IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v36y2016i4p681-693.html
   My bibliography  Save this article

Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory

Author

Listed:
  • Jason R. W. Merrick
  • Philip Leclerc

Abstract

Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions.

Suggested Citation

  • Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
  • Handle: RePEc:wly:riskan:v:36:y:2016:i:4:p:681-693
    DOI: 10.1111/risa.12254
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12254
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12254?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Han Bleichrodt & Ulrich Schmidt & Horst Zank, 2009. "Additive Utility in Prospect Theory," Management Science, INFORMS, vol. 55(5), pages 863-873, May.
    2. Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
    3. Crawford, Vincent P., 1990. "Equilibrium without independence," Journal of Economic Theory, Elsevier, vol. 50(1), pages 127-154, February.
    4. Chateauneuf, Alain & Eichberger, Jurgen & Grant, Simon, 2007. "Choice under uncertainty with the best and worst in mind: Neo-additive capacities," Journal of Economic Theory, Elsevier, vol. 137(1), pages 538-567, November.
    5. H. V. Ravinder & Don N. Kleinmuntz & James S. Dyer, 1988. "The Reliability of Subjective Probabilities Obtained Through Decomposition," Management Science, INFORMS, vol. 34(2), pages 186-199, February.
    6. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    7. Michael H. Birnbaum, 2005. "Three New Tests of Independence That Differentiate Models of Risky Decision Making," Management Science, INFORMS, vol. 51(9), pages 1346-1358, September.
    8. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
    9. Tversky, Amos & Kahneman, Daniel, 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Springer, vol. 5(4), pages 297-323, October.
    10. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    11. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    12. Loomes, Graham & Sugden, Robert, 1982. "Regret Theory: An Alternative Theory of Rational Choice under Uncertainty," Economic Journal, Royal Economic Society, vol. 92(368), pages 805-824, December.
    13. Jonathan Shalev, 2000. "Loss aversion equilibrium," International Journal of Game Theory, Springer;Game Theory Society, vol. 29(2), pages 269-287.
    14. Hoffman, Elizabeth & McCabe, Kevin A & Smith, Vernon L, 1996. "On Expectations and the Monetary Stakes in Ultimatum Games," International Journal of Game Theory, Springer;Game Theory Society, vol. 25(3), pages 289-301.
    15. Henry Stott, 2006. "Cumulative prospect theory's functional menagerie," Journal of Risk and Uncertainty, Springer, vol. 32(2), pages 101-130, March.
    16. Quiggin, John, 1982. "A theory of anticipated utility," Journal of Economic Behavior & Organization, Elsevier, vol. 3(4), pages 323-343, December.
    17. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    18. Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
    19. Nagel, Rosemarie, 1995. "Unraveling in Guessing Games: An Experimental Study," American Economic Review, American Economic Association, vol. 85(5), pages 1313-1326, December.
    20. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    21. Herbert A. Simon, 1955. "A Behavioral Model of Rational Choice," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 69(1), pages 99-118.
    22. George E. Apostolakis & Douglas M. Lemon, 2005. "A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism," Risk Analysis, John Wiley & Sons, vol. 25(2), pages 361-376, April.
    23. David E. Bell, 1982. "Regret in Decision Making under Uncertainty," Operations Research, INFORMS, vol. 30(5), pages 961-981, October.
    24. Gregory L. Keeney & Detlof von Winterfeldt, 2010. "Identifying and Structuring the Objectives of Terrorists," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1803-1816, December.
    25. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    26. Daniel Kahneman, 2003. "Maps of Bounded Rationality: Psychology for Behavioral Economics," American Economic Review, American Economic Association, vol. 93(5), pages 1449-1475, December.
    27. Horst Zank, 2001. "Cumulative Prospect Theory for Parametric and Multiattribute Utilities," Mathematics of Operations Research, INFORMS, vol. 26(1), pages 67-81, February.
    28. Tianjun Feng & L. Robin Keller, 2006. "A Multiple-Objective Decision Analysis for Terrorism Protection: Potassium Iodide Distribution in Nuclear Incidents," Decision Analysis, INFORMS, vol. 3(2), pages 76-93, June.
    29. Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
    30. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    31. Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
    32. Birnbaum, Michael H., 2006. "Evidence against prospect theories in gambles with positive, negative, and mixed consequences," Journal of Economic Psychology, Elsevier, vol. 27(6), pages 737-761, December.
    33. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    34. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Natalie M. Scala & Allison C. Reilly & Paul L. Goethals & Michel Cukier, 2019. "Risk and the Five Hard Problems of Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 39(10), pages 2119-2126, October.
    2. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    3. Vicki Bier, 2020. "The Role of Decision Analysis in Risk Analysis: A Retrospective," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2207-2217, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    2. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    3. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    4. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    5. David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
    6. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    7. Andrea C. Hupman & Jay Simon, 2023. "The Legacy of Peter Fishburn: Foundational Work and Lasting Impact," Decision Analysis, INFORMS, vol. 20(1), pages 1-15, March.
    8. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    9. Meng, Jingyi & Webb, Craig S. & Zank, Horst, 2024. "Mixture independence foundations for expected utility," Journal of Mathematical Economics, Elsevier, vol. 111(C).
    10. Pedro Bordalo & Nicola Gennaioli & Andrei Shleifer, 2013. "Salience and Consumer Choice," Journal of Political Economy, University of Chicago Press, vol. 121(5), pages 803-843.
    11. Ulrich Schmidt & Horst Zank, 2012. "A genuine foundation for prospect theory," Journal of Risk and Uncertainty, Springer, vol. 45(2), pages 97-113, October.
    12. repec:cup:judgdm:v:16:y:2021:i:6:p:1324-1369 is not listed on IDEAS
    13. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
    14. Pedro Bordalo & Nicola Gennaioli & Andrei Shleifer, 2012. "Salience Theory of Choice Under Risk," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 127(3), pages 1243-1285.
    15. Graham Loomes & Ganna Pogrebna, 2014. "Testing for independence while allowing for probabilistic choice," Journal of Risk and Uncertainty, Springer, vol. 49(3), pages 189-211, December.
    16. Laurent Denant-Boemont & Olivier L’Haridon, 2013. "La rationalité à l'épreuve de l'économie comportementale," Revue française d'économie, Presses de Sciences-Po, vol. 0(2), pages 35-89.
    17. Aurélien Baillon & Han Bleichrodt & Alessandra Cillo, 2015. "A Tailor-Made Test of Intransitive Choice," Operations Research, INFORMS, vol. 63(1), pages 198-211, February.
    18. Sudeep Bhatia & Graham Loomes & Daniel Read, 2021. "Establishing the laws of preferential choice behavior," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 16(6), pages 1324-1369, November.
    19. Charles-Cadogan, G., 2018. "Losses loom larger than gains and reference dependent preferences in Bernoulli’s utility function," Journal of Economic Behavior & Organization, Elsevier, vol. 154(C), pages 220-237.
    20. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    21. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:36:y:2016:i:4:p:681-693. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.