Two Against One: Deterrence in the Triad

F. Zagare
{"title":"Two Against One: Deterrence in the Triad","authors":"F. Zagare","doi":"10.1515/peps-2023-0050","DOIUrl":null,"url":null,"abstract":"Abstract This essay explores a deterrence relationship between one defender and two challengers that are interconnected game-theoretically but are otherwise acting independently. In the double deterrence game model, the primary challenger makes the first move, defender, the second, and the secondary challenger makes its move only after the defender and the primary challenger have made their choices. In other words, the threat of the secondary challenger is both latent and contingent. There are four types of defenders, and three types of the two challengers. These preference assumptions define 36 distinct strategic environments, or games. These games are analyzed under both complete and incomplete information. The results are highly sensitive to the specific combination of player types. Deterrence is most likely to succeed when a defender’s threat is highly credible, and to fail when it is low. The secondary challenger is most likely to have an impact on play only at intermediate levels of the defender’s and the primary challenger’s credibility. Assuming a rising challenger, or a declining defender, or both, a danger zone will exist just prior to, or immediately after, the primary challenger has achieved parity with the defender, that is, when a balance of capabilities exists. The principal aim of a defender of the status quo facing two challengers acting independently should be on preventing a challenge by its primary opponent. This conclusion is robust no matter what configuration of player types one assumes.","PeriodicalId":509287,"journal":{"name":"Peace Economics, Peace Science and Public Policy","volume":"8 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peace Economics, Peace Science and Public Policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/peps-2023-0050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract This essay explores a deterrence relationship between one defender and two challengers that are interconnected game-theoretically but are otherwise acting independently. In the double deterrence game model, the primary challenger makes the first move, defender, the second, and the secondary challenger makes its move only after the defender and the primary challenger have made their choices. In other words, the threat of the secondary challenger is both latent and contingent. There are four types of defenders, and three types of the two challengers. These preference assumptions define 36 distinct strategic environments, or games. These games are analyzed under both complete and incomplete information. The results are highly sensitive to the specific combination of player types. Deterrence is most likely to succeed when a defender’s threat is highly credible, and to fail when it is low. The secondary challenger is most likely to have an impact on play only at intermediate levels of the defender’s and the primary challenger’s credibility. Assuming a rising challenger, or a declining defender, or both, a danger zone will exist just prior to, or immediately after, the primary challenger has achieved parity with the defender, that is, when a balance of capabilities exists. The principal aim of a defender of the status quo facing two challengers acting independently should be on preventing a challenge by its primary opponent. This conclusion is robust no matter what configuration of player types one assumes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
二对一:三合会的威慑力
摘要 本文探讨了一个防御者和两个挑战者之间的威慑关系,这两个挑战者在博弈论上相互关联,但在其他方面却独立行动。在双重威慑博弈模型中,主要挑战者先行动,防御者后行动,而次要挑战者只有在防御者和主要挑战者做出选择后才行动。换句话说,次要挑战者的威胁既是潜在的,也是偶然的。防御者有四种类型,两个挑战者有三种类型。这些偏好假设定义了 36 种不同的战略环境或博弈。这些博弈是在完全信息和不完全信息条件下进行分析的。结果对玩家类型的具体组合非常敏感。当防御方的威胁可信度较高时,威慑最有可能成功,而当可信度较低时,威慑最有可能失败。只有在防御者和主要挑战者可信度处于中间水平时,次要挑战者才最有可能对游戏产生影响。假设挑战者实力上升,或防守者实力下降,或两者兼而有之,那么在主要挑战者与防守者实力相当之前或之后,也就是在双方实力平衡时,就会出现一个危险区。面对两个独立行动的挑战者,维持现状的防御者的主要目标应该是防止主要对手的挑战。无论假设玩家类型的配置如何,这一结论都是可靠的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Does Fiscal Decentralization Mitigate Domestic Terrorism? UN Peacekeeping Forces and Peace Negotiations in Africa The Military Expenditure – Economic Growth Nexus Revisited: Evidence from the United Kingdom Group Grievances, Opportunity, and the Onset of Civil War: Some Theory and Tests of Competing Mechanisms, 1990–2017 Why Americans Support Strict Counterterrorism Measures: Examining the Relationship between Concern about Terrorism and Public Support for Counterterrorism
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1