Skip to main content

Adversarial Risk Analysis: Applications to Basic Counterterrorism Models

  • Conference paper
Algorithmic Decision Theory (ADT 2009)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5783))

Included in the following conference series:

Abstract

Interest in counterterrorism modelling has increased recently. A common theme in the approaches adopted is the need to develop methods to analyse decisions when there are intelligent opponents ready to increase our risks. Most of the approaches have a clear game theoretic flavour, although there have been some decision analytic based approaches. We have recently introduced a framework for adversarial risk analysis, aimed at dealing with problems with intelligent opponents and uncertain outcomes. In this paper, we shall explore how such framework may cope with two of the standard counterterrorism model formulations: sequential defend-attack and simultaneous defend-attack moves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aliprantis, C., Chakrabarti, S.: Games and Decision Making, Oxford, U.P (2000)

    Google Scholar 

  • Banks, D., Anderson, S.: Game theory and risk analysis in the context of the smallpox threat. In: Wilson, A., Wilson, G., Olwell, D. (eds.) Statistical Methods in Counterterrorism, pp. 9–22 (2006)

    Google Scholar 

  • Bier, V.S., Azaiez, N.: Game Theoretic Risk Analysis of Security Threats. Springer, Heidelberg (2008)

    MATH  Google Scholar 

  • Bier, V., Oliveros, S., Samuelson, L.: Choosing what to protect. Journal of Economic Literature 9(4), 563–587 (2007)

    Google Scholar 

  • Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)

    Article  Google Scholar 

  • Brown, G., Carlyle, W.M., Wood, R.: Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker(-Defender) Optimization to Terror Risk Assessment and Mitigation, Appendix E. National Academies Press, Washington (2008)

    Google Scholar 

  • French, S., Rios Insua, D.: Statistical Decision Theory, Arnold (2000)

    Google Scholar 

  • Gibbons, R.: A Primer in Game Theory. Pearson Education Ltd., Harlow (1992)

    MATH  Google Scholar 

  • Harsanyi, J.: Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Management Science 14(3), 159–182 (1967)

    Article  MathSciNet  Google Scholar 

  • Harsanyi, J.: Subjective probability and the theory of games: Comments on Kadane and Larkey’s paper. Management Science 28(2), 120–124 (1982)

    Article  Google Scholar 

  • Kadane, J.B., Larkey, P.D.: Subjective probability and the theory of games. Management Science 28(2), 113–120 (1982); reply: 124

    Article  MathSciNet  Google Scholar 

  • Parnell, G., Banks, D., Borio, L., Brown, G., Cox, L.A., Gannon, J., Harvill, E., Kunreuther, H., Morse, S., Pappaioanou, M., Pollack, S., Singpurwalla, N., Wilson, A.: Report on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis. National Academies Press, Washington (2008)

    Google Scholar 

  • Pinker, E.J.: An analysis of short-term responses to threats of terrorism. Management Science 53(6), 865–880 (2007)

    Article  Google Scholar 

  • Raiffa, H.: Negotiation Analysis. Harvard University Press, Cambridge (2002)

    MATH  Google Scholar 

  • Rios, J., Rios Insua, D.: Balanced increment and concession methods for negotiation support. Journal of the Spanish Royal Academy of Sciences, RACSAM (in press, 2010)

    Google Scholar 

  • Rios Insua, D., Rios, J., Banks, D.: Adversarial risk analysis. Journal of the American Statistical Association 104(486), 841–854 (2009)

    Article  MathSciNet  Google Scholar 

  • Rothkopf, M.: Decision Analysis: The right tool for auctions. Decision Analysis 4, 167–172 (2007)

    Article  Google Scholar 

  • van Bingsbergen, J.H., Marx, L.M.: Exploring relations between decision analysis and game theory. Decision Analysis 4, 32–40 (2007)

    Article  Google Scholar 

  • von Winterfeldt, D., O’Sullivan, T.M.: Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Analysis 3(2), 63–75 (2006)

    Article  Google Scholar 

  • Zhuang, J., Bier, V.: Balancing Terrorism and Natural Disasters. Defensive Strategy with endogenous attack effort. Operations Research 55(5), 976–991 (2007)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rios, J., Rios Insua, D. (2009). Adversarial Risk Analysis: Applications to Basic Counterterrorism Models. In: Rossi, F., Tsoukias, A. (eds) Algorithmic Decision Theory. ADT 2009. Lecture Notes in Computer Science(), vol 5783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04428-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04428-1_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04427-4

  • Online ISBN: 978-3-642-04428-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics