Revenge or continued attack and defense in defender-attacker conflicts

Abstract Existing literature has demonstrated that exacting revenge can have a self-deterrence effect and a value of revenge effect. The former means that each player will decrease effort when competing for a resource because of fear of a rival’s revenge while the latter implies that each player will increase effort in the revenge period. Moreover, the self-deterrence effect could outweigh the value of revenge effect, implying that revenge could be helpful in stabilizing conflicts, a phenomenon known as the paradox of revenge. We re-examine the two effects and the paradox of revenge in defender–attacker conflicts, considering a scenario in which a defender (and only the defender) who was attacked in the first period takes revenge on the attacker in the subsequent period. We demonstrate that whether or not these results hold, depends on how much the defender values revenge and the difference between the two players’ efficiencies of effort. More interestingly, we show that a sufficiently large revenge value for the defender can deter an attack from the attacker in the first place.

[1]  S. Skaperdas Contest success functions , 1996 .

[2]  Kjell Hausken,et al.  Whether to attack a terrorist's resource stock today or tomorrow , 2008, Games Econ. Behav..

[3]  Mario Gollwitzer,et al.  What gives victims satisfaction when they seek revenge , 2011 .

[4]  Subhayu Bandyopadhyay,et al.  The Interplay between Preemptive and Defensive Counterterrorism Measures: A Two‐Stage Game , 2008 .

[5]  Kjell Hausken,et al.  Defending against multiple different attackers , 2011, Eur. J. Oper. Res..

[6]  H. Pringle Crow Creek's Revenge , 1998, Science.

[7]  Roger Hartley,et al.  Asymmetric contests with general technologies , 2005 .

[8]  Todd Sandler,et al.  Terrorists versus the Government , 2006 .

[9]  Gregory Levitin,et al.  Defence resource distribution between protection and decoys for constant resource stockpiling pace , 2013, J. Oper. Res. Soc..

[10]  Ronald A. Howard,et al.  Analysis of National Strategies to Counter a Country's Nuclear Weapons Program , 2011, Decis. Anal..

[11]  Kjell Hausken,et al.  Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..

[12]  J. Atsu Amegashie,et al.  The Paradox of Revenge in Conflicts , 2008 .

[13]  William E. Stein,et al.  Asymmetric Rent-Seeking with More than Two Contestants , 2002 .

[14]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[15]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[16]  Kjell Hausken,et al.  Strategic defense and attack of series systems when agents move sequentially , 2011 .

[17]  Marie-Elisabeth Paté-Cornell Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations , 2012, Decis. Anal..

[18]  N. Long The theory of contests: A unified model and review of the literature , 2013 .

[19]  Mario Gollwitzer,et al.  What makes revenge sweet: Seeing the offender suffer or delivering a message? , 2009 .

[20]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[21]  L. Skitka,et al.  Motivated and displaced revenge: Remembering 9/11 suppresses opposition to military intervention in Syria (for some). , 2015 .

[22]  Kjell Hausken,et al.  Defense and attack for interdependent systems , 2017, Eur. J. Oper. Res..

[23]  N. Chagnon,et al.  Life Histories, Blood Revenge, and Warfare in a Tribal Population , 1988, Science.

[24]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[25]  T. Sandler,et al.  A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.

[26]  M. Ross,et al.  The Benefits, Costs, and Paradox of Revenge , 2010 .

[27]  National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision , 2012 .

[28]  Kjell Hausken Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..

[29]  D. D. de Quervain,et al.  The Neural Basis of Altruistic Punishment , 2004, Science.

[30]  P. Liberman Retributive Support for International Punishment and Torture , 2013 .

[31]  J. Derksen,et al.  Revenge: An Analysis of Its Psychological Underpinnings. , 2015, International journal of offender therapy and comparative criminology.

[32]  B. Bushman,et al.  Vicarious Revenge and the Death of Osama bin Laden , 2014, Personality & social psychology bulletin.

[33]  G. Tullock Efficient Rent Seeking , 2001 .

[34]  G. Carruthers Making sense of spousal revenge filicide , 2016 .

[35]  N. Frijda The laws of emotion. , 1988, The American psychologist.

[36]  Dmitry Ryvkin Heterogeneity of Players and Aggregate Effort in Contests , 2013 .

[37]  H. Aliyev,et al.  Blood Revenge and Violent Mobilization: Evidence from the Chechen Wars , 2015, International Security.

[38]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[39]  Brian Knutson,et al.  Sweet Revenge? , 2004, Science.