Hostname: page-component-7d684dbfc8-hsbzg Total loading time: 0 Render date: 2023-09-23T07:27:38.363Z Has data issue: false Feature Flags: { "corePageComponentGetUserInfoFromSharedSession": true, "coreDisableEcommerce": false, "coreDisableSocialShare": false, "coreDisableEcommerceForArticlePurchase": false, "coreDisableEcommerceForBookPurchase": false, "coreDisableEcommerceForElementPurchase": false, "coreUseNewShare": true, "useRatesEcommerce": true } hasContentIssue false

Moral Hazard, Discipline, and the Management of Terrorist Organizations

Published online by Cambridge University Press:  20 December 2011

Jacob N. Shapiro
David A. Siegel
Get access


Terrorist groups repeatedly include operatives of varying commitment and often rely on a common set of security-reducing bureaucratic tools to manage these individuals. This is puzzling in that covert organizations are commonly thought to screen their operatives very carefully and pay a particularly heavy price for record keeping. The authors use terrorist memoirs and the internal correspondence of one particularly prominent group to highlight the organizational challenges terrorist groups face and use a game-theoretic model of moral hazard in a finitely sized organization to explain why record keeping and bureaucracy emerge in these groups. The model provides two novel results. First, in small heterogeneous organizations longer institutional memory can enhance organizational efficiency. Second, such organizations will use worse agents in equilibrium under certain conditions. The core logic is that in small organizations the punishment strategies that allow leaders to extract greater effort are credible only when operatives can identify and react to deviations from the leaders' equilibrium strategy. This dynamic creates incentives for record keeping and means that small organizations will periodically use problematic agents in equilibrium as part of a strategy that optimally motivates their best operatives.

Research Article
Copyright © Trustees of Princeton University 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)