2011
DOI: 10.1111/j.1539-6924.2011.01655.x
|View full text |Cite
|
Sign up to set email alerts
|

Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs

Abstract: Many analyses conducted to inform security decisions depend on estimates of the conditional probabilities of different attack alternatives. These probabilities are difficult to estimate since analysts have limited access to the adversary and limited knowledge of the adversary's utility function, so subject matter experts often provide the estimates through direct elicitation. In this article, we describe a method of using uncertainty in utility function value tradeoffs to model the adversary's decision process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…In order to evaluate the terrorists’ decision to attack based on attribute preference, swing weights (wjk) are introduced (Rosoff & John, 2009). Swing weights, quantified on a scale of 0–1, are assessed using generalized beta distributions to represent the analyst's uncertainty about the terrorists’ value tradeoffs (Levine, 2012; Paté‐Cornell & Guikema, 2002). A concave function is used to reflect the risk averse attitude of the terrorist, U(Xk)j (Equation ).…”
Section: Methodsmentioning
confidence: 99%
“…In order to evaluate the terrorists’ decision to attack based on attribute preference, swing weights (wjk) are introduced (Rosoff & John, 2009). Swing weights, quantified on a scale of 0–1, are assessed using generalized beta distributions to represent the analyst's uncertainty about the terrorists’ value tradeoffs (Levine, 2012; Paté‐Cornell & Guikema, 2002). A concave function is used to reflect the risk averse attitude of the terrorist, U(Xk)j (Equation ).…”
Section: Methodsmentioning
confidence: 99%
“…Additionally, it is possible that the model of the terrorist's decision making does not cover all vulnerabilities in the system. We will investigate this important aspect to identify an approach that aids the decision makers and explains the mechanisms and strategies of the attackers [29][30][31][32].…”
Section: Threat Likelihood Assessmentmentioning
confidence: 99%
“…Many factors associated with IED threats and vulnerability are grouped into this category, primarily because of their diversity -of motive, design, manufacture and response -and that they are derived from issues pertaining to human factors. The utility, and also the flaw, regarding the use of expert opinion is that you gain the experience of the individual -something of limited utility in an environment depending on the preferences of an unpredictable adversary (Levine, 2012). Assuming that the experience and information that an expert retains is relevant to the case under consideration, all expert opinion remains subjective (Taylor-Adams and Kirwan, 1997) introducing the opportunity for bias and prejudice into assessments (Forester et al, 2003;Koblentz, 2011) in addition to significant variability between experts (Firmino et al, 2006;Park and Lee, 2008).…”
Section: Challenges For Pra For Ied Attackmentioning
confidence: 99%