Making Infrastructure Competitive in an Urban World
Author
Abstract
Suggested Citation
DOI: 10.1177/0002716209344842
Download full text from publisher
References listed on IDEAS
- Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
- Restrepo, Carlos E. & Simonoff, Jeffrey S. & Zimmerman, Rae, 2009. "Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(1), pages 38-50.
- Urbina, Elba & Wolshon, Brian, 2003. "National review of hurricane evacuation plans and policies: a comparison and contrast of state practices," Transportation Research Part A: Policy and Practice, Elsevier, vol. 37(3), pages 257-275, March.
- Rae Zimmerman & Carlos E. Restrepo, 2006. "The next step: quantifying infrastructure interdependencies to improve security," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 2(2/3), pages 215-230.
- Jeffrey S. Simonoff & Carlos E. Restrepo & Rae Zimmerman, 2007. "Risk‐Management and Risk‐Analysis‐Based Decision Tools for Attacks on Electric Power," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 547-570, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Vaezi, Ali & Verma, Manish, 2018. "Railroad transportation of crude oil in Canada: Developing long-term forecasts, and evaluating the impact of proposed pipeline projects," Journal of Transport Geography, Elsevier, vol. 69(C), pages 98-111.
- Qianxiang Zhu & Yuanqing Qin & Yue Zhao & Zhou Chunjie, 2020. "A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures," International Journal of Distributed Sensor Networks, , vol. 16(1), pages 15501477198, January.
- Siler-Evans, Kyle & Hanson, Alex & Sunday, Cecily & Leonard, Nathan & Tumminello, Michele, 2014. "Analysis of pipeline accidents in the United States from 1968 to 2009," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(4), pages 257-269.
- Eva D. Regnier, 2020. "What Is Six Hours Worth? The Impact of Lead Time on Tropical-Storm Preparation Decisions," Decision Analysis, INFORMS, vol. 17(1), pages 9-23, March.
- Moahamed Younes El Bouti & Mohamed Allouch, 2018. "Analysis of 801 Work-Related Incidents in the Oil and Gas Industry That Occurred Between 2014 and 2016 in 6 Regions," Energy and Environment Research, Canadian Center of Science and Education, vol. 8(1), pages 1-32, June.
- B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
- William B. Haskell & Wenjie Huang & Huifu Xu, 2018. "Preference Elicitation and Robust Optimization with Multi-Attribute Quasi-Concave Choice Functions," Papers 1805.06632, arXiv.org.
- Restrepo, Carlos E. & Simonoff, Jeffrey S. & Zimmerman, Rae, 2009. "Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(1), pages 38-50.
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
- Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
- Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
- Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
- Shital A. Thekdi & James H. Lambert, 2012. "Decision Analysis and Risk Models for Land Development Affecting Infrastructure Systems," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1253-1269, July.
- Peiqiu Guan & Jing Zhang & Vineet M. Payyappalli & Jun Zhuang, 2018. "Modeling and Validating Public–Private Partnerships in Disaster Management," Decision Analysis, INFORMS, vol. 15(2), pages 55-71, June.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Edouard Kujawski, 2015. "Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources," Systems Engineering, John Wiley & Sons, vol. 18(4), pages 365-376, July.
- Thomas J. Wilbanks & Rae Zimmerman & Susan Julius & Paul Kirshen & Joel B. Smith & Richard Moss & William Solecki & Matthias Ruth & Stephen Conrad & Steven J. Fernandez & Michael S. Matthews & Michael, 2020. "Toward indicators of the performance of US infrastructures under climate change risks," Climatic Change, Springer, vol. 163(4), pages 1795-1813, December.
- Shi An & Ze Wang & Jianxun Cui, 2015. "Integrating Regret Psychology to Travel Mode Choice for a Transit-Oriented Evacuation Strategy," Sustainability, MDPI, vol. 7(7), pages 1-16, June.
- Lee D. Han & Fang Yuan & Shih-Miao Chin & Holing Hwang, 2006. "Global Optimization of Emergency Evacuation Assignments," Interfaces, INFORMS, vol. 36(6), pages 502-513, December.
More about this item
Keywords
urban infrastructure; infrastructure investment; energy; transportation; renewable energy; natural hazards; security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:anname:v:626:y:2009:i:1:p:226-241. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.