Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat
Author
Abstract
Suggested Citation
DOI: 10.1111/risa.12624
Download full text from publisher
References listed on IDEAS
- Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
- Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
- Keeney,Ralph L. & Raiffa,Howard, 1993. "Decisions with Multiple Objectives," Cambridge Books, Cambridge University Press, number 9780521438834, October.
- Wright, George & Rowe, Gene & Bolger, Fergus & Gammack, John, 1994. "Coherence, Calibration, and Expertise in Judgmental Probability Forecasting," Organizational Behavior and Human Decision Processes, Elsevier, vol. 57(1), pages 1-25, January.
- Fearon, James D. & Laitin, David D., 1996. "Explaining Interethnic Cooperation," American Political Science Review, Cambridge University Press, vol. 90(4), pages 715-735, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Aditya Bhan & Tarun Kabiraj, 2020. "Terrorist Inter-Group Cooperation and Terror Activity," Group Decision and Negotiation, Springer, vol. 29(6), pages 1085-1106, December.
- Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
- Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
- Olga Špačková & Daniel Straub, 2015. "Cost‐Benefit Analysis for Optimization of Risk Protection Under Budget Constraints," Risk Analysis, John Wiley & Sons, vol. 35(5), pages 941-959, May.
- César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
- KARRI PASANEN & MIKKO KURTTILA & JOUNI PYKÄlÄINEN & JYRKI KANGAS & PEKKA LESKINEN, 2005. "Mesta — Non-Industrial Private Forest Owners' Decision-Support Environment For The Evaluation Of Alternative Forest Plans Over The Internet," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 4(04), pages 601-620.
- Indra de Soysa & Synøve Almås, 2019. "Does Ethnolinguistic Diversity Preclude Good Governance? A Comparative Study with Alternative Data, 1990‐2015," Kyklos, Wiley Blackwell, vol. 72(4), pages 604-636, November.
- Gerring, John & Thacker, Strom C. & Lu, Yuan & Huang, Wei, 2015. "Does Diversity Impair Human Development? A Multi-Level Test of the Diversity Debit Hypothesis," World Development, Elsevier, vol. 66(C), pages 166-188.
- Kazuya Yamamoto, 2015. "Mobilization, Flexibility of Identity, and Ethnic Cleavage," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 18(2), pages 1-8.
- Gerd Gigerenzer, 1997. "Bounded Rationality: Models of Fast and Frugal Inference," Swiss Journal of Economics and Statistics (SJES), Swiss Society of Economics and Statistics (SSES), vol. 133(II), pages 201-218, June.
- Shuang Liu & Kirsten Maclean & Cathy Robinson, 2019. "A cost-effective framework to prioritise stakeholder participation options," EURO Journal on Decision Processes, Springer;EURO - The Association of European Operational Research Societies, vol. 7(3), pages 221-241, November.
- Khaled, Oumaima & Minoux, Michel & Mousseau, Vincent & Michel, Stéphane & Ceugniet, Xavier, 2018. "A multi-criteria repair/recovery framework for the tail assignment problem in airlines," Journal of Air Transport Management, Elsevier, vol. 68(C), pages 137-151.
- Zhang, Tianyu & Dong, Peiwu & Zeng, Yongchao & Ju, Yanbing, 2022. "Analyzing the diffusion of competitive smart wearable devices: An agent-based multi-dimensional relative agreement model," Journal of Business Research, Elsevier, vol. 139(C), pages 90-105.
- Smith, Chris M. & Shaw, Duncan, 2019. "The characteristics of problem structuring methods: A literature review," European Journal of Operational Research, Elsevier, vol. 274(2), pages 403-416.
- Anirban Basu & William Dale & Arthur Elstein & David Meltzer, 2009. "A linear index for predicting joint health‐states utilities from single health‐states utilities," Health Economics, John Wiley & Sons, Ltd., vol. 18(4), pages 403-419, April.
- Letrouit,Lucie Michele Maya & Selod,Harris, 2020. "Trust or Property Rights ? Can Trusted Relationships Substitute for Costly Land Registration in West African Cities ?," Policy Research Working Paper Series 9310, The World Bank.
- Chorus, Caspar & van Cranenburgh, Sander & Daniel, Aemiro Melkamu & Sandorf, Erlend Dancke & Sobhani, Anae & Szép, Teodóra, 2021. "Obfuscation maximization-based decision-making: Theory, methodology and first empirical evidence," Mathematical Social Sciences, Elsevier, vol. 109(C), pages 28-44.
- Katharina Werner & Ahmed Skali, 2023.
"Violent Conflict and Parochial Trust: Lab-in-the-Field and Survey Evidence,"
HiCN Working Papers
404, Households in Conflict Network.
- Werner, Katharina & Skali, Ahmed, 2023. "Violent Conflict and Parochial Trust: Lab-in-the-Field and Survey Evidence," GLO Discussion Paper Series 1319, Global Labor Organization (GLO).
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:342-371. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.