Abstract
In this paper, terrorism is analysed using the tools of modern portfolio theory. This approach permits the analysis of the returns that a terrorist group can expect from their activities as well as the risk they face. The analysis sheds new light on the nature of the terrorist group’s (attack method) choice set and the efficiency properties of that set. If terrorist groups are, on average, more risk averse, the economist can expect the terrorist group to exhibit a bias towards bombing and armed attack. In addition, even the riskiest (from the terrorist group’s point of view) combinations of attack methods have maximum expected returns of less than 70 injuries and fatalities per attack per year.
ACKNOWLEDGMENTS
The author would like to thank Dr Glenda Adkins and two anonymous referees for suggestions that greatly improved this paper.
Notes
1 See Anderton and Carter (Citation2005, Citation2006) for a discussion of the utility maximisation model applied to terrorism.
2 And the application of analytical tools developed in finance or financial economics to the analysis of terrorism and terrorist behaviour (see Phillips, Citation2005). Although of peripheral relevance, this paper also adds to the literature on price and substitution effects (Faria, Citation2006; Frey and Luechinger, Citation2003).
4 An economic good is something that is desired but which costs something to obtain. In this case, it is usually assumed to be political power and resources or a monetary equivalent.
5 Completeness: given situations A and B an individual can always specify if A is preferred to B, B is preferred to A or A and B are equally attractive; Transitivity: if A is preferred to B and B to C, then A is preferred to C; Continuity: if A is preferred to B then a situation suitably close to A is preferred to B.
6 Return on Attack Type
7 Also see Phillips (Citation2005) and, for different perspective, Faria (Citation2006).
8 Assuming that successful (unsuccessful) attacks increase (decrease) the terrorist’s resources and that these resources are ‘reinvested’ in the same successful (unsuccessful) attack methods. See Enders and Sandler (Citation2002).