In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models
Author
Abstract
Suggested Citation
DOI: 10.1111/risa.12422
Download full text from publisher
References listed on IDEAS
- Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
- Loewenstein, George, 1996. "Out of Control: Visceral Influences on Behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 65(3), pages 272-292, March.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- John C. Harsanyi, 2004. "Games with Incomplete Information Played by ÜBayesianÝ Players, I--III: Part I. The Basic Model&," Management Science, INFORMS, vol. 50(12_supple), pages 1804-1817, December.
- Pape, Robert A., 2003. "The Strategic Logic of Suicide Terrorism," American Political Science Review, Cambridge University Press, vol. 97(3), pages 343-361, August.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
- Lapan, Harvey E & Sandler, Todd, 1988.
"To Bargain or Not to Bargain: That Is the Question,"
American Economic Review, American Economic Association, vol. 78(2), pages 16-21, May.
- Lapan, Harvey E. & Sandler, Todd, 1988. "To Bargain or Not To Bargain: That Is The Question," ISU General Staff Papers 198805010700001154, Iowa State University, Department of Economics.
- Lapan, Harvey E. & Sandler, Todd, 1988. "To Bargain or Not to Bargain: That is the Question," Staff General Research Papers Archive 10817, Iowa State University, Department of Economics.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Bryan Caplan, 2006. "Terrorism: The relevance of the rational choice model," Public Choice, Springer, vol. 128(1), pages 91-107, July.
- Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Eli Berman & David Laitin, 2005. "Hard Targets: Theory and Evidence on Suicide Attacks," NBER Working Papers 11740, National Bureau of Economic Research, Inc.
- Raghunathan, Rajagopal & Pham, Michel Tuan, 1999. "All Negative Moods Are Not Equal: Motivational Influences of Anxiety and Sadness on Decision Making, , , , ," Organizational Behavior and Human Decision Processes, Elsevier, vol. 79(1), pages 56-77, July.
- Keeney,Ralph L. & Raiffa,Howard, 1993. "Decisions with Multiple Objectives," Cambridge Books, Cambridge University Press, number 9780521438834, September.
- Gregory L. Keeney & Detlof von Winterfeldt, 2010. "Identifying and Structuring the Objectives of Terrorists," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1803-1816, December.
- Peter J. Hammond, 1976. "Changing Tastes and Coherent Dynamic Choice," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 43(1), pages 159-173.
- George Loewenstein, 2000. "Emotions in Economic Theory and Economic Behavior," American Economic Review, American Economic Association, vol. 90(2), pages 426-432, May.
- Wright, William F. & Bower, Gordon H., 1992. "Mood effects on subjective probability assessment," Organizational Behavior and Human Decision Processes, Elsevier, vol. 52(2), pages 276-291, July.
- Isen, Alice M. & Geva, Nehemia, 1987. "The influence of positive affect on acceptable level of risk: The person with a large canoe has a large worry," Organizational Behavior and Human Decision Processes, Elsevier, vol. 39(2), pages 145-154, April.
- Ralph L. Keeney & Detlof von Winterfeldt, 2011. "A Value Model for Evaluating Homeland Security Decisions," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1470-1487, September.
- Gilberto Montibeller & Detlof von Winterfeldt, 2015. "Cognitive and Motivational Biases in Decision and Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 35(7), pages 1230-1251, July.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Bryan Caplan, 2001. "Rational Ignorance versus Rational Irrationality," Kyklos, Wiley Blackwell, vol. 54(1), pages 3-26, February.
- Arce, Daniel G. & Sandler, Todd, 2007. "Terrorist Signalling and the Value of Intelligence," British Journal of Political Science, Cambridge University Press, vol. 37(4), pages 573-586, October.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Khakzad, Nima & Reniers, Genserik, 2019. "Low-capacity utilization of process plants: A cost-robust approach to tackle man-made domino effects," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Vicki Bier, 2020. "The Role of Decision Analysis in Risk Analysis: A Retrospective," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2207-2217, November.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2012. "Modeling State-Dependent Priorities of Malicious Agents," Decision Analysis, INFORMS, vol. 9(2), pages 172-185, June.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Gilberto Montibeller & L. Alberto Franco & Ashley Carreras, 2020. "A Risk Analysis Framework for Prioritizing and Managing Biosecurity Threats," Risk Analysis, John Wiley & Sons, vol. 40(11), pages 2462-2477, November.
- González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
- E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
- Shu, Hui-Chu, 2010. "Investor mood and financial markets," Journal of Economic Behavior & Organization, Elsevier, vol. 76(2), pages 267-282, November.
- G. Quijano, Eduardo & RÃos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
- Robin L. Dillon & Vicki M. Bier & Richard Sheffield John & Abdullah Althenayyan, 2023. "Closing the Gap Between Decision Analysis and Policy Analysts Before the Next Pandemic," Decision Analysis, INFORMS, vol. 20(2), pages 109-132, June.
- Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:36:y:2016:i:4:p:666-680. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.