IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v28y2008i6p1669-1687.html
   My bibliography  Save this article

How a System Backfires: Dynamics of Redundancy Problems in Security

Author

Listed:
  • Navid Ghaffarzadegan

Abstract

Increasing attention is being paid to reliability, safety, and security issues in social systems. Scott Sagan examined why more security forces (a redundancy solution) may lead to less security.(1) He discussed how such a solution can backfire due to three major issues (i.e., “common‐mode error,”“social shirking,” and “overcompensation”). In this article, using Sagan's hypotheses, we simulate and analyze a simple and generic security system as more guards are added to the system. Simulation results support two of Sagan's hypotheses. More specifically, the results show that “common‐mode error” causes the system to backfire, and “social shirking” leads to an inefficient system while exacerbating the common‐mode error's effect. Simulation results show that “overcompensation” has no effect of backfiring, but it leads the system to a critical state in which it can easily be affected by the common‐mode error. Furthermore, the simulation results make us question the importance of the initial power of adversaries (e.g., terrorists) as the results show that, for any exogenous level of adversary power, the system endogenously overcompensates to a level that makes the system more susceptible to being attacked.

Suggested Citation

  • Navid Ghaffarzadegan, 2008. "How a System Backfires: Dynamics of Redundancy Problems in Security," Risk Analysis, John Wiley & Sons, vol. 28(6), pages 1669-1687, December.
  • Handle: RePEc:wly:riskan:v:28:y:2008:i:6:p:1669-1687
    DOI: 10.1111/j.1539-6924.2008.01132.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2008.01132.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2008.01132.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Maria Luisa Lima & Julie Barnett & Jorge Vala, 2005. "Risk Perception and Technological Development at a Societal Level," Risk Analysis, John Wiley & Sons, vol. 25(5), pages 1229-1239, October.
    2. Darren W. Davis & Brian D. Silver, 2004. "Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America," American Journal of Political Science, John Wiley & Sons, vol. 48(1), pages 28-46, January.
    3. Scott D. Sagan, 2004. "The Problem of Redundancy Problem: Why More Nuclear Security Forces May Produce Less Nuclear Security," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 935-946, August.
    4. Elise A. Weaver & George Richardson, 2006. "Threshold setting and the cycling of a decision threshold," System Dynamics Review, System Dynamics Society, vol. 22(1), pages 1-26, March.
    5. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    6. George E. Apostolakis, 2004. "Redundancy and Nuclear Security," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 947-948, August.
    7. Anthony A. Leiserowitz, 2005. "American Risk Perceptions: Is Climate Change Dangerous?," Risk Analysis, John Wiley & Sons, vol. 25(6), pages 1433-1442, December.
    8. Vivianne H. M. Visschers & Ree M. Meertens & Wim F. Passchier & Nanne K. DeVries, 2007. "How Does the General Public Evaluate Risk Information? The Impact of Associations with Other Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 715-727, June.
    9. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    10. Adam Rose & Gbadebo Oladosu & Shu‐Yi Liao, 2007. "Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 513-531, June.
    11. Haas, Reinhard & Biermayr, Peter, 2000. "The rebound effect for space heating Empirical evidence from Austria," Energy Policy, Elsevier, vol. 28(6-7), pages 403-410, June.
    12. Matthew Bunn, 2004. "Thinking about How Many Guards Will Do the Job," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 949-953, August.
    13. H. Rosoff & D. Von Winterfeldt, 2007. "A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 533-546, June.
    14. Julie J. C. H. Ryan & Daniel J. Ryan, 2005. "Proportional Hazards in Information Security," Risk Analysis, John Wiley & Sons, vol. 25(1), pages 141-149, February.
    15. Mark P. Kaminskiy & Bilal M. Ayyub, 2006. "Terrorist Population Dynamics Model," Risk Analysis, John Wiley & Sons, vol. 26(3), pages 747-752, June.
    16. Michael W. Slimak & Thomas Dietz, 2006. "Personal Values, Beliefs, and Ecological Risk Perception," Risk Analysis, John Wiley & Sons, vol. 26(6), pages 1689-1705, December.
    17. Michael M. Ting, 2003. "A Strategic Theory of Bureaucratic Redundancy," American Journal of Political Science, John Wiley & Sons, vol. 47(2), pages 274-292, April.
    18. Mika Kivimäki & Raija Kalimo, 1993. "Risk Perception Among Nuclear Power Plant Personnel: A Survey," Risk Analysis, John Wiley & Sons, vol. 13(4), pages 421-424, August.
    19. John S. Carroll, 2004. "Redundancy as a Design Principle and an Operating Principle," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 955-957, August.
    20. Mattias J. Viklund, 2003. "Trust and Risk Perception in Western Europe: A Cross‐National Study," Risk Analysis, John Wiley & Sons, vol. 23(4), pages 727-738, August.
    21. M. T. Todinov, 2006. "Reliability Analysis Based on the Losses from Failures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 311-335, April.
    22. Lennart Sjöberg & Britt‐Marie Drottz‐Sjöberg, 1991. "Knowledge and Risk Perception Among Nuclear Power Plant Employees," Risk Analysis, John Wiley & Sons, vol. 11(4), pages 607-618, December.
    23. M. Elisabeth Paté‐Cornell & Robin L. Dillon & Seth D. Guikema, 2004. "On the Limitations of Redundancies in the Improvement of System Reliability," Risk Analysis, John Wiley & Sons, vol. 24(6), pages 1423-1436, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    2. Viktoria Gisladottir & Alexander A. Ganin & Jeffrey M. Keisler & Jeremy Kepner & Igor Linkov, 2017. "Resilience of Cyber Systems with Over‐ and Underregulation," Risk Analysis, John Wiley & Sons, vol. 37(9), pages 1644-1651, September.
    3. Mika Kivimäki & Raija Kalimo & Simo Salminen, 1995. "Perceived Nuclear Risk, Organizational Commitment, and Appraisals of Management: A Study of Nuclear Power Plant Personnel," Risk Analysis, John Wiley & Sons, vol. 15(3), pages 391-396, June.
    4. Zeynep Altinay & Eric Rittmeyer & Lauren L. Morris & Margaret A. Reams, 2021. "Public risk salience of sea level rise in Louisiana, United States," Journal of Environmental Studies and Sciences, Springer;Association of Environmental Studies and Sciences, vol. 11(4), pages 523-536, December.
    5. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    6. M. Elisabeth Paté-Cornell, 2012. "Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations," Decision Analysis, INFORMS, vol. 9(2), pages 186-203, June.
    7. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    8. Meredith Frances Dobbie & Rebekah Ruth Brown, 2014. "A Framework for Understanding Risk Perception, Explored from the Perspective of the Water Practitioner," Risk Analysis, John Wiley & Sons, vol. 34(2), pages 294-308, February.
    9. Shan Gao & Weimin Li & Shuang Ling & Xin Dou & Xiaozhou Liu, 2019. "An Empirical Study on the Influence Path of Environmental Risk Perception on Behavioral Responses In China," IJERPH, MDPI, vol. 16(16), pages 1-18, August.
    10. Zhengyan Li & David M. Konisky, 2023. "Personal attributes and (mis)perceptions of local environmental risk," Review of Policy Research, Policy Studies Organization, vol. 40(1), pages 119-152, January.
    11. Michael Greenberg & Charles Haas & Anthony Cox & Karen Lowrie & Katherine McComas & Warner North, 2012. "Ten Most Important Accomplishments in Risk Analysis, 1980–2010," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 771-781, May.
    12. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    13. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    14. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    15. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    16. Ahmad Saleh Safi & William James Smith & Zhnongwei Liu, 2012. "Rural Nevada and Climate Change: Vulnerability, Beliefs, and Risk Perception," Risk Analysis, John Wiley & Sons, vol. 32(6), pages 1041-1059, June.
    17. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    18. Vladimir M. Cvetković & Adem Öcal & Yuliya Lyamzina & Eric K. Noji & Neda Nikolić & Goran Milošević, 2021. "Nuclear Power Risk Perception in Serbia: Fear of Exposure to Radiation vs. Social Benefits," Energies, MDPI, vol. 14(9), pages 1-19, April.
    19. Theresa A. K. Knoblauch & Michael Stauffacher & Evelina Trutnevyte, 2018. "Communicating Low‐Probability High‐Consequence Risk, Uncertainty and Expert Confidence: Induced Seismicity of Deep Geothermal Energy and Shale Gas," Risk Analysis, John Wiley & Sons, vol. 38(4), pages 694-709, April.
    20. Francesca S. Cardwell & Susan J. Elliott, 2019. "Understanding an Environmental Health Risk: Investigating Asthma Risk Perception in Ontario Youth Sport," IJERPH, MDPI, vol. 16(11), pages 1-18, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:28:y:2008:i:6:p:1669-1687. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.