IDEAS home Printed from https://ideas.repec.org/a/sae/compsc/v28y2011i5p497-521.html
   My bibliography  Save this article

The Escalation of Terror: Hate and the Demise of Terrorist Organizations

Author

Listed:
  • Catherine C. Langlois
  • Jean-Pierre P. Langlois

Abstract

Our goal in this article is to examine the strategic interaction between terror groups, hosts, and the United States in order to better understand the parameters of the interaction and the elements of a winning strategy. We adopt a game theoretic approach assuming that each player has a well defined goal and accounts for the anticipated behavior of the others to develop strategy. The game that we develop is a repeated game in which the host and the US must decide whether to fight a terrorist organization whose membership and resources will grow indefinitely if left unchecked. Our model predicts circumstances in which a host will begin to push back against the terrorists in anticipation of a future involvement of the US. It also predicts circumstances in which the terrorist organization’s hatred of the US prompts attacks that seal its fate and early demise.

Suggested Citation

  • Catherine C. Langlois & Jean-Pierre P. Langlois, 2011. "The Escalation of Terror: Hate and the Demise of Terrorist Organizations," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(5), pages 497-521, November.
  • Handle: RePEc:sae:compsc:v:28:y:2011:i:5:p:497-521
    DOI: 10.1177/0738894211418423
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0738894211418423
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0738894211418423?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    2. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre-emption," Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
    3. A. J. Novak & G. Feichtinger & G. Leitmann, 2010. "A Differential Game Related to Terrorism: Nash and Stackelberg Strategies," Journal of Optimization Theory and Applications, Springer, vol. 144(3), pages 533-555, March.
    4. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    5. G. Feichtinger & A. J. Novak, 2008. "Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution," Journal of Optimization Theory and Applications, Springer, vol. 139(3), pages 541-556, December.
    6. B. Peter Rosendorff & Todd Sandler, 2004. "Too Much of a Good Thing?," Journal of Conflict Resolution, Peace Science Society (International), vol. 48(5), pages 657-671, October.
    7. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    8. de Mesquita, Ethan Bueno, 2005. "Conciliation, Counterterrorism, and Patterns of Terrorist Violence," International Organization, Cambridge University Press, vol. 59(1), pages 145-176, January.
    9. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    3. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    4. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    5. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    6. Tiberiu Dragu & Mattias Polborn, 2009. "Terrorism Prevention and Electoral Accountability," CESifo Working Paper Series 2864, CESifo.
    7. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    8. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.
    9. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    10. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    11. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    12. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    13. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    14. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    15. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    16. Todd Sandler & Daniel G. Arce & Walter Enders, 2011. "An Evaluation of Interpol's Cooperative-Based Counterterrorism Linkages," Journal of Law and Economics, University of Chicago Press, vol. 54(1), pages 79-110.
    17. João Ricardo Faria & Emilson C. D. Silva & Daniel G. Arce, 2017. "Intertemporal Versus Spatial Externalities in Counterterror Policy Games," Dynamic Games and Applications, Springer, vol. 7(3), pages 402-421, September.
    18. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    19. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    20. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:compsc:v:28:y:2011:i:5:p:497-521. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://pss.la.psu.edu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.