Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wzw2p Total loading time: 0 Render date: 2024-04-30T14:19:14.645Z Has data issue: false hasContentIssue false

5 - Coping with Uncertainty in Adversarial Risk Analysis

Published online by Cambridge University Press:  13 December 2017

Ali E. Abbas
Affiliation:
University of Southern California
Milind Tambe
Affiliation:
University of Southern California
Detlof von Winterfeldt
Affiliation:
University of Southern California
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Asbeck, E., & Haimes, Y. Y. (1984). The partitioned multiobjective risk method. Large Scale Systems 6, 1338.Google Scholar
Ball, D. J., & Watt, J. (2013). Further thoughts on the utility of risk matrices. Risk Analysis 33, 20682078.CrossRefGoogle ScholarPubMed
Bier, V. M. (1993, October 20–22). Some illustrative examples of model uncertainty. Proceedings of Workshop I in Advanced Topics in Risk and Reliability Analysis, Model Uncertainty: Its Characterization and Quantification, pp. 91–98, Annapolis, Maryland. Reprinted in Mosleh, A., Siu, N. Smidts, C, & Lui, C. (Eds.). (1995). Model uncertainty: Its characterization and quantification (pp. 93100). University of Maryland.Google Scholar
Bier, V. M. (1994). Uncertainty irrelevance and preferences over ambiguity in expected utility decision theory. In Ayyub, B. M. & Gupta, M. M. (Eds.), Uncertainty modeling and analysis: Theory and applications (pp. 211220). North-Holland.Google Scholar
Bier, V. M., Ferson, S., Haimes, Y. Y., Lambert, J. H., & Small, M. J. (2004). Risk of extreme and rare events: Lessons from a selection of approaches. In McDaniels, T. & Small, M. J. (Eds.), Risk analysis and society: Interdisciplinary perspectives (pp. 74118). Cambridge University Press.Google Scholar
Bier, V. M., & Kosanoglu, F. (2015). Target-oriented utility theory for modeling the deterrent effects of counterterrorism. Reliability Engineering and System Safety, 136, 3546.Google Scholar
Bier, V. M., & Lin, S.-W. (2008). A study of expert overconfidence. Reliability Engineering and System Safety, 93, 711721.Google Scholar
Bier, V. M., & Lin, S.-W. (2013). On the treatment of uncertainty and variability in making decisions about risk. Risk Analysis, 33, 18991907.CrossRefGoogle Scholar
Bier, V. M., Menoyo, J., & Wang, C. (2012). Achieving realistic levels of defensive hedging based on non-monotonic and multi-attribute terrorist utility functions. In Herrmann, J. W. (Ed.), Handbook of operations research for homeland security (pp. 125139). Springer.Google Scholar
Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9, 563587.CrossRefGoogle Scholar
Box, G. E. (1979). Robustness in the strategy of scientific model building. In Launer, R. & Wilkinson, G. (Eds.), Robustness in statistics (p. 202). Academic Press.Google Scholar
Breckenridge, J. N., & Zimbardo, P. G. (2006). The strategy of terrorism and the psychology of mass-mediated fear. In Bongar, B. (Ed.), Psychology of terrorism (pp. 116133). Oxford University Press.CrossRefGoogle Scholar
Brown, G. G., & CoxJr., L. A. (2011a). How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis, 31, 196204.Google Scholar
Brown, G. G., & CoxJr., L. A. & CoxJr., L. A. (2011b). Making terrorism risk analysis less harmful and more useful: another try. Risk Analysis, 31, 193195.Google Scholar
Brown, R. V., & Lindley, D. V. (1986). Plural analysis: Multiple approaches to quantitative research. Theory and Decision, 20, 133154.Google Scholar
Burns, W. J., & Slovic, P. (2010). Predicting and modeling public response to a terrorist strike. In Slovic, P. (Ed.), The feeling of risk: New perspectives on risk perception. Earthscan.Google Scholar
Cami, A., Wallstrom, G. L., & Hogan, W. R. (2009). Measuring the effect of commuting on the performance of the Bayesian Aerosol Release Detector. BMC Medical Informatics and Decision Making, 9 (Supplement 1), S7.CrossRefGoogle ScholarPubMed
de Campos, C. P., & Ji, Q. (2008). Strategy selection in influence diagrams using imprecise probabilities. In Proceedings of the 24th Conference in Uncertainty in Artificial Intelligence (UAI) (pp. 121128).Google Scholar
Corani, G., Antonucci, A., & Zaffalon, M. (2012). Bayesian networks with imprecise probabilities: Theory and application to classification. In Holmes, D. E. & Jaim, C. (Eds.), Data mining: Foundations and intelligent paradigms (pp. 4993). Intelligent Systems Reference Library, Volume 23.Google Scholar
Covello, V. T., Peters, R. G., Wojtecki, J. G., & Hyde, R. C. (2001). Risk communication, the West Nile virus epidemic, and bioterrorism: Responding to the communication challenges posed by the intentional or unintentional release of a pathogen in an urban setting. Journal of Urban Health: Bulletin of the New York Academy of Medicine, 78, 382391.Google Scholar
CoxJr., L. A. (2008a). What’s wrong with risk matrices? Risk Analysis, 28, 497512.Google ScholarPubMed
CoxJr., L. A. (2008b). Some limitations of “risk = threat × vulnerability × consequence” for risk analysis of terrorist attacks. Risk Analysis, 28, 17491761.CrossRefGoogle ScholarPubMed
CoxJr., L. A. (2009). Improving risk-based decision making for terrorism applications. Risk Analysis, 29, 336341.CrossRefGoogle ScholarPubMed
CoxJr., L. A., Babayev, D., & Huber, W. (2005). Some limitations of qualitative risk rating systems. Risk Analysis, 25, 651662.Google Scholar
CoxJr., L. A., Brown, G. G., & Pollock, S. M. (2008).When is uncertainty about uncertainty worth characterizing? Interfaces, 38, 465468.CrossRefGoogle Scholar
Dighe, N. S., Zhuang, J., & Bier, V. M. (2009). Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 5, 3143.Google Scholar
Ezell, B. C., Bennett, S. P., von Winterfeldt, D. Sokolowski, J., & Collins, A. J. (2010). Probabilistic risk analysis and terrorism risk. Risk Analysis, 30, 575589.CrossRefGoogle ScholarPubMed
Ferson, S., & Donald, S. (1998). Probability bounds analysis. In Mosleh, A. & Bari, R. A. (Eds.), Probabilistic safety assessment and management (pp. 12031208). Springer-Verlag.Google Scholar
Ferson, S., & Hajagos, J. G. (2006). Varying correlation coefficients can underestimate uncertainty in probabilistic models. Reliability Engineering and System Safety, 91, 14611467.CrossRefGoogle Scholar
Finkel, A. M. (2014). Emitting more light than heat: Lessons from risk assessment controversies for the “job-killing regulations” debate. In Coglianese, C., Finkel, A. M., & Carrigan (Eds.), C., Does regulation kill jobs? (pp. 128149). University of Pennsylvania Press.Google Scholar
Goodstein, E., & Hart Hodges, H. (1997). Polluted data: Overestimating environmental costs. American Prospect, 8(35), 6469.Google Scholar
Government Accountability Office. (2008, November 14 and December 15). Homeland security grant program risk-based distribution methods. Presentation to Congressional Committees.Google Scholar
Grundmann, O. (2014). The current state of bioterrorist attack surveillance and preparedness in the US. Risk Management and Healthcare Policy, 177187.Google Scholar
Harrington, W., Morgenstern, R. D., & Nelson, P. (2000). On the accuracy of regulatory cost estimates. Journal of Policy Analysis and Management, 19, 297322.Google Scholar
Hausken, K., & Bier, V. M. (2011a). Defending against multiple different attackers. European Journal of Operational Research, 211, 370384.Google Scholar
Hausken, K., & Bier, V. M. (2011b). Endogenizing the sticks and carrots: Modeling terrorism and the emergence of hatred. Annals of Operations Research, 186, 3959.Google Scholar
Hazilla, M., & Kopp, R. J. (1990). Social cost of environmental quality regulations: A general equilibrium analysis. Journal of Political Economy, 98, 853873.Google Scholar
Henrion, M. Pradhan, M., Del Favero, B., Huang, K., Provan, G., & O’Rorke, P. (1996). Why is diagnosis using belief networks insensitive to imprecision in probabilities? In Proceedings of the Twelfth Annual Conference on Uncertainty in Artificial Intelligence (UAI96) (pp. 307314). Morgan Kaufmann Publishers.Google Scholar
Hoeting, J., Madigan, D., Raftery, A., & Volinsky, C. (1999). Bayesian model averaging. Statistical Science, 14, 382401.Google Scholar
Hora, S. (2007). Eliciting probabilities from experts. In Edwards, W., Miles, R. F., & von Winterfeldt, D. (Eds.), Advances in decision analysis: From foundations to applications (pp. 129153). Cambridge University Press.Google Scholar
Jamshidi, T., & Bier, V. M. (2009, December). Cost-effectiveness of investments in defense of critical infrastructure. Annual Meeting, Society for Risk Analysis, Baltimore, Maryland.Google Scholar
Kahneman, D. (2011). Thinking, fast and slow. Macmillan.Google Scholar
Kleiter, G. D. (1996). Propagating imprecise probabilities in Bayesian networks. Artificial Intelligence, 88, 143161.Google Scholar
Koller, D., & Friedman, N. (2009). Probabilistic graphical models: Principles and techniques. MIT Press.Google Scholar
Koller, D., & Milch, B. (2001). Multi-agent influence diagrams for representing and solving games. Proceedings of the 17th International Joint Conference on Artificial Intelligence.Google Scholar
Major, J. A. (2002). Advanced techniques for modelling terrorism risk. Journal of Risk, Finance, 4, 1524.CrossRefGoogle Scholar
Maya, I., John, R. S., Rosoff, H., Bier, V. M., & Barrett, A. (2012, July). Adaptive adversary decision modeling for global terrorism risk. World Congress on Risk, Society for Risk Analysis, Sydney, Australia.Google Scholar
McArdle, S. C., Rosoff, H., & John, R. S. (2012). The dynamics of evolving beliefs, concerns, emotions, and behavioral avoidance following 9/11: A longitudinal analysis of representative archival samples. Risk Analysis, 32, 744761.Google Scholar
McLay, L., Rothschild, C., & Guikema, S. (2012). Robust adversarial risk analysis: A level-k approach. Decision Analysis, 9, 4154.CrossRefGoogle Scholar
Miller, , E. (2012). Patterns of onset and decline among terrorist organizations. Journal of Quantitative Criminology, 28, 77101.Google Scholar
Mohtadi, H., & Murshid, A. P. (2009). Risk of catastrophic terrorism: An extreme value approach. Journal of Applied Econometrics, 24, 537559.CrossRefGoogle Scholar
Montibeller, G., & von Winterfeldt, D. (2015). Cognitive and motivational biases in decision and risk analysis. Risk Analysis, 35, 12301251.CrossRefGoogle ScholarPubMed
Morgan, M. G., Henrion, M., & Small, M. (1990). Uncertainty: A guide to dealing with uncertainty in quantitative risk and policy analysis. Cambridge University Press.CrossRefGoogle Scholar
Morningside Post. (2007). The bipartisan politicization of the national intelligence estimate. www.themorningsidepost.com/2007/12/08/the-bipartisan-politicization-of-the-nie/.Google Scholar
Mosleh, A., & Bier, V. M. (1996). Uncertainty about probability: A reconciliation with the subjectivist viewpoint. IEEE Transactions on Systems, Man, and Cybernetics (Part A: Systems and Humans), 26, 303310.Google Scholar
National Research Council. (2008). Department of Homeland Security bioterrorism risk assessment: A call for change. National Academies Press.Google Scholar
Office of Technology Assessment. (1995). Gauging control technology and regulatory impacts in occupational safety and health: An appraisal of OSHA’s analytic approach.Google Scholar
Pate-Cornell, E., & Guikema, S. (2002). Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 7, 520.Google Scholar
Pizer, W. A., & Kopp, R. (2003). Calculating the costs of environmental regulation. Resources for the Future Discussion Paper 03-06.Google Scholar
Powell, R. (2007). Allocating defensive resources with private information about vulnerability. American Political Science Review, 101, 799809.Google Scholar
Price, B. C. (2012). Targeting top terrorists: How leadership decapitation contributes to counterterrorism. International Security, 4, 946.CrossRefGoogle Scholar
Putnam, H., & Bartlett, Inc. (1980). Comparisons of estimated and actual pollution control capital expenditures for selected industries. U.S. Environmental Protection Agency.Google Scholar
Raftery, A. E., & Zheng, Y. (2003). Discussion: Performance of Bayesian model averaging. Journal of the American Statistical Association, 98, 931938.CrossRefGoogle Scholar
Rosoff, H., & John, R. S. (2009). Decision analysis by proxy for the rational terrorist. Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI-09). Workshop on Quantitative Risk Analysis for Security Applications.Google Scholar
Rosoff, H., & von Winterfeldt, D. (2007). A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach. Risk Analysis, 27, 533546.Google Scholar
Ruth Ruttenberg and Associates. (2004). Not too costly, after all: An examination of the inflated cost-estimates of health, safety and environmental protections. Prepared for the Public Citizen Foundation, Inc.Google Scholar
Shan, X., & Zhuang, J. (2013). Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game. European Journal of Operational Research, 228, 262272.CrossRefGoogle Scholar
Shen, Y., & Cooper, G. F. (2010). A new prior for Bayesian anomaly detection: Application to biosurveillance. Methods of Information in Medicine, 49, 4453.Google ScholarPubMed
Sticha, P. J., Weaver, E. A., Tatman, J. A., Mahoney, S. M., & Buede, D. M. (2009). Reading the behavior signature: Predicting leader personality from individual and group actions. Association for the Advancement of Artificial Intelligence Spring Symposium: Technosocial Predictive Analytics, pp. 130136.Google Scholar
Tetlock, P. E. (2009). Expert political judgment: How good is it? How can we know? Princeton University Press.CrossRefGoogle Scholar
Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185 (4157), 11241131.CrossRefGoogle ScholarPubMed
U.S. Department of Homeland Security. (2006). Bioterrorism risk assessment. Biological Threat Characterization Center, National Biodefense Analysis and Countermeasures Center.Google Scholar
Von Winterfeldt, D. (1999). On the relevance of behavioral decision research for decision analysis. In Shanteau, J., Mellers, B. A., & Schum (Eds.), D. A., Decision science and technology: Reflections on the contributions of Ward Edwards (pp. 133154). Springer.Google Scholar
Wang, C., & Bier, V. M. (2011). Target-hardening decisions based on uncertain multiattribute terrorist utility,. Decision Analysis, 8, 286302.Google Scholar
Wang, C., & Bier, V. M. & Bier, V. M. (2015). Quantifying adversary capabilities to inform defensive resource allocation. Risk Analysis, http://onlinelibrary.wiley.com/doi/10.1111/risa.12399/.Google Scholar
Wong, W.-K., Moore, A., Cooper, G. & Wagner, M. (2003). Bayesian network anomaly pattern detection for disease outbreaks. In Fawcett, T. & Mishra, N. (Eds.), Proceedings of the Twentieth International Conference on Machine Learning (pp. 808815). AAAI Press.Google Scholar
Woo, G. (2002). Quantitative terrorism risk assessment. Journal of Risk Finance, 4, 714.Google Scholar
Woo, G. (2003). Insuring against Al Qaeda. NBER Insurance Project Workshop.Google Scholar
Zhang, N. L. (1998). Probabilistic inference in influence diagrams. Computational Intelligence, 14, 475497.CrossRefGoogle Scholar
Zhuang, J., & Bier, V. M. (2010). Reasons for secrecy and deception in homeland-security resource allocation. Risk Analysis, 30, 409418.Google Scholar
Zhuang, J., Bier, V. M., & Alagoz, O. (2010). Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203, 409418.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×