Modelling improvised explosive device attacks in the West – Assessing the hazard
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2017.04.007
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
- Patrick T. Brandt & Todd Sandler, 2010. "What Do Transnational Terrorists Target? Has It Changed? Are We Safer?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 214-236, April.
- Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
- Kjell Hausken, 2018. "A cost–benefit analysis of terrorist attacks," Defence and Peace Economics, Taylor & Francis Journals, vol. 29(2), pages 111-129, February.
- Hegghammer, Thomas, 2013. "Should I Stay or Should I Go? Explaining Variation in Western Jihadists' Choice between Domestic and Foreign Fighting," American Political Science Review, Cambridge University Press, vol. 107(1), pages 1-15, February.
- Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
- Stewart, Mark G. & Mueller, John, 2014. "Cost-benefit analysis of airport security: Are airports too safe?," Journal of Air Transport Management, Elsevier, vol. 35(C), pages 19-28.
- Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
- John Mueller & Mark G. Stewart, 2014. "Evaluating Counterterrorism Spending," Journal of Economic Perspectives, American Economic Association, vol. 28(3), pages 237-248, Summer.
- Mark G. Stewart & John Mueller, 2013. "Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 32(3), pages 615-633, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Thöns, Sebastian & Stewart, Mark G., 2019. "On decision optimality of terrorism risk mitigation measures for iconic bridges," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 574-583.
- Stewart, Mark G. & Netherton, Michael D., 2019. "A probabilistic risk-acceptance model for assessing blast and fragmentation safety hazards," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
- Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
- Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
- Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Abel Brodeur, 2018.
"The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks,"
American Economic Journal: Applied Economics, American Economic Association, vol. 10(4), pages 246-282, October.
- Brodeur, Abel, 2015. "Terrorism and Employment: Evidence from Successful and Failed Terror Attacks," IZA Discussion Papers 9526, Institute of Labor Economics (IZA).
- Abel Brodeur, 2016. "Terrorism and Employment : Evidence from Successful and Failed Terror Attacks," Working Papers 1619E, University of Ottawa, Department of Economics.
- Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
- Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Halkos, George & Managi, Shunsuke & Zisiadou, Argyro, 2017. "Analyzing the determinants of terrorist attacks and their market reactions," Economic Analysis and Policy, Elsevier, vol. 54(C), pages 57-73.
- Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
- Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
- Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:165:y:2017:i:c:p:345-354. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.