Probabilistic Risk Analysis and Terrorism Risk
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2010.01401.x
Download full text from publisher
References listed on IDEAS
- Robert J. Aumann, 1995. "Repeated Games with Incomplete Information," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262011476, April.
- P. Jean-Jacques Herings & Ana Mauleon & Vincent J. Vannetelbosch, 2004.
"Fuzzy play, matching devices and coordination failures,"
International Journal of Game Theory, Springer;Game Theory Society, vol. 32(4), pages 519-531, August.
- Jean-Jacques HERINGS & Ana MAULEON & Vincent J. VANNETELBOSCH, 2000. "Fuzzy Play, Matching Devices and Coordination Failures," LIDAM Discussion Papers IRES 2001029, Université catholique de Louvain, Institut de Recherches Economiques et Sociales (IRES).
- HERINGS, Jean-Jacques & MAULEON , Ana & VANNETELBOSCH, Vincent J., 2003. "Fuzzy play, matching devices and coordination failures," LIDAM Reprints CORE 1717, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- P.Jean-Jacques Herings & Ana Mauleon & Vincent Vannetelbosch, 2002. "Fuzzy Play, Matching Devices and Coordination Faulures," Game Theory and Information 0205003, University Library of Munich, Germany.
- Herings, P.J.J. & Mauleon, Ana & Vannetelbosch, V.J., 2004. "Fuzzy play, matching devices and coordination failures," Other publications TiSEM fe0d2a3a-5c9b-497e-a521-3, Tilburg University, School of Economics and Management.
- Herings, P.J.J. & Mauleon, A. & Vannetelbosch, V., 2001. "Fuzzy play, matching devices and coordination failures," Research Memorandum 020, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
- Peter Borm & Herbert Hamers & Ruud Hendrickx, 2001.
"Operations research games: A survey,"
TOP: An Official Journal of the Spanish Society of Statistics and Operations Research, Springer;Sociedad de Estadística e Investigación Operativa, vol. 9(2), pages 139-199, December.
- Borm, P.E.M. & Hamers, H.J.M. & Hendrickx, R.L.P., 2001. "Operations Research Games : A Survey," Other publications TiSEM 04f265e0-8043-4d4f-bf27-2, Tilburg University, School of Economics and Management.
- Borm, P.E.M. & Hamers, H.J.M. & Hendrickx, R.L.P., 2001. "Operations Research Games : A Survey," Discussion Paper 2001-45, Tilburg University, Center for Economic Research.
- Borm, P.E.M. & Hamers, H.J.M. & Hendrickx, R.L.P., 2001. "Operations research games : A survey," Other publications TiSEM 755a430b-592f-400b-ba18-9, Tilburg University, School of Economics and Management.
- Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
- Lapan, Harvey E & Sandler, Todd, 1988.
"To Bargain or Not to Bargain: That Is the Question,"
American Economic Review, American Economic Association, vol. 78(2), pages 16-21, May.
- Lapan, Harvey E. & Sandler, Todd, 1988. "To Bargain or Not To Bargain: That Is The Question," ISU General Staff Papers 198805010700001154, Iowa State University, Department of Economics.
- Lapan, Harvey E. & Sandler, Todd, 1988. "To Bargain or Not to Bargain: That is the Question," Staff General Research Papers Archive 10817, Iowa State University, Department of Economics.
- William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
- Steven Plaut, 2004. "Misplaced Applications of Economic Theory to the Middle East," Public Choice, Springer, vol. 118(1_2), pages 11-24, January.
- H. Rosoff & D. Von Winterfeldt, 2007. "A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 533-546, June.
- John C. Harsanyi, 1967. "Games with Incomplete Information Played by "Bayesian" Players, I-III Part I. The Basic Model," Management Science, INFORMS, vol. 14(3), pages 159-182, November.
- Charles H. Anderton & John R. Carter, 2006.
"Applying Intermediate Microeconomics to Terrorism,"
The Journal of Economic Education, Taylor & Francis Journals, vol. 37(4), pages 442-458, October.
- Charles Anderton & John Carter, 2004. "Applying Intermediate Microeconomics to Terrorism," Working Papers 0412, College of the Holy Cross, Department of Economics.
- Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jan Schnellenbach, 2006.
"Appeasing nihilists? Some economic thoughts on reducing terrorist activity,"
Public Choice, Springer, vol. 129(3), pages 301-313, December.
- Jan Schnellenbach, 2005. "Appeasing Nihilists? Some Economic Thoughts on Reducing Terrorist Activity," Law and Economics 0507001, University Library of Munich, Germany.
- Jérôme Renault & Xavier Venel, 2017.
"Long-Term Values in Markov Decision Processes and Repeated Games, and a New Distance for Probability Spaces,"
Mathematics of Operations Research, INFORMS, vol. 42(2), pages 349-376, May.
- Jérôme Renault & Xavier Venel, 2017. "Long-term values in Markov Decision Processes and Repeated Games, and a new distance for probability spaces," PSE-Ecole d'économie de Paris (Postprint) hal-01396680, HAL.
- Jérôme Renault & Xavier Venel, 2017. "Long-term values in Markov Decision Processes and Repeated Games, and a new distance for probability spaces," Post-Print hal-01396680, HAL.
- Jérôme Renault & Xavier Venel, 2017. "Long-term values in Markov Decision Processes and Repeated Games, and a new distance for probability spaces," Université Paris1 Panthéon-Sorbonne (Post-Print and Working Papers) hal-01396680, HAL.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
- Guilhem Lecouteux, 2018.
"Bayesian game theorists and non-Bayesian players,"
The European Journal of the History of Economic Thought, Taylor & Francis Journals, vol. 25(6), pages 1420-1454, November.
- Guilhem Lecouteux, 2017. "Bayesian Game Theorists and Non-Bayesian Players," GREDEG Working Papers 2017-30, Groupe de REcherche en Droit, Economie, Gestion (GREDEG CNRS), Université Côte d'Azur, France, revised Jul 2018.
- Guilhem Lecouteux, 2018. "Bayesian Game Theorists and non-Bayesian Players," Working Papers halshs-01633126, HAL.
- Guilhem Lecouteux, 2018. "Bayesian Game Theorists and Non-Bayesian Players," Post-Print halshs-01941773, HAL.
- Wang, Jia & Ni, Shunjiang & Shen, Shifei & Li, Shuying, 2019. "Empirical study of crowd dynamic in public gathering places during a terrorist attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1-9.
- Michael Macgregor Perry & Hadi El-Amine, 2021. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Papers 2110.12572, arXiv.org.
- Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
- David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Anderton,Charles H. & Carter,John R., 2009.
"Principles of Conflict Economics,"
Cambridge Books,
Cambridge University Press, number 9780521875578, December.
- Anderton,Charles H. & Carter,John R., 2009. "Principles of Conflict Economics," Cambridge Books, Cambridge University Press, number 9780521698658, December.
- Michael Perry & Hadi El-Amine, 2019. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Decision Analysis, INFORMS, vol. 16(4), pages 314-332, December.
- Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
- Misha Gavrilovich & Victoria Kreps, 2018. "Games with Symmetric Incomplete Information and Asymmetric Computational Resources," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(02), pages 1-16, June.
- Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Ashkenazi-Golan, Galit & Rainer, Catherine & Solan, Eilon, 2020. "Solving two-state Markov games with incomplete information on one side," Games and Economic Behavior, Elsevier, vol. 122(C), pages 83-104.
- Alejandro Melo Ponce, 2018. "The Secret Behind The Tortoise and the Hare: Information Design in Contests," 2018 Papers pme809, Job Market Papers.
- Roger B. Myerson, 2004. "Comments on "Games with Incomplete Information Played by 'Bayesian' Players, I--III Harsanyi's Games with Incoplete Information"," Management Science, INFORMS, vol. 50(12_supple), pages 1818-1824, December.
- Robin L. Dillon & Genevieve Lester & Richard S. John & Catherine H. Tinsley, 2012. "Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate," Risk Analysis, John Wiley & Sons, vol. 32(4), pages 713-728, April.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:30:y:2010:i:4:p:575-589. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.