Hostname: page-component-cd9895bd7-dk4vv Total loading time: 0 Render date: 2024-12-23T19:55:22.374Z Has data issue: false hasContentIssue false

Arms Control Verification and Other Games Involving Imperfect Detection

Published online by Cambridge University Press:  01 August 2014

Donald Wittman
Affiliation:
University of CaliforniaSanta Cruz

Abstract

This article presents an analysis of the strategic behavior of countries when there is imperfect verification of an arms control agreement. It provides a framework for determining whether an arms control agreement is desirable, shows which factors are needed for the agreement to be maintained in the absence of third-party enforcers, and develops propositions relating changes in verification capabilities to changes in the likelihood of cheating and the use of verification technology. These propositions yield several paradoxes of information (for example, the better the verification technology, the less often it will be employed). Since the analysis incorporates both simultaneous and sequential moves by the players, it provides new insights into other applied areas as well as game theory.

Type
Articles
Copyright
Copyright © American Political Science Association 1989

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aspin, Les, and Kaplan, Fred M.. 1980. “Verification in Perspective.” In Verification and SALT, ed. Potter, William C.. Boulder: Westview.Google Scholar
Becker, Gary S. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76:169–93.Google Scholar
Brams, Steven, and Davis, Morton. 1987. “The Verification Problem in Arms Control: A Gametheoretic Analysis.” In Communication and Interaction in Global Politics, ed. Cioffi-Revilla, Claudio, Merritt, Richard L., and Zinnes, Dina A.. Beverly Hills: Sage.Google Scholar
Brams, Steven, and Kilgour, D. Mark. 1986. “Notes on Arms-Control Verification: A Game Theoretic Analysis.” In Modeling and Analysis in Arms Control, ed. Avenhaus, Rudolph, Huber, Reiner K., and Kettelle, John D.. Berlin: Springer-Verlag.Google Scholar
Brams, Steven, and Kilgour, D. Mark. 1988. Game Theory and National Security. New York: Basil Blackwell.Google Scholar
Davis, Morton, and Kuhn, Harold. 1963. “The Probability of Test Ban Violations and Optimal Strategies for Inspection.” In Applications of Statistical Methodology to Arms Control and Disarmament. Report to Arms Control and Disarmament Agency. Contract no. ACDA/ST-3. Princeton: Mathematica.Google Scholar
Earle, Ralph. 1986. “Verification Issues from the Point of View of the Negotiator.” In Arms Control Verification: The Technology That Makes It Possible, ed. Tsipis, Kostas, Hafemeister, David W., and Janeway, P.. Washington: Pergamon-Brassey.Google Scholar
Fichtner, J. 1986. “On Concepts for Solving Two-Person Games Which Model the Verification Problems in Arms Control.” In Modeling and Analysis in Arms Control, ed. Avenhaus, Rudolph A., Huber, Reiner K., and Kettelle, John D.. Berlin: Springer-Verlag.Google Scholar
Harsanyi, John. 1967. “A Gametheoretical Analysis of Arms Control and Disarmament Problems.” In Development of Utility Theory fen' Arms Control and Disarmament: Models of Gradual Reduction of Arms. Report to Arms Control and Disarmament Agency. Contract no. ACDA/ST-116. Princeton: Mathematica.Google Scholar
Hirshleifer, Jack. 1987. “The Economic Approach to Conflict.” In Economic. Imperialism: The Economic Approach Applied outside the Field of Economics, ed. Radnitzky, Gerald and Bernholz, Peter. New York: Paragon.Google Scholar
Katz, Amrom. 1980. “The Fabric of Verification.” In Verification and SALT, ed. Potter, William C.. Boulder: Westview.Google Scholar
Kennedy, John F. 1963. “Nuclear Test Ban Treaty.” Hearings Before the U.S. Congress Senate Committee on Foreign Relations, 88th Cong., 1st sess.Google Scholar
Kuhn, Harold. 1963. “Recursive Inspection Games.” In Applications of Statistical Methodology to Arms Control and Disarmament. Report to Arms Control and Disarmament Agency. Contract no. ACDA/ST-3. Princeton: Mathematica.Google Scholar
McGuire, Martin C. 1965. Secrecy and the Arms Race. Cambridge: Harvard University Press.Google Scholar
Maschler, Michael. 1963. “A Non-Zero Sum Game Related to a Test Ban Treaty.” In Applications of Statistical Methodology to Arms Control and Disarmament. Report to Arms Control and Disarmament Agency. Contract no. ACDA/ST-3. Princeton: Mathematica.Google Scholar
Nash, John F. 1951. “Non-cooperative Games.” Annals of Mathematics 54:286–95.Google Scholar
O'Neill, Barry. 1988. “Imperfect Verification in Arms Control.” Northwestern University. Typescript.Google Scholar
Polinsky, A. Mitchell, and Shavell, Steven. 1979. “The Optimal Tradeoff between the Probability and Magnitude of Fines.” American Economic Review 69:880–91.Google Scholar
Richelson, Jeffrey T. 1979. “Multiple Aimpoint Basing.” Journal of Conflict Resolution 23:613–28.CrossRefGoogle Scholar
Stiglitz, Joseph E., and Weiss, Andrew. 1983. “Incentive Effects of Terminations: Applications to the Credit and Labor Markets.” American Economic Review 73:912–27.Google Scholar
Tsipis, Kostas, Hafemeister, David W., and Janeway, P.. 1986. Arms Control Verification: The Technology That Makes It Possible. Washington: Pergamon-Brassey.Google Scholar
Williamson, Oliver E. 1983. “Credible Commitments: Using Hostages To Support Exchange.” American Economic Review 73:519–40.Google Scholar
Wittman, Donald A. 1979. “How a War Ends.” Journal of Conflict Resolution 23:743–63.CrossRefGoogle Scholar
Wittman, Donald A. 1987. Arms Control Verification and Other Games Involving Detection and Signaling. University of California, Santa Cruz. Applied Economics Working Paper.Google Scholar
Submit a response

Comments

No Comments have been published for this article.