Nature plays with dice – terrorists do not: Allocating resources to counter strategic versus probabilistic risks

European Journal of Operational Research - Tập 192 - Trang 198-208 - 2009
Boaz Golany1, Edward H. Kaplan2, Abraham Marmur3, Uriel G. Rothblum1
1Faculty of Industrial Engineering and Management, Technion, Israel Institute of Technology, Haifa 32000, Israel
2School of Management, School of Medicine, Faculty of Engineering, Yale University, New Haven, CT 06520, USA
3Center for Security Science and Technology, Department of Chemical Engineering, Technion, Israel Institute of Technology, Haifa 32000, Israel

Tài liệu tham khảo

Apostolakis, 2005, A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism, Risk Analysis, 25, 361, 10.1111/j.1539-6924.2005.00595.x M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006. V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004. Brown, 2006, Defending critical infrastructure, Interfaces, 36, 530, 10.1287/inte.1060.0252 A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005. Coughlin, 1992, Pure strategy equilibria in a class of systems defence games, International Journal of Game Theory, 20, 195, 10.1007/BF01253775 Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005. Harris, 2004, Mathematical methods in combatting terrorism, Risk Analysis, 24, 985, 10.1111/j.0272-4332.2004.00501.x Kaplan, 1998, Allocating HIV prevention resources, Socio-Economic Planning Sciences, 32, 257, 10.1016/S0038-0121(98)00002-0 E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005. Kuno, 1991, A linear-time algorithm for solving continuous maximum knapsack problems, Operations Research Letters, 10, 23, 10.1016/0167-6377(91)90082-Z Leung, 2004, A risk-based approach to setting priorities in protecting bridges against terrorist attacks, Risk Analysis, 24, 963, 10.1111/j.0272-4332.2004.00500.x National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004. Osborne, 1994 S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005. Rockafellar, 1970 Rosenblatt, 1994, Optimality of cut/expand across the board’ rule for constrained optimization problems with an application to an inventory model, IIE Transactions, 26, 102, 10.1080/07408179408966601 Sandler, 2003, Terrorism and game theory, Simulation and Gaming, 34, 319, 10.1177/1046878103255492 Sarewitz, 2003, Vulnerability and risk: some thoughts from a political and policy perspective, Risk Analysis, 23, 805, 10.1111/1539-6924.00357 Shubik, 1982 M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978. Shubik, 1981, Systems defense games: Colonel Blotto, command and control, Naval Research Logistics Quarterly, 28, 281, 10.1002/nav.3800280210 Von Neumann, 1944 Wein, 2005, Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program, Proceedings of the National Academy of Sciences, 1020, 7772, 10.1073/pnas.0407496102