IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v27y2007i3p585-596.html
   My bibliography  Save this article

Modeling Values for Anti‐Terrorism Analysis

Author

Listed:
  • Ralph L. Keeney

Abstract

Decisions are made to achieve objectives. A qualitative list of the objectives for a decision is the foundation for a value model that unambiguously represents objectives in a quantitative manner. The objectives guide thinking and the value model provides a basis for analyzing alternatives to best meet the desired objectives. This article illustrates the usefulness of clearly identifying objectives and developing value models to support anti‐terrorism analysis. It outlines procedures to develop value models for the Department of Homeland Security and for terrorist organizations. The later is useful to both design anti‐terrorism alternatives and suggest possible terrorist priorities and actions. An example that develops a terrorist value model for the theft and misuse of plutonium is presented. Several uses of value models for anti‐terrorist activities are discussed and suggestions for developing such value models are outlined.

Suggested Citation

  • Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
  • Handle: RePEc:wly:riskan:v:27:y:2007:i:3:p:585-596
    DOI: 10.1111/j.1539-6924.2007.00910.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2007.00910.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2007.00910.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    2. Peter C. Fishburn, 1965. "Markovian Dependence in Utility Theory with Whole Product Sets," Operations Research, INFORMS, vol. 13(2), pages 238-257, April.
    3. Peter C. Fishburn, 1965. "Independence in Utility Theory with Whole Product Sets," Operations Research, INFORMS, vol. 13(1), pages 28-45, February.
    4. Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
    5. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    6. Ralph L. Keeney & Robin S. Gregory, 2005. "Selecting Attributes to Measure the Achievement of Objectives," Operations Research, INFORMS, vol. 53(1), pages 1-11, February.
    7. Keeney,Ralph L. & Raiffa,Howard, 1993. "Decisions with Multiple Objectives," Cambridge Books, Cambridge University Press, number 9780521438834, October.
    8. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    9. Viscusi, W Kip & Zeckhauser, Richard J, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    2. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    3. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    4. Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    2. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    3. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    4. Robin Gregory & Ralph L. Keeney, 2017. "A Practical Approach to Address Uncertainty in Stakeholder Deliberations," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 487-501, March.
    5. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    6. Gilberto Montibeller & Detlof von Winterfeldt, 2015. "Cognitive and Motivational Biases in Decision and Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 35(7), pages 1230-1251, July.
    7. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    8. Pauline Vorjohann, 2023. "Reference-dependent choice bracketing," Discussion Papers 2309, University of Exeter, Department of Economics.
    9. Doctor, Jason N. & Miyamoto, John & Bleichrodt, Han, 2009. "When are person tradeoffs valid?," Journal of Health Economics, Elsevier, vol. 28(5), pages 1018-1027, September.
    10. Ralph L. Keeney & Detlof von Winterfeldt, 2011. "A Value Model for Evaluating Homeland Security Decisions," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1470-1487, September.
    11. Gordon B. Hazen, 2007. "Adding Extrinsic Goals to the Quality-Adjusted Life Year Model," Decision Analysis, INFORMS, vol. 4(1), pages 3-16, March.
    12. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    13. Gerd Gigerenzer, 1997. "Bounded Rationality: Models of Fast and Frugal Inference," Swiss Journal of Economics and Statistics (SJES), Swiss Society of Economics and Statistics (SSES), vol. 133(II), pages 201-218, June.
    14. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    15. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    16. Carland, Corinne & Goentzel, Jarrod & Montibeller, Gilberto, 2018. "Modeling the values of private sector agents in multi-echelon humanitarian supply chains," European Journal of Operational Research, Elsevier, vol. 269(2), pages 532-543.
    17. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    18. Yuval Rottenstreich & Alex Markle & Johannes Müller-Trede, 2023. "Risky Sure Things," Management Science, INFORMS, vol. 69(8), pages 4707-4720, August.
    19. He, Ying & Dyer, James S. & Butler, John C. & Jia, Jianmin, 2019. "An additive model of decision making under risk and ambiguity," Journal of Mathematical Economics, Elsevier, vol. 85(C), pages 78-92.
    20. Huber, Joel & Viscusi, W. Kip & Bell, Jason, 2008. "Reference dependence in iterative choices," Organizational Behavior and Human Decision Processes, Elsevier, vol. 106(2), pages 143-152, July.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:27:y:2007:i:3:p:585-596. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.