Probabilistic Risk Analysis and Terrorism Risk

Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

[1]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[2]  M. Douglas,et al.  Terrorism: A Positive Feedback Game , 2003 .

[3]  Charles H. Anderton,et al.  Applying Intermediate Microeconomics to Terrorism , 2004 .

[4]  Deborah Goodwin The Military and Negotiation: The Role of the Soldier-Diplomat , 2005 .

[5]  Bilal M Ayyub,et al.  Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  Steven E. Plaut Misplaced Applications of Economic Theory to the Middle East , 2004 .

[7]  Roger M. Cooke,et al.  Probabilistic Risk Analysis: Probabilistic risk analysis , 2001 .

[8]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[9]  Robin L. Dillon-Merrill,et al.  Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .

[10]  Herbert Hamers,et al.  Operations research games: A survey , 2001 .

[11]  Kjell Hausken,et al.  Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .

[12]  W. Kip Viscusi The risks of terrorism , 2003 .

[13]  Sarit Kraus,et al.  Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.

[14]  Richard E. Wilson,et al.  COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .

[15]  J. Neumann,et al.  The Theory of Games and Economic Behaviour , 1944 .

[16]  Roger Anderson,et al.  Homeland Security , 2004, Gov. Inf. Q..

[17]  G. Apostolakis The concept of probability in safety assessments of technological systems. , 1990, Science.

[18]  Harvey E. Lapan,et al.  To Bargain or Not to Bargain: That is the Question , 1988 .

[19]  Hiromitsu Kumamoto,et al.  Probabilistic Risk Assessment and Management for Engineers and Scientists , 1996 .

[20]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[21]  Anthony H. Cordesman The challenge of biological terrorism , 2005 .

[22]  J. M. Smith The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.

[23]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[24]  Robert J. Aumann,et al.  Repeated Games with Incomplete Information , 1995 .

[25]  P. Jean-Jacques Herings,et al.  Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.

[26]  Howard Kunreuther,et al.  You Can Only Die Once: Interdependent Security in an Uncertain World , 2005 .

[27]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[28]  James H. Lambert,et al.  Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .

[29]  Larry G. Blackwood Risk Modeling for Determining Value and Decision Making , 2001, Technometrics.

[30]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[31]  W. McEneaney,et al.  Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .

[32]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[33]  Ralph L. Keeney,et al.  Eliciting probabilities from experts in complex technical problems , 1991 .

[34]  Richard Scheines,et al.  Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .

[35]  C. Allin Cornell,et al.  Seismic Risk Analysis of Boston , 1975 .

[36]  D. Earn,et al.  Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[37]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[38]  M. Elisabeth Paté-Cornell,et al.  Advances in Decision Analysis: The Engineering Risk-Analysis Method and Some Applications , 2007 .

[39]  N. Abrahamson,et al.  On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .

[40]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[41]  Detlof von Winterfeldt,et al.  Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..

[42]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[43]  Nicholas R. Jennings,et al.  Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..

[44]  Kathryn B. Laskey,et al.  An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .