Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention
Author
Abstract
Suggested Citation
DOI: 10.1287/deca.1100.0186
Download full text from publisher
References listed on IDEAS
- Farrow Scott & Shapiro Stuart, 2009.
"The Benefit-Cost Analysis of Security Focused Regulations,"
Journal of Homeland Security and Emergency Management, De Gruyter, vol. 6(1), pages 1-22, April.
- Scott Farrow & Stuart Shapiro, 2009. "The Benefit-Cost Analysis of Security Focused Regulations," UMBC Economics Department Working Papers 09-101, UMBC Department of Economics.
- Robinson Lisa A & Hammitt James K. & Aldy Joseph E. & Krupnick Alan & Baxter Jennifer, 2010. "Valuing the Risk of Death from Terrorist Attacks," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 7(1), pages 1-27, February.
- Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
- Elizabeth A. Casman & M. Granger Morgan & Hadi Dowlatabadi, 1999. "Mixed Levels of Uncertainty in Complex Policy Models," Risk Analysis, John Wiley & Sons, vol. 19(1), pages 33-42, February.
- Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
- Lakdawalla, Darius & Zanjani, George, 2005.
"Insurance, self-protection, and the economics of terrorism,"
Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
- Darius Lakdawalla & George Zanjani, 2002. "Insurance, Self-Protection, and the Economics of Terrorism," NBER Working Papers 9215, National Bureau of Economic Research, Inc.
- Vicki M. Bier & Louis A. Cox & M. Naceur Azaiez, 2009. "Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 1, pages 1-11, Springer.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Lisa A. Robinson, 2007. "Policy Monitor How US Government Agencies Value Mortality Risk Reductions," Review of Environmental Economics and Policy, Association of Environmental and Resource Economists, vol. 1(2), pages 283-299, Summer.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
- David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
- L. Robin Keller & Ali Abbas & Manel Baucells & Vicki M. Bier & David Budescu & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Ahti Salo & George Wu, 2010.
"From the Editors..,"
Decision Analysis, INFORMS, vol. 7(4), pages 327-330, December.
- L. Robin Keller & Manel Baucells & Kevin F. McCardle & Gregory S. Parnell & Ahti Salo, 2007. "From the Editors..," Decision Analysis, INFORMS, vol. 4(4), pages 173-175, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2008. "From the Editors..," Decision Analysis, INFORMS, vol. 5(4), pages 173-176, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2009. "From the Editors ..," Decision Analysis, INFORMS, vol. 6(4), pages 199-201, December.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
- L. Robin Keller, 2012. "From the Editor---Decisions over Time (Exploding Offers or Purchase Regret), in Game Settings (Embedded Nash Bargaining or Adversarial Games), and in Influence Diagrams," Decision Analysis, INFORMS, vol. 9(1), pages 1-5, March.
- L. Robin Keller & Kelly M. Kophazi, 2012. "From the Editors ---Copulas, Group Preferences, Multilevel Defenders, Sharing Rewards, and Communicating Analytics," Decision Analysis, INFORMS, vol. 9(3), pages 213-218, September.
- L. Robin Keller & Kelly M. Kophazi, 2011. "From the Editors---Deterrence, Multiattribute Utility, and Probability and Bayes' Updating," Decision Analysis, INFORMS, vol. 8(2), pages 83-87, June.
- Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
- L. Robin Keller & Ali Abbas & J. Eric Bickel & Vicki M. Bier & David V. Budescu & John C. Butler & Philippe Delquié & Kenneth C. Lichtendahl & Jason R. W. Merrick & Ahti Salo & George Wu, 2011. "From the Editors ---Probability Scoring Rules, Ambiguity, Multiattribute Terrorist Utility, and Sensitivity Analysis," Decision Analysis, INFORMS, vol. 8(4), pages 251-255, December.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- L. Robin Keller, 2011. "Investment and Defense Strategies, Heuristics, and Games: From the Editor ..," Decision Analysis, INFORMS, vol. 8(1), pages 1-3, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Kevin Boyle & Sapna Kaul & Ali Hashemi & Xiaoshu Li, 2015. "Applicability of benefit transfers for evaluation of homeland security counterterrorism measures," Chapters, in: Carol Mansfield & V. K. Smith (ed.), Benefit–Cost Analyses for Security Policies, chapter 10, pages 225-253, Edward Elgar Publishing.
- Tim Lohse & Julio R. Robledo & Ulrich Schmidt, 2012.
"Self‐Insurance and Self‐Protection as Public Goods,"
Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 79(1), pages 57-76, March.
- Lohse, Tim & Julio R. Robledo & Ulrich Schmidt, 2006. "Self-Insurance and Self-Protection as Public Goods," Hannover Economic Papers (HEP) dp-354, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
- Lohse, Tim & Robledo, Julio & Schmidt, Ulrich, 2010. "Self-Insurance and Self-Protection as Public Goods," Kiel Working Papers 1613, Kiel Institute for the World Economy (IfW Kiel).
- Schmidt, Ulrich & Robledo, Julio R. & Lohse, Tim, 2007. "Self-Insurance and Self-Protection as Public Goods," Economics Working Papers 2007-16, Christian-Albrechts-University of Kiel, Department of Economics.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Scotton Carol R., 2013. "New risk rates, inter-industry differentials and the magnitude of VSL estimates," Journal of Benefit-Cost Analysis, De Gruyter, vol. 4(1), pages 39-80, March.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
- Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
- Lisa A. Robinson & James K. Hammitt, 2015. "Research Synthesis and the Value per Statistical Life," Risk Analysis, John Wiley & Sons, vol. 35(6), pages 1086-1100, June.
- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Louis Anthony (Tony) Cox, Jr, 2008. "Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 28(6), pages 1749-1761, December.
- Christian Gollier, 2020.
"Cost–benefit analysis of age‐specific deconfinement strategies,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 22(6), pages 1746-1771, December.
- Christian Gollier, 2020. "Cost–benefit analysis of age‐specific deconfinement strategies," Post-Print hal-03156641, HAL.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- James K. Hammitt, 2020.
"Valuing mortality risk in the time of COVID-19,"
Journal of Risk and Uncertainty, Springer, vol. 61(2), pages 129-154, October.
- Hammitt, James K., 2020. "Valuing mortality risk in the time of covid-19," TSE Working Papers 20-1115, Toulouse School of Economics (TSE).
- Allen, W. David, 2013. "Self-protection against crime victimization: Theory and evidence from university campuses," International Review of Law and Economics, Elsevier, vol. 34(C), pages 21-33.
- Svetlana Pashchenko & Ponpoje (Poe) Porapakkarm & Mariacristina De Nardi, 2017.
"The Lifetime Costs of Bad Health,"
2017 Meeting Papers
533, Society for Economic Dynamics.
- De Nardi, Mariacristina & Pashchenko, Svetlana & Porapakkarm, Ponpoje, 2022. "The Lifetime Costs of Bad Health," MPRA Paper 112492, University Library of Munich, Germany.
- Mariacristina De Nardi & Svetlana Pashchenko & Ponpoje Porapakkarm, 2017. "The Lifetime Costs of Bad Health," Working Papers 2017-079, Human Capital and Economic Opportunity Working Group.
- De Nardi, Mariacristina & Pashchenko, Svetlana & Porapakkarm, Ponpoje, 2017. "The Lifetime Costs of Bad Health," CEPR Discussion Papers 12386, C.E.P.R. Discussion Papers.
- Mariacristina De Nardi & Svetlana Pashchenko & Ponpoje Porapakkarm, 2017. "The Lifetime Costs of Bad Health," NBER Working Papers 23963, National Bureau of Economic Research, Inc.
More about this item
Keywords
applications; terrorism; applications; public policy; risk analysis; cost-effectiveness; uncertainty;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:7:y:2010:i:4:p:366-377. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.