Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard S. John is active.

Publication


Featured researches published by Richard S. John.


Decision Analysis | 2016

Identifying and Structuring the Objectives of the Islamic State of Iraq and the Levant (ISIL) and Its Followers

Johannes Siebert; Detlof von Winterfeldt; Richard S. John

This study addresses three questions: What are the objectives of the leaders of ISIL? What are the objectives of the followers of ISIL? How are the two sets of objectives related? To answer these questions, we analyzed the transcripts of interviews and presentations of 59 subject matter experts (SMEs) and conducted a separate analysis of speeches of ISIL leaders and selected Internet sources. In both efforts we identified and structured the strategic, fundamental, and means objectives of ISIL and its followers. The results indicate that ISIL’s leaders pursue four strategic objectives: (1) Establish a Caliphate in Iraq and the Levant, (2) Control and Govern the Caliphate, (3) Expand Islam and Sharia Law Worldwide, and (4) Recreate the Power and Glory of (Sunni) Islam. The followers’ objectives can be partitioned into three strategic objectives: Humanitarian Fulfillment, Religious Fulfillment, and Personal Fulfillment. The objectives identified from the SME interviews were similar to those identified from ISIL leaders’ statements and the Internet. However, the Internet search revealed many more personal objectives of ISIL followers. The results further indicate that ISIL’s leadership objectives are closely aligned with those of its followers. There also is a sharp contrast between the objectives of ISIL and those of Al Qaeda, particularly ISIL’s emphasis on occupying and controlling territories in Iraq and Syria versus Al Qaeda’s focus on worldwide jihad.


Risk Analysis | 2014

Perceptions of Randomized Security Schedules

Nicholas Scurich; Richard S. John

Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.


The Journal of Legal Studies | 2017

Jurors’ Presumption of Innocence

Nicholas Scurich; Richard S. John

The presumption of innocence explicitly forbids jurors from using official suspicion or indictment as evidence of guilt in a criminal trial. A behavioral experiment tested whether jurors follow this prescription. It revealed that, compared to when a suspect had been merely named, jurors thought that the individual was significantly more likely to be guilty after a detective referred the case to the district attorney and when he was formally charged and thus a criminal defendant. A judicial instruction to presume innocence reduced jurors’ beliefs in the defendant’s guilt. Regression analyses indicate that jurors’ prior beliefs predicted their posterior beliefs and further that their prior beliefs were predictive of verdicts even after accounting for their posterior beliefs. The findings suggest that jurors make different assumptions about the guilt of a criminal defendant before the introduction of evidence and that these assumptions influence their overall evaluation of the case and their verdict.


Risk Analysis | 2016

Attacker Deterrence and Perceived Risk in a Stackelberg Security Game

Garret Ridinger; Richard S. John; Michael McBride; Nicholas Scurich

In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense schemes, the key treatment variable being whether the defender picks one target at random to guard or imperfectly guards all targets. The two schemes are expected-payoff equivalent, and when provided separately we found no effect of having one scheme or the other. Yet, when both are present, we found that subjects had a preference for the fixed scheme, a preference that cannot be reduced to differences in beliefs. Overall, our results suggest that understanding how individuals perceive risk is vital to understand the behavior of attackers.


Organizational Behavior and Human Performance | 1980

Reference effects: A sheep in Wolf's clothing☆

F. Hutton Barron; Richard S. John


Risk Analysis | 2016

Cumulative Response to Sequences of Terror Attacks Varying in Frequency and Trajectory

Jinshu Cui; Heather Rosoff; Richard S. John


Environment Systems and Decisions | 2018

Modeling public responses to soft-target transportation terror

Matt Baucum; Heather Rosoff; Richard S. John; William Burns; Paul Slovic


adaptive agents and multi-agents systems | 2016

Semi-Automated Construction of Decision-Theoretic Models of Human Behavior

David V. Pynadath; Heather Rosoff; Richard S. John


Law, Probability and Risk | 2016

Quantifying the presumption of innocence

Nicholas Scurich; Kenneth D. Nguyen; Richard S. John


Archive | 2014

Systematic Exploration of Public Response to Experimentally Manipulated Disaster Events (Terror and Non-terror) Using Video-based Scenario Simulation

Richard S. John; Heather Rosoff

Collaboration


Dive into the Richard S. John's collaboration.

Top Co-Authors

Avatar

Heather Rosoff

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David J. Weiss

California State University

View shared research outputs
Top Co-Authors

Avatar

David V. Pynadath

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Detlof von Winterfeldt

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinshu Cui

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Kenneth D. Nguyen

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Matt Baucum

University of Southern California

View shared research outputs
Researchain Logo
Decentralizing Knowledge