当前位置: X-MOL 学术Journal of Applied Security Research › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment
Journal of Applied Security Research ( IF 1.1 ) Pub Date : 2021-05-06 , DOI: 10.1080/19361610.2021.1908814
Donald Douglas Atsa’am 1 , Ruth Wario 1
Affiliation  

Abstract

This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.



中文翻译:

通过猎鹿博弈论环境采用分而治之的策略,在反恐中使用恐怖分子

摘要

本研究将分而治之策略与猎鹿游戏交织在一起,以模拟恐怖主义和反恐环境。全球恐怖主义数据库的记录显示,从1970年到2018年,98%的恐怖袭击事件都是针对守法公民/设施的,而2%是针对恐怖分子的。提出了三种分而治之的策略:破坏通信渠道、行贿和煽动恐怖组织之间的不信任。当这些战略得到实施时,恐怖分子将被有效地用作反恐的工具。因此,对公民的袭击将减少,而对恐怖分子的袭击将增加。

更新日期:2021-05-06
down
wechat
bug