恐怖袭击事件中博弈双方高度不对称和存在认知差异,误对策方法提供了合适的分析框架.本文运用误对策分析方法剖析 了恐怖袭击事件中政府反恐力量与恐怖分子的认知差异,并分析了不同情境下策略冲突的平衡结局.由于双方认知偏差 可能导致不存在纯策略纳什均衡,而混合均衡进一步加大了策略的不确定性,安全策略采取“安全第一”的原则使决策者避免最大风险, 相对于纳什均衡更合适作为存在认知差异的误对策问题的均衡分析方法.在实践操作角度上,恐怖袭击二阶误对策模型的平衡 结局为恐怖分子发动的恐怖袭击行动将被挫败,因此提出提高反恐效能的政策建议,即发动社会民众提供反恐情报和预警线索, 提高民众反恐意识.
Abstract
Terrorism attack has the asymmetry between both parties and the cognitive difference, so hypergame analysis provides a suitable analytical framework. This paper applies the hypergame analysis method to the cognitive difference in terrorism attack between government anti-terrorism forces and terrorists, and analyzes the equilibrium outcome of strategies conflict among the different scenarios. Because the cognitive difference of two parties maybe result that the hypergame model has not pure strategy Nash equilibrium, and mix equilibrium further increases the strategic uncertainty, security strategy takes the "safety-first" principle to avoid the maximal risk, which is more suitable to analyze the hypergame problem with cognitive difference than Nash equilibrium, as a new equilibrium analysis method. From the viewpoint of practical operation, the equilibrium outcome of the second-order hypergame model of terrorism attack shows that the terrorism attack should be frustrated. The paper provides some advices to improve the anti-terrorism policy efficiency by the extended analysis of hypergame model, which is government encourages the public to provide the intelligences and warnings, improve the anti-terrorism awareness of the public.
关键词
误对策 /
恐怖主义 /
认知差异 /
安全策略 /
情报预警
{{custom_keyword}} /
Key words
hypergame /
terrorism /
cognitive difference /
security strategy /
early warning intelligence
{{custom_keyword}} /
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 谢玮, 张璐晶. 民众如何反恐?[J]. 中国经济周刊, 2014(22): 32-35.Xie Wei, Zhang Lujing. How do the public conduct counter-terror operations?[J]. China Economic Weekly, 2014(22): 32-35.
[2] Lehto M. Indirect responsibility for terrorist acts: Redefinition of the concept of terrorism beyond violent acts[M]. Martinus Nijhoff Publishers, 2009.
[3] 范维澄. 国家突发公共事件应急管理中科学问题的思考和建议[J]. 中国科学基金, 2007(2): 71-76.Fan Weicheng. Advisement and suggestion to scientific problems of emergency management for public incidents[J]. Science Foundation in China, 2007(2): 71-76.
[4] 张辉, 刘奕. 基于"情景-应对"的国家应急平台体系基础科学问题与集成平台[J]. 系统工程理论与实践, 2012, 32(5): 947-953.Zhang Hui, Liu Yi. Key problem on fundamental science and technology integration in "scenario-response" based national emergency response platform system[J]. Systems Engineering - Theory & Practice, 2012, 32(5): 947-953.
[5] 杨春贵. 正确处理不同类型的人民内部矛盾[J]. 学习时报, 2007年7月2日, 第3版.Yang Chungui. Correctly handle different types of contradictions among the people[J]. Study Times, 2007-7-2, 3.
[6] 刘德海, 苏烨. 群体性突发事件调解、预警和防御的情景优化模型[J]. 系统工程理论与实践, 2014, 34(10): 2609-2618.Liu Dehai, Su Ye. Scenario optimal model of social mediation, information warning and police deploy in mass incident[J]. Systems Engineering - Theory & Practice, 2014, 34(10): 2609-2618.
[7] Faure G O, Zartman W I. Negotiating with terrorists: Strategy, tactics, and politics[M]. Routledge, 2010.
[8] 高扩. 反恐法有望年内正式出台[N]. 齐鲁晚报, 2014-6-15, A6版.Gao Kuo. Anti terrorism Law is expected to be formally introduced during the year[N]. Qilu Evening News, 2014-6-15, A6.
[9] Sandler T, Enders W. An economic perspective on transnational terrorism[J]. European Journal of Political Economy, 2004, 302(20): 301-316.
[10] Jain S, Mukand S W. The economics of high-visibility terrorism[J]. European Journal of Political Economy, 2004, 480(20): 479-494.
[11] 付举磊, 孙多勇, 肖进, 等. 基于社会网络分析理论的恐怖组织网络研究综述[J]. 系统工程理论与实践, 2013, 33(9): 2177-2186.Fu Julei, Sun Duoyong, Xiao Jin, et al. Review of the research on the terrorist networks based on social network analysis[J]. Systems Engineering - Theory & Practice, 2013, 33(9): 2177-2186.
[12] Ressler S. Social network analysis as an approach to combat terrorism: Past, present, and future research[J]. Homeland Security Affairs, 2006, 2(2): 1-10.
[13] Pinker E J. An analysis of short-term responses to threats of terrorism[J]. Management Science, 2007, 53(6): 865-880.
[14] Ghaffarzadegan N, Andersen D F. Modeling behavioral complexities of warning issuance for domestic security: A simulation approach to develop public management theories[J]. International Public Management Journal, 2012, 15(3): 337-363.
[15] Zhuang J, Bier V M. Balancing terrorism and natural disasters - defensive strategy with endogenous attack effort[J]. Operations Research, 2007, 55(5): 976-991.
[16] Wang X, Zhuang J. Balancing congestion and security in the presence of strategic applicants with private information[J]. European Journal of Operational Research, 2011, 212(1): 100-111.
[17] Zhuang J, Bier V M, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game[J]. European Journal of Operational Research, 2010, 203(2): 409-418.
[18] Bennett P G. Toward a theory of hypergame[J]. Omega, 1977, 5(4): 749-751.
[19] Bennett P G, Dando M R, Sharp R G. Using hypergames to model difficult social issues: An approach to the case of soccer hooliganism[J]. The Journal of the Operational Research Society, 1980, 31(7): 621-635.
[20] Said A K, Hartley D A. A hypergame approach to crisis decision-making: The 1973 Middle East War[J]. The Journal of the Operational Research Society, 1982, 33(10): 937-948.
[21] Kanazawa T, Ushio T, Yamasaki T. Replicator dynamics of evolutionary hypergames[J]. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2007, 37(1): 132-138.
[22] 舒江, 段建新, 刘德铭. 超对策理论的改进及应用[J]. 系统工程理论与实践, 1994, 14(9): 49-52.Shu Jiang, Duan Jianxin, Liu Deming. The extension of hypergame analysis and its application[J]. Systems Engineering - Theory & Practice, 1994, 14(9): 49-52.
[23] 马燕, 罗力生. 昆明:开展24小时配枪巡逻[N]. 人民公安报, 2014-5-4, 第4版.Ma Yan, Luo Lisheng. Kunming: Conduct 24 hours revolver patrols[N]. China Public Daily, 2014-5-4, 4.
[24] 胡锦洋, 王盼盼, 王晓雄. 昆明暴恐案更多内幕被披露[N]. 环球时报, 2014-3-6, 第3版.Hu Jinyang, Wang Panpan, Wang Xiaoxiong. Kunming violent fear more insider case was disclosed[N]. Global Times, 2014-3-6, 3.
[25] 桂田田. 反恐升级, 严密布阵图如何勾画?[N]. 北京青年报, 2014-5-12, 第A5版.Gui Tiantian. Terrorism upgrade, how to sketch strict lineup figure?[N]. Beijing Youth Daily, 2014-5-12, A5.
[26] Montet C, Serra D. Game theory and economics[M]. Palgrave Macmillan, 2003.
[27] Von Neumann J. On the theory of game strategy[M]// Tucker A W, Luce R D. Contribution to the Theory of Games. Princeton University Press, 1959.
[28] 王晨. 恐怖组织"负责"的背后[J]. 华声, 2014, 176(10): 68-69.Wang Chen. Behind the terrorist organization "responsible"[J]. Peanuts' Voice, 2014, 176(10): 68-69.
[29] 严帅. 警惕"东突"暴恐新动向[J]. 瞭望, 2014, 10: 46-49.Yan Shuai. Vigilance "East Turkistan" terrorist violence new trend[J]. Look, 2014, 10: 46-49.
[30] 朱江明. 我们的情报工作出了哪些问题?[J]. 南方人物周刊, 2014, 8: 24-25.Zhu Jiangming. What is the problem of our intelligence work?[J]. Southern People Weekly, 2014, 8: 24-25.
[31] Ghaffarzadegan N, Andersen D F. Modeling behavioral complexities of warning issuance for domestic security: A simulation approach to develop public management theories[J]. International Public Management Journal, 2012, 15(3): 337-363.
{{custom_fnGroup.title_cn}}
脚注
{{custom_fn.content}}
基金
国家自然科学基金面上项目(71271045, 71571033);东北财经大学学科建设 支持计划特色学科项目(XKT-201411);东北财经大学科研创新团队培育与扶持计划国际合作研究支持项目(DUFE2015GY03)
{{custom_fund}}