×

Self-managing terror: resolving agency problems with diverse teams. (English) Zbl 1478.91106

Summary: I examine a principal-agents model of subversion with externalities to illustrate a novel mechanism for why diversity can be valuable to organizations: teams of diverse agents can self-manage and discourage their teammates from subversion through compromise. In contrast to standard “ally-principle” type results, I find that integrating more extreme agents can result in better-behaved teams. The model describes, among other cases, radical Islamist terror groups that use foreign fighters. Because foreign and domestic fighters have conflicting preferences over how they want to subvert, integrated teams may self-manage with efficiency gains for the principal. This model explains variation in agency problems and foreign fighter usage in major insurgent groups, including al Qaeda in Iraq, the Haqqani Network, and the Islamic State. Additionally, the theory here can explain management practices in a wide range of alternate settings, for example, where a busy or constrained principal cannot easily implement auditing or incentive contracts.

MSC:

91B43 Principal-agent models

References:

[1] Adams, R. B.; Hermalin, B. E.; Weisbach, M. S., The role of boards of directors in corporate governance: a conceptual framework and survey, J. Econ. Lit., 48, 58-107 (2010)
[2] Al-Tamimi, A.J., 2015a. The ISIS papers: a masterplan for consolidating power.
[3] Al-Tamimi, A.J., 2015b. The Islamic state ‘masterplan’ of administration - some analytical notes.
[4] Baccara, M.; Bar-Isaac, H., How to organize crime, Rev. Econ. Stud., 75, 1039-1067 (2008) · Zbl 1144.91306
[5] Baccara, M.; Yariv, L., Choosing peers: homophily and polarization in groups, J. Econ. Theory, 165, 152-178 (2016) · Zbl 1371.91139
[6] Bahney, B. W.; Iyengar, R. K.; Johnston, P. B.; Jung, D. F.; Shapiro, J. N.; Shatz, H. J., Insurgent compensation: evidence from Iraq, Am. Econ. Rev., 103, 518-522 (2013)
[7] Bathala, C. T.; Rao, R. P., The determinants of board composition: an agency theory perspective, Manag. Decis. Econ., 16, 59-69 (1995)
[8] Battaglini, M., Multiple referrals and multidimensional cheap talk, Econometrica, 1379-1401 (2002) · Zbl 1137.91329
[9] Bendor, J.; Glazer, A.; Hammond, T., Theories of delegation, Annu. Rev. Pol. Sci., 4, 235-269 (2001)
[10] Bendor, J.; Meirowitz, A., Spatial models of delegation, Am. Polit. Sci. Rev., 293-310 (2004)
[11] Berman, E., Religious, Radical, Violent (2009), The MIT Press
[12] Berman, E.; Laitin, D. D., Religion, terrorism and public goods: testing the club model, J. Public Econ., 92, 1942-1967 (2008)
[13] Bertelli, A.; Feldmann, S. E., Strategic appointments, J. Public Adm. Res. Theory, 17, 19-38 (2007)
[14] Beyerlein, M. M.; Johnson, D. A., Advances in Interdisciplinary Studies of Work Teams, vol. 1 (1994), Elsevier Science/JAI Press
[15] Biddle, S.; Friedman, J. A.; Shapiro, J. N., Testing the surge: why did violence decline in Iraq in 2007?, Int. Secur., 37, 7-40 (2012)
[16] Blanc, J.-B., The Pirates of Somalia: Ending the Threat, Rebuilding a Nation, International Bank for Reconstruction and Development (2013), The World Bank
[17] Bonatti, A.; Rantakari, H., The politics of compromise, Am. Econ. Rev., 106, 229-259 (2016)
[18] Brown, V.; Rassler, D., Fountainhead of Jihad (2013), Hurst & Company: Hurst & Company London
[19] Bubb, R.; Warren, P. L., Optimal agency bias and regulatory review, J. Leg. Stud., 43, 95-135 (2014)
[20] Caparini, M.; Hwang, J., Police reform in northern Ireland: achievements and future challenges, Stockholm Int. Peace Res. Inst. (2019)
[21] Chai, S., An organizational economics theory of antigovernment violence, Comp. Polit., 99-110 (1993)
[22] Che, Y.; Yoo, S., Optimal incentives for teams, Am. Econ. Rev., 91, 525-541 (2001)
[23] CTC, Analysis of the State of ISI (2007), Combating Terrorism Center: Combating Terrorism Center West Point, NY, Tech. Rep.
[24] CTC, Letter from Abu Hamza to Ansar al-Sunnah Highlighting Divisions s between Abu Hamza and a member of al-Ansar (2007), Combating Terrorism Center: Combating Terrorism Center West Point, NY, Tech. Rep.
[25] CTC, Letters to the Leadership of ISI about Issues of Single-party Control (2007), Combating Terrorism Center: Combating Terrorism Center West Point, NY, Tech. Rep.
[26] Dewatripont, M.; Tirole, J., Advocates, J. Polit. Econ., 107, 1-39 (1999)
[27] Dressler, J. A., The Haqqani Network: From Pakistan to Afghanistan (2010), Institute for the Study of War
[28] Enders, W.; Jindapon, P., Network externalities and the structure of terror networks, J. Confl. Resolut., 54, 262-280 (2010)
[29] Felter, J.; Fishman, B., Al-qa’ida’s foreign fighters in Iraq: a first look at the sinjar records (2007), Tech. Rep., DTIC Document
[30] Fishman, B., Dysfunction and decline: Lessons learned from inside al-Qa’ida in Iraq (2009), Tech. Rep., DTIC Document
[31] Fishman, B., The Master Plan: ISIS, al Qaeda, and the Jihadi Strategy for Final Victory (2016), Yale University Press
[32] Gailmard, S.; Hammond, T., Intercameral bargaining and intracameral organization in legislatures, J. Polit., 73, 535-546 (2011)
[33] Gates, S., Recruitment and allegiance the microfoundations of rebellion, J. Confl. Resolut., 46, 111-130 (2002)
[34] Gates, S.; Podder, S., Social media, recruitment, allegiance and the Islamic state, Perspectives on Terrorism, 9, 107-116 (2015)
[35] Gibbons, R.; Roberts, J., The Handbook of Organizational Economics (2012), Princeton University Press
[36] Gilligan, T. W.; Krehbiel, K., Asymmetric information and legislative rules with a heterogeneous committee, Am. J. Polit. Sci., 459-490 (1989)
[37] Grillo, I., Gangster Warlords: Drug Dollars, Killing Fields, and the New Politics of Latin America (2016), Bloomsbury Publishing
[38] Hafez, M. M., Tactics, takfir and anti-muslim violence, (Self-Inflicted Wounds: Debates and Division in Al Qaeda and Its Periphery (2010)), 19-44
[39] Hamid, M.; Farrall, L., The Arabs at War in Afghanistan (2015), Hurst
[40] Hegghammer, T., The rise of muslim foreign fighters: Islam and the globalization of Jihad, Int. Secur., 35, 53-94 (2010)
[41] Hegghammer, T., Should I stay or should I go? Explaining variation in western Jihadists’ choice between domestic and foreign fighting, Am. Polit. Sci. Rev., 107, 1-15 (2013)
[42] Hirsch, A. V.; Shotts, K. W., Competitive policy development, Am. Econ. Rev., 105, 1646-1664 (2015)
[43] Holmstrom, B., Moral hazard in teams, Bell J. Econ., 324-340 (1982)
[44] Holmstrom, B.; Milgrom, P., Regulating trade among agents, J. Inst. Theor. Econ., 146, 85-105 (1990)
[45] Holmstrom, B.; Milgrom, P., Multitask principal-agent analyses: incentive contracts, asset ownership, and job design, J. Law Econ. Organ., 7, 24-52 (1991)
[46] Hong, L.; Page, S. E., Problem solving by heterogeneous agents, J. Econ. Theory, 97, 123-163 (2001) · Zbl 1013.91030
[47] Jackson, M. O.; Wilkie, S., Endogenous games and mechanisms: side payments among players, Rev. Econ. Stud., 72, 543-566 (2005) · Zbl 1121.91013
[48] Kalyvas, S., The Logic of Violence in Civil War, Cambridge Studies in Comparative Politics (2006), Cambridge University Press
[49] Kalyvas, S. N., Warfare in civil wars, (Kalyvas, Stathis N., Rethinking the Nature of War (2005), Routledge), 99-119
[50] Kalyvas, S. N.; Balcells, L., International system and technologies of rebellion: how the end of the cold war shaped internal conflict, Am. Polit. Sci. Rev., 415-429 (2010)
[51] Kirdar, M., Al Qaeda in Iraq (2011), Center for Strategic and International Studies
[52] Lazear, E. P., Globalisation and the market for team-mates, Econ. J., C15-C40 (1999)
[53] Lilleby, L. W., The Haqqani network: pursuing feuds under the guise of jihad?, CTX Global Ecco, 3 (2013)
[54] Maciag, M., Where police don’t mirror communities and why it matters, Governing (2015)
[55] McChrystal, G. S., My Share of the Task: A Memoir (2013), Penguin
[56] Moghadam, A.; Fishman, B., Self-Inflicted Wounds: Debates and Divisions Within al-Qaeda and its Periphery (2010), Combating Terrorism Center: Combating Terrorism Center West Point, NY, Tech. Rep.
[57] Pettersson, T.; Öberg, M., Organized violence, 1989-2019, J. Peace Res., 57, 597-613 (2020)
[58] Ramsey, C.H., Robinson, L.O., 2015. President’s task force on 21st century policing.
[59] Scahill, J., The purge: how Somalia’s al shabaab turned against its own foreign fighters, Intercept (2015)
[60] Schram, P., Managing insurgency, J. Confl. Resolut. (2019)
[61] Segal, I., Contracting with externalities, Q. J. Econ., 114, 337-388 (1999) · Zbl 0953.91026
[62] Shapiro, J., Formal approaches to the study of terrorism, (Chenoweth, E.; English, R.; Gofas, A.; Kalyvas, S. N., The Oxford Handbook of Terrorism (2019), Oxford University Press: Oxford University Press Oxford), 148-162, Chap. 10
[63] Shapiro, J. N., The Terrorists Dilemma: Managing Violent Covert Organizations (2013), Princeton University Press
[64] Shapiro, J. N.; Siegel, D., Underfunding in terrorist organizations, Int. Stud. Q., 51, 405-429 (2007)
[65] Shapiro, J. N.; Siegel, D. A., Moral hazard, discipline, and the management of terrorist organizations, World Polit., 64, 39-78 (2012)
[66] Tirole, J., Hierarchies and bureaucracies: on the role of collusion in organizations, J. Law Econ. Organ., 2, 181-214 (1986)
[67] Trotsky, L., 1905 (1971), Penguin: Penguin Harmondsworth
[68] Weinstein, J. M., Inside Rebellion: The Politics of Insurgent Violence (2006), Cambridge University Press
[69] Weiss, M., How ISIS picks its suicide bombers, Daily Beast Website, 16 (2015)
[70] Whiteside, C., New masters of revolutionary warfare: the Islamic state movement (2002-2016), Perspectives on Terrorism, 10, 4-18 (2016)
[71] Wilson, J. Q., Bureaucracy: What Government Agencies Do and Why They Do It (1989), Basic Books
[72] Yeatts, D.E., Hyten, C., 1998. High-performing self-managed work teams: a comparison of theory to practice. Sage.
[73] Zedong, M., Problems of war and strategy, Sel. Works, 2, 224 (1938)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.