IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v92y2007i7p930-946.html
   My bibliography  Save this article

Cost–benefit functions for the allocation of security sensors for air contaminants

Author

Listed:
  • Lambert, James H.
  • Farrington, Mark W.

Abstract

In this paper, we study various functional forms of the cost–benefit function in a context of risk analysis and multi-objective decision-making for the allocation of hazard protection. An approach of benefit–cost analysis under uncertainty is used. The study identifies measures of hazard intensity and population exposure as well as additional parameters that influence assessments of benefits and costs. Parameter uncertainties are propagated by numerical interval analysis. Several tiers of the uncertainty of the benefit-to-cost ratio are generated to compare hazard intensity and population exposure in multi-objective tradeoff analysis. We develop an example application with the allocation of chemical, biological, and radiological air contaminant sensors throughout a region. The sensors provide local protection to non-identical sectors of the population that are exposed to non-identical intensities of the hazard. The results illuminate the significance of the cost–benefit function for the allocation of sensors. The paper has implications for anti-terrorism, disaster preparedness, transportation safety, and other areas of public safety.

Suggested Citation

  • Lambert, James H. & Farrington, Mark W., 2007. "Cost–benefit functions for the allocation of security sensors for air contaminants," Reliability Engineering and System Safety, Elsevier, vol. 92(7), pages 930-946.
  • Handle: RePEc:eee:reensy:v:92:y:2007:i:7:p:930-946
    DOI: 10.1016/j.ress.2006.06.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832006001487
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2006.06.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Charles N. Haas, 2002. "The Role of Risk Analysis in Understanding Bioterrorism," Risk Analysis, John Wiley & Sons, vol. 22(4), pages 671-677, August.
    2. Raymond A. Zilinskas & Bruce Hope & D. Warner North, 2004. "A Discussion of Findings and Their Possible Implications from a Workshop on Bioterrorism Threat Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 901-908, August.
    3. Richard A. Williams & Kimberly M. Thompson, 2004. "Integrated Analysis: Combining Risk and Economic Assessments While Preserving the Separation of Powers," Risk Analysis, John Wiley & Sons, vol. 24(6), pages 1613-1623, December.
    4. Elizabeth A. Casman, 2004. "The Potential of Next‐Generation Microbiological Diagnostics to Improve Bioterrorism Detection Speed," Risk Analysis, John Wiley & Sons, vol. 24(3), pages 521-536, June.
    5. Yacov Y. Haimes, 1991. "Total Risk Management," Risk Analysis, John Wiley & Sons, vol. 11(2), pages 169-171, June.
    6. Elisabeth Paté‐Cornell, 2002. "Finding and Fixing Systems Weaknesses: Probabilistic Methods and Applications of Engineering Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 319-334, April.
    7. John Merrifield, 1997. "Sensitivity Analysis In Benefit Cost Analysis: A Key To Increased Use And Acceptance," Contemporary Economic Policy, Western Economic Association International, vol. 15(3), pages 82-92, July.
    8. Hokstad, Per & Steiro, Trygve, 2006. "Overall strategy for risk evaluation and priority setting of risk regulations," Reliability Engineering and System Safety, Elsevier, vol. 91(1), pages 100-111.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Cerotti, Davide & Gribaudo, Marco & Bobbio, Andrea, 2014. "Markovian agents models for wireless sensor networks deployed in environmental protection," Reliability Engineering and System Safety, Elsevier, vol. 130(C), pages 149-158.
    2. Alsultan, Marwan & Jun, Jungwook & Lambert, James H., 2020. "Program evaluation of highway access with innovative risk-cost-benefit analysis," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    3. Garcez, Thalles Vitelli & de Almeida, Adiel Teixeira, 2014. "A risk measurement tool for an underground electricity distribution system considering the consequences and uncertainties of manhole events," Reliability Engineering and System Safety, Elsevier, vol. 124(C), pages 68-80.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. James H. Lambert & Mark W. Farrington, 2006. "Risk‐Based Objectives for the Allocation of Chemical, Biological, and Radiological Air Emissions Sensors," Risk Analysis, John Wiley & Sons, vol. 26(6), pages 1659-1674, December.
    2. Junrui Xu & James H. Lambert, 2015. "Risk‐Cost‐Benefit Analysis for Transportation Corridors with Interval Uncertainties of Heterogeneous Data," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 624-641, April.
    3. Alberto Cerezo-Narváez & Andrés Pastor-Fernández & Manuel Otero-Mateo & Pablo Ballesteros-Pérez, 2022. "The Influence of Knowledge on Managing Risk for the Success in Complex Construction Projects: The IPMA Approach," Sustainability, MDPI, vol. 14(15), pages 1-30, August.
    4. Spash, Clive L. & Vatn, Arild, 2006. "Transferring environmental value estimates: Issues and alternatives," Ecological Economics, Elsevier, vol. 60(2), pages 379-388, December.
    5. Noel T. Brewer & Sarah E. Lillie & William K. Hallman, 2006. "Why People Believe They Were Exposed to Biological or Chemical Warfare: A Survey of Gulf War Veterans," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 337-345, April.
    6. Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.
    7. Yacov Y. Haimes, 2006. "On the Definition of Vulnerabilities in Measuring Risks to Infrastructures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 293-296, April.
    8. Feng Guo & Yanan Wang & Jie Peng & Hetian Huang & Xiangting Tu & Hu Zhao & Nan Zhan & Zhu Rao & Gaofeng Zhao & Hongbo Yang, 2022. "Occurrence, Distribution, and Risk Assessment of Antibiotics in the Aquatic Environment of the Karst Plateau Wetland of Yangtze River Basin, Southwestern China," IJERPH, MDPI, vol. 19(12), pages 1-14, June.
    9. Kenneth G. Crowther & Yacov Y. Haimes, 2005. "Application of the inoperability input—output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, John Wiley & Sons, vol. 8(4), pages 323-341.
    10. Michael J. Pennock & Yacov Y. Haimes, 2002. "Principles and guidelines for project risk management," Systems Engineering, John Wiley & Sons, vol. 5(2), pages 89-108.
    11. David M. Hassenzahl, 2006. "Implications of Excessive Precision for Risk Comparisons: Lessons from the Past Four Decades," Risk Analysis, John Wiley & Sons, vol. 26(1), pages 265-276, February.
    12. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    13. Kirsti Russell Vastveit & Kerstin Eriksson & Ove Njå, 2014. "Critical reflections on municipal risk and vulnerability analyses as decision support tools: the role of regulation regimes," Environment Systems and Decisions, Springer, vol. 34(3), pages 443-455, September.
    14. Robert Holman, 2004. "Bernard de Mandeville, Adam Smith a počestní darebové naší doby [Bernard de Mandeville, Adam Smith and virtuous knaves of our times]," Politická ekonomie, Prague University of Economics and Business, vol. 2004(5), pages 657-662.
    15. Yacov Y. Haimes & Clyde C. Chittister, 2012. "Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 213-224, June.
    16. Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
    17. Sandra Hoffmann, 2011. "Overcoming Barriers to Integrating Economic Analysis into Risk Assessment," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1345-1355, September.
    18. Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
    19. Shamoun, Dima & Williams, Richard & Broughel, James & Calabrese, Edward, 2016. "Regulation under Uncertainty: Use of the Linear No-Threshold Model in Chemical and Radiation Exposure," Working Papers 04174, George Mason University, Mercatus Center.
    20. Riccardo Minciardi & Roberto Sacile & Eva Trasforini, 2009. "Resource Allocation in Integrated Preoperational and Operational Management of Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 29(1), pages 62-75, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:92:y:2007:i:7:p:930-946. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.