메뉴 건너뛰기




Volumn 8, Issue 4, 2011, Pages 286-302

Target-hardening decisions based on uncertain multiattribute terrorist utility

Author keywords

Bayes' method; Game theory; Homeland security; Multiattribute utility; Uncertainty

Indexed keywords


EID: 83755228811     PISSN: 15458490     EISSN: 15458504     Source Type: Journal    
DOI: 10.1287/deca.1110.0218     Document Type: Article
Times cited : (44)

References (26)
  • 1
    • 85038476145 scopus 로고    scopus 로고
    • Risk analysis and intelligence communities collaborative framework
    • Arlington, VA. Accessed September 2011
    • Baker, J., M. Wool, A. Smith, J. Kahan, C. Ansel, P. Hammar, D. McGarvey, M. Phillips, R. Lark. 2009. Risk analysis and intelligence communities collaborative framework. Report, Homeland Security Institute, Arlington, VA. Accessed September 16, 2011, http://www.homelandsecurity.org/hsireports/Risk- Intel%20Collaboration%20Final%20Report.pdf.
    • (2009) Report, Homeland Security Institute , vol.16
    • Baker, J.1    Wool, M.2    Smith, A.3    Kahan, J.4    Ansel, C.5    Hammar, P.6    McGarvey, D.7    Phillips, M.8    Lark, R.9
  • 2
    • 11844260777 scopus 로고    scopus 로고
    • Balanced scorecard method for predicting the probability of a terrorist attack
    • Risk Analysis IV
    • Beitel, G. A., D. I. Gertman, M. M. Plum. 2004. Balanced scorecard method for predicting the probability of a terrorist attack. C. A. Brebbia, ed. Risk Analysis IV. WIT Press, Southampton, UK, 581-592. (Pubitemid 40087062)
    • (2004) Management Information Systems , vol.9 , pp. 581-592
    • Beitel, G.A.1    Gertman, D.I.2    Plum, M.M.3
  • 3
    • 34447325155 scopus 로고    scopus 로고
    • Choosing what to protect
    • DOI 10.1111/j.1539-6924.2007.00906.x
    • Bier, V. M. 2007. Choosing what to protect. Risk Anal. 27(3) 607-620. (Pubitemid 47063172)
    • (2007) Risk Analysis , vol.27 , Issue.3 , pp. 607-620
    • Bier, V.M.1
  • 4
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier, V. M., S. Oliveros, L. Samuelson. 2007. Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econom. Theory 9(4) 563-587.
    • (2007) J. Public Econom. Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 5
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • DOI 10.1111/j.1539-6924.2008.01053.x
    • Bier, V. M., N. Haphuriwat, J. Menoyo, R. Zimmerman, A. M. Culpen. 2008. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Anal. 28(3) 763-770. (Pubitemid 351847236)
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 7
    • 33845439386 scopus 로고    scopus 로고
    • Defending critical infrastructure
    • DOI 10.1287/inte.1060.0252
    • Brown, G., C. Matthew, J. Salmeron, K. Wood. 2006. Defending critical infrastructure. Interfaces 36(6) 530-544. (Pubitemid 44905062)
    • (2006) Interfaces , vol.36 , Issue.6 , pp. 530-544
    • Brown, G.1    Carlyle, M.2    Salmeron, J.3    Wood, K.4
  • 8
    • 38549157823 scopus 로고    scopus 로고
    • The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches
    • Farrow, S. 2008. The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Econom. Policy 25(1) 14-26.
    • (2008) Contemporary Econom. Policy , vol.25 , Issue.1 , pp. 14-26
    • Farrow, S.1
  • 9
    • 84954529870 scopus 로고    scopus 로고
    • Game theory models of intelligent actors in reliability analysis: An overview of the state of the art
    • V. M. Bier, M. N. Azaiez, eds., Springer, New York
    • Guikema, S. D. 2009. Game theory models of intelligent actors in reliability analysis: An overview of the state of the art. V. M. Bier, M. N. Azaiez, eds. Game Theoretic Risk Analysis of Security Threats. Springer, New York, 13-32.
    • (2009) Game Theoretic Risk Analysis of Security Threats , pp. 13-32
    • Guikema, S.D.1
  • 11
    • 60649102048 scopus 로고    scopus 로고
    • Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities
    • Jha, M. K. 2009. Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities. J. Infrastructure Systems 15(1) 31-39.
    • (2009) J. Infrastructure Systems , vol.15 , Issue.1 , pp. 31-39
    • Jha, M.K.1
  • 13
    • 33749589535 scopus 로고    scopus 로고
    • Advanced techniques for modeling terrorism risk
    • Major, J. 2002. Advanced techniques for modeling terrorism risk. J. Risk Finance 4(1) 15-24.
    • (2002) J. Risk Finance , vol.4 , Issue.1 , pp. 15-24
    • Major, J.1
  • 14
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Powell, R. 2007a. Defending against terrorist attacks with limited resources. Amer. Political Sci. Rev. 101(3) 527-541.
    • (2007) Amer. Political Sci. Rev. , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 15
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell, R. 2007b. Allocating defensive resources with private information about vulnerability. Amer. Political Sci. Rev. 101(4) 799-809.
    • (2007) Amer. Political Sci. Rev. , vol.101 , Issue.4 , pp. 799-809
    • Powell, R.1
  • 16
    • 84877870467 scopus 로고    scopus 로고
    • Decision analysis by proxy for the rational terrorist
    • TEAMCORE Research Group, University of Southern California, Los Angeles. Accessed September 16, 2011
    • Rosoff, H., R. John. 2009. Decision analysis by proxy for the rational terrorist. Proc. Internat. Joint Conf. Artificial Intelligence (IJCAI-09), Workshop on Quant. Risk Anal. Security Appl., TEAMCORE Research Group, University of Southern California, Los Angeles. Accessed September 16, 2011, http://teamcore.usc.edu/QRASA-09/SubmissionsFinal/Paper-4.pdf.
    • (2009) Proc. Internat. Joint Conf. Artificial Intelligence (IJCAI-09), Workshop on Quant. Risk Anal. Security Appl
    • Rosoff, H.1    John, R.2
  • 17
    • 63449108250 scopus 로고    scopus 로고
    • Games and terrorism: Recent developments
    • Sandler, T., K. Siqueira. 2009. Games and terrorism: Recent developments. Simulation and Gaming 40(2) 164-192.
    • (2009) Simulation and Gaming , vol.40 , Issue.2 , pp. 164-192
    • Sandler, T.1    Siqueira, K.2
  • 18
    • 0034179713 scopus 로고    scopus 로고
    • Nested partitions method for global optimization
    • Shi, L., S. Ólafsson. 2000. Nested partitions method for global optimization. Oper. Res. 48(3) 390-407. (Pubitemid 32415966)
    • (2000) Operations Research , vol.48 , Issue.3 , pp. 390-407
    • Shi, L.1    Olafsson, S.2
  • 19
    • 33750558925 scopus 로고    scopus 로고
    • Terrorists versus the government: Strategic interaction, support, and sponsorship
    • Siqueira, K., T. Sandler. 2006. Terrorists versus the government: Strategic interaction, support, and sponsorship. J. Conflict Resolution 50(6) 1-21.
    • (2006) J. Conflict Resolution , vol.50 , Issue.6 , pp. 1-21
    • Siqueira, K.1    Sandler, T.2
  • 20
    • 85038471161 scopus 로고    scopus 로고
    • Apollo: An analytical tool for predicting a subject's decision making
    • MITRE Corporation, McLean, VA. Accessed September 16, 2011
    • Sticha, P. J., D. Buede, R. L. Rees. 2005. Apollo: An analytical tool for predicting a subject's decision making. Proc. Internat. Conf. Intelligence Anal. (IA-05), MITRE Corporation, McLean, VA. Accessed September 16, 2011, http://analysis.mitre.org/proceedings/Final-Papers-Files/143-Camera-Ready-Paper. pdf.
    • (2005) Proc. Internat. Conf. Intelligence Anal. (IA-05)
    • Sticha, P.J.1    Buede, D.2    Rees, R.L.3
  • 21
    • 79951923270 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security, Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011
    • U.S. Department of Homeland Security. 2009. Homeland Security grant program overview. Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011, http://www.dhs.gov/xlibrary/assets/grant-program- overview-fy2009.pdf.
    • (2009) Homeland Security Grant Program Overview
  • 22
    • 0011450426 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security., Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011
    • U.S. Department of Homeland Security. 2002. National strategy for homeland security. Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011, http://www.dhs.gov/xlibrary/assets/nat-strat-hls. pdf.
    • (2002) National Strategy for Homeland Security
  • 23
    • 34247121489 scopus 로고    scopus 로고
    • RAND Corporation, Santa Monica, CA. Accessed September 16, 2011
    • Willis, H. H., A. R. Morral, T. K. Kelly, J. J. Medby. 2005. Estimating Terrorism Risk. RAND Corporation, Santa Monica, CA. Accessed September 16, 2011, http://www.rand.org/pubs/ monographs/2005/RAND-MG388.pdf.
    • (2005) Estimating Terrorism Risk
    • Willis, H.H.1    Morral, A.R.2    Kelly, T.K.3    Medby, J.J.4
  • 24
    • 70449714332 scopus 로고    scopus 로고
    • Using risk analysis to inform intelligence analysis
    • RAND Corporation, Santa Monica, CA. Accessed September 16, 2011
    • Willis, H. H. 2007. Using risk analysis to inform intelligence analysis. Working paper, RAND Corporation, Santa Monica, CA. Accessed September 16, 2011, http://www.rand.org/pubs/working-papers/2007/RAND-WR464.pdf.
    • (2007) Working Paper
    • Willis, H.H.1
  • 25
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • DOI 10.1287/opre.1070.0434
    • Zhuang, J., V. M. Bier. 2007. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Oper. Res. 55(5) 976-991. (Pubitemid 351159542)
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 26
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang, J., V. M. Bier, O. Alagoz. 2010. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2) 409-418.
    • (2010) Eur. J. Oper. Res. , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.