Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2007.00911.x
Download full text from publisher
References listed on IDEAS
- William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
- Louis Anthony (Tony) Cox & Djangir Babayev & William Huber, 2005. "Some Limitations of Qualitative Risk Rating Systems," Risk Analysis, John Wiley & Sons, vol. 25(3), pages 651-662, June.
- Harry F. Martz & Mark E. Johnson, 1987. "Risk Analysis of Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 7(1), pages 35-47, March.
- Emanuele Borgonovo, 2006. "Measuring Uncertainty Importance: Investigation and Comparison of Alternative Approaches," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1349-1361, October.
- Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
- Andrew G. Huff & James S. Hodges & Shaun P. Kennedy & Amy Kircher, 2015. "Evaluation of the Food and Agriculture Sector Criticality Assessment Tool (FASCAT) and the Collected Data," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1448-1467, August.
- Susana Freiria & Alexandre O. Tavares & Rui Pedro Julião, 2015. "The Multiscale Importance of Road Segments in a Network Disruption Scenario: A Risk‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 484-500, March.
- Elianne A. Zijlstra & Mijntje D. C. ten Brummelaar & Mileen S. Cuijpers & Wendy J. Post & Ingrid D. C. van Balkom & Hamed Seddighi, 2022. "A Safe Home? A Qualitative Study into the Experiences of Adolescents Growing Up in the Dutch Area Impacted by Earthquakes Induced by Gas Extraction," IJERPH, MDPI, vol. 19(8), pages 1-13, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Louis Anthony (Tony)Cox, 2008. "What's Wrong with Risk Matrices?," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 497-512, April.
- Ibsen Chivatá Cárdenas & Saad S. H. Al‐Jibouri & Johannes I. M. Halman & Wim van de Linde & Frank Kaalberg, 2014. "Using Prior Risk‐Related Knowledge to Support Risk Management Decisions: Lessons Learnt from a Tunneling Project," Risk Analysis, John Wiley & Sons, vol. 34(10), pages 1923-1943, October.
- S. Cucurachi & E. Borgonovo & R. Heijungs, 2016. "A Protocol for the Global Sensitivity Analysis of Impact Assessment Models in Life Cycle Assessment," Risk Analysis, John Wiley & Sons, vol. 36(2), pages 357-377, February.
- Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
- Roger C. Jensen & Haley Hansen, 2020. "Selecting Appropriate Words for Naming the Rows and Columns of Risk Assessment Matrices," IJERPH, MDPI, vol. 17(15), pages 1-17, July.
- Wenbin Ruan & Zhenzhou Lu & Longfei Tian, 2013. "A modified variance-based importance measure and its solution by state dependent parameter," Journal of Risk and Reliability, , vol. 227(1), pages 3-15, February.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Ronald Wintrobe, 2006. "Extremism, Suicide Terror, and Authoritarism," ICER Working Papers 8-2006, ICER - International Centre for Economic Research.
- Yun, Wanying & Lu, Zhenzhou & Feng, Kaixuan & Li, Luyi, 2019. "An elaborate algorithm for analyzing the Borgonovo moment-independent sensitivity by replacing the probability density function estimation with the probability estimation," Reliability Engineering and System Safety, Elsevier, vol. 189(C), pages 99-108.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017.
"What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan,"
Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
- Ibsen Chivatá Cárdenas & Saad S.H. Al‐Jibouri & Johannes I.M. Halman & Frits A. van Tol, 2014. "Modeling Risk‐Related Knowledge in Tunneling Projects," Risk Analysis, John Wiley & Sons, vol. 34(2), pages 323-339, February.
- Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016.
"Military aid, direct intervention and counterterrorism,"
European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
- Maria D. C. Garcia-Alonso & Paul Levine & Ron Smith, 2015. "Military Aid, Direct Intervention and Counterterrorism," Studies in Economics 1501, School of Economics, University of Kent.
- Maria Garcia-Alonso & Paul Levine & Ron Smith, 2015. "Military Aid, Direct Intervention and Counterterrorism," School of Economics Discussion Papers 0115, School of Economics, University of Surrey.
- Hua Li & George E. Apostolakis & Joseph Gifun & William VanSchalkwyk & Susan Leite & David Barber, 2009. "Ranking the Risks from Multiple Hazards in a Small Community," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 438-456, March.
- Vassili Kolokoltsov, 2017. "The Evolutionary Game of Pressure (or Interference), Resistance and Collaboration," Mathematics of Operations Research, INFORMS, vol. 42(4), pages 915-944, November.
- TOSHIHIRO IHORI & MARTIN C. McGUIRE, 2007.
"Collective Risk Control and Group Security: The Unexpected Consequences of Differential Risk Aversion,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(2), pages 231-263, April.
- Toshihiro Ihori & Martin C. McGuire, 2006. "Collective Risk Control And Group Security: The Unexpected Consequences of Differential Risk Aversion," CIRJE F-Series CIRJE-F-402, CIRJE, Faculty of Economics, University of Tokyo.
- Toshihiro Ihori & Martin C. McGuire, 2006. "Collective Risk Control And Group Security: The Unexpected Consequences of Differential Risk Aversion," CARF F-Series CARF-F-060, Center for Advanced Research in Finance, Faculty of Economics, The University of Tokyo.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:27:y:2007:i:4:p:789-801. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.