IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v37y2017i2p342-371.html
   My bibliography  Save this article

Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat

Author

Listed:
  • Gary A. Ackerman
  • Jun Zhuang
  • Sitara Weerasuriya

Abstract

This article uses a game‐theoretic approach to analyze the risk of cross‐milieu terrorist collaboration—the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists’ collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision‐making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right‐wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right‐ or left‐wing extremists. The game‐theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed.

Suggested Citation

  • Gary A. Ackerman & Jun Zhuang & Sitara Weerasuriya, 2017. "Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 342-371, February.
  • Handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:342-371
    DOI: 10.1111/risa.12624
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12624
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12624?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    2. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    3. Keeney,Ralph L. & Raiffa,Howard, 1993. "Decisions with Multiple Objectives," Cambridge Books, Cambridge University Press, number 9780521438834, September.
    4. Wright, George & Rowe, Gene & Bolger, Fergus & Gammack, John, 1994. "Coherence, Calibration, and Expertise in Judgmental Probability Forecasting," Organizational Behavior and Human Decision Processes, Elsevier, vol. 57(1), pages 1-25, January.
    5. Fearon, James D. & Laitin, David D., 1996. "Explaining Interethnic Cooperation," American Political Science Review, Cambridge University Press, vol. 90(4), pages 715-735, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Aditya Bhan & Tarun Kabiraj, 2020. "Terrorist Inter-Group Cooperation and Terror Activity," Group Decision and Negotiation, Springer, vol. 29(6), pages 1085-1106, December.
    2. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    3. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    3. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    6. Olga Špačková & Daniel Straub, 2015. "Cost‐Benefit Analysis for Optimization of Risk Protection Under Budget Constraints," Risk Analysis, John Wiley & Sons, vol. 35(5), pages 941-959, May.
    7. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    8. KARRI PASANEN & MIKKO KURTTILA & JOUNI PYKÄlÄINEN & JYRKI KANGAS & PEKKA LESKINEN, 2005. "Mesta — Non-Industrial Private Forest Owners' Decision-Support Environment For The Evaluation Of Alternative Forest Plans Over The Internet," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 4(04), pages 601-620.
    9. Indra de Soysa & Synøve Almås, 2019. "Does Ethnolinguistic Diversity Preclude Good Governance? A Comparative Study with Alternative Data, 1990‐2015," Kyklos, Wiley Blackwell, vol. 72(4), pages 604-636, November.
    10. Gerring, John & Thacker, Strom C. & Lu, Yuan & Huang, Wei, 2015. "Does Diversity Impair Human Development? A Multi-Level Test of the Diversity Debit Hypothesis," World Development, Elsevier, vol. 66(C), pages 166-188.
    11. Kazuya Yamamoto, 2015. "Mobilization, Flexibility of Identity, and Ethnic Cleavage," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 18(2), pages 1-8.
    12. Gerd Gigerenzer, 1997. "Bounded Rationality: Models of Fast and Frugal Inference," Swiss Journal of Economics and Statistics (SJES), Swiss Society of Economics and Statistics (SSES), vol. 133(II), pages 201-218, June.
    13. Shuang Liu & Kirsten Maclean & Cathy Robinson, 2019. "A cost-effective framework to prioritise stakeholder participation options," EURO Journal on Decision Processes, Springer;EURO - The Association of European Operational Research Societies, vol. 7(3), pages 221-241, November.
    14. Khaled, Oumaima & Minoux, Michel & Mousseau, Vincent & Michel, Stéphane & Ceugniet, Xavier, 2018. "A multi-criteria repair/recovery framework for the tail assignment problem in airlines," Journal of Air Transport Management, Elsevier, vol. 68(C), pages 137-151.
    15. Zhang, Tianyu & Dong, Peiwu & Zeng, Yongchao & Ju, Yanbing, 2022. "Analyzing the diffusion of competitive smart wearable devices: An agent-based multi-dimensional relative agreement model," Journal of Business Research, Elsevier, vol. 139(C), pages 90-105.
    16. Smith, Chris M. & Shaw, Duncan, 2019. "The characteristics of problem structuring methods: A literature review," European Journal of Operational Research, Elsevier, vol. 274(2), pages 403-416.
    17. Anirban Basu & William Dale & Arthur Elstein & David Meltzer, 2009. "A linear index for predicting joint health‐states utilities from single health‐states utilities," Health Economics, John Wiley & Sons, Ltd., vol. 18(4), pages 403-419, April.
    18. Letrouit,Lucie Michele Maya & Selod,Harris, 2020. "Trust or Property Rights ? Can Trusted Relationships Substitute for Costly Land Registration in West African Cities ?," Policy Research Working Paper Series 9310, The World Bank.
    19. Chorus, Caspar & van Cranenburgh, Sander & Daniel, Aemiro Melkamu & Sandorf, Erlend Dancke & Sobhani, Anae & Szép, Teodóra, 2021. "Obfuscation maximization-based decision-making: Theory, methodology and first empirical evidence," Mathematical Social Sciences, Elsevier, vol. 109(C), pages 28-44.
    20. Katharina Werner & Ahmed Skali, 2023. "Violent Conflict and Parochial Trust: Lab-in-the-Field and Survey Evidence," HiCN Working Papers 404, Households in Conflict Network.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:342-371. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.