{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:50:06Z","timestamp":1770965406455,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,1,22]],"date-time":"2011-01-22T00:00:00Z","timestamp":1295654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s10479-010-0833-8","type":"journal-article","created":{"date-parts":[[2011,1,21]],"date-time":"2011-01-21T07:18:58Z","timestamp":1295594338000},"page":"39-59","source":"Crossref","is-referenced-by-count":32,"title":["Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures"],"prefix":"10.1007","volume":"186","author":[{"given":"Vicki M.","family":"Bier","sequence":"first","affiliation":[]},{"given":"Kjell","family":"Hausken","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,22]]},"reference":[{"key":"833_CR1","volume-title":"Repeated games with incomplete information","author":"R. Aumann","year":"1995","unstructured":"Aumann, R., & Maschler, M. (1995). Repeated games with incomplete information. Cambridge: MIT Press."},{"key":"833_CR2","author":"S. Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, S., & Sandler, T. (2011). The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica. doi: 10.1111\/j.1468-0335.2009.00823.x .","journal-title":"Economica"},{"key":"833_CR3","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1111\/j.1467-9779.2007.00320.x","volume":"9","author":"V. M. Bier","year":"2007","unstructured":"Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563\u2013587.","journal-title":"Journal of Public Economic Theory"},{"key":"833_CR4","volume-title":"Varieties of pacifism: A survey from antiquity to the outset of the twentieth century","author":"P. Brock","year":"1999","unstructured":"Brock, P. (1999). Varieties of pacifism: A survey from antiquity to the outset of the twentieth century. New York: Syracuse University Press."},{"key":"833_CR5","volume-title":"Ghost: confessions of a counterterrorism agent","author":"F. Burton","year":"2008","unstructured":"Burton, F. (2008). Ghost: confessions of a counterterrorism agent. New York: Random House."},{"key":"833_CR6","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/1014052.1014066","volume-title":"Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining","author":"N. Dalvi","year":"2004","unstructured":"Dalvi, N., Domingos, P., Mausam, M., Sanghai, S., & Verma, D. (2004). Adversarial classification. In Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining, Seattle, WA (pp.\u00a099\u2013108)."},{"key":"833_CR7","unstructured":"Dirks, T. (1969), Review of \u201cButch Cassidy and the Sundance Kid (1969)\u201d, http:\/\/www.filmsite.org\/butc3.html ."},{"key":"833_CR8","volume-title":"Research on terrorism: trends, achievements and failures","author":"W. Enders","year":"2004","unstructured":"Enders, W., & Sandler, T. (2004). What do we know about the substitution effect in transnational terrorism. In A. Silke & G. Ilardi (Eds.), Research on terrorism: trends, achievements and failures. London: Frank Cass."},{"key":"833_CR9","doi-asserted-by":"crossref","DOI":"10.4337\/9781845421465","volume-title":"Dealing with terrorism: stick or carrot","author":"B. S. Frey","year":"2004","unstructured":"Frey, B. S. (2004). Dealing with terrorism: stick or carrot. Northampton: Edward Elgar."},{"key":"833_CR10","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/1024269032000052923","volume":"14","author":"B. S. Frey","year":"2003","unstructured":"Frey, B. S., & Luechinger, S. (2003). How to fight terrorism: alternatives to deterrence. Defense and Peace Economics, 14, 237\u2013249.","journal-title":"Defense and Peace Economics"},{"key":"833_CR11","volume-title":"The counter-terrorism puzzle: a guide for decision makers","author":"B. Ganor","year":"2005","unstructured":"Ganor, B. (2005). The counter-terrorism puzzle: a guide for decision makers. New Brunswick: Transaction Publishers."},{"key":"833_CR12","first-page":"45","volume":"120","author":"E. L. Glaeser","year":"2005","unstructured":"Glaeser, E. L. (2005). The political economy of hatred. Quarterly Journal of Economics, 120, 45\u201386.","journal-title":"Quarterly Journal of Economics"},{"key":"833_CR13","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.jaccpubpol.2006.09.001","volume":"25","author":"K. Hausken","year":"2006","unstructured":"Hausken, K. (2006). Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 629\u2013665.","journal-title":"Journal of Accounting and Public Policy"},{"key":"833_CR14","volume-title":"Leviathan","author":"T. Hobbes","year":"1651","unstructured":"Hobbes, T. (1651). Leviathan. London: Dent."},{"key":"833_CR15","volume-title":"Inside terrorism","author":"B. Hoffman","year":"1998","unstructured":"Hoffman, B. (1998). Inside terrorism. New York: Columbia University Press."},{"key":"833_CR16","unstructured":"Hoffman, B. (2001), All you need is love, The Atlantic, http:\/\/www.theatlantic.com\/doc\/200112\/hoffman ."},{"key":"833_CR17","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1086\/261974","volume":"103","author":"J. Hirshleifer","year":"1995","unstructured":"Hirshleifer, J. (1995). Anarchy and its breakdown. Journal of Political Economy, 103, 26\u201352.","journal-title":"Journal of Political Economy"},{"key":"833_CR18","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1023\/A:1024167124083","volume":"26","author":"N. Keohane","year":"2003","unstructured":"Keohane, N., & Zeckhauser, R. J. (2003). The ecology of terror defense. Journal of Risk and Uncertainty, 26, 201\u2013229.","journal-title":"Journal of Risk and Uncertainty"},{"key":"833_CR19","doi-asserted-by":"crossref","first-page":"1891","DOI":"10.1016\/j.jpubeco.2004.06.008","volume":"89","author":"D. Lakdawalla","year":"2005","unstructured":"Lakdawalla, D., & Zanjani, G. (2005). Insurance, self-protection, and the economics of terrorism. Journal of Public Economics, 89, 1891\u20131905.","journal-title":"Journal of Public Economics"},{"issue":"1","key":"833_CR20","first-page":"160","volume":"37","author":"A. Lutfi","year":"2001","unstructured":"Lutfi, A. (2001). Blowback: China and the Afghan Arabs. Issues and Studies, 37(1), 160\u2013214.","journal-title":"Issues and Studies"},{"key":"833_CR21","unstructured":"Obama, B. H. 2009. The Nobel peace prize lecture, Oslo, December 10, 2009, http:\/\/nobelprize.org\/nobel_prizes\/peace\/laureates\/2009\/obama-lecture_en.html ."},{"key":"833_CR22","volume-title":"The prince","author":"N. Machiavelli","year":"1492","unstructured":"Machiavelli, N. (1492). The prince. Cambridge: Cambridge University Press."},{"issue":"2","key":"833_CR23","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1163\/157180606778968290","volume":"11","author":"D. G. Pruitt","year":"2006","unstructured":"Pruitt, D. G. (2006). Negotiation with terrorists. International Negotiation, 11(2), 371\u2013394.","journal-title":"International Negotiation"},{"key":"833_CR24","first-page":"267","volume":"73","author":"S. C. Salop","year":"1983","unstructured":"Salop, S. C., & Scheffman, D. T. (1983). Raising rivals\u2019 costs. American Economic Review, 73, 267\u2013271.","journal-title":"American Economic Review"},{"key":"833_CR25","unstructured":"Sandler, T., Arce, D. G., & Enders, W. (2008). Copenhagen consensus 2008 challenge paper: terrorism."},{"key":"833_CR26","volume-title":"The strategy of conflict","author":"T. Schelling","year":"1960","unstructured":"Schelling, T. (1960). The strategy of conflict. Cambridge: Harvard University Press."},{"key":"833_CR27","volume-title":"Micromotives and macrobehavior","author":"T. Schelling","year":"1978","unstructured":"Schelling, T. (1978). Micromotives and macrobehavior. New York: Norton."},{"key":"833_CR28","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","volume":"7","author":"S. Skaperdas","year":"1996","unstructured":"Skaperdas, S. (1996). Contest success functions. Economic Theory, 7, 283\u2013290.","journal-title":"Economic Theory"},{"issue":"1","key":"833_CR29","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1571-9979.1998.tb00147.x","volume":"14","author":"B. I. Spector","year":"1998","unstructured":"Spector, B. I. (1998). Deciding to negotiate with villains. Negotiation Journal, 14(1), 43\u201359.","journal-title":"Negotiation Journal"},{"issue":"3","key":"833_CR30","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1163\/1571806031310770","volume":"8","author":"B. I. Spector","year":"2003","unstructured":"Spector, B. I. (2003). Negotiating with villains revisited: research note. International Negotiation, 8(3), 616\u2013626.","journal-title":"International Negotiation"},{"key":"833_CR31","unstructured":"Tzu, S. (320 Before Christ). The art of war. Translated by Griffith, S.B. (1963). London: Oxford University Press."},{"key":"833_CR32","volume-title":"The theory of industrial organization","author":"J. Tirole","year":"1989","unstructured":"Tirole, J. (1989). The theory of industrial organization. New York: MIT Press."},{"key":"833_CR33","first-page":"224","volume":"5","author":"G. Tullock","year":"1967","unstructured":"Tullock, G. (1967). The welfare costs of tariffs, monopolies, and theft. Western Economic Journal, 5, 224\u2013232.","journal-title":"Western Economic Journal"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-010-0833-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-010-0833-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-010-0833-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:08:04Z","timestamp":1559138884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-010-0833-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,22]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["833"],"URL":"https:\/\/doi.org\/10.1007\/s10479-010-0833-8","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,22]]}}}