{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:17Z","timestamp":1760239937463,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2016-80250-R","IJCI-2016-28239"],"award-info":[{"award-number":["TIN2016-80250-R","IJCI-2016-28239"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems. This paper tackles the problem of online surveillance, which we define as the monitoring by a security agency of a set of websites through tracking and classification of profiles that are potentially suspected of carrying out terrorist attacks. We conduct a theoretical analysis in this scenario that investigates the introduction of automatic classification technology compared to the status quo involving manual investigation of the collected profiles. Our analysis starts examining the suitability of game-theoretic-based models for decision-making in the introduction of this technology. We propose an adversarial-risk-analysis (ARA) model as a novel way of approaching the online surveillance problem that has the advantage of discarding the hypothesis of common knowledge. The proposed model allows us to study the rationality conditions of the automatic suspect detection technology, determining under which circumstances it is better than the traditional human-based approach. Our experimental results show the benefits of the proposed model. Compared to standard game theory, our ARA-based model indicates in general greater prudence in the deployment of the automatic technology and exhibits satisfactory performance without having to relax crucial hypotheses such as common knowledge and therefore subtracting realism from the problem, although at the expense of higher computational complexity.<\/jats:p>","DOI":"10.3390\/s19030480","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T11:12:48Z","timestamp":1548328368000},"page":"480","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance"],"prefix":"10.3390","volume":"19","author":[{"given":"C\u00e9sar","family":"Gil","sequence":"first","affiliation":[{"name":"Mossos d\u2019Esquadra, Catalan Police, 08080 Barcelona, Spain"}]},{"given":"Javier","family":"Parra-Arnau","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Mathematics, Universitat Rovira i Virgili, CYBERCAT-Center for Cybersecurity Research of Catalonia, 43007 Tarragona, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"ref_1","unstructured":"Reinares, F., and Calvo, C. (2016). Estado isl\u00e1mico en Espa\u00f1a, Real Instituto Elcano."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Khan, S., Paul, D., Momtahan, P., and Aloqaily, M. (2018, January 23\u201326). Artificial intelligence framework for smart city microgrids: State of the art, challenges, and opportunities. Proceedings of the International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain.","DOI":"10.1109\/FMEC.2018.8364080"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Kantarci, B., and Mouftah, H. (2017, January 26\u201330). Trusted Third Party for service management in vehicular clouds. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986410"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Kantarci, B., and Mouftah, H. (2017, January 24\u201327). Fairness-Aware Game Theoretic Approach for Service Management in Vehicular Clouds. Proceedings of the Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada.","DOI":"10.1109\/VTCFall.2017.8288282"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., and Mouftah, H. (2018, January 20\u201324). Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures. Proceedings of the International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422401"},{"key":"ref_6","first-page":"1","article-title":"The politics of surveillance policy: UK regulatory dynamics after snowden","volume":"5","author":"Hintz","year":"2016","journal-title":"Inf. Syst. Res."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bier, V., and Azaie, M. (2008). Game Theoretic Risk Analysis of Security Threats, Springer-Verlag.","DOI":"10.1002\/9780470061596.risk0659"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1198\/jasa.2009.0155","article-title":"Adversarial risk analysis","volume":"104","author":"Rios","year":"2009","journal-title":"J. Am. Stat. Assoc."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"46538","DOI":"10.1109\/ACCESS.2018.2866310","article-title":"On the cost-effectiveness of mass surveillance","volume":"6","author":"Castelluccia","year":"2018","journal-title":"IEEE Access."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Englehardt, S., and Narayanan, A. (2016, January 24\u201328). Online tracking: A 1-million-site measurement and analysis. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978313"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Parra-Arnau, J., Achara, J., and Castelluccia, C. (2017). MyAdChoices: Bringing transparency and control to online advertising. ACM Trans. Web, 11.","DOI":"10.1145\/2996466"},{"key":"ref_12","unstructured":"Yuan, S., Abidin, A., Sloan, M., and Wang, J. (arXiv, 2012). Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users, arXiv."},{"key":"ref_13","unstructured":"Toubiana, V. (2018, August 07). SquiggleSR. Available online: www.squigglesr.com."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, B., Sheth, A., Weinsberg, U., Chandrashekar, J., and Govindan, R. (2013, January 21\u201322). Adreveal: Improving transparency into online targeted advertising. Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks Article, College Park, MD, USA.","DOI":"10.1145\/2535771.2535783"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yan, J., Liu, N., Wang, G., Zhang, W., Jiang, Y., and Chen, Z. (2009, January 20\u201324). How much can behavioral targeting help online advertising?. Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain.","DOI":"10.1145\/1526709.1526745"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Aly, M., Hatch, A., Josifovski, V., and Narayanan, V. (2012, January 16\u201320). Web-scale user modeling for targeting. Proceedings of the 21st International Conference on World Wide Web, Lyon, France.","DOI":"10.1145\/2187980.2187982"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/10864415.2004.11044301","article-title":"Consumer attitudes toward mobile advertising: An empirical study","volume":"8","author":"Tsang","year":"2004","journal-title":"Int. J. Electron. Commer."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1287\/isre.1050.0041","article-title":"The value of intrusion detection systems in information technology security architecture","volume":"16","author":"Cavusoglu","year":"2005","journal-title":"Inform. Syst. Res."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mell, P., and Bace, R. (2001). Nist Special Publication on Intrusion Detection Systems.","DOI":"10.1201\/1079\/43273.29.5.20011101\/31414.1"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1287\/deca.1100.0171","article-title":"Is screening cargo containers for smuggled nuclear threats worthwhile?","volume":"7","author":"Merrick","year":"2010","journal-title":"Decis. Anal."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Rios, J., and Insua, D. (2009, January 20\u201323). Adversarial risk analysis: Applications to basic counterterrorism models. Proceedings of the International Conference on Algorithmic Decision Theory, Venice, Italy.","DOI":"10.1007\/978-3-642-04428-1_27"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","article-title":"Balancing terrorism and natural disasters\u2014Defensive strategy with endogenous attacker effort","volume":"55","author":"Zhuang","year":"2007","journal-title":"Oper. Res."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1287\/inte.1060.0252","article-title":"Defending critical infrastructure","volume":"36","author":"Brown","year":"2006","journal-title":"Interfaces"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1287\/deca.1060.0071","article-title":"Should we protect commercial airplanes against surface-to-air missile attacks by terrorists?","volume":"3","author":"Winterfeldt","year":"2006","journal-title":"Decis. Anal."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1111\/risa.12580","article-title":"Adversarial risk analysis for urban security resource allocation","volume":"36","author":"Gil","year":"2016","journal-title":"Risk Anal."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Barton, R., and Meckesheimer, M. (2006). Handbooks in Operations Research and Management Science, Elsevier. Metamodel-Based Simulation Optimization.","DOI":"10.1016\/S0927-0507(06)13018-2"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1287\/opre.34.6.871","article-title":"Evaluating influence diagrams","volume":"34","author":"Shachter","year":"1996","journal-title":"Oper. Res."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","article-title":"Preserving privacy for free","volume":"321","author":"Wang","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","article-title":"Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_30","first-page":"708","article-title":"Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound","volume":"15","author":"Wang","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Banks, D., Aliaga, J., and Insua, D. (2015). Adversarial Risk Analysis, CRC Press.","DOI":"10.1201\/b18653"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/480\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:28:31Z","timestamp":1760185711000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":31,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["s19030480"],"URL":"https:\/\/doi.org\/10.3390\/s19030480","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,1,24]]}}}