954
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

APPLYING MODERN PORTFOLIO THEORY TO THE ANALYSIS OF TERRORISM. COMPUTING THE SET OF ATTACK METHOD COMBINATIONS FROM WHICH THE RATIONAL TERRORIST GROUP WILL CHOOSE IN ORDER TO MAXIMISE INJURIES AND FATALITIES

Pages 193-213 | Received 14 Mar 2007, Accepted 07 Jan 2008, Published online: 09 Jul 2009
 

Abstract

In this paper, terrorism is analysed using the tools of modern portfolio theory. This approach permits the analysis of the returns that a terrorist group can expect from their activities as well as the risk they face. The analysis sheds new light on the nature of the terrorist group’s (attack method) choice set and the efficiency properties of that set. If terrorist groups are, on average, more risk averse, the economist can expect the terrorist group to exhibit a bias towards bombing and armed attack. In addition, even the riskiest (from the terrorist group’s point of view) combinations of attack methods have maximum expected returns of less than 70 injuries and fatalities per attack per year.

JEL Codes:

ACKNOWLEDGMENTS

The author would like to thank Dr Glenda Adkins and two anonymous referees for suggestions that greatly improved this paper.

Notes

1 See Anderton and Carter (Citation2005, Citation2006) for a discussion of the utility maximisation model applied to terrorism.

2 And the application of analytical tools developed in finance or financial economics to the analysis of terrorism and terrorist behaviour (see Phillips, Citation2005). Although of peripheral relevance, this paper also adds to the literature on price and substitution effects (Faria, Citation2006; Frey and Luechinger, Citation2003).

4 An economic good is something that is desired but which costs something to obtain. In this case, it is usually assumed to be political power and resources or a monetary equivalent.

5 Completeness: given situations A and B an individual can always specify if A is preferred to B, B is preferred to A or A and B are equally attractive; Transitivity: if A is preferred to B and B to C, then A is preferred to C; Continuity: if A is preferred to B then a situation suitably close to A is preferred to B.

6 Return on Attack Type

7 Also see Phillips (Citation2005) and, for different perspective, Faria (Citation2006).

8 Assuming that successful (unsuccessful) attacks increase (decrease) the terrorist’s resources and that these resources are ‘reinvested’ in the same successful (unsuccessful) attack methods. See Enders and Sandler (Citation2002).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 417.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.