Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources
Author
Abstract
Suggested Citation
DOI: 10.1002/sys.21309
Download full text from publisher
References listed on IDEAS
- Edouard Kujawski & Mariana L. Alvaro & William R. Edwards, 2004. "Incorporating psychological influences in probabilistic cost analysis," Systems Engineering, John Wiley & Sons, vol. 7(3), pages 195-216.
- R. J. Aumann & M. Maschler, 1972. "Some Thoughts on the Minimax Principle," Management Science, INFORMS, vol. 18(5-Part-2), pages 54-63, January.
- Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
- Martin Shubik & Robert James Weber, 1981.
"Systems defense games: Colonel blotto, command and control,"
Naval Research Logistics Quarterly, John Wiley & Sons, vol. 28(2), pages 281-287, June.
- Martin Shubik & Robert J. Weber, 1978. "Systems Defense Games: Colonel Blotto, Command and Control," Cowles Foundation Discussion Papers 489, Cowles Foundation for Research in Economics, Yale University.
- Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
- Barry M. Horowitz & Yacov Y. Haimes, 2003. "Risk‐based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism," Systems Engineering, John Wiley & Sons, vol. 6(3), pages 152-169.
- Bernheim, B Douglas, 1984.
"Rationalizable Strategic Behavior,"
Econometrica, Econometric Society, vol. 52(4), pages 1007-1028, July.
- D. B. Bernheim, 2010. "Rationalizable Strategic Behavior," Levine's Working Paper Archive 514, David K. Levine.
- D. B. Bernheim, 2010. "Rationalizable Strategic Behavior," Levine's Working Paper Archive 661465000000000381, David K. Levine.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Daniel Kahneman & Amos Tversky, 2013.
"Prospect Theory: An Analysis of Decision Under Risk,"
World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127,
World Scientific Publishing Co. Pte. Ltd..
- Kahneman, Daniel & Tversky, Amos, 1979. "Prospect Theory: An Analysis of Decision under Risk," Econometrica, Econometric Society, vol. 47(2), pages 263-291, March.
- Amos Tversky & Daniel Kahneman, 1979. "Prospect Theory: An Analysis of Decision under Risk," Levine's Working Paper Archive 7656, David K. Levine.
- Jules H. van Binsbergen & Leslie M. Marx, 2007. "Exploring Relations Between Decision Analysis and Game Theory," Decision Analysis, INFORMS, vol. 4(1), pages 32-40, March.
- Train,Kenneth E., 2009.
"Discrete Choice Methods with Simulation,"
Cambridge Books,
Cambridge University Press, number 9780521747387, October.
- Train,Kenneth E., 2009. "Discrete Choice Methods with Simulation," Cambridge Books, Cambridge University Press, number 9780521766555, October.
- Kenneth Train, 2003. "Discrete Choice Methods with Simulation," Online economics textbooks, SUNY-Oswego, Department of Economics, number emetr2.
- Enders,Walter & Sandler,Todd, 2012.
"The Political Economy of Terrorism,"
Cambridge Books,
Cambridge University Press, number 9780521181006, October.
- Enders,Walter & Sandler,Todd, 2012. "The Political Economy of Terrorism," Cambridge Books, Cambridge University Press, number 9781107004566, October.
- Bernard Harris, 2004. "Mathematical Methods in Combatting Terrorism," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 985-988, August.
- Pearce, David G, 1984. "Rationalizable Strategic Behavior and the Problem of Perfection," Econometrica, Econometric Society, vol. 52(4), pages 1029-1050, July.
- Martin J. Osborne & Ariel Rubinstein, 1994.
"A Course in Game Theory,"
MIT Press Books,
The MIT Press,
edition 1, volume 1, number 0262650401, April.
- Martin J Osborne & Ariel Rubinstein, 2009. "A Course in Game Theory," Levine's Bibliography 814577000000000225, UCLA Department of Economics.
- Prajit K. Dutta, 1999. "Strategies and Games: Theory and Practice," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262041693, April.
- Seth Guikema, 2012. "Modeling Intelligent Adversaries for Terrorism Risk Assessment: Some Necessary Conditions for Adversary Models," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1117-1121, July.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Carlos Barros & Isabel Proença, 2005. "Mixed Logit Estimation Of Radical Islamic Terrorism In Europe And North America: A Comparative Study," Microeconomics 0508005, University Library of Munich, Germany.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
- Mumtaz Karatas & Ertan Yakıcı & Abdullah Dasci, 2022. "Solving a bi-objective unmanned aircraft system location-allocation problem," Annals of Operations Research, Springer, vol. 319(2), pages 1631-1654, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- van Damme, E.E.C., 2000.
"Non-cooperative Games,"
Discussion Paper
2000-96, Tilburg University, Center for Economic Research.
- van Damme, E.E.C., 2014. "Non-Cooperative Games," Discussion Paper 2014-077, Tilburg University, Center for Economic Research.
- van Damme, E.E.C., 2014. "Non-Cooperative Games," Other publications TiSEM de642e17-c01e-4069-b8b2-2, Tilburg University, School of Economics and Management.
- van Damme, E.E.C., 2001. "Non-cooperative games," Other publications TiSEM 739ad196-8730-41a3-8d86-8, Tilburg University, School of Economics and Management.
- van Damme, E.E.C., 2000. "Non-cooperative Games," Other publications TiSEM 51465233-a356-4d20-acc4-c, Tilburg University, School of Economics and Management.
- van Damme, E.E.C., 2015. "Game theory : Noncooperative games," Other publications TiSEM ff518f2b-501f-4d99-817b-c, Tilburg University, School of Economics and Management.
- Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
- Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
- Asheim, G.B. & Dufwenberg, M., 1996.
"Admissibility and Common Knowledge,"
Discussion Paper
1996-16, Tilburg University, Center for Economic Research.
- Asheim, G.B. & Dufwenberg, M., 1996. "Admissibility and Common Knowledge," Other publications TiSEM 54bb4094-d109-48b9-8b45-a, Tilburg University, School of Economics and Management.
- B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
- Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2012.
"Rationalizable Implementation,"
World Scientific Book Chapters, in: Robust Mechanism Design The Role of Private Information and Higher Order Beliefs, chapter 11, pages 375-404,
World Scientific Publishing Co. Pte. Ltd..
- Bergemann, Dirk & Morris, Stephen & Tercieux, Olivier, 2011. "Rationalizable implementation," Journal of Economic Theory, Elsevier, vol. 146(3), pages 1253-1274, May.
- Dirk Bergemann & Stephen Morris, 2009. "Rationalizable Implementation," Cowles Foundation Discussion Papers 1697, Cowles Foundation for Research in Economics, Yale University.
- Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2011. "Rationalizable Implementation," PSE-Ecole d'économie de Paris (Postprint) halshs-00654687, HAL.
- Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2011. "Rationalizable Implementation," Post-Print halshs-00654687, HAL.
- Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2010. "Rationalizable Implementation," Cowles Foundation Discussion Papers 1697R, Cowles Foundation for Research in Economics, Yale University.
- Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2010. "Rationalizable Implementation," Levine's Working Paper Archive 661465000000000022, David K. Levine.
- Xiao Luo & Xuewen Qian & Chen Qu, 2020. "Iterated elimination procedures," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 70(2), pages 437-465, September.
- Nagel, Rosemarie & Bühren, Christoph & Frank, Björn, 2017.
"Inspired and inspiring: Hervé Moulin and the discovery of the beauty contest game,"
Mathematical Social Sciences, Elsevier, vol. 90(C), pages 191-207.
- Rosemarie Nagel & Christoph Bühren & Björn Frank, 2016. "Inspired and inspiring: Hervé Moulin and the discovery of the beauty contest game," Economics Working Papers 1539, Department of Economics and Business, Universitat Pompeu Fabra, revised Nov 2016.
- Joseph Y. Halpern & Rafael Pass, 2018. "Game theory with translucent players," International Journal of Game Theory, Springer;Game Theory Society, vol. 47(3), pages 949-976, September.
- Chen, Yi-Chun & Sun, Yifei, 2015. "Full implementation in backward induction," Journal of Mathematical Economics, Elsevier, vol. 59(C), pages 71-76.
- Vitaly Pruzhansky, 2011. "Some interesting properties of maximin strategies," International Journal of Game Theory, Springer;Game Theory Society, vol. 40(2), pages 351-365, May.
- Joseph Greenberg & Sudheer Gupta & Xiao Luo, 2003. "Towering over Babel: Worlds Apart but Acting Together," IEAS Working Paper : academic research 03-A009, Institute of Economics, Academia Sinica, Taipei, Taiwan.
- Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
- Holler Manfred J., 2002. "Classical, Modern, and New Game Theory / Klassische, Moderne und Neue Spieltheorie," Journal of Economics and Statistics (Jahrbuecher fuer Nationaloekonomie und Statistik), De Gruyter, vol. 222(5), pages 556-583, October.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:syseng:v:18:y:2015:i:4:p:365-376. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6858 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.