Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Counterterrorism, a game-theoretic analysis (Daniel G

.).pdf
Скачиваний:
24
Добавлен:
28.06.2014
Размер:
111.28 Кб
Скачать

 

 

 

 

EU

 

 

 

EU

 

 

 

Freeze

 

Does not

 

 

Retaliate

Does not

 

 

 

Freeze

4,4

 

1,3

 

Retaliate

 

4,3

2,4

 

US

 

 

 

 

 

US

 

 

 

 

 

 

Does not

3,1

 

2,2

Does not

 

3,1

1,2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a. Freezing assets: weakest link

b. Retaliation:

asymmetric dominance

 

 

 

 

EU

 

 

 

EU

 

 

Gather

 

Does not

 

 

Infiltrate

Does not

 

Gather

 

2,2

 

4,3

 

Infiltrate

 

2,2

3,4

US

 

 

 

 

 

US

 

 

 

 

Does not

 

3,4

 

1,1

Does not

 

4,3

1,1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

c. Intelligence:

hero

 

 

d. Infiltration:

leader

 

Figure 6. Some alternative proactive policies and their ordinal game forms

Table 1 Policy Choices and Underlying Games

Policies

Alternative Game Forms

Proactive Policies

 

Preemption

Prisoner’s Dilemma, chicken, assurance (threshold),

 

coordination (best shot), asymmetric dominance

Freezing assets

Prisoner’s Dilemma, chicken, asymmetric dominance,

 

assurance (weakest link)

Retaliation

Prisoner’s Dilemma, chicken, assurance (threshold),

 

coordination (best shot), asymmetric dominance

Group Infiltration

Leader, asymmetric dominance

Intelligence

Hero, asymmetric dominance

New technological barriers

Coordination (best shot)

 

 

Defensive Policies

 

Deterrence

Prisoner’s Dilemma (deterrence race)

Hardening targets

Prisoner’s Dilemma (fortification race)

Shoring up weakest link

Prisoner’s Dilemma, chicken, asymmetric dominance