메뉴 건너뛰기




Volumn 31, Issue 9, 2011, Pages 1488-1510

A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

Author keywords

Adaptive adversary; Risk management; Terrorism risk

Indexed keywords

ADAPTIVE ADVERSARY; COMBINED METHOD; COMPARATIVE ANALYSIS; COUNTER TERRORISM; EVENT TREES; ILLUSTRATIVE EXAMPLES; INFLUENCE DIAGRAM; MANAGEMENT DECISIONS; PROBABILISTIC RISK ANALYSIS; PROBABILITY ASSESSMENTS; RADIOLOGICAL MATERIALS; RISK LEVELS; RISK MANAGER; RISK-BASED; SUBJECTIVE PROBABILITY; TERRORISM RISKS;

EID: 80053384354     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2011.01590.x     Document Type: Article
Times cited : (64)

References (23)
  • 1
    • 34447322230 scopus 로고    scopus 로고
    • Should we protect commercial airplanes against surface-to-air missile attacks by terrorists?
    • von Winterfeldt D, Sullivan TM. Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Analysis, 2006; 3(2):63-75.
    • (2006) Decision Analysis , vol.3 , Issue.2 , pp. 63-75
    • von Winterfeldt, D.1    Sullivan, T.M.2
  • 2
    • 78651314211 scopus 로고    scopus 로고
    • A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry
    • Bakir NO. A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Analysis, 2008; 5(4):230-248.
    • (2008) Decision Analysis , vol.5 , Issue.4 , pp. 230-248
    • Bakir, N.O.1
  • 3
    • 78651269932 scopus 로고    scopus 로고
    • Is screening cargo containers for smuggled nuclear threats worthwhile?
    • Merrick JRW, McLay LA. Is screening cargo containers for smuggled nuclear threats worthwhile? Decision Analysis, 2010; 7(2):155-171.
    • (2010) Decision Analysis , vol.7 , Issue.2 , pp. 155-171
    • Merrick, J.R.W.1    McLay, L.A.2
  • 5
  • 6
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
    • Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 7
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier VM, Oliveros S, Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 2007; 9(4):563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 8
    • 33847259790 scopus 로고    scopus 로고
    • Subsidies in interdependent security with heterogeneous discount rates
    • Zhuang J, Bier VM, Gupta A. Subsidies in interdependent security with heterogeneous discount rates. Engineering Economist, 2007; 52(1):1-19.
    • (2007) Engineering Economist , vol.52 , Issue.1 , pp. 1-19
    • Zhuang, J.1    Bier, V.M.2    Gupta, A.3
  • 11
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
    • Paté-Cornell ME, Guikema S. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 2002; 7(4):5-20.
    • (2002) Military Operations Research , vol.7 , Issue.4 , pp. 5-20
    • Paté-Cornell, M.E.1    Guikema, S.2
  • 12
    • 73649115679 scopus 로고    scopus 로고
    • Intelligent adversary risk analysis: A bioterrorism risk management model
    • Parnell GS, Smith CM, Moxley FI. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 2010; 30(1):32-48.
    • (2010) Risk Analysis , vol.30 , Issue.1 , pp. 32-48
    • Parnell, G.S.1    Smith, C.M.2    Moxley, F.I.3
  • 16
    • 78651285026 scopus 로고    scopus 로고
    • Al Qaeda "was making dirty bomb."
    • Gardner F. Al Qaeda "was making dirty bomb." BBC News Online, 2003.
    • (2003) BBC News Online
    • Gardner, F.1
  • 18
    • 84889967883 scopus 로고    scopus 로고
    • Game theory and risk analysis in the context of the smallpox threat
    • in Wilson A, Wilson G, Olwell, D (eds). New York Springer
    • Banks D, Anderson S. Game theory and risk analysis in the context of the smallpox threat. Pp. 9-22 in Wilson A, Wilson G, Olwell, D (eds). Statistical Methods in Counterterrorism. New York Springer, 2006.
    • (2006) Statistical Methods in Counterterrorism , pp. 9-22
    • Banks, D.1    Anderson, S.2
  • 20
    • 0000351891 scopus 로고
    • The reliability of subjective probabilities obtained through decomposition
    • Ravinder HV, Kleinmuntz DN, Dyer J. The reliability of subjective probabilities obtained through decomposition. Management Science, 1988; 34(2):186-199.
    • (1988) Management Science , vol.34 , Issue.2 , pp. 186-199
    • Ravinder, H.V.1    Kleinmuntz, D.N.2    Dyer, J.3
  • 21
    • 0001152402 scopus 로고
    • Knowledge maps
    • Howard RA. Knowledge maps. Management Science, 1989; 35(8):903-922.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 903-922
    • Howard, R.A.1
  • 22
    • 84855352605 scopus 로고    scopus 로고
    • Eliciting subjective probabilities and correcting for biases from individuals
    • in Cochran J (ed). New York John Wiley & Sons
    • Mihajlovits BH, Merrick JRW. Eliciting subjective probabilities and correcting for biases from individuals. Pp. 1-13 in Cochran J (ed). Wiley Encyclopedia of Operations Research and Management Science. New York John Wiley & Sons, 2011.
    • (2011) Wiley Encyclopedia of Operations Research and Management Science , pp. 1-13
    • Mihajlovits, B.H.1    Merrick, J.R.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.