Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in National Security Law
Alternative Threat Methodology, Charles B. King Iii
Alternative Threat Methodology, Charles B. King Iii
Journal of Strategic Security
Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …
Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter
Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter
Journal of Strategic Security
Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area …
Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller
Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller
Journal of Strategic Security
This article presents a dynamic decision support methodology forcounter-terrorism decision support. The initial sections introduce basic objectives and challenges of terrorism risk analysis and risk management. The remainder of the paper describes TRANSEC, a decision support framework for defining, validating, and monitoring strategies focused on managing terrorism risks to international transportation networks. The methodology and software tools underlying TRANSEC are applicable to other homeland security problems, such as critical infrastructure and border protection.
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Journal of Strategic Security
For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Journal of Strategic Security
Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …