Managing Asymmetric Conflict
We consider conflicts between an incumbent, e.g. government or dominant firm, and potential challengers, e.g. guerilla movement or entrants. It is not uncommon for challengers to win such conflicts despite their lack of resources. They can do this by exploiting a second mover advantage: choosing to attack the incumbent in ways that it had not prepared for, because it was locked in by past investments. To model such asymmetric conflict we use a three stage game. In the first stage the incumbent chooses effort; in the second stage the challengers choose the degree of differentiation from the incumbent and in the third stage each decide whether to attack or defend and collect their payoffs. This simple model has a number of interesting predicitions, which may apply in certain types of legal, commercial and military conflicts.
|Date of creation:||Oct 2004|
|Date of revision:|
|Contact details of provider:|| Postal: |
Phone: +44 (0)1227 827497
Web page: http://www.kent.ac.uk/economics/
|Order Information:|| Email: |
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Bresnahan, Timothy F & Greenstein, Shane, 1999.
"Technological Competition and the Structure of the Computer Industry,"
Journal of Industrial Economics,
Wiley Blackwell, vol. 47(1), pages 1-40, March.
- Timothy F. Bresnahan & Shane Greenstein, 1997. "Technological Competition and the Structure of the Computer Industry," Working Papers 97028, Stanford University, Department of Economics.
- Ralph Rotte & Christoph Schmidt, 2003.
"On the production of victory: Empirical determinants of battlefield success in modern war,"
Defence and Peace Economics,
Taylor & Francis Journals, vol. 14(3), pages 175-192.
- Rotte, Ralph & Schmidt, Christoph M., 2002. "On the Production of Victory: Empirical Determinants of Battlefield Success in Modern War," IZA Discussion Papers 491, Institute for the Study of Labor (IZA).
- Grossman, Herschel I & Kim, Minseong, 1995. "Swords or Plowshares? A Theory of the Security of Claims to Property," Journal of Political Economy, University of Chicago Press, vol. 103(6), pages 1275-88, December.
- Intriligator, Michael D, 1975. "Strategic Considerations in the Richardson Model of Arms Races," Journal of Political Economy, University of Chicago Press, vol. 83(2), pages 339-53, April.
- John Sutton, 2001. "Technology and Market Structure: Theory and History," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262692643, June.
- Grossman, Herschel I, 1991. "A General Equilibrium Model of Insurrections," American Economic Review, American Economic Association, vol. 81(4), pages 912-21, September.
- Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
- Bruno S. Frey & Simon Luechinger, . "How to Fight Terrorism: Alternatives to Deterrence," IEW - Working Papers 137, Institute for Empirical Research in Economics - University of Zurich.
- Lapan, Harvey E. & Sandler, Todd, 1993.
"Terrorism and Signalling,"
Staff General Research Papers
10808, Iowa State University, Department of Economics.
- Collier, Paul & Hoeffler, Anke, 1998. "On Economic Causes of Civil War," Oxford Economic Papers, Oxford University Press, vol. 50(4), pages 563-73, October.
When requesting a correction, please mention this item's handle: RePEc:ukc:ukcedp:0411. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Tracey Girling)
If references are entirely missing, you can add them using this form.