IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v38y2018i12p2683-2702.html
   My bibliography  Save this article

Sequential Refined Partitioning for Probabilistic Dependence Assessment

Author

Listed:
  • Christoph Werner
  • Tim Bedford
  • John Quigley

Abstract

Modeling dependence probabilistically is crucial for many applications in risk assessment and decision making under uncertainty. Neglecting dependence between multivariate uncertainties can distort model output and prevent a proper understanding of the overall risk. Whenever relevant data for quantifying and modeling dependence between uncertain variables are lacking, expert judgment might be sought to assess a joint distribution. Key challenges for the use of expert judgment for dependence modeling are over‐ and underspecification. An expert can provide assessments that are infeasible, i.e., not consistent with any probability distribution (overspecification), and on the other hand, without making very restrictive parametric assumptions an expert cannot fully define a probability distribution (underspecification). The sequential refined partitioning method addresses over‐ and underspecification while allowing for flexibility about which part of a joint distribution is assessed and its level of detail. Potential overspecification is avoided by ensuring low cognitive complexity for experts through eliciting single conditioning sets and by offering feasible assessment ranges. The feasible range of any (sequential) assessment can be derived by solving a linear programming problem. Underspecification is addressed by modeling the density of directly and indirectly assessed distribution parts as minimally informative given their constraints. Hence, our method allows for modeling the whole distribution feasibly and in accordance with experts' information. A nonparametric way of assessing and modeling dependence flexibly in such detail has not been presented in the expert judgment literature for probabilistic dependence models so far. We provide an example of assessing terrorism risk in insurance underwriting.

Suggested Citation

  • Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
  • Handle: RePEc:wly:riskan:v:38:y:2018:i:12:p:2683-2702
    DOI: 10.1111/risa.13162
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.13162
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.13162?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    2. Guikema, Seth D. & Aven, Terje, 2010. "Assessing risk from intelligent attacks: A perspective on approaches," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 478-483.
    3. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    4. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    5. Werner, Christoph & Bedford, Tim & Cooke, Roger M. & Hanea, Anca M. & Morales-Nápoles, Oswaldo, 2017. "Expert judgement for dependence in probabilistic modelling: A systematic literature review and future research directions," European Journal of Operational Research, Elsevier, vol. 258(3), pages 801-819.
    6. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    7. B. John Garrick, 2002. "Perspectives on the Use of Risk Assessment to Address Terrorism," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 421-423, June.
    8. Shin, Jinsoo & Son, Hanseong & Khalil ur, Rahman & Heo, Gyunyoung, 2015. "Development of a cyber security risk model using Bayesian networks," Reliability Engineering and System Safety, Elsevier, vol. 134(C), pages 208-217.
    9. John Quigley & Abigail Colson & Willy Aspinall & Roger M. Cooke, 2018. "Elicitation in the Classical Model," International Series in Operations Research & Management Science, in: Luis C. Dias & Alec Morton & John Quigley (ed.), Elicitation, chapter 0, pages 15-36, Springer.
    10. Martin Eling & Denis Toplek, 2009. "Modeling and Management of Nonlinear Dependencies–Copulas in Dynamic Financial Analysis," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 76(3), pages 651-681, September.
    11. Luis V. Montiel & J. Eric Bickel, 2013. "Approximating Joint Probability Distributions Given Partial Information," Decision Analysis, INFORMS, vol. 10(1), pages 26-41, March.
    12. Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
    13. Tim Bedford & Alireza Daneshkhah & Kevin J. Wilson, 2016. "Approximate Uncertainty Modeling in Risk Analysis with Vine Copulas," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 792-815, April.
    14. Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
    15. Bernd Kraan & Tim Bedford, 2005. "Probabilistic Inversion of Expert Judgments in the Quantification of Model Uncertainty," Management Science, INFORMS, vol. 51(6), pages 995-1006, June.
    16. Bedford, Tim & Wilson, Kevin J. & Daneshkhah, Alireza, 2014. "Assessing parameter uncertainty on coupled models using minimum information methods," Reliability Engineering and System Safety, Elsevier, vol. 125(C), pages 3-12.
    17. Tim Bedford & Kevin Wilson, 2014. "On the construction of minimum information bivariate copula families," Annals of the Institute of Statistical Mathematics, Springer;The Institute of Statistical Mathematics, vol. 66(4), pages 703-723, August.
    18. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    19. Kousky, Carolyn & Cooke, Roger M., 2009. "The Unholy Trinity: Fat Tails, Tail Dependence, and Micro-Correlations," RFF Working Paper Series dp-09-36-rev.pdf, Resources for the Future.
    20. Christoph Werner & Anca M. Hanea & Oswaldo Morales-Nápoles, 2018. "Eliciting Multivariate Uncertainty from Experts: Considerations and Approaches Along the Expert Judgement Process," International Series in Operations Research & Management Science, in: Luis C. Dias & Alec Morton & John Quigley (ed.), Elicitation, chapter 0, pages 171-210, Springer.
    21. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    22. Anca M. Hanea & Mark Burgman & Victoria Hemming, 2018. "IDEA for Uncertainty Quantification," International Series in Operations Research & Management Science, in: Luis C. Dias & Alec Morton & John Quigley (ed.), Elicitation, chapter 0, pages 95-117, Springer.
    23. H. Rosoff & D. Von Winterfeldt, 2007. "A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 533-546, June.
    24. Gerd Gigerenzer & Ralph Hertwig & Eva Van Den Broek & Barbara Fasolo & Konstantinos V. Katsikopoulos, 2005. "“A 30% Chance of Rain Tomorrow”: How Does the Public Understand Probabilistic Weather Forecasts?," Risk Analysis, John Wiley & Sons, vol. 25(3), pages 623-629, June.
    25. Alexander J. McNeil & Rüdiger Frey & Paul Embrechts, 2015. "Quantitative Risk Management: Concepts, Techniques and Tools Revised edition," Economics Books, Princeton University Press, edition 2, number 10496.
    26. Gregory L. Keeney & Detlof von Winterfeldt, 2010. "Identifying and Structuring the Objectives of Terrorists," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1803-1816, December.
    27. John Paul Gosling, 2018. "SHELF: The Sheffield Elicitation Framework," International Series in Operations Research & Management Science, in: Luis C. Dias & Alec Morton & John Quigley (ed.), Elicitation, chapter 0, pages 61-93, Springer.
    28. Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
    29. Erwann Michel‐Kerjan & Burkhard Pedell, 2006. "How Does the Corporate World Cope with Mega‐Terrorism? Puzzling Evidence from Terrorism Insurance Markets," Journal of Applied Corporate Finance, Morgan Stanley, vol. 18(4), pages 61-75, September.
    30. Christian Genest & Michel Gendron & Michaël Bourdeau-Brien, 2009. "The Advent of Copulas in Finance," The European Journal of Finance, Taylor & Francis Journals, vol. 15(7-8), pages 609-618.
    31. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    32. Aven, Terje & Krohn, Bodil S., 2014. "A new perspective on how to understand, assess and manage risk and the unforeseen," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 1-10.
    33. Jozef De Mey, 2003. "The Aftermath of September 11: The Impact on and Systemic Risk to the Insurance Industry," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 28(1), pages 65-70, January.
    34. J. Eric Bickel & James E. Smith, 2006. "Optimal Sequential Exploration: A Binary Learning Model," Decision Analysis, INFORMS, vol. 3(1), pages 16-32, March.
    35. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    36. Luis V. Montiel & J. Eric Bickel, 2012. "A Simulation-Based Approach to Decision Making with Partial Information," Decision Analysis, INFORMS, vol. 9(4), pages 329-347, December.
    37. Nagler, Thomas & Czado, Claudia, 2016. "Evading the curse of dimensionality in nonparametric density estimation with simplified vine copulas," Journal of Multivariate Analysis, Elsevier, vol. 151(C), pages 69-89.
    38. James E. Smith & Detlof von Winterfeldt, 2004. "Anniversary Article: Decision Analysis in Management Science," Management Science, INFORMS, vol. 50(5), pages 561-574, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Rafael Schwarzenegger & John Quigley & Lesley Walls, 2023. "Is eliciting dependency worth the effort? A study for the multivariate Poisson-Gamma probability model," Journal of Risk and Reliability, , vol. 237(5), pages 858-867, October.
    2. Vicki Bier, 2020. "The Role of Decision Analysis in Risk Analysis: A Retrospective," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2207-2217, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    2. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    3. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    4. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    5. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    6. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    7. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    8. William M. Kroshl & Shahram Sarkani & Thomas A Mazzuchi, 2015. "Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation," Risk Analysis, John Wiley & Sons, vol. 35(9), pages 1690-1705, September.
    9. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    10. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    11. Tianyang Wang & James S. Dyer & Warren J. Hahn, 2017. "Sensitivity analysis of decision making under dependent uncertainties using copulas," EURO Journal on Decision Processes, Springer;EURO - The Association of European Operational Research Societies, vol. 5(1), pages 117-139, November.
    12. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    13. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    14. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    15. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    16. Michael Macgregor Perry & Hadi El-Amine, 2021. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Papers 2110.12572, arXiv.org.
    17. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    18. Thomas Ying‐Jeh Chen & Valerie Nicole Washington & Terje Aven & Seth David Guikema, 2020. "Review and Evaluation of the J100‐10 Risk and Resilience Management Standard for Water and Wastewater Systems," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 608-623, March.
    19. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    20. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:38:y:2018:i:12:p:2683-2702. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.