Abstract
Interest in counterterrorism modelling has increased recently. A common theme in the approaches adopted is the need to develop methods to analyse decisions when there are intelligent opponents ready to increase our risks. Most of the approaches have a clear game theoretic flavour, although there have been some decision analytic based approaches. We have recently introduced a framework for adversarial risk analysis, aimed at dealing with problems with intelligent opponents and uncertain outcomes. In this paper, we shall explore how such framework may cope with two of the standard counterterrorism model formulations: sequential defend-attack and simultaneous defend-attack moves.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aliprantis, C., Chakrabarti, S.: Games and Decision Making, Oxford, U.P (2000)
Banks, D., Anderson, S.: Game theory and risk analysis in the context of the smallpox threat. In: Wilson, A., Wilson, G., Olwell, D. (eds.) Statistical Methods in Counterterrorism, pp. 9–22 (2006)
Bier, V.S., Azaiez, N.: Game Theoretic Risk Analysis of Security Threats. Springer, Heidelberg (2008)
Bier, V., Oliveros, S., Samuelson, L.: Choosing what to protect. Journal of Economic Literature 9(4), 563–587 (2007)
Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)
Brown, G., Carlyle, W.M., Wood, R.: Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker(-Defender) Optimization to Terror Risk Assessment and Mitigation, Appendix E. National Academies Press, Washington (2008)
French, S., Rios Insua, D.: Statistical Decision Theory, Arnold (2000)
Gibbons, R.: A Primer in Game Theory. Pearson Education Ltd., Harlow (1992)
Harsanyi, J.: Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Management Science 14(3), 159–182 (1967)
Harsanyi, J.: Subjective probability and the theory of games: Comments on Kadane and Larkey’s paper. Management Science 28(2), 120–124 (1982)
Kadane, J.B., Larkey, P.D.: Subjective probability and the theory of games. Management Science 28(2), 113–120 (1982); reply: 124
Parnell, G., Banks, D., Borio, L., Brown, G., Cox, L.A., Gannon, J., Harvill, E., Kunreuther, H., Morse, S., Pappaioanou, M., Pollack, S., Singpurwalla, N., Wilson, A.: Report on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis. National Academies Press, Washington (2008)
Pinker, E.J.: An analysis of short-term responses to threats of terrorism. Management Science 53(6), 865–880 (2007)
Raiffa, H.: Negotiation Analysis. Harvard University Press, Cambridge (2002)
Rios, J., Rios Insua, D.: Balanced increment and concession methods for negotiation support. Journal of the Spanish Royal Academy of Sciences, RACSAM (in press, 2010)
Rios Insua, D., Rios, J., Banks, D.: Adversarial risk analysis. Journal of the American Statistical Association 104(486), 841–854 (2009)
Rothkopf, M.: Decision Analysis: The right tool for auctions. Decision Analysis 4, 167–172 (2007)
van Bingsbergen, J.H., Marx, L.M.: Exploring relations between decision analysis and game theory. Decision Analysis 4, 32–40 (2007)
von Winterfeldt, D., O’Sullivan, T.M.: Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Analysis 3(2), 63–75 (2006)
Zhuang, J., Bier, V.: Balancing Terrorism and Natural Disasters. Defensive Strategy with endogenous attack effort. Operations Research 55(5), 976–991 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rios, J., Rios Insua, D. (2009). Adversarial Risk Analysis: Applications to Basic Counterterrorism Models. In: Rossi, F., Tsoukias, A. (eds) Algorithmic Decision Theory. ADT 2009. Lecture Notes in Computer Science(), vol 5783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04428-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-04428-1_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04427-4
Online ISBN: 978-3-642-04428-1
eBook Packages: Computer ScienceComputer Science (R0)