IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v24y2004i4p985-988.html
   My bibliography  Save this article

Mathematical Methods in Combatting Terrorism

Author

Listed:
  • Bernard Harris

Abstract

This document is a preliminary report on the role that mathematical and statistical methods might play in the defense against terrorist attacks. In no way does this replace the efforts of law enforcement agenices or intelligence activities. The hope is that mathematical techniques can make their efforts more efficient. The ideas enumerated here utilize the notion of probabilistic risk analysis, which was developed for the purpose of assessing the safety of nuclear reactors, as well as randomization and game theory. More extensive work in these directions is contemplated for the future. The author is planning workshops to evaluate the ideas presented here and to elicit additional methodologies that may prove useful in this endeavor.

Suggested Citation

  • Bernard Harris, 2004. "Mathematical Methods in Combatting Terrorism," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 985-988, August.
  • Handle: RePEc:wly:riskan:v:24:y:2004:i:4:p:985-988
    DOI: 10.1111/j.0272-4332.2004.00501.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.0272-4332.2004.00501.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.0272-4332.2004.00501.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Abhinav B. Agrawal & Kash Barker & Yacov Y. Haimes, 2011. "Adaptive multiplayer approach for risk‐based decision‐making: 2006 Virginia Gubernatorial Inauguration," Systems Engineering, John Wiley & Sons, vol. 14(4), pages 455-470, December.
    3. Edouard Kujawski, 2015. "Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources," Systems Engineering, John Wiley & Sons, vol. 18(4), pages 365-376, July.
    4. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    5. Jordan Jeremy D & Melouk Sharif H & Perry Marcus B, 2009. "Optimizing Football Game Play Calling," Journal of Quantitative Analysis in Sports, De Gruyter, vol. 5(2), pages 1-34, May.
    6. William M. Bulleit & Matthew W. Drewek, 2011. "Agent‐Based Simulation for Human‐Induced Hazard Analysis," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 205-217, February.
    7. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    8. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    9. James H. Lambert & Mark W. Farrington, 2006. "Risk‐Based Objectives for the Allocation of Chemical, Biological, and Radiological Air Emissions Sensors," Risk Analysis, John Wiley & Sons, vol. 26(6), pages 1659-1674, December.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:24:y:2004:i:4:p:985-988. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.