Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-5g6vh Total loading time: 0 Render date: 2024-04-29T20:00:12.770Z Has data issue: false hasContentIssue false

29 - Asymmetric Prescriptive/Descriptive Game Theory for Counterterrorism

Published online by Cambridge University Press:  13 December 2017

Ali E. Abbas
Affiliation:
University of Southern California
Milind Tambe
Affiliation:
University of Southern California
Detlof von Winterfeldt
Affiliation:
University of Southern California
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Berejikian, J. (2002a). A cognitive theory of deterrence. Journal of Peace Research, 39(2), 165183.CrossRefGoogle Scholar
Berejikian, J. (2002b). Model building with prospect theory: A cognitive approach to international relations. Political Psychology, 23(4), 759786.CrossRefGoogle Scholar
Bleichrodt, H., Schmidt, U., & Zank, H. (2009). Additive utility in prospect theory. Management Science, 55(5), 863873.Google Scholar
Butler, C. (2007). Prospect theory and coercive bargaining. Journal of Conflict Resolution, 51(2), 227250.CrossRefGoogle Scholar
Camerer, C. (2003). Behavioral game theory. Princeton, NJ: Princeton University Press.Google Scholar
Chateauneuf, A., Eichberger, J., & Grant, S. (2007). Choice under uncertainty with the best and worst in mind: NEO-additive capacities. Journal of Economic Theory, 137, 538567.Google Scholar
Colman, A. (2003). Cooperation, psychological game theory, and limitations of rationality in social interaction. Behavioral and Brain Sciences, 26, 139198.Google Scholar
Einhorn, H. J. (1970). The use of nonlinear, noncompensatory models in decision making. Psychological Bulletin, 73(3), 221.CrossRefGoogle ScholarPubMed
Einhorn, H. J. (1971). Use of nonlinear, noncompensatory models as a function of task and amount of information. Organizational Behavior and Human Performance, 6(1), 127.CrossRefGoogle Scholar
Gigerenzer, G., & Todd, P. M. (1999). Simple heuristics that make us smart. New York: Oxford University Press.Google Scholar
Kadane, J. B., & Larkey, P.D. (1982a). Subjective probability and the theory of games. Management Science, 28(2), 13651379.Google Scholar
Kadane, J. B., & Larkey, P.D. (1982b). The confusion of is and ought in game theoretic contexts. Management Science, 29(12), 113120.Google Scholar
Kahneman, D. (2011). Thinking fast and slow. New York: Farrar, Straus and Girou.Google Scholar
Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47, 263292.CrossRefGoogle Scholar
Kar, D., Fang, F., Fave, F. D., Sintov, N., & Tambe, M. (2015). “A game of thrones”: When human behavior models compete in repeated Stackelberg security games. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS).Google Scholar
Keeney, G. L., & von Winterfeldt, D. (2010). Identifying and structuring the objectives of terrorists. Risk Analysis, 30(12), 18031816.CrossRefGoogle ScholarPubMed
Keeney, R. L. (2007). Modeling values for anti-terrorism analysis. Risk Analysis, 27(3), 585596.CrossRefGoogle ScholarPubMed
Leclerc, P. (2014). Prospect theory preferences in noncooperative game theory. PhD Dissertation. Virginia Commonwealth University.Google Scholar
McKelvey, R., & Palfrey, T. (1995). Quantal response equilibria for normal form games. Games and Economic Behavior, 10(1), 638.CrossRefGoogle Scholar
Merrick, J. R. W., & LeClerc, P. (2016). Modeling adversaries in counterterrorism decisions using prospect theory. Risk Analysis, 36(4), 681–693.CrossRefGoogle Scholar
Merrick, J. R. W., LeClerc, P., Trenkov, H., & Olsen, R. (2015). Outthinking the terrorists. In Anthony Cox (Ed.), Breakthroughs in risk analysis (pp. 287–312). Hoboken, NJ: Wiley.Google Scholar
Merrick, J. R. W., & Parnell, G. S. (2011). A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 31(9), 14881510.CrossRefGoogle ScholarPubMed
Metzger, L., & Rieger, M. (2010). Equilibria in games with prospect theory preferences. Unpublished manuscript.Google Scholar
Nash, J. (1950). Equilibrium points in N-person games. Proceedings of the National Academy of Sciences, 36(36), 4849.Google Scholar
Nguyen, T. H., Yang., R., Azaria, A., Kraus, S., & Tambe, M. (2013, July). Analyzing the effectiveness of adversary modeling in security games. In Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI).Google Scholar
Parnell, G. S., Smith, C. M., & Moxley, F. I. (2010). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30(1), 3248.CrossRefGoogle ScholarPubMed
Quiggin, J. (1982). A theory of anticipated utility. Journal of Economic Behavior and Organization, 3(4), 323343.Google Scholar
Quiggin, J. (1991). Generalized expected utility theory: The rank-dependent model. Boston, MA: Kluwer Academic Publishers.Google Scholar
Raiffa, H. (1985). The art and science of negotiation. Cambridge, MA: Harvard University Press.Google Scholar
Ramsey, F. (1931). Foundations essays in philosophy, logic, mathematics and economics. London: Humanities Press, Routledge.Google Scholar
Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841854.Google Scholar
Ritzberger, K. (1994). On games under expected utility with rank dependent probabilities. Theory and Decision, 40(1), 127.CrossRefGoogle Scholar
Rosoff, H., & John, R. (2009). Decision analysis by proxy for the rational terrorist. Proc. Internat. Joint Conf. Artificial Intelligence (IJCAI-09), Quant. Risk Anal. Security Applications. Accessed January 4, 2013, http://teamcore.usc.edu/QRASA-09/SubmissionsFinal/Paper_4.pdf.Google Scholar
Savage, L. J. (1954). Foundations of statistics. New York: John Wiley.Google Scholar
Shalev, J. (2000). Loss aversion equilibrium. International Journal of Game Theory, 29(2), 269287.Google Scholar
Simon, H. A. (1955). A behavioral model of rational choice. The Quarterly Journal of Economics, 69(1), 99118.Google Scholar
Starmer, C. (2000). Developments in non-expected utility theory: The hunt for a descriptive theory of choice under risk. Journal of Economic Literature, 38(2), 332382.Google Scholar
Tversky, A. (1972). Elimination by aspects: A theory of choice. Psychological Review, 79(4), 281299.CrossRefGoogle Scholar
Tversky, A., & Kahneman, D. (1992). Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and Uncertainty, 5(4), 297323.CrossRefGoogle Scholar
Tversky, A., Sattath, S., & Slavic, P. (1988). Contingent weighting in judgment and choice. Psychological Review, 95(37), 184.Google Scholar
von Neumann, J, & Morgenstern, O. (1944). The theory of games and economic behaviour. Princeton, NJ: Princeton University Press.Google Scholar
Wu, G., & Gonzalez, R. (1996). Curvature of the probability weighting function. Management Science, 42(12), 16761690.Google Scholar
Wu, G., & Gonzalez, R. (1999). On the shape of the probability weighting function. Cognitive Psychology, 38, 129166.Google Scholar
Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., & John, R. (2013). Improving resource allocation strategy against human adversaries in security games: An extended study. Artificial Intelligence Journal, 195, 440469.CrossRefGoogle Scholar
Zank, H. (2001). Cumulative prospect theory for parametric and multiattribute utilities. Mathematics of Operations Research, 26, 6781.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×