-
1
-
-
42349112246
-
Homeland-security pork
-
cited 2012 Sep 20]. Accessed October 10, 2012.
-
de Rugy V. Homeland-security pork. Washington Times, 2005 [cited 2012 Sep 20]. Available at: http://www.aei.org/article/22924. Accessed October 10, 2012.
-
(2005)
Washington Times
-
-
de Rugy, V.1
-
2
-
-
84879115845
-
The 2013 homeland security budget: Misplaced priorities
-
March 14, 2012 [cited 2012 Sep 20. Accessed October 10, 2012.
-
Zuckerman J. The 2013 homeland security budget: Misplaced priorities. In Backgrounder: The Heritage Foundation, March 14, 2012 [cited 2012 Sep 20]. Available at: http://thf_media.s3.amazonaws.com/2012/pdf/bg2664.pdf. Accessed October 10, 2012.
-
In Backgrounder: The Heritage Foundation
-
-
Zuckerman, J.1
-
3
-
-
41549107359
-
Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack
-
Atkinson MP, Cao Z., Wein LM. Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack. Risk Analysis, 2008; 28(2):353-371.
-
(2008)
Risk Analysis
, vol.28
, Issue.2
, pp. 353-371
-
-
Atkinson, M.P.1
Cao, Z.2
Wein, L.M.3
-
4
-
-
73649115679
-
Intelligent adversary risk analysis: A bioterrorism risk management model
-
Parnell GS, Smith CM., Moxley FI. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 2010; 30(1):32-48.
-
(2010)
Risk Analysis
, vol.30
, Issue.1
, pp. 32-48
-
-
Parnell, G.S.1
Smith, C.M.2
Moxley, F.I.3
-
5
-
-
0036202354
-
Probabilistic risk analysis and game theory
-
Hausken K. Probabilistic risk analysis and game theory. Risk Analysis, 2002; 22(1):17-27.
-
(2002)
Risk Analysis
, vol.22
, Issue.1
, pp. 17-27
-
-
Hausken, K.1
-
6
-
-
38549098290
-
Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
-
Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
7
-
-
79952695711
-
Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
-
Golalikhani M, Zhuang J. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis, 2010; 31(4):533-547.
-
(2010)
Risk Analysis
, vol.31
, Issue.4
, pp. 533-547
-
-
Golalikhani, M.1
Zhuang, J.2
-
8
-
-
84860431639
-
Robust allocation of a defensive budget considering an attacker's private information
-
Nikoofal ME, Zhuang J. Robust allocation of a defensive budget considering an attacker's private information. Risk Analysis, 2012; 32(5):930-943.
-
(2012)
Risk Analysis
, vol.32
, Issue.5
, pp. 930-943
-
-
Nikoofal, M.E.1
Zhuang, J.2
-
9
-
-
84879071085
-
-
U.S. Government Accountability Office. DHS risk-based grant methodology is reasonable, but current version's measure of vulnerability is limited. [cited 2012 Sep 20]. Accessed October 10, 2012.
-
U.S. Government Accountability Office. DHS risk-based grant methodology is reasonable, but current version's measure of vulnerability is limited. 2008 [cited 2012 Sep 20]. Available at: http://www.gao.gov/new.items/d08852.pdf. Accessed October 10, 2012.
-
(2008)
-
-
-
10
-
-
1342283753
-
Suicidal terrorism and discriminatory screening: An efficiency-equity trade off
-
Yetman J. Suicidal terrorism and discriminatory screening: An efficiency-equity trade off. Defence and Peace Economics, 2004; 15(3):221-230.
-
(2004)
Defence and Peace Economics
, vol.15
, Issue.3
, pp. 221-230
-
-
Yetman, J.1
-
11
-
-
79952701280
-
Balancing congestion and security in the presence of strategic applicants with private information
-
Wang X, Zhuang J. Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 2011; 212(1):100-111.
-
(2011)
European Journal of Operational Research
, vol.212
, Issue.1
, pp. 100-111
-
-
Wang, X.1
Zhuang, J.2
-
12
-
-
84925923787
-
Equity and public risk
-
Keeney RL. Equity and public risk. Operations Research, 1980; 28(3):527-534.
-
(1980)
Operations Research
, vol.28
, Issue.3
, pp. 527-534
-
-
Keeney, R.L.1
-
13
-
-
0000097574
-
On equity in providing public services
-
Savas ES. On equity in providing public services. Management Science, 1978; 24(3):800-808.
-
(1978)
Management Science
, vol.24
, Issue.3
, pp. 800-808
-
-
Savas, E.S.1
-
14
-
-
84879069505
-
Community-based operations research: Decision modeling for local impact and diverse populations
-
Johnson MP (ed). New York: Springer
-
Leclerc PD, McLay LA, Mayorga ME. Community-based operations research: Decision modeling for local impact and diverse populations. Pp. 97-118 in Johnson MP (ed). Modeling Equity for Allocation in Public Resources. New York: Springer, 2011.
-
(2011)
Modeling Equity for Allocation in Public Resources
, pp. 97-118
-
-
Leclerc, P.D.1
McLay, L.A.2
Mayorga, M.E.3
-
15
-
-
0025896782
-
QALYs and the equity-efficiency trade off
-
Wagstaff A. QALYs and the equity-efficiency trade off. Journal of Health Economics, 1991: 10(1):21-41.
-
(1991)
Journal of Health Economics
, vol.10
, Issue.1
, pp. 21-41
-
-
Wagstaff, A.1
-
16
-
-
0028597668
-
Markets in tradable water rights: Potential for efficiency gains in developing country water resource allocation
-
Rosegrant MW, Binswanger HP. Markets in tradable water rights: Potential for efficiency gains in developing country water resource allocation. World Development, 1994; 22(11):1613-1625.
-
(1994)
World Development
, vol.22
, Issue.11
, pp. 1613-1625
-
-
Rosegrant, M.W.1
Binswanger, H.P.2
-
17
-
-
0343779233
-
Equity axioms for public risks
-
Fishburn PC. Equity axioms for public risks. Operations Research, 1984; 32(5):901-908.
-
(1984)
Operations Research
, vol.32
, Issue.5
, pp. 901-908
-
-
Fishburn, P.C.1
-
19
-
-
84986164048
-
Self-interest and sympathy in economic behaviour
-
Hausken K. Self-interest and sympathy in economic behaviour. International Journal of Social Economics, 1996; 23(7):4-24.
-
(1996)
International Journal of Social Economics
, vol.23
, Issue.7
, pp. 4-24
-
-
Hausken, K.1
-
20
-
-
35948999928
-
-
Princeton, NJ: Princeton University Press
-
Young P. Equity: In Theory and Practice. Princeton, NJ: Princeton University Press, 1994.
-
(1994)
In Theory and Practice
-
-
Young, P.E.1
-
22
-
-
0028409792
-
Equity measurement in facility location analysis: A review and framework
-
Marsh MT, Schilling DA. Equity measurement in facility location analysis: A review and framework. European Journal of Operational Research, 1994; 74(1):1-17.
-
(1994)
European Journal of Operational Research
, vol.74
, Issue.1
, pp. 1-17
-
-
Marsh, M.T.1
Schilling, D.A.2
-
23
-
-
0024628310
-
Equity considerations in public risks evaluation
-
Fishburn PC, Straffin PD. Equity considerations in public risks evaluation. Operations Research, 1989; 37(2):229-239.
-
(1989)
Operations Research
, vol.37
, Issue.2
, pp. 229-239
-
-
Fishburn, P.C.1
Straffin, P.D.2
-
24
-
-
84879086409
-
-
The Department of Homeland Security's risk assessment methodology: Evolution, issues, and options for Congress. 2007 [cited 2012 Sep 20]. Accessed October 10, 2012.
-
Masse T, O'Neil S, Rollins J. The Department of Homeland Security's risk assessment methodology: Evolution, issues, and options for Congress. 2007 [cited 2012 Sep 20]. Available at: http://fpc.state.gov/documents/organization/80208.pdf. Accessed October 10, 2012.
-
-
-
Masse, T.1
O'Neil, S.2
Rollins, J.3
-
25
-
-
84879082482
-
-
Homeland security dollars and sense #1: Current spending formulas waste aid to states. Accessed on October 10, 2012.
-
Carafano JJ. Homeland security dollars and sense #1: Current spending formulas waste aid to states. 2004. Available at:http://www.heritage.org/research/reports/2004/05/homeland-security-dollars-and-sense-1-current-spending-formulas-waste-aid-to-states. Accessed on October 10, 2012.
-
(2004)
-
-
Carafano, J.J.1
-
26
-
-
84879094299
-
-
Homeland security funding "pork" under fire. CNN News, 2008 [cited 2012 Sep 20] Accessed October 10, 2012.
-
Lucas F. Homeland security funding "pork" under fire. CNN News, 2008 [cited 2012 Sep 20]. Available at: http://cnsnews.com/news/article/homeland-security-funding-pork-under-fire. Accessed October 10, 2012.
-
-
-
Lucas, F.1
-
27
-
-
0032779547
-
Reconsidering social equity in publictransit
-
Garrett M, Taylor B. Reconsidering social equity in publictransit. Berkeley Planning Journal, 1999; 13(1):6-27.
-
(1999)
Berkeley Planning Journal
, vol.13
, Issue.1
, pp. 6-27
-
-
Garrett, M.1
Taylor, B.2
-
29
-
-
84879100888
-
-
Federal formula grants and California: Homeland security. California. 2004 [cited 2012 Sep 20]. Accessed October 10, 2012.
-
Ransdell T. Federal formula grants and California: Homeland security. California. 2004 [cited 2012 Sep 20]. Available at: https://www.ppic.org/content/pubs/ffg/FF104TRFF.pdf. Accessed October 10, 2012.
-
-
-
Ransdell, T.1
-
30
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
Bier VM, Haphuriwat N., Menoyo J, Zimmerman R, Culpen AM. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 2008; 28(3):763-770.
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
32
-
-
84879076658
-
-
The cost of being Osama bin Laden. [cited 2012 Sep 20]. Accessed October 10, 2012.
-
Ackman D. The cost of being Osama bin Laden. 2001 [cited 2012 Sep 20]. Available at: http://www.forbes.com/2001/09/14/0914ladenmoney. Accessed October 10, 2012.
-
(2001)
-
-
Ackman, D.1
-
33
-
-
84893005278
-
A financial profile of the terrorism of Al Qaeda and its affiliates
-
del Cid Gómez JM, Miguel J. A financial profile of the terrorism of Al Qaeda and its affiliates. Perspectives on Terror, 2010; 4(4):3-27.
-
(2010)
Perspectives on Terror
, vol.4
, Issue.4
, pp. 3-27
-
-
del Cid Gómez, J.M.1
Miguel, J.2
-
34
-
-
68149115896
-
Game theory and risk analysis
-
Cox LA. Game theory and risk analysis. Risk Analysis, 2009; 29(8):1062-1068.
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1062-1068
-
-
Cox, L.A.1
-
35
-
-
84879125298
-
Risk Management Solutions
-
Newark, CA: Risk Management Solutions, [cited 2012 Sep 20]. Accessed October 10, 2012.
-
Risk Management Solutions. Managing terrorism risk. Newark, CA: Risk Management Solutions, 2003 [cited 2012 Sep 20]. Available at: http://www.rms.com/publications/terrorism_risk_modeling.pdf. Accessed October 10, 2012.
-
(2003)
Managing terrorism risk
-
-
-
36
-
-
84879106895
-
-
U.S. Department of Homeland Security. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. [cited 2012 Sep 20]. Accessed October 10, 2012.
-
U.S. Department of Homeland Security. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. 2004 [cited 2012 Sep 20]. Available at: http://web.archive.org/web/,http://www.ojp.usdoj.gov/odp/docs/fy04uasi.pdf. Accessed October 10, 2012.
-
(2004)
-
-
-
37
-
-
84879116620
-
-
Public Law 110-53. Public law 110-53 - Implementing recommendations of the 9/11 Commission Act of. [cited 2012 Sep 20]. Accessed October 10, 2012.
-
Public Law 110-53. Public law 110-53 - Implementing recommendations of the 9/11 Commission Act of 2007. [cited 2012 Sep 20]. Available at: http://www.gpo.gov/fdsys/pkg/PLAW-110publ53/content-detail.html. Accessed October 10, 2012.
-
(2007)
-
-
-
39
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang J, Bier VM., Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
-
40
-
-
80052018326
-
-
Defending against a terrorist who accumulates resources. Military Operations Research
-
Hausken K, Zhuang J. Defending against a terrorist who accumulates resources. Military Operations Research, 2011; 16(1):21-39.
-
(2011)
, vol.16
, Issue.1
, pp. 21-39
-
-
Hausken, K.1
Zhuang, J.2
-
41
-
-
79952852737
-
Governments' and terrorists' defense and attack in a T-period game
-
Hausken K, Zhuang J. Governments' and terrorists' defense and attack in a T-period game. Decision Analysis, 2011; 8(1):46-70.
-
(2011)
Decision Analysis
, vol.8
, Issue.1
, pp. 46-70
-
-
Hausken, K.1
Zhuang, J.2
-
42
-
-
34447335639
-
Modeling values for anti-terrorism analysis
-
Keeney RL. Modeling values for anti-terrorism analysis. Risk Analysis, 2007; 27(3):585-596.
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 585-596
-
-
Keeney, R.L.1
-
43
-
-
83755228811
-
Target-hardening decisions based on uncertain multiattribute terrorist utility
-
Wang C, Bier VM. Target-hardening decisions based on uncertain multiattribute terrorist utility. Decision Analysis, 2011; 8(4):286-302.
-
(2011)
Decision Analysis
, vol.8
, Issue.4
, pp. 286-302
-
-
Wang, C.1
Bier, V.M.2
-
44
-
-
80053424264
-
A value model forevaluating homeland security decisions
-
Keeney RL, von Winterfeldt D. A value model forevaluating homeland security decisions. Risk Analysis, 2011; 31(9):1470-1487.
-
(2011)
Risk Analysis
, vol.31
, Issue.9
, pp. 1470-1487
-
-
Keeney, R.L.1
von Winterfeldt, D.2
-
45
-
-
0030304298
-
Contest success functions
-
Skaperdas S. Contest success functions. Economic Theory, 1996; 7(2):283-290.
-
(1996)
Economic Theory
, vol.7
, Issue.2
, pp. 283-290
-
-
Skaperdas, S.1
-
46
-
-
78649762419
-
Reasons for secrecy and deception in homeland-security resource allocation
-
Zhuang J, Bier VM. Reasons for secrecy and deception in homeland-security resource allocation. Risk Analysis, 2010; 30(12):1737-1743.
-
(2010)
Risk Analysis
, vol.30
, Issue.12
, pp. 1737-1743
-
-
Zhuang, J.1
Bier, V.M.2
-
47
-
-
84960608031
-
The existence of equilibrium in discontinuous economic games, I: Theory
-
Dasgupta P, Maskin E. The existence of equilibrium in discontinuous economic games, I: Theory. Review of Economic Theory, 1986; 53(1):1-26.
-
(1986)
Review of Economic Theory
, vol.53
, Issue.1
, pp. 1-26
-
-
Dasgupta, P.1
Maskin, E.2
|