IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v22y2002i3p445-454.html
   My bibliography  Save this article

Fusion of Intelligence Information: A Bayesian Approach

Author

Listed:
  • Elisabeth Paté‐Cornell

Abstract

The attack that occurred on September 11, 2001 was, in the end, the result of a failure to detect and prevent the terrorist operations that hit the United States. The U.S. government thus faces at this time the daunting tasks of first, drastically increasing its ability to obtain and interpret different types of signals of impending terrorist attacks with sufficient lead time and accuracy, and second, improving its ability to react effectively. One of the main challenges is the fusion of information, from different sources (U.S. or foreign), and of different types (electronic signals, human intelligence, etc.). Fusion thus involves two very distinct and separate issues: communications, i.e., ensuring that the different U.S. and foreign intelligence agencies communicate all relevant and accurate information in a timely fashion and, perhaps more difficult, merging the content of signals, some ``sharp'' and some ``fuzzy,'' some dependent and some independent into useful information. The focus of this article is on the latter issue, and on the use of the results. In this article, I present a classic probabilistic Bayesian model sometimes used in engineering risk analysis, which can be helpful in the fusion of information because it allows computation of the posterior probability of an event given its prior probability (before the signal is observed) and the quality of the signal characterized by the probabilities of false positive and false negative. Experience suggests that the nature of these errors has been sometimes misunderstood; therefore, I discuss the validity of several possible definitions.

Suggested Citation

  • Elisabeth Paté‐Cornell, 2002. "Fusion of Intelligence Information: A Bayesian Approach," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 445-454, June.
  • Handle: RePEc:wly:riskan:v:22:y:2002:i:3:p:445-454
    DOI: 10.1111/0272-4332.00056
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/0272-4332.00056
    Download Restriction: no

    File URL: https://libkey.io/10.1111/0272-4332.00056?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. M. E. Paté‐Cornell & J. E. Neu, 1985. "Warning Systems and Defense Policy: A Reliability Model for the Command and Control of U.S. Nuclear Forces," Risk Analysis, John Wiley & Sons, vol. 5(2), pages 121-138, June.
    2. B. John Garrick, 1984. "Recent Case Studies and Advancements in Probabilistic Risk Assessment," Risk Analysis, John Wiley & Sons, vol. 4(4), pages 267-279, December.
    3. Itzhak Ravid, 1990. "Military Decision, Game Theory and Intelligence: An Anecdote," Operations Research, INFORMS, vol. 38(2), pages 260-264, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ali Devin Sezer & Çağrı Haksöz, 2012. "Optimal Decision Rules for Product Recalls," Mathematics of Operations Research, INFORMS, vol. 37(3), pages 399-418, August.
    2. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
    3. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    4. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    5. Jordi Vallverdú, 2008. "The False Dilemma: Bayesian vs. Frequentist," E-LOGOS, Prague University of Economics and Business, vol. 2008(1).
    6. Kristin A. Duncan & Jonathan L. Wilson, 2008. "A Multinomial‐Dirichlet Model for Analysis of Competing Hypotheses," Risk Analysis, John Wiley & Sons, vol. 28(6), pages 1699-1709, December.
    7. Caron Chess & Jeffrey Calia, 2002. "Letter to the Editor," Risk Analysis, John Wiley & Sons, vol. 22(6), pages 1039-1040, December.
    8. Elisabeth Paté‐Cornell, 2012. "On “Black Swans” and “Perfect Storms”: Risk Analysis and Management When Statistics Are Not Enough," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1823-1833, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jason R. W. Merrick & J. Rene van Dorp & Jack Harrald & Thomas Mazzuchi & John E. Spahn & Martha Grabowski, 2000. "A systems approach to managing oil transportation risk in Prince William Sound," Systems Engineering, John Wiley & Sons, vol. 3(3), pages 128-142.
    2. M. Elisabeth Paté‐Cornell, 1986. "Warning Systems in Risk Management," Risk Analysis, John Wiley & Sons, vol. 6(2), pages 223-234, June.
    3. Aven, Terje, 2020. "Three influential risk foundation papers from the 80s and 90s: Are they still state-of-the-art?," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    4. Elisabeth Paté‐Cornell, 2002. "Finding and Fixing Systems Weaknesses: Probabilistic Methods and Applications of Engineering Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 319-334, April.
    5. Michael Greenberg & Charles Haas & Anthony Cox & Karen Lowrie & Katherine McComas & Warner North, 2012. "Ten Most Important Accomplishments in Risk Analysis, 1980–2010," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 771-781, May.
    6. Jason R. W. Merrick & Martha Grabowski & Premnath Ayyalasomayajula & John R. Harrald, 2005. "Understanding Organizational Safety Using Value‐Focused Thinking," Risk Analysis, John Wiley & Sons, vol. 25(4), pages 1029-1041, August.
    7. Elisabeth Paté‐Cornell, 2002. "Risk and Uncertainty Analysis in Government Safety Decisions," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 633-646, June.
    8. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    9. M. Elisabeth Paté‐Cornell, 1993. "Learning from the Piper Alpha Accident: A Postmortem Analysis of Technical and Organizational Factors," Risk Analysis, John Wiley & Sons, vol. 13(2), pages 215-232, April.
    10. Elisabeth Paté‐Cornell, 2012. "On “Black Swans” and “Perfect Storms”: Risk Analysis and Management When Statistics Are Not Enough," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1823-1833, November.
    11. Robin L. Dillon & M. Elisabeth Paté-Cornell & Seth D. Guikema, 2003. "Programmatic Risk Analysis for Critical Engineering Systems Under Tight Resource Constraints," Operations Research, INFORMS, vol. 51(3), pages 354-370, June.
    12. Jason R. W. Merrick & J. René van Dorp & Thomas Mazzuchi & John R. Harrald & John E. Spahn & Martha Grabowski, 2002. "The Prince William Sound Risk Assessment," Interfaces, INFORMS, vol. 32(6), pages 25-40, December.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:22:y:2002:i:3:p:445-454. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.