This project will develop an elicitation process to assess important counterterrorism values such as adversary intent and capabilities, target vulnerabilities, and countermeasure costs, by aggregating judgments of a diverse panel of intelligence experts. In this process, experts would be asked to give medians and prediction intervals that reflect their best knowledge and levels of confidence (or uncertainty) both for the uncertain quantities of interest, and for a set of “seed variables ” whose true values are verifiable using historical or anticipated near-future data. A consensus probability distribution for the quantity of interest can then be achieved by weighting the various experts based on performance on the seed variables (and possi...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
The predictability and understandability of the world around us is limited, and many events are unce...
Threat and risk assessment have become an integral part of counterterrorism strategies. This process...
In the information security business, 30 years of practical and theoretical research has resulted in...
Expert judgement is routinely required to inform critically important decisions. While expert judgem...
Abstract—Expert judgments are often used to estimate likelihood values in a security risk analysis. ...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
It is shown how calibration methods for expert judgement can be used to establish consensus about th...
Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of suc...
The tragic events of 911 and the concerns about the potential for a terrorist or hostile state attac...
Department of Defense (DoD) information assurance (IA) certification and accreditation relies on a m...
This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a mor...
Expert opinion and judgment enter into the practice of statistical inference and decision-making in ...
The increased use of risk assesment in governmental and corporate decision-making has increased the ...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
The predictability and understandability of the world around us is limited, and many events are unce...
Threat and risk assessment have become an integral part of counterterrorism strategies. This process...
In the information security business, 30 years of practical and theoretical research has resulted in...
Expert judgement is routinely required to inform critically important decisions. While expert judgem...
Abstract—Expert judgments are often used to estimate likelihood values in a security risk analysis. ...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
Elicitation is the process of extracting expert knowledge about some unknown quantity or quantities,...
It is shown how calibration methods for expert judgement can be used to establish consensus about th...
Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of suc...
The tragic events of 911 and the concerns about the potential for a terrorist or hostile state attac...
Department of Defense (DoD) information assurance (IA) certification and accreditation relies on a m...
This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a mor...
Expert opinion and judgment enter into the practice of statistical inference and decision-making in ...
The increased use of risk assesment in governmental and corporate decision-making has increased the ...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
The predictability and understandability of the world around us is limited, and many events are unce...
Threat and risk assessment have become an integral part of counterterrorism strategies. This process...