Modeling Values for Anti‐Terrorism Analysis
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2007.00910.x
Download full text from publisher
References listed on IDEAS
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Peter C. Fishburn, 1965. "Markovian Dependence in Utility Theory with Whole Product Sets," Operations Research, INFORMS, vol. 13(2), pages 238-257, April.
- Peter C. Fishburn, 1965. "Independence in Utility Theory with Whole Product Sets," Operations Research, INFORMS, vol. 13(1), pages 28-45, February.
- Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
- Daniel Kahneman & Amos Tversky, 2013.
"Prospect Theory: An Analysis of Decision Under Risk,"
World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127,
World Scientific Publishing Co. Pte. Ltd..
- Kahneman, Daniel & Tversky, Amos, 1979. "Prospect Theory: An Analysis of Decision under Risk," Econometrica, Econometric Society, vol. 47(2), pages 263-291, March.
- Amos Tversky & Daniel Kahneman, 1979. "Prospect Theory: An Analysis of Decision under Risk," Levine's Working Paper Archive 7656, David K. Levine.
- Ralph L. Keeney & Robin S. Gregory, 2005. "Selecting Attributes to Measure the Achievement of Objectives," Operations Research, INFORMS, vol. 53(1), pages 1-11, February.
- Keeney,Ralph L. & Raiffa,Howard, 1993. "Decisions with Multiple Objectives," Cambridge Books, Cambridge University Press, number 9780521438834, October.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Viscusi, W Kip & Zeckhauser, Richard J, 2003.
"Sacrificing Civil Liberties to Reduce Terrorism Risks,"
Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
- Viscusi, W. Kip & Zeckhauser, Richard, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Working Paper Series rwp03-017, Harvard University, John F. Kennedy School of Government.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
- G. Quijano, Eduardo & RÃos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
- Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
- Robin Gregory & Ralph L. Keeney, 2017. "A Practical Approach to Address Uncertainty in Stakeholder Deliberations," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 487-501, March.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Gilberto Montibeller & Detlof von Winterfeldt, 2015. "Cognitive and Motivational Biases in Decision and Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 35(7), pages 1230-1251, July.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Pauline Vorjohann, 2023. "Reference-dependent choice bracketing," Discussion Papers 2309, University of Exeter, Department of Economics.
- Doctor, Jason N. & Miyamoto, John & Bleichrodt, Han, 2009. "When are person tradeoffs valid?," Journal of Health Economics, Elsevier, vol. 28(5), pages 1018-1027, September.
- Ralph L. Keeney & Detlof von Winterfeldt, 2011. "A Value Model for Evaluating Homeland Security Decisions," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1470-1487, September.
- Gordon B. Hazen, 2007. "Adding Extrinsic Goals to the Quality-Adjusted Life Year Model," Decision Analysis, INFORMS, vol. 4(1), pages 3-16, March.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Gerd Gigerenzer, 1997. "Bounded Rationality: Models of Fast and Frugal Inference," Swiss Journal of Economics and Statistics (SJES), Swiss Society of Economics and Statistics (SSES), vol. 133(II), pages 201-218, June.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Carland, Corinne & Goentzel, Jarrod & Montibeller, Gilberto, 2018. "Modeling the values of private sector agents in multi-echelon humanitarian supply chains," European Journal of Operational Research, Elsevier, vol. 269(2), pages 532-543.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Yuval Rottenstreich & Alex Markle & Johannes Müller-Trede, 2023. "Risky Sure Things," Management Science, INFORMS, vol. 69(8), pages 4707-4720, August.
- He, Ying & Dyer, James S. & Butler, John C. & Jia, Jianmin, 2019. "An additive model of decision making under risk and ambiguity," Journal of Mathematical Economics, Elsevier, vol. 85(C), pages 78-92.
- Huber, Joel & Viscusi, W. Kip & Bell, Jason, 2008. "Reference dependence in iterative choices," Organizational Behavior and Human Decision Processes, Elsevier, vol. 106(2), pages 143-152, July.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:27:y:2007:i:3:p:585-596. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.