Terrorism experiments

被引:29
作者
Arce, Daniel G. [1 ]
Croson, Rachel T. A. [1 ]
Eckel, Catherine C. [2 ]
机构
[1] Univ Texas Dallas, Negotiat Ctr, Richardson, TX 75083 USA
[2] Univ Texas Dallas, Ctr Behav & Expt Econ Sci, Richardson, TX 75083 USA
基金
美国国家科学基金会;
关键词
conflict experiments; counterterrorism game; interdependent security; terrorism experiments; PROFESSIONALS PLAY MINIMAX; LABORATORY EXPERIMENTATION; COLONEL-BLOTTO; PUBLIC-GOODS; ECONOMICS; PUNISHMENT; BACKLASH; RISKS; GAMES;
D O I
10.1177/0022343310391502
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Experimental research has a long-established tradition in psychology and sociology, and a more recent but important history as a useful methodology in economics. In this article, we discuss the strengths and weaknesses of experiments as a method for studying terrorism and other national security topics. For example, given the paucity of data on counterterror policy decisions by governments, as well as for planning, targeting and selecting methods of attack by terrorist organizers, the experimental approach can substitute for this lack of field data. Experiments can also identify policy counterfactuals that might otherwise be unobservable. Hence, we begin by discussing several theoretical themes in the analysis of terrorism: interdependent security games such as airline screening; the dual nature of pre-emptive versus deterrent counterterror policies and the implications of this duality for policy coordination among targeted nations; the resurgence of interest in Colonel Blotto games when properly adjusted to reflect the asymmetric conflict between target governments and terrorist groups; and the relationship between terrorist activity and extreme punishments (or vendettas). The small but emerging literature using experiments to examine these issues is reviewed, paying particular attention to how experimental results can inform theory and policy. Finally, we propose new directions for researchers to explore.
引用
收藏
页码:373 / 382
页数:10
相关论文
共 70 条
[31]   Modeling interdependent risks [J].
Heal, Greoffrey ;
Kunreuther, Howard .
RISK ANALYSIS, 2007, 27 (03) :621-634
[32]   Coordination of strategic responses to security threats: Laboratory evidence [J].
Hess, Rachel O. ;
Holt, Charles A. ;
Smith, Angela M. .
EXPERIMENTAL ECONOMICS, 2007, 10 (03) :235-250
[33]  
Kagel J.H., 1995, HDB EXPT EC
[34]  
Kearns M., 2004, ADV NEURAL INFORM PR, V16
[35]   Reciprocity Is Not Give and Take: Asymmetric Reciprocity to Positive and Negative Acts [J].
Keysar, Boaz ;
Converse, Benjamin A. ;
Wang, Jiunwen ;
Epley, Nicholas .
PSYCHOLOGICAL SCIENCE, 2008, 19 (12) :1280-1286
[36]   Interdependent security [J].
Kunreuther, H ;
Heal, G .
JOURNAL OF RISK AND UNCERTAINTY, 2003, 26 (2-3) :231-249
[37]  
Kunreuther H, 2009, JUDGM DECIS MAK, V4, P363
[38]  
LAPAN HE, 1988, AM ECON REV, V78, P16
[39]  
Lapan HE., 1993, European Journal of Political Economy, V9, P383
[40]   Effects of fear and anger on perceived risks of terrorism: A national field experiment [J].
Lerner, JS ;
Gonzalez, RM ;
Small, DA ;
Fischhoff, B .
PSYCHOLOGICAL SCIENCE, 2003, 14 (02) :144-150