IDEAS home Printed from https://ideas.repec.org/a/sae/jocore/v38y1994i3p452-478.html
   My bibliography  Save this article

The Scale of Terrorist Attacks as a Signal of Resources

Author

Listed:
  • Per Baltzer Overgaard

    (University of Aarhus)

Abstract

This article studies conflicts between terrorists and governments in a setting of asymmetric information. The government is initially uncertain about the level of resources available to a terrorist group for use in violent attacks. The conflict is modeled as a signaling game where the magnitude of terrorist attacks serves as a signal of terrorist resources. With complete information, optimal government retaliation depends nontrivially on terrorist resources. With asymmetric information, this provides terrorists with an incentive to convey the message that resources are large in an attempt to soften government retaliation. Thus equilibrium attack levels of high resource terrorist groups must be distorted upward if they are to convey any information to the government. In addition, we consider equilibria where attacks are uninformative of terrorist resources, but where the government softens its retaliation. In either case the government suffers under asymmetric information. We examine how varying the flexibility of government responses affects the likely outcome of conflicts, and this gives rise to an assessment of the value of government intelligence gathering and (partial) government commitment.

Suggested Citation

  • Per Baltzer Overgaard, 1994. "The Scale of Terrorist Attacks as a Signal of Resources," Journal of Conflict Resolution, Peace Science Society (International), vol. 38(3), pages 452-478, September.
  • Handle: RePEc:sae:jocore:v:38:y:1994:i:3:p:452-478
    DOI: 10.1177/0022002794038003005
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0022002794038003005
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0022002794038003005?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Kreps, David M & Wilson, Robert, 1982. "Sequential Equilibria," Econometrica, Econometric Society, vol. 50(4), pages 863-894, July.
    2. Milgrom, Paul & Roberts, John, 1982. "Limit Pricing and Entry under Incomplete Information: An Equilibrium Analysis," Econometrica, Econometric Society, vol. 50(2), pages 443-459, March.
    3. Kyle Bagwell & Garey Ramey, 1988. "Advertising and Limit Pricing," RAND Journal of Economics, The RAND Corporation, vol. 19(1), pages 59-71, Spring.
    4. Lapan, Harvey E. & Sandler, Todd, 1993. "Terrorism and signalling," European Journal of Political Economy, Elsevier, vol. 9(3), pages 383-397, August.
    5. Lapan, Harvey E & Sandler, Todd, 1988. "To Bargain or Not to Bargain: That Is the Question," American Economic Review, American Economic Association, vol. 78(2), pages 16-21, May.
    6. Kreps, David M. & Wilson, Robert, 1982. "Reputation and imperfect information," Journal of Economic Theory, Elsevier, vol. 27(2), pages 253-279, August.
    7. In-Koo Cho & David M. Kreps, 1987. "Signaling Games and Stable Equilibria," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 102(2), pages 179-221.
    8. Bagwell, Kyle & Ramey, Garey, 1990. "Advertising and pricing to deter or accommodate entry when demand is unknown," International Journal of Industrial Organization, Elsevier, vol. 8(1), pages 93-113.
    9. Lee, Dwight R, 1988. "Free Riding and Paid Riding in the Fight against Terrorism," American Economic Review, American Economic Association, vol. 78(2), pages 22-26, May.
    10. Cho, In-Koo & Sobel, Joel, 1990. "Strategic stability and uniqueness in signaling games," Journal of Economic Theory, Elsevier, vol. 50(2), pages 381-413, April.
    11. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
    2. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    3. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    4. Margaret A. Wilson, 2000. "Toward a Model of Terrorist Behavior in Hostage-Taking Incidents," Journal of Conflict Resolution, Peace Science Society (International), vol. 44(4), pages 403-424, August.
    5. Bruno S. Frey & Simon Luechinger, "undated". "Terrorism: Deterrence May Backfire," IEW - Working Papers 136, Institute for Empirical Research in Economics - University of Zurich.
    6. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
    7. Reed M. Wood, 2014. "Opportunities to kill or incentives for restraint? Rebel capabilities, the origins of support, and civilian victimization in civil war," Conflict Management and Peace Science, Peace Science Society (International), vol. 31(5), pages 461-480, November.
    8. Muhammet A Bas & Curtis S Signorino & Taehee Whang, 2014. "Knowing one’s future preferences: A correlated agent model with Bayesian updating," Journal of Theoretical Politics, , vol. 26(1), pages 3-34, January.
    9. Aaron Clauset & Maxwell Young & Kristian Skrede Gleditsch, 2007. "On the Frequency of Severe Terrorist Events," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 58-87, February.
    10. William Spaniel, 2019. "Rational Overreaction to Terrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 63(3), pages 786-810, March.
    11. Spagat, Michael & Mandler, Michael, 2003. "Foreign Aid Designed to Diminish Terrorist Atrocities can Increase Them," CEPR Discussion Papers 4004, C.E.P.R. Discussion Papers.
    12. Hendel, Ulrich, 2012. ""Look like the innocent flower, but be the serpent under't": Mimicking behaviour of growth-oriented terrorist organizations," Discussion Papers in Economics 13998, University of Munich, Department of Economics.
    13. Nicole Crain & W. Crain, 2006. "Terrorized economies," Public Choice, Springer, vol. 128(1), pages 317-349, July.
    14. Daniel G. Arce & Todd Sandler, 2010. "Terrorist Spectaculars: Backlash Attacks and the Focus of Intelligence," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 354-373, April.
    15. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
    16. Lu, Peng & Wen, Feier & Li, Yan & Chen, Dianhan, 2021. "Multi-agent modeling of crowd dynamics under mass shooting cases," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    17. William M. Kroshl & Shahram Sarkani & Thomas A Mazzuchi, 2015. "Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation," Risk Analysis, John Wiley & Sons, vol. 35(9), pages 1690-1705, September.
    18. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    19. Gian Maria Campedelli & Mihovil Bartulovic & Kathleen M. Carley, 2019. "Pairwise similarity of jihadist groups in target and weapon transitions," Journal of Computational Social Science, Springer, vol. 2(2), pages 245-270, July.
    20. Kumar, Dushyant & Roy Chowdhury, Prabal, 2022. "Winning hearts and minds in conflict-ridden areas: Development as a signal of benevolence," Economic Modelling, Elsevier, vol. 117(C).
    21. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    22. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bagwell, Kyle & Wolinsky, Asher, 2002. "Game theory and industrial organization," Handbook of Game Theory with Economic Applications, in: R.J. Aumann & S. Hart (ed.), Handbook of Game Theory with Economic Applications, edition 1, volume 3, chapter 49, pages 1851-1895, Elsevier.
    2. Iñaki Aguirre, 1999. "Information transmission and incentives not to price discriminate," Spanish Economic Review, Springer;Spanish Economic Association, vol. 1(3), pages 283-299.
    3. Boyer, Marcel & Mahenc, Philippe & Moreaux, Michel, 2003. "Entry preventing locations under incomplete information," International Journal of Industrial Organization, Elsevier, vol. 21(6), pages 809-829, June.
    4. Cesaltina Pires & Sílvia Jorge, 2012. "Limit pricing under third-degree price discrimination," International Journal of Game Theory, Springer;Game Theory Society, vol. 41(3), pages 671-698, August.
    5. Govindan, Srihari & Wilson, Robert B., 2008. "Decision-Theoretic Forward Induction," Research Papers 1986, Stanford University, Graduate School of Business.
    6. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    7. Dobrin R. Kolev & Thomas J. Prusa, 2021. "Dumping and double crossing: The (in)effectiveness of cost-based trade policy under incomplete information," World Scientific Book Chapters, in: Thomas J Prusa (ed.), Economic Effects of Antidumping, chapter 7, pages 129-152, World Scientific Publishing Co. Pte. Ltd..
    8. Sylvain Baumann, 2018. "Protection, Technological Transfer and Alliance against Terrorist Conflict," Post-Print hal-02949083, HAL.
    9. Woon†Oh Jung, 1989. "Strategic choice of inventory accounting methods," Contemporary Accounting Research, John Wiley & Sons, vol. 6(1), pages 1-25, September.
    10. Sexton, Richard J., 1991. "Game Theory: A Review With Applications To Vertical Control In Agricultural Markets," Working Papers 225865, University of California, Davis, Department of Agricultural and Resource Economics.
    11. Bruno S. Frey & Simon Luechinger, 2005. "Measuring terrorism," Chapters, in: Alain Marciano & Jean-Michel Josselin (ed.), Law and the State, chapter 6, Edward Elgar Publishing.
    12. Meng, Dawen & Tian, Guoqiang, 2013. "Entry-Deterring Nonlinear Pricing with Bounded Rationality," MPRA Paper 57935, University Library of Munich, Germany, revised May 2014.
    13. Kyle Bagwell & Garey Ramey, 1991. "Oligopoly Limit Pricing," RAND Journal of Economics, The RAND Corporation, vol. 22(2), pages 155-172, Summer.
    14. Konrad, Kai A., 2002. "Terrorism and the state [Terrorismus und der Staat]," Discussion Papers, Research Unit: Market Processes and Governance FS IV 02-15, WZB Berlin Social Science Center.
    15. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    16. Yutian Chen & Wei Tan, 2012. "A Theory on Predatory Advertising After a Demand-Reducing Shock," Eastern Economic Journal, Palgrave Macmillan;Eastern Economic Association, vol. 38(4), pages 460-478.
    17. Kyle Bagwell, 2007. "Signalling and entry deterrence: a multidimensional analysis," RAND Journal of Economics, RAND Corporation, vol. 38(3), pages 670-697, September.
    18. Bruno S. Frey & Simon Luechinger, "undated". "Terrorism: Deterrence May Backfire," IEW - Working Papers 136, Institute for Empirical Research in Economics - University of Zurich.
    19. Melkonyan, Tigran A., 2006. "Value of reputation in the chain-store game with multiple incumbents," International Journal of Industrial Organization, Elsevier, vol. 24(2), pages 425-448, March.
    20. Liu, Shuo & Pei, Harry, 2020. "Monotone equilibria in signaling games," European Economic Review, Elsevier, vol. 124(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:jocore:v:38:y:1994:i:3:p:452-478. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://pss.la.psu.edu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.