Modeling Terrorist Beliefs and Motivations

Size: px
Start display at page:

Download "Modeling Terrorist Beliefs and Motivations"

Transcription

1 CREATE Research Archive Research Project Summaries 2009 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, Heather Rosoff University of Southern California, Follow this and additional works at: Recommended Citation John, Richard and Rosoff, Heather, "Modeling Terrorist Beliefs and Motivations" (2009). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact

2 Modeling Terrorist Beliefs and Motivations Richard John and Heather Rosoff, University of Southern California 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Research Products Presentations Conferences Presentations - Outreach Publications Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to construct a decision analytic framework for better understanding the motivations, objectives, and beliefs that drive terrorist group behavior. Our general approach is to use published terrorist writings and individuals who understand the beliefs and values of particular terror organizations to provide inputs to a proxy decision analysis for terrorist organizations. Key structural elements of the decision analysis model include the following: (1) a fundamental objectives hierarchy representing the short-term and long-term objectives of the terror organization, (2) scales operationalizing each fundamental objective, and (3) an event tree representing the uncertainty involved in carrying out a selected terror attack. Parameters for the model are elicited in the form of probability distributions over responses required for attribute scale values, attribute weights, singleattribute utility functions, and Bernouli probabilities for the binary nodes of the event tree. These probability distributions primarily represent the inherent uncertainty in what we know about terrorist values (attribute weights and utility functions). In the case of the scale scores (alternatives by attributes matrix), the probability distributions also capture the terrorists inherent uncertainty in the outcome of an attack, as well as our uncertainty about terrorist beliefs. Previous work on this project constructed decision analytic models for a terrorist organization such as Al Qaeda for evaluating eight possible alternative attack mode strategies in the US, and a status quo no attack strategy alternative. Using the fully parameterized model, we were able to construct and compare risk profiles (CDFs over aggregate utility) for each attack strategy. This random utility modeling approach also allowed us to estimate the relative likelihood of a terrorist leader (or organization) selecting one of the attack strategies considered. During Year 5 we addressed two separate research questions: (1) How much does the proxy terrorist utility model diverge from using a utility model for the US coupled with a zero-sum assumption? and (2) How do anti-terrorism resource allocations impact terrorist preferences for different attack strategies, and to what extent are estimated relative likelihoods of various attack strategies influenced by anti-terrorism initiatives? To address the first question, we developed (dis-)utility models for evaluating the same attack strategies from the perspective of the US, and compared the resulting risk profiles to those of a terrorist leader. To address the second question, we performed sensitivity analysis over parameters in the terrorist utility model that should be sensitive to different allocations of anti-terrorist resources. Three antiterrorist resources were considered (1) tagging of original radiological and biological sources terms, (2) hardening targets for better protection from attack, and (3) installing screening devices to improve

3 detection of radiological and explosive materials. Each anti-terrorist resource was evaluated in terms of its impact upon proxy terrorist s attribute definitions, probability estimates and ultimately, estimates for the likelihood of various attack strategies. Research progress and accomplishments made throughout Year 5 are described in the subsequent section. 2. Research Accomplishments During Year 5 we completed a number of analyses related to the two research questions described above. With respect to our evaluation of the zero-sum assumption, we demonstrate that quite different preferences and implied relative likelihoods result from our proxy decision analysis of terrorist preferences compared to a more standard economic evaluation of expected losses from the perspective of the US. It is clear from our analysis that terrorist organizations (and their leaders) have very different fundamental objectives that are not captured by a zero-sum assumption applied to an evaluation model constructed from the US perspective. Furthermore, even in cases where there terrorist objects are similar to the mirror (opposite) objectives of the US, there are remarkable differences in attribute scales, attribute weights, and attribute utility functions capturing attitudes toward risk. These differences in values contribute to large differences in the evaluation of alternative attack strategies based on the proxy terrorist decision analytic model and the model assuming US values and a zero-sum game. With respect to our sensitivity analysis of anti-terrorism initiatives, we demonstrate that preferences and relative likelihoods are altered depending upon the anti-terrorism resource under consideration and the proxy terrorist s perceived risk posed by that resource. For example, as seen in Figures 1 and 2, the analysis shows that the tagging countermeasure, did not impact Proxy 1 s attack preferences. However, Proxy 2 s likelihood estimates decreased for those alternatives directly impacted by the anti-terrorism resource (Port nuclear device, dirty bomb, smallpox attack and anthrax release). In doing so, the desirability of Proxy 2 s most preferred attack, the no attack alternative, increased. Figure 1: Proxy 1 Relative Likelihood for Tagging Countermeasure Page 2 of 4

4 Figure 2: Proxy 2 Relative Likelihood for Tagging Countermeasure Interestingly, while anti-terrorism resources alter attribute scales and uncertainties and attack probability estimates, attack strategies preferences could remain unaffected depending on the values assigned to attribute weights and attribute utility functions capturing attitudes toward risk for each alternative. Through the exploration of different anti-terrorism resources impact on proxy terrorist preferences, insight is gained as to the extent to which government actions might influence terrorist decision making. 3. Research Products 3.1. Presentations Conferences 1. Rosoff, H., John, R., Fear and Loathing in Los Angeles and Hollywood, presented at The Subjective, Probability, Utility and Decision Making (SPUDM) 22 Biannual Meeting, Rovereto, Italy, August Rosoff, H., John, R., Risk Perception Driving Factors, presented at the Workshop on Public Response Threat: Cross-Disciplinary Contributions and Collaboration, Eugene, OR, August, Rosoff, H., John, R., Decision Analysis by Proxy for the Rational Terrorist, in proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI-09), Workshop on Quantitative Risk Analysis for Security Applications (QRASA), Pasadena, CA, July 11-17, John, R., Rosoff, H., Value Focused Thinking for Counterterrorism Risk Analysis, presented at the Department of Homeland Security (DHS) Annual Summit Meeting, Washington, DC, March 17-18, John R., A Good Bayesian was Seduced by the Dark Side, paper presented at the Edwards Bayesian Research Conference, Fullerton, CA, January Rosoff, H., John, R., Using Terrorism Risk Perception to Better Understand the Public s Response to Disasters, presented at the 47th Annual Bayesian Research Conference, Fullerton, CA, January John, R., Rosoff, H., The Sum of our Fears and Egocentric Zero-sum Assumptions, HSSAI sponsored paper presentation at the Institute for Operations Research and Management Science (INFORMS), Washington, DC, October 12-15, Rosoff, H., John, R., Estimating the Effects of Counter-terrorism on the Terrorist Threat, presented at the Society for Risk Analysis (SRA) Annual Meeting, Boston, MA, December 7-10, 2008 Page 3 of 4

5 3.2. Presentations - Outreach 1. Rosoff, H., John, R., Using Decision and Risk Analysis to Assist in Policy Making About Terrorism, presented at the School of Policy, Planning, and Development, University of Southern California, May Publications 1. Rosoff, H., Using Decision and Risk Analysis to Assist in Policy Making About Terrorism, doctoral dissertation, Detlof von Winterfeldt, Advisor and Dissertation Chair, School of Policy, Planning, and Development, University of Southern California, May Rosoff, H., John, R., Decision analysis by proxy for the rational terrorist, in proceedings of the 21 st International Joint Conference on Artificial Intelligence (IJCAI-09), Workshop on Quantitative Risk Analysis for Security Applications (QRASA), Pasadena, California, July Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of students supported (funded by CREATE) 3 # of students involved (funded by CREATE + any other programs) 1 Funded by CREATE Heather Rosoff, Doctoral Candidate, University of Southern California (USC) School of Policy, Planning and Development. Page 4 of 4

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2010 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern

More information

From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London

From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London CREATE Research Archive Research Project Summaries 2009 From Describing to Nudging: Choice of Transportation after a Terrorist Attack in London Barbara Fasolo London School of Economics and Political Science,

More information

The Effects of Time on Anticipated Consequences of Risks

The Effects of Time on Anticipated Consequences of Risks CREATE Research Archive Research Project Summaries 2011 The Effects of Time on Anticipated Consequences of Risks L. Robin Keller University of California - Irvine, Lrkeller@uci.edu Follow this and additional

More information

National Center for Risk and Economic Analysis of Terrorism Events University of Southern California

National Center for Risk and Economic Analysis of Terrorism Events University of Southern California National Center for Risk and Economic Analysis of Terrorism Events University of Southern California The Perception of Terrorist Events to Improve Risk Communication: Understanding the Impact of Near-Miss

More information

1. Executive Summary. These findings, along with Gigerenzer s dread hypothesis, made us realize that

1. Executive Summary. These findings, along with Gigerenzer s dread hypothesis, made us realize that From describing to nudging: Choice of transportation after a terrorist attack in London Barbara Fasolo et al., London School of Economics, UK b.fasolo@lse.ac.uk 1. Executive Summary...1 2. Research Accomplishments...3

More information

Risk Perception October 1, 2012 to September 30, Heather Rosoff Richard John University of Southern California

Risk Perception October 1, 2012 to September 30, Heather Rosoff Richard John University of Southern California National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Risk Perception October 1, 2012 to September 30, 2013 Heather Rosoff Richard John University of Southern

More information

UNDERSTANDING TERRORISM RISK PERCEPTION AND IMPROVING RISK COMMUNICATION: FINAL REPORT

UNDERSTANDING TERRORISM RISK PERCEPTION AND IMPROVING RISK COMMUNICATION: FINAL REPORT UNDERSTANDING TERRORISM RISK PERCEPTION AND IMPROVING RISK COMMUNICATION: FINAL REPORT Compiled and Edited by: William J. Burns Ph.D. Decision Research, CSUSM October 25, 2010 The following report describes

More information

FY2015 Annual Report. Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University

FY2015 Annual Report. Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University FY2015 Annual Report Risk Perception and Communication: Near-Misses and Risk Inoculation Robin Dillon-Merrill, Georgetown University Contents 1. Executive Summary... 1 2. Research and Research Transition

More information

OUR RECOMMENDED INDIVIDUAL S STRATEGY

OUR RECOMMENDED INDIVIDUAL S STRATEGY Chapter Four CONCLUSIONS OUR RECOMMENDED INDIVIDUAL S STRATEGY Our recommended strategy involves actions that individuals can take that can save lives, even in catastrophic terrorist attacks. This can

More information

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you?

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you? One Health and All-Hazards: the New Environmental Health Christopher Eddy, MPH, REHS, RS, M.B.A. (candidate) Erik Balster, MPH, REHS, RS July 11, 2013 Next best thing to the Cover of the Rolling Stone?

More information

Using Risk Analysis to Manage Terrorism Risk

Using Risk Analysis to Manage Terrorism Risk CREATE Research Archive Research Project Summaries 2010 Using Risk Analysis to Manage Terrorism Risk Henry H. Willis RAND, hwillis@rand.org Follow this and additional works at: http://research.create.usc.edu/project_summaries

More information

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS Journal Submission: International Journal of Emergency Mental Health Published: Volume 5, Number 1, Winter 2003 Submitted by: Richard J. Ottenstein, Ph.D., CEAP, CTS Address: The Workplace Trauma Center

More information

Assessing the Credibility of Threats Toward Schools

Assessing the Credibility of Threats Toward Schools Assessing the Credibility of Threats Toward Schools Disclaimer Sunshine Law Disclaimer CLOSED MEETINGS AND RECORDS 610.021, 610.022 A public governmental body is permitted, to close its records when they

More information

Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint

Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint 1 Construction of Theoretical Model for Antiterrorism: From Reflexive Game Theory Viewpoint Vladimir Lefebvre, PhD University of California, Irvine Kofi Nyamekye, PhD Integrated Activity-Based Simulation

More information

Conversation with Tom Inglesby on October 2, 2013

Conversation with Tom Inglesby on October 2, 2013 Participants Conversation with Tom Inglesby on October 2, 2013 Tom Inglesby, M.D., Chief Executive Officer and Director, University of Pittsburgh Medical Center (UPMC) Center for Health Security Alexander

More information

ATTACK MODALITIES. Draft 1 Charles P. Blair

ATTACK MODALITIES. Draft 1 Charles P. Blair ATTACK MODALITIES Draft 1 Charles P. Blair ATTACK MODALITIES Attack Modalities refers to the actual methods and techniques that terrorists choose to employ to attack particular targets. There are several

More information

Alternative Threat Methodology

Alternative Threat Methodology Volume 4 Number 1 Volume 4, No. 1: Spring 2011 Article 5 Alternative Threat Methodology Charles B. King III Transportation Security Administration, chas.king@dhs.gov Follow this and additional works at:

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

5/20/2014. Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition. ANC sysmposium 19 May 2014

5/20/2014. Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition. ANC sysmposium 19 May 2014 ANC sysmposium 19 May 2014 Lorentz workshop on HPI Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition Johan Kwisthout, Maria Otworowska, Harold Bekkering, Iris van Rooij

More information

CREATE Research Archive

CREATE Research Archive CREATE Research Archive Published Articles & Papers 1-1-2012 The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival

More information

A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network

A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network , pp.116-120 http://dx.doi.org/10.14257/astl.2016.137.22 A Study of Methodology on Effective Feasibility Analysis Using Fuzzy & the Bayesian Network JaeHyuk Cho 1 1 Division of Next Growth Engine R&D Coordiantion,

More information

SESHA--Graduate Lecture Series--Emerging Issues. Elizabeth Aton Washington University School of Medicine

SESHA--Graduate Lecture Series--Emerging Issues. Elizabeth Aton Washington University School of Medicine SESHA--Graduate Lecture Series--Emerging Issues Elizabeth Aton Washington University School of Medicine Elizabeth Aton Division of General Medical Sciences, Department of Internal Medicine, Campus Box

More information

Understanding and adapting to an

Understanding and adapting to an ABSTRACT Understanding and adapting to an evolving terrorist threat presents a significant challenge to intelligence and law enforcement communities around the world. The goal of this paper is to introduce

More information

RESEARCH PAPER. The psychological basis for terrorism and terrorists

RESEARCH PAPER. The psychological basis for terrorism and terrorists RESEARCH PAPER The psychological basis for terrorism and terrorists 2 1.0 Introduction The present research paper sheds light on the evidences that explain the psychological basis for terrorism and terrorists.

More information

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,

More information

Steve Eisenhawer Terry Bott D.V. Rao. American Nuclear Society Annual Meeting June 1-4, 2003 San Diego, CA

Steve Eisenhawer Terry Bott D.V. Rao. American Nuclear Society Annual Meeting June 1-4, 2003 San Diego, CA LA-UR-03-3467 Approved for public release; distribution is unlimited. Title: Assessing the Risk of Nuclear Terrorism Using Logic Evolved Decision Analysis Author(s): Steve Eisenhawer Terry Bott D.V. Rao

More information

Event Classification and Relationship Labeling in Affiliation Networks

Event Classification and Relationship Labeling in Affiliation Networks Event Classification and Relationship Labeling in Affiliation Networks Abstract Many domains are best described as an affiliation network in which there are entities such as actors, events and organizations

More information

Decisions and Dependence in Influence Diagrams

Decisions and Dependence in Influence Diagrams JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University

More information

A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models

A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models Jonathan Y. Ito and David V. Pynadath and Stacy C. Marsella Information Sciences Institute, University of Southern California

More information

Improving rapid counter terrorism decision making

Improving rapid counter terrorism decision making Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural

More information

CRIMINAL JUSTICE (CJ)

CRIMINAL JUSTICE (CJ) Criminal Justice (CJ) 1 CRIMINAL JUSTICE (CJ) CJ 500. Crime and Criminal Justice in the Cinema Prerequisite(s): Senior standing. Description: This course examines media representations of the criminal

More information

Foundations for a Science of Social Inclusion Systems

Foundations for a Science of Social Inclusion Systems Foundations for a Science of Social Inclusion Systems Fabio N. Akhras Renato Archer Center of Information Technology Rodovia Dom Pedro I, km 143,6 13089-500 Campinas, São Paulo, Brazil Phone: 0055-19-37466268

More information

Module 2 - Public Health Preparedness

Module 2 - Public Health Preparedness Module 2 - Public Health Preparedness Objectives Define a public health emergency List examples of types of public health events and emergencies Overview Protecting the public from health threats involves

More information

Societal Ripple Effects from Terrorist Attacks and Risk Communication Strategies Based on Fear and Anger

Societal Ripple Effects from Terrorist Attacks and Risk Communication Strategies Based on Fear and Anger CREATE Research Archive Research Project Summaries 1-1-2011 Societal Ripple Effects from Terrorist Attacks and Risk Communication Strategies Based on Fear and Anger Xiaoli Nan University of Maryland -

More information

Tambe, Developing the Science and Applications of Security Games: Machine Learning, Uncertainty and Preference Elicitation in Game Theory for Security

Tambe, Developing the Science and Applications of Security Games: Machine Learning, Uncertainty and Preference Elicitation in Game Theory for Security Games: Machine Learning, Uncertainty and Preference Having successfully founded the research area of security games, which has led to real-world applications in scheduling the deployment of limited resources

More information

Assessing U.S. Travelers Trade-offs for Aviation Safety Objectives: A Natural Experiment

Assessing U.S. Travelers Trade-offs for Aviation Safety Objectives: A Natural Experiment Proceedings of the 50th Hawaii International Conference on System Sciences 2017 Assessing U.S. Travelers Trade-offs for Aviation Safety Objectives: A Natural Experiment Kenneth Nguyen University of Southern

More information

Modeling Populations of Interest in Order to Simulate Cultural Response to Influence Activities

Modeling Populations of Interest in Order to Simulate Cultural Response to Influence Activities Modeling Populations of Interest in Order to Simulate Cultural Response to Influence Activities Michael Bernard a, George Backus b, Matthew Glickman c, Charles Gieseler d, and Russel Waymire e {mlberna

More information

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Simon Pope and Audun Jøsang, DSTC, CRC for Enterprise Distributed Systems Technology ICCRTS, 13-16 June 2005 June 22, 2005 DSTC 2005. All

More information

E x e c u t i v e S u m m a r y. P o w e r e d b y

E x e c u t i v e S u m m a r y. P o w e r e d b y E x e c u t i v e S u m m a r y P o w e r e d b y COPYRIGHT BRAINWAVE SCIENCE 2016 Our Company Founded in 2012, Brainwave Science offers its ground-breaking Brain Fingerprinting Technology with applications

More information

The Common Priors Assumption: A comment on Bargaining and the Nature of War

The Common Priors Assumption: A comment on Bargaining and the Nature of War The Common Priors Assumption: A comment on Bargaining and the Nature of War Mark Fey Kristopher W. Ramsay June 10, 2005 Abstract In a recent article in the JCR, Smith and Stam (2004) call into question

More information

Innovations in Risk and Economic Modeling of Counterterrorism

Innovations in Risk and Economic Modeling of Counterterrorism CREATE Research Archive Research Project Summaries 2012 Innovations in Risk and Economic Modeling of Counterterrorism Vicki M. Bier University of Wisconsin, bier@engr.wisc.edu Follow this and additional

More information

LOW-RANK DECOMPOSITION AND LOGISTIC REGRESSION METHODS FOR LINK PREDICTION IN TERRORIST NETWORKS CSE 293 MS PROJECT REPORT, FALL 2010.

LOW-RANK DECOMPOSITION AND LOGISTIC REGRESSION METHODS FOR LINK PREDICTION IN TERRORIST NETWORKS CSE 293 MS PROJECT REPORT, FALL 2010. LOW-RANK DECOMPOSITION AND LOGISTIC REGRESSION METHODS FOR LINK PREDICTION IN TERRORIST NETWORKS CSE 293 MS PROJECT REPORT, FALL 2010 Eric Doi ekdoi@cs.ucsd.edu University of California, San Diego ABSTRACT

More information

On Trust. Massimo Felici. Massimo Felici On Trust c

On Trust. Massimo Felici. Massimo Felici On Trust c On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust

More information

Monitoring and Evaluation Material Development Message Development Channel Analysis Audience Analysis Situational Analysis

Monitoring and Evaluation Material Development Message Development Channel Analysis Audience Analysis Situational Analysis Risk Communication Plan Monitoring and Evaluation Material Development Message Development Channel Analysis Audience Analysis Situational Analysis Susana G. Juangco DOH HEMS, Philippines Learning Objectives

More information

Cultural Competence: An Ethical Model for Big Data Research

Cultural Competence: An Ethical Model for Big Data Research Cultural Competence: An Ethical Model for Big Data Research Amirah Majid The Information School University of Washington Seattle, WA 98105 USA amirah@uw.edu Abstract Data science research is human subjects

More information

Some Thoughts on the Principle of Revealed Preference 1

Some Thoughts on the Principle of Revealed Preference 1 Some Thoughts on the Principle of Revealed Preference 1 Ariel Rubinstein School of Economics, Tel Aviv University and Department of Economics, New York University and Yuval Salant Graduate School of Business,

More information

Should I stay or should I go? An experimental study of health and economic government policies following a severe biological agent release

Should I stay or should I go? An experimental study of health and economic government policies following a severe biological agent release CREATE Research Archive Published Articles & Papers 1-13-2013 Should I stay or should I go? An experimental study of health and economic government policies following a severe biological agent release

More information

THE GLOBAL HEALTH SECURITY AGENDA. We have to change our mindsets and start thinking about biological threats as the security threats that they are.

THE GLOBAL HEALTH SECURITY AGENDA. We have to change our mindsets and start thinking about biological threats as the security threats that they are. THE GLOBAL HEALTH SECURITY AGENDA We have to change our mindsets and start thinking about biological threats as the security threats that they are. President Barack Obama September 26, 2014 1 Global Health

More information

C/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people,

C/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people, C/S/E/L :2008 innovations at the intersection of people, technology, and work. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor Daniel J. Zelik The Ohio State University

More information

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? Richards J. Heuer, Jr. Version 1.2, October 16, 2005 This document is from a collection of works by Richards J. Heuer, Jr.

More information

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Theories and Theorists in Public Health Response to Bioterrorism Patricia Bolivar Walden University Research Theory, Design, and Method

More information

On Spotting the Terrorist in a Crowd

On Spotting the Terrorist in a Crowd On Spotting the Terrorist in a Crowd 2-3 March, 2018 Edwards Bayesian Research Conference CSU, Fullerton Richard S. John Dept. of Psychology University of Southern California Center for Risk and Economic

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementary Statistics and Results This file contains supplementary statistical information and a discussion of the interpretation of the belief effect on the basis of additional data. We also present

More information

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict Threat Assessment & Response to Mass Violence Mario J. Scalora, Ph.D. Agenda Brief Overview of Threat Assessment Principles Recent Trends in Targeted Violence Application to Mass Casualty Response Targeted

More information

Detention and Reintegration Working Group. Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders

Detention and Reintegration Working Group. Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders Detention and Reintegration Working Group Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders 8-9 April 2015 Medan, Indonesia Summary Overview On 8-9

More information

You must answer question 1.

You must answer question 1. Research Methods and Statistics Specialty Area Exam October 28, 2015 Part I: Statistics Committee: Richard Williams (Chair), Elizabeth McClintock, Sarah Mustillo You must answer question 1. 1. Suppose

More information

White Paper. Human Behavior Analytics with Proxy Interrogatories

White Paper. Human Behavior Analytics with Proxy Interrogatories White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics

More information

Artificial Intelligence and Human Thinking. Robert Kowalski Imperial College London

Artificial Intelligence and Human Thinking. Robert Kowalski Imperial College London Artificial Intelligence and Human Thinking Robert Kowalski Imperial College London 1 Artificial Intelligence and Human Thinking The Abductive Logic Programming (ALP) agent model as a unifying framework

More information

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)

Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) Simon Pope and Audun Jøsang, DSTC, CRC for Enterprise Distributed Systems Technology ICCRTS, 13-16 June 2005 June 22, 2005 DSTC 2005. All

More information

and Explanation C Kristen Alley Swain, P Meek School of Journalism and Ne University of Mississippi

and Explanation C Kristen Alley Swain, P Meek School of Journalism and Ne University of Mississippi Risk Perceptions o and Explanation C in Terrorism News Kristen Alley Swain, P Meek School of Journalism and Ne University of Mississippi kaswain@olemiss.edu Background Terrorists try to provoke a high

More information

Assessment and Estimation of Risk Preferences (Outline and Pre-summary)

Assessment and Estimation of Risk Preferences (Outline and Pre-summary) Assessment and Estimation of Risk Preferences (Outline and Pre-summary) Charles A. Holt and Susan K. Laury 1 In press (2013) for the Handbook of the Economics of Risk and Uncertainty, Chapter 4, M. Machina

More information

Analysis of Competing Hypotheses. An Analytical Process by former CIA analyst Richards J Heuer, Jr.

Analysis of Competing Hypotheses. An Analytical Process by former CIA analyst Richards J Heuer, Jr. Analysis of Competing Hypotheses An Analytical Process by former CIA analyst Richards J Heuer, Jr. What is analysis? google Detailed examination of the elements or structure of something, typically as

More information

A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs

A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs Fred H. Cate Distinguished Professor and Director Center for Applied Cybersecurity Research, Indiana University Herbert

More information

CONFLICT MANAGEMENT Fourth Edition

CONFLICT MANAGEMENT Fourth Edition Assessment CONFLICT MANAGEMENT Fourth Edition Complete this book, and you ll know how to: 1) Catch disagreement before it escalates into dysfunctional conflict. 2) Replace habitual styles of handling differences

More information

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game

Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Effects of Sequential Context on Judgments and Decisions in the Prisoner s Dilemma Game Ivaylo Vlaev (ivaylo.vlaev@psy.ox.ac.uk) Department of Experimental Psychology, University of Oxford, Oxford, OX1

More information

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008 Evaluation of Methods for Drawing Inferences about Non-State Actors Perceptions of the Risks and Benefits of Seeking and Acquiring Weapons of Mass Destruction Kevin Murphy The Pennsylvania State University,

More information

7/19/2010. Social CERC Is there an APP for that? What is CERC? What s with the Color Key?

7/19/2010. Social CERC Is there an APP for that? What is CERC? What s with the Color Key? Social CERC Is there an APP for that? Kristine A. Smith, M.A. NYS Department of Health What is CERC? Crisis and Emergency Risk Communication is different from Traditional risk communication where the actual

More information

Bayes, Data and NUREG/CR-6928 Caveats Nathan Larson, Carroll Trull September 2017

Bayes, Data and NUREG/CR-6928 Caveats Nathan Larson, Carroll Trull September 2017 Bayes, Data and NUREG/CR-6928 Caveats Nathan Larson, Carroll Trull September 2017 1 Overview State-of-Knowledge Correlation Change-of-State Failure Mode LOCA Treatment Plant Availability Factor Zero Event

More information

Chapter 1: Thinking critically with. Introduction

Chapter 1: Thinking critically with. Introduction Chapter 1: Thinking critically with psychological science Introduction Fact or Falsehood 1. Human intuition is remarkable accurate and free from error. 2. Most people seem to lack confidence in the accuracy

More information

The competitive advantages of a spatially centralized entity versus a decentralized entity

The competitive advantages of a spatially centralized entity versus a decentralized entity The competitive advantages of a spatially centralized entity versus a decentralized entity New England Complex Systems Institute One-Week Intensive Course: Complex Physical, Biological and Social Systems

More information

AU TQF 2 Doctoral Degree. Course Description

AU TQF 2 Doctoral Degree. Course Description Course Description 1. Foundation Courses CP 5000 General Psychology Non-credit Basic psychological concepts and to introduce students to the scientific study of behavior. Learning and Behavior, Altered

More information

Support system for breast cancer treatment

Support system for breast cancer treatment Support system for breast cancer treatment SNEZANA ADZEMOVIC Civil Hospital of Cacak, Cara Lazara bb, 32000 Cacak, SERBIA Abstract:-The aim of this paper is to seek out optimal relation between diagnostic

More information

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER CARVER + SHOCK PRIMER 1 CARVER PLUS SHOCK METHOD FOR FOOD SECTOR VULNERABILITY ASSESSMENTS 1 Overview The CARVER plus Shock method is an offensive targeting prioritization tool that has been adapted for

More information

INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM. National Nuclear Security Administration. Nuclear Safeguards

INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM. National Nuclear Security Administration. Nuclear Safeguards 2017 INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM National Nuclear Security Administration Nuclear Safeguards 1 Contents 1 2 4 6 The International Nuclear Safeguards Engagement Program About IAEA

More information

Protective Actions and Interventions

Protective Actions and Interventions Protective Actions and Interventions Risk Communication, psychosocial factors, readiness and disaster behaviors Moderator Robert J. Ursano, M.D PANEL: Steve M Becker Ph.D. H. Keith Florig Ph.D. Ann E Norwood

More information

A Classification Tree for Predicting Consumer Preferences for Risk Reduction

A Classification Tree for Predicting Consumer Preferences for Risk Reduction A Classification Tree for Predicting Consumer Preferences for Risk Reduction John K. Horowitz; Richard T. Carson American Journal of Agricultural Economics, Vol. 73, No. 5, Proceedings Issue. (Dec., 1991),

More information

John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow

John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow Empirical Bayes Estimates of Development Reliability for One Shot Devices John Quigley, Tim Bedford, Lesley Walls Department of Management Science, University of Strathclyde, Glasgow This article describes

More information

Between-word regressions as part of rational reading

Between-word regressions as part of rational reading Between-word regressions as part of rational reading Klinton Bicknell & Roger Levy UC San Diego CUNY 2010: New York Bicknell & Levy (UC San Diego) Regressions as rational reading CUNY 2010 1 / 23 Introduction

More information

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory Forensic Issues Regarding the Analysis of Evidence in Support of Agroterrorism Investigations Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory 703-632-7770 mwilson@fbiacademy.edu

More information

Green Security Games: Apply Game Theory to Addressing Green Security Challenges

Green Security Games: Apply Game Theory to Addressing Green Security Challenges Green Security Games: Apply Game Theory to Addressing Green Security Challenges FEI FANG University of Southern California and THANH H. NGUYEN University of Southern California In the past decade, game-theoretic

More information

Perceived similarity and visual descriptions in content-based image retrieval

Perceived similarity and visual descriptions in content-based image retrieval University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Perceived similarity and visual descriptions in content-based image

More information

Thoughts on Social Design

Thoughts on Social Design 577 Center for Mathematical Economics Working Papers September 2017 Thoughts on Social Design Walter Trockel and Claus-Jochen Haake Center for Mathematical Economics(IMW) Bielefeld University Universitätsstraße

More information

Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar

Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar Grant Competition: AARP Foundation Seeks Evidence-Based Solutions for Vulnerable Older Adults Applicant Webinar Presented by Matt D Amico, Grant Program Officer October 11, 2016 Webinar Agenda AARP Foundation

More information

Reflect on the Types of Organizational Structures. Hierarch of Needs Abraham Maslow (1970) Hierarchy of Needs

Reflect on the Types of Organizational Structures. Hierarch of Needs Abraham Maslow (1970) Hierarchy of Needs Reflect on the Types of Organizational Structures 1 Hierarch of Needs Abraham Maslow (1970) Self- Actualization or Self- Fulfillment Esteem Belonging, Love, and Social Activities Safety and Security Psychological

More information

Groups in Organizations. Overview of topics

Groups in Organizations. Overview of topics Groups in Organizations Overview of topics 1 Plan of today s lecture Groups general aspects Links with individual behavior Cohesion & conformity Decision making in groups 2 Characteristics of Groups Groups

More information

A Brief Introduction to Bayesian Statistics

A Brief Introduction to Bayesian Statistics A Brief Introduction to Statistics David Kaplan Department of Educational Psychology Methods for Social Policy Research and, Washington, DC 2017 1 / 37 The Reverend Thomas Bayes, 1701 1761 2 / 37 Pierre-Simon

More information

SITUATIONAL AWARENESS IN A BIOTERROR ATTACK VIA PROBABILITY MODELING

SITUATIONAL AWARENESS IN A BIOTERROR ATTACK VIA PROBABILITY MODELING SITUATIONAL AWARENESS IN A BIOTERROR ATTACK VIA PROBABILITY MODELING Edward H. Kaplan William N and Marie A Beach Professor of Management Sciences Yale School of Management Professor of Public Health Yale

More information

Capturing the dependences between intelligence signals without undue computational burden

Capturing the dependences between intelligence signals without undue computational burden Probabilistic Early Warning for National Security Crises Elisabeth Paté-Cornell, Stanford University David Blum, Stanford University mep@stanford.edu dmblum@stanford.edu 1. Executive Summary... 1 2. Research

More information

An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners

An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners Linwood D. Hudson Digital Sandbox, Inc. 11710 Plaza America Dr., Suite 2000 Reston, VA 20190 lhudson@dsbox.com

More information

Responsiveness to feedback as a personal trait

Responsiveness to feedback as a personal trait Responsiveness to feedback as a personal trait Thomas Buser University of Amsterdam Leonie Gerhards University of Hamburg Joël van der Weele University of Amsterdam Pittsburgh, June 12, 2017 1 / 30 Feedback

More information

Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang.

Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang. Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma February 04, 2019 Tao Chen Wan Wang Sining Wang Lei Chen University of Waterloo University of Waterloo

More information

Risk Interpretation and Action

Risk Interpretation and Action Risk Interpretation and Action J. Richard Eiser 1, Ann Bostrom 2, Ian Burton 3, David Johnston 4, John McClure 5, Douglas Paton 6, Joop van der Pligt 7, Mathew White 8. 1 University of Sheffield, UK; 2

More information

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1 Finding Information Sources by Model Sharing in Open Multi-Agent Systems Jisun Park, K. Suzanne Barber The Laboratory for Intelligent Processes and Systems The University of Texas at Austin 20 E. 24 th

More information

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018 Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this

More information

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking Journal of Applied Psychology 1982, Vol. 67, No. 5, 616-622 Copyright 1982 by the American Psychological Association, Inc. 002I-9010/82/6705-0616S00.75 ', ', and Nonsmokers' Beliefs About Cigarette Smoking

More information

1. PSYCHOLOGY and ADVERTISING

1. PSYCHOLOGY and ADVERTISING ADVERTISING PSYCHOLOGY 1. PSYCHOLOGY and ADVERTISING SCIENCE AND ADVERTISING Missions, Methods, Conceptions THE MISSION OF ADVERTISING PSYCHOLOGY Philip Kotler The goal of marketing is to change the demands

More information

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options

The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Executive Summary: The National Deliberative Poll in Japan, August 4-5, 2012 on Energy and Environmental Policy Options Overview This is the first Deliberative Poll (DP) anywhere in the world that was

More information

Crisis Counseling Assistance and Training Program Trainer s Toolkit. References

Crisis Counseling Assistance and Training Program Trainer s Toolkit. References Crisis Counseling Assistance and Training Program Trainer s Toolkit References Crisis Counseling Assistance and Training Program Trainer s Toolkit References American Psychological Association and Discovery

More information

Internet Society Philadelphia Chapter Meeting. 11 June 2010

Internet Society Philadelphia Chapter Meeting. 11 June 2010 Internet Society Philadelphia Chapter Meeting 11 June 2010 Who are we? Founded in 1992 by Internet Pioneers, as an international nonprofit organization 100+ organization members tens t of thousands of

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information