Search Results

There are 28356 results for: content related to: A Value Model for Evaluating Homeland Security Decisions

  1. Modeling Values for Anti-Terrorism Analysis

    Risk Analysis

    Volume 27, Issue 3, June 2007, Pages: 585–596, Ralph L. Keeney

    Version of Record online : 18 JUL 2007, DOI: 10.1111/j.1539-6924.2007.00910.x

  2. Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate

    Risk Analysis

    Volume 32, Issue 4, April 2012, Pages: 713–728, Robin L. Dillon, Genevieve Lester, Richard S. John and Catherine H. Tinsley

    Version of Record online : 28 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01747.x

  3. Identifying Changing Aviation Threat Environments Within an Adaptive Homeland Security Advisory System

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 319–329, Adrian J. Lee and Sheldon H. Jacobson

    Version of Record online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2010.01656.x

  4. Identifying and Structuring the Objectives of Terrorists

    Risk Analysis

    Volume 30, Issue 12, December 2010, Pages: 1803–1816, Gregory L. Keeney and Detlof von Winterfeldt

    Version of Record online : 19 AUG 2010, DOI: 10.1111/j.1539-6924.2010.01472.x

  5. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

    Risk Analysis

    Volume 30, Issue 1, January 2010, Pages: 32–48, Gregory S. Parnell, Christopher M. Smith and Frederick I. Moxley

    Version of Record online : 11 DEC 2009, DOI: 10.1111/j.1539-6924.2009.01319.x

  6. Analyzing the Homeland Security of the U.S.-Mexico Border

    Risk Analysis

    Volume 29, Issue 5, May 2009, Pages: 699–713, Lawrence M. Wein, Yifan Liu and Arik Motskin

    Version of Record online : 7 JAN 2009, DOI: 10.1111/j.1539-6924.2008.01180.x

  7. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Version of Record online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  8. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    Risk Analysis

    Volume 28, Issue 4, August 2008, Pages: 1125–1133, Thomas F. Sanquist, Heidi Mahy and Frederic Morris

    Version of Record online : 4 JUL 2008, DOI: 10.1111/j.1539-6924.2008.01069.x

  9. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

    Risk Analysis

    Volume 31, Issue 9, September 2011, Pages: 1488–1510, Jason Merrick and Gregory S. Parnell

    Version of Record online : 18 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01590.x

  10. Constructing Homeland Security: An Anemic Policy Regime

    Policy Studies Journal

    Volume 39, Issue 2, May 2011, Pages: 285–307, Peter J. May, Ashley E. Jochim and Joshua Sapotichne

    Version of Record online : 2 MAY 2011, DOI: 10.1111/j.1541-0072.2011.00408.x

  11. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Version of Record online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  12. Seeing around Corners: Crafting the New Department of Homeland Security

    Review of Policy Research

    Volume 21, Issue 3, May 2004, Pages: 369–395, Wendy Haynes

    Version of Record online : 28 JUN 2008, DOI: 10.1111/j.1541-1338.2004.00081.x

  13. Probabilistic Risk Analysis and Terrorism Risk

    Risk Analysis

    Volume 30, Issue 4, April 2010, Pages: 575–589, Barry Charles Ezell, Steven P. Bennett, Detlof Von Winterfeldt, John Sokolowski and Andrew J. Collins

    Version of Record online : 12 APR 2010, DOI: 10.1111/j.1539-6924.2010.01401.x

  14. Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

    Risk Analysis

    Volume 31, Issue 4, April 2011, Pages: 533–547, Mohsen Golalikhani and Jun Zhuang

    Version of Record online : 24 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01531.x

  15. General Probability-Time Tradeoff and Intertemporal Risk-Value Model

    Risk Analysis

    Volume 30, Issue 3, March 2010, Pages: 421–431, Shengxiang She, Chaoqun Ma and Desheng Dash Wu

    Version of Record online : 2 FEB 2010, DOI: 10.1111/j.1539-6924.2009.01344.x

  16. Coordinating for Contingencies: Taking Stock of Post-9/11 Homeland Security Reforms

    Journal of Contingencies and Crisis Management

    Volume 20, Issue 2, June 2012, Pages: 77–89, Erik Brattberg

    Version of Record online : 15 MAR 2012, DOI: 10.1111/j.1468-5973.2012.00662.x

  17. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker

    Risk Analysis

    Volume 33, Issue 6, June 2013, Pages: 1083–1099, Xiaojun Shan and Jun Zhuang

    Version of Record online : 19 DEC 2012, DOI: 10.1111/j.1539-6924.2012.01919.x

  18. The Quality and Use of Regulatory Analysis in 2008

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 855–880, Jerry Ellig and Patrick A. McLaughlin

    Version of Record online : 7 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01715.x

  19. Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit-Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment

    Risk Analysis

    Volume 28, Issue 2, April 2008, Pages: 325–339, Henry H. Willis and Tom LaTourrette

    Version of Record online : 16 APR 2008, DOI: 10.1111/j.1539-6924.2008.01022.x

  20. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness

    Risk Analysis

    Volume 28, Issue 3, June 2008, Pages: 763–770, Vicki M. Bier, Naraphorn Haphuriwat, Jaime Menoyo, Rae Zimmerman and Alison M. Culpen

    Version of Record online : 28 JUN 2008, DOI: 10.1111/j.1539-6924.2008.01053.x