Strategic Alternative Responses to Risks of Terrorism
Author
Abstract
Suggested Citation
DOI: 10.1111/1539-6924.00325
Download full text from publisher
References listed on IDEAS
- Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
- Yacov Y. Haimes, 1991. "Total Risk Management," Risk Analysis, John Wiley & Sons, vol. 11(2), pages 169-171, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Levan Elbakidze & Yanhong Jin, 2012. "Victim Countries of Transnational Terrorism: An Empirical Characteristics Analysis," Risk Analysis, John Wiley & Sons, vol. 32(12), pages 2152-2165, December.
- Pu Jiang & Yacov Y. Haimes, 2004. "Risk Management for Leontief‐Based Interdependent Systems," Risk Analysis, John Wiley & Sons, vol. 24(5), pages 1215-1229, October.
- Xuewei Ji & Wenguo Weng & Weicheng Fan, 2008. "Cellular Automata‐Based Systematic Risk Analysis Approach for Emergency Response," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1247-1260, October.
- Franz Dietrich, 2004. "Terrorism Prevention: A General Model," Others 0404001, University Library of Munich, Germany.
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.
- Matthew H. Henry & Yacov Y. Haimes, 2009. "A Comprehensive Network Security Risk Model for Process Control Networks," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 223-248, February.
- Yacov Y. Haimes, 2006. "On the Definition of Vulnerabilities in Measuring Risks to Infrastructures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 293-296, April.
- Yacov Y. Haimes & Alfred Anderegg, 2015. "Sequential Pareto‐Optimal Decisions Made During Emergent Complex Systems of Systems: An Application to the FAA NextGen," Systems Engineering, John Wiley & Sons, vol. 18(1), pages 28-44, January.
- Jalal Ali & Joost R. Santos, 2015. "Modeling the Ripple Effects of IT‐Based Incidents on Interdependent Economic Systems," Systems Engineering, John Wiley & Sons, vol. 18(2), pages 146-161, March.
- Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
- Kenneth G. Crowther & Yacov Y. Haimes, 2005. "Application of the inoperability input—output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, John Wiley & Sons, vol. 8(4), pages 323-341.
- Sivakumar, Senthilkumar, 2022. "A novel Integrated Risk Management Method for Airport operations," Journal of Air Transport Management, Elsevier, vol. 105(C).
- Michael J. Pennock & Yacov Y. Haimes, 2002. "Principles and guidelines for project risk management," Systems Engineering, John Wiley & Sons, vol. 5(2), pages 89-108.
- Joost R. Santos & Sheree T. Pagsuyoin & Lucia C. Herrera & Raymond R. Tan & Krista D. Yu, 2014. "Analysis of drought risk management strategies using dynamic inoperability input–output modeling and event tree analysis," Environment Systems and Decisions, Springer, vol. 34(4), pages 492-506, December.
- Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
- Yacov Y. Haimes & Clyde C. Chittister, 2012. "Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 213-224, June.
- Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
- Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
- Kenneth G. Crowther & Yacov Y. Haimes & Gideon Taub, 2007. "Systemic Valuation of Strategic Preparedness Through Application of the Inoperability Input‐Output Model with Lessons Learned from Hurricane Katrina," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1345-1364, October.
- M. F. Leung & J. R. Santos & Y. Y. Haimes, 2003. "Risk Modeling, Assessment, and Management of Lahar Flow Threat," Risk Analysis, John Wiley & Sons, vol. 23(6), pages 1323-1335, December.
- Joost R. Santos & Lucia Castro Herrera & Krista Danielle S. Yu & Sheree Ann T. Pagsuyoin & Raymond R. Tan, 2014. "State of the Art in Risk Analysis of Workforce Criticality Influencing Disaster Preparedness for Interdependent Systems," Risk Analysis, John Wiley & Sons, vol. 34(6), pages 1056-1068, June.
- Yacov Y. Haimes, 2018. "Risk Modeling of Interdependent Complex Systems of Systems: Theory and Practice," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 84-98, January.
- Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
- Sean S. Baggott & Joost R. Santos, 2020. "A Risk Analysis Framework for Cyber Security and Critical Infrastructure Protection of the U.S. Electric Power Grid," Risk Analysis, John Wiley & Sons, vol. 40(9), pages 1744-1761, September.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:23:y:2003:i:3:p:429-444. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.