de Mesquita, Ethan Bueno, 2005. "Conciliation, Counterterrorism, and Patterns of Terrorist Violence," International Organization, Cambridge University Press, vol. 59(1), pages 145-176, January.
    16. Yang-Ming Chang & Dennis L. Weisman, 2005. "Sibling Rivalry and Strategic Parental Transfers," Southern Economic Journal, John Wiley & Sons, vol. 71(4), pages 821-836, April.
    17. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    18. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre‐emption," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 39(4), pages 1370-1387, November.
    19. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    20. Skaperdas, Stergios, 1992. "Cooperation, Conflict, and Power in the Absence of Property Rights," American Economic Review, American Economic Association, vol. 82(4), pages 720-739, September.
    21. Buchanan, James M, 1983. "Rent Seeking, Noncompensated Transfers, and Laws of Succession," Journal of Law and Economics, University of Chicago Press, vol. 26(1), pages 71-85, April.
    22. Yang-Ming Chang & Zijun Luo, 2015. "Endogenous division rules as a family constitution: strategic altruistic transfers and sibling competition," Journal of Population Economics, Springer;European Society for Population Economics, vol. 28(1), pages 173-194, January.
    23. Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
    24. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2014. "Foreign direct investment, aid, and terrorism," Oxford Economic Papers, Oxford University Press, vol. 66(1), pages 25-50, January.
    25. Sandler, Todd & Tschirhart, John T. & Cauley, Jon, 1983. "A Theoretical Analysis of Transnational Terrorism," American Political Science Review, Cambridge University Press, vol. 77(1), pages 36-54, March.
    26. Kevin Siqueira & Todd Sandler, 2008. "Defensive Counterterrorism Measures And Domestic Politics," Defence and Peace Economics, Taylor & Francis Journals, vol. 19(6), pages 405-413.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Shuo She & Qiao Wang & Dana Weimann-Saks, 2020. "Correlation factors influencing terrorist attacks: political, social or economic? A study of terrorist events in 49 “Belt and Road” countries," Quality & Quantity: International Journal of Methodology, Springer, vol. 54(1), pages 125-146, February.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    2. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    3. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    4. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    5. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    6. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    7. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    8. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    9. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.
    10. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    11. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    12. Subhayu Bandyopadhyay & Todd Sandler & Javed Younas, 2011. "Foreign aid as counterterrorism policy," Oxford Economic Papers, Oxford University Press, vol. 63(3), pages 423-447, July.
    13. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    14. Michael Jetter & David Stadelmann, 2019. "Terror per Capita," Southern Economic Journal, John Wiley & Sons, vol. 86(1), pages 286-304, July.
    15. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    16. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    17. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
    18. Bandyopadhyay, Subhayu & Sandler, Todd, 2014. "Immigration policy and counterterrorism," Journal of Public Economics, Elsevier, vol. 110(C), pages 112-123.
    19. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    20. De Sousa, José & Mirza, Daniel & Verdier, Thierry, 2018. "Terror networks and trade: Does the neighbor hurt?," European Economic Review, Elsevier, vol. 107(C), pages 27-56.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:pubcho:v:179:y:2019:i:3:d:10.1007_s11127-018-0559-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.