22.04.2014 Views

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SRA 2013 Annual Meeting <strong>Abstracts</strong><br />

P.148 Zhuang, J; Wang, X*; Song, C; Xu, J; University at<br />

Buffalo, SUNY; xwang54@buffalo.edu<br />

Robust Approval Process in the Face of Strategic<br />

Adversaries and Normal Applicants<br />

The objective of this project is to explore a new class of decision<br />

models to provide structural insights <strong>for</strong> robust screening when<br />

dealing with adaptive applicants and incomplete in<strong>for</strong>mation.<br />

This research is motivated by public concerns on balancing<br />

congestion and safety due to security screening. Such<br />

screening has been used to identify and deter potential threats<br />

(e.g., terrorists, attackers, smugglers, spies) among normal<br />

applicants wishing to enter an organization, location, or facility.<br />

In-depth screening could reduce the risk of being attacked.<br />

However it may also create delays and deter normal applicants,<br />

which decreases the welfare of both the approver (authority,<br />

manager, screener) and the normal applicants. This research<br />

will consider the factors of security, congestion, equity, and the<br />

strategic and non-strategic responses from various applicant<br />

types. In particular, this research studies the applicants'<br />

strategies of applying, reneging, learning, and deceiving. This<br />

research also studies the approver's strategies of screening,<br />

dynamic service rates, multiple-servers and priority processing,<br />

multi-layer screening, and secrecy and deception. If successful,<br />

this research will lead to new frameworks that decision makers<br />

can use <strong>for</strong> screening diverse groups of strategic applicants.<br />

These new frameworks have the potential to reduce costs, avoid<br />

unnecessary waiting and inconvenience, and improve<br />

effectiveness and efficiency of the approval processes. Potential<br />

applications of this research include immigration systems, job<br />

market background checks, and airport/container/border<br />

controls. The relevance is illustrated by the recent national<br />

debate on selective "pat-downs" and "advanced<br />

imaging"screening, and the associated changing travel<br />

patterns. This research will engage many graduate,<br />

undergraduate, and high school students, including those from<br />

under-represented groups. The results of this research will be<br />

disseminated broadly to local, national and international<br />

communities.<br />

P.151 Zhuang, J; Fu, J*; Jose, VRR; University at Buffalo,<br />

SUNY; jfu3@buffalo.edu<br />

Modeling attacker-defender games with risk preferences<br />

Traditional models of attacker-defender games generally<br />

assume that players are risk-neutral; i.e. they choose strategies<br />

that maximize their expected payoff or benefit. In practice,<br />

decision makers could be either risk seeking or risk averse,<br />

which has not been extensively studied in the attacker-defender<br />

game literature. For example, terrorists could have risk<br />

preferences (Yang et al. 2013). Government could be risk<br />

averse: Standish (2002) argued that Western governments tend<br />

to be extremely risk-avers and constantly introduce disruptive<br />

risk-averse policies in many areas such as air travel security;<br />

Stewart et al. (2011) stated that the amount of government<br />

spending <strong>for</strong> “many homeland security measures would fail a<br />

cost-benefit analysis using standard expected value methods of<br />

analysis [suggesting] not surprisingly that policy makers within<br />

the US Government /DHS are risk-averse.” Un<strong>for</strong>tunately, the<br />

growing attacker-defender game literature has not rigorously<br />

studied the players’ risk preferences. To fill this gap, the<br />

research objective of this proposal is to study how the<br />

incorporation of alternative models of behavior (e.g., expected<br />

utility and cumulative prospect theories) affects the equilibrium<br />

behavior of players in attacker-defender games. Though<br />

Zhuang and Bier (2007, Operations Research) asserted that the<br />

more risk-averse a defender is, the more likely she is to defend<br />

and that the less risk-averse an attacker is, the more likely he is<br />

to attack, our preliminary results show that this behavior may<br />

not be true when other factors such as initial wealth, risk<br />

aversion/risk seekingness, loss aversion, and optimism are<br />

incorporated into a model. If successful, this project results can<br />

enrich our understanding of how players in attacker-defender<br />

games when a rich set of empirically recognized aspects of<br />

human behavior and decision making is introduced in analytic<br />

models, and help trans<strong>for</strong>m a large group of existing models<br />

which ignore player preferences.<br />

P.152 Zhuang, J; Bier, V; Zhang, J*; University at Buffalo,<br />

SUNY; University of Wisconsin-Madison;<br />

Jingzhang42@buffalo.edu<br />

First Conference on Validating Models of Adversary<br />

Behavior<br />

Hundreds of billions of dollars have been spent on homeland<br />

security since September 11, 2001, and numerous models have<br />

been developed to study the strategic interactions be tween<br />

defenders and adversaries (e.g., attackers or terrorists).<br />

Un<strong>for</strong>tunately, few if any models have yet been validated using<br />

empirical data, limiting the application of those models in<br />

practice. Supported by the U. S. Department of Homeland<br />

Security (DHS) through the National Consortium <strong>for</strong> the Study<br />

of Terrorism and Responses to Terrorism (START) and the<br />

National Center <strong>for</strong> <strong>Risk</strong> and Economic <strong>Analysis</strong> of Terrorism<br />

Events (CREATE), Drs. Jun Zhuang and Vicki Bier organized a<br />

conference on validating models of adversary behavior in<br />

Buffalo/Niagara Falls, NY, in June 23-26, 2013. This conference<br />

is intended to bridge theoretical and empirical research on<br />

adversarial modeling, and facilitate transitioning of the best<br />

existing models of adversary behavior into practice by<br />

assessing and demonstrating their validity and applicability to<br />

real-world problems. A secondary goal of the conference is to<br />

encourage synergy and communication between risk analysts,<br />

statisticians, economists, and other social scientists engaged in<br />

terrorism modeling and research. In this poster presentation,<br />

we summarize the summary of the conference findings.<br />

T1-I.1 Zimmerman, R; New York University;<br />

rae.zimmerman@nyu.edu<br />

Network approaches to assess critical infrastructure risks<br />

Portraying critical infrastructure characteristics as networks is<br />

an important foundation <strong>for</strong> analyzing risks to these<br />

infrastructures from extreme events. <strong>Risk</strong> and network<br />

concepts are combined <strong>for</strong> critical infrastructure, primarily<br />

transportation, with implications <strong>for</strong> others. Three analyses are<br />

presented <strong>for</strong> infrastructure network changes and adaptations.<br />

First, infrastructure age as a risk factor under extreme<br />

conditions is analyzed <strong>for</strong> U.S. bridge collapses involving<br />

critical network nodes in bridge structures and system-wide<br />

transportation networks. Age and bridge collapse date are<br />

correlated and compared to bridge inventory age. Age is<br />

significant <strong>for</strong> function and structural deterioration but not as<br />

much <strong>for</strong> extreme events, since age may not reflect non-age<br />

related factors, e.g., design flaws, misuse, and conditional or<br />

combined probabilities of separate conditions. Second,<br />

transportation users with low incomes may be more vulnerable<br />

to disconnected links in transportation systems affecting their<br />

mobility to jobs during extreme event travel disruptions. For<br />

selected urban areas, percent changes in low income<br />

populations are compared to rail transit availability. Third,<br />

disaster-related network breakages with widespread impacts on<br />

users are identified. For such conditions, network-related risk<br />

reduction measures <strong>for</strong> rail transit are presented, e.g.,<br />

redundant/alternative routing or links, interconnected nodes,<br />

and multiple travel modes. Where transportation disruptions<br />

involve energy or water failures, alternatives to strengthen<br />

power/transportation nodes and alleviate flooding are examined<br />

in networks terms. These findings have widespread implications<br />

<strong>for</strong> network-based infrastructure risk policies <strong>for</strong> user and<br />

system risks in extreme events and climate change disruptions.<br />

Findings extend research from the author’s book, Transport,<br />

the Environment and Security (2012) and are illustrated using<br />

extreme U.S. weather events, including Hurricanes Sandy and<br />

Irene.<br />

December 8-11, 2013 - Baltimore, MD

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!