Decision Analysis

CREATE’s decision analysis researchers use rigorous models to help make sound decisions in homeland security applications related to terrorism and other catastrophic risks. Topics include:

  • Representation of preferences and trade-offs using multiattribute value and utility models
  • Representation of risk attitudes
  • Modeling adversary beliefs and preferences
  • Representation of belief using joint probability distributions and Bayesian learning
  • Group decision making
  • Framing decision situations
  • Alternative generation
  • The identification (and minimization) of cognitive biases 
  • Implementing a decision culture within  enterprises

Game Theory is also applied to capture objectives and beliefs of adaptive adversaries threating critical infrastructure, including seaports, airports, wildlife/forests/fisheries, and high-crime urban areas. Limited resources must be allocated and scheduled efficiently, avoiding predictability while simultaneously accounting for adversaries’ responses to security coverage, adversary preferences, and uncertainty over such preferences and capabilities. Casting security allocation as a Stackelberg security game, our new algorithms have been used in multiple applications.

Researchers

Detlof von Winterfeldt

Detlof von Winterfeldt is a Professor at the Daniel J. Epstein Department of Industrial and Systems Engineering of the Viterbi School of Engineering and a Professor of Public Policy...

read more
Richard John

Dr. Richard John serves as the Associate Director for Research at CREATE, professor in the Department of Psychology at the Dornsife College of Letters, Arts & Sciences at USC… 

read more
Vicki Bier

Vicki Bier is a risk analyst and decision analyst specializing in probabilistic risk analysis for homeland security and critical infrastructure protection. Her current research interests include…

read more
Williams Burns

William Burns completed his Ph.D. at the University of Oregon in Decision Science and subsequently held positions as a professor at the University of Iowa and UC Davis …

read more
Sam Chatterjee

Samrat Chatterjee is an Operations Research Scientist with the National Security Directorate at the Pacific Northwest National Laboratory (PNNL). His research focuses on assessing…

read more
Robin Dillon-Merrill

Robin Dillon-Merrill is a Professor in the McDonough School of Business at Georgetown University and Area Coordinator for the Operations and Information Management Group… 

read more
Gilberto Montibeller

Gilberto Montibeller is a professor of Management Science at Loughborough University, and the Acting Associate Dean for Enterprise at the School of Business and Economics.  

read more
Heather Rosoff

Heather Rosoff’s research focuses on using risk and decision analytic techniques to study the uncertainties surrounding terrorism. More specifically, her risk perception…

read more
Milind Tambe

Milind Tambe is Gordon McKay Professor of Computer Science and Director of the Center for Research in Computation and Society (CRCS) at Harvard University…

read more

Sample Papers

  • Siebert, J. & von Winterfeldt, D. (2020). Comparative Analysis of Terrorists’ Objectives, Decision Analysis, February 2020, https://doi.org/10.1287/deca.2019.0400.
  • von Winterfeldt, D., Farrow, S., John, R., Eyer, J., Rose, A., & Rosoff, H. (2020). Assessing the Benefits and Costs of Homeland Security Research: A Risk-Informed Methodology with Applications to the U.S. Coast Guard. Risk Analysis, 40(3), 450-475. doi: 10.1111/risa.13403 
  • Kusumastuti, S., Rosoff, H., & John, R. S. (2019). Characterizing conflicting user values for cyber authentication using a virtual public values forum. Decision Analysis, 16(3), 157-171. doi: 10.1287/deca.2018.
  • Cui,J., Nguyen, T., Pita, J., &  John, R. S. (2017). Methods for addressing the unpredictable real-world element in security. In A. Abbas, M. Tambe, & D. von Winterfeldt (Eds.), Improving homeland security decisions (pp. 574-603). Cambridge University Press.  
  • Rosoff, H. & John, R. S. (2017). Decision analysis by proxy for the adaptive adversary. In A. Abbas, M. Tambe, & D. von Winterfeldt (Eds.), Improving homeland security decisions (pp. 709-729). Cambridge University Press.
  • Cui, J., Rosoff, H., & John, R. S. (2017). Deterrence of cyber attackers in a three-player behavioral game. In S. Rass, B. An, C. Kiekintveld, F. Fang, & S. Schauer (Eds.), Decision and game theory for security: GameSec 2017 (pp. 718-736). New York: Springer.  
  • Nguyen, K., Rosoff, H., & John, R. S. (2017). Valuing equal protection in aviation security screening. Risk Analysis, 37(12), 2405-2419. doi: 10.1111/risa.12814
  • Garcia, R. & von Winterfeldt, D. (2016) Defender-attacker decision tree analysis to counter terrorism.  Risk Analysis, 36(8), 1-14. 

ARMOR-IRIS

ARMOR-GUARDS

ARMOR-LAX