John, Richard

Full Name: 
John, Richard

Researcher Profile

Presentations

Title Project
Convergent Validation of a Methodology for Identifying and Structuring the Objectives of the “Islamic State of Iraq and the Levant” (ISIL) and its Followers Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Identifying and structuring the objectives of the Islamic State of Iraq and the Levant (ISIL) Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Valuing security and privacy Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
A prescriptive multi-attribute model of user preferences for conflicting objectives related to cyber security risk Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Modeling values and trade-offs of cybersecurity stakeholders Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Your money or your privacy: Eliciting trade-offs for cyber security Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Framing value-driven decision models for different classes of cyber adversaries Deterring Adaptive Adversaries: Multi-attribute Utility (MAU) Analysis, Decision Trees and Value of Misinformation for Informing Cyber Security
Decision Analysis by Proxy for the Rational Terrorist Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Cognitive, Emotional, and Behavioral Reactions to Terrorism Events Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Monte Carlo Simulation to Construct a Random Utility Model of Terrorist Preferences for Attack Modes Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
What Do We Know about Public Perception of Terrorism Risks? Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Osama is Ready to Hear This. Are You?” Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Who's Afraid of Osama bin Laden? Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Risk and Economic Analysis: A Dirty Bomb Attack on the Ports of Los Angeles and Long Beach Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Random Utility Modeling for the Rational Terrorist Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Perspective Taking and Threat Assessment Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Perspective Taking: Avoiding the Zero-Sum Trap Risk Perception and Estimating Threat Probability Using Random Utility Models of Terrorist Objectives and Motivations
Public perceptions and trade-offs related to randomized security schedules Systematic Exploration of Public Response to Experimentally Manipulated Disaster Events (Terror and Non-terror) Using Video-based Scenario Simulation
The influence of disaster severity and outcome attribution on travel behavior Systematic Exploration of Public Response to Experimentally Manipulated Disaster Events (Terror and Non-terror) Using Video-based Scenario Simulation
Public response to the terrorist attacks on Boston Systematic Exploration of Public Response to Experimentally Manipulated Disaster Events (Terror and Non-terror) Using Video-based Scenario Simulation