Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2008.01142.x
Download full text from publisher
References listed on IDEAS
- Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
- Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
- Jay Sethuraman & John N. Tsitsiklis, 2007. "Stochastic Search in a Forest Revisited," Mathematics of Operations Research, INFORMS, vol. 32(3), pages 589-593, August.
- H. Rosoff & D. Von Winterfeldt, 2007. "A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 533-546, June.
- Vicki M. Bier & Louis A. Cox & M. Naceur Azaiez, 2009. "Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 1, pages 1-11, Springer.
- Eric V. Denardo & Uriel G. Rothblum & Ludo Van der Heyden, 2004. "Index Policies for Stochastic Search in a Forest with an Application to R&D Project Management," Mathematics of Operations Research, INFORMS, vol. 29(1), pages 162-181, February.
- Dimitris Bertsimas & José Niño-Mora, 1996. "Conservation Laws, Extended Polymatroids and Multiarmed Bandit Problems; A Polyhedral Approach to Indexable Systems," Mathematics of Operations Research, INFORMS, vol. 21(2), pages 257-306, May.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Louis Anthony (Tony) Cox, Jr., 2012. "Evaluating and Improving Risk Formulas for Allocating Limited Budgets to Expensive Risk‐Reduction Opportunities," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1244-1252, July.
- Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
- Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- K. D. Glazebrook & R. Minty, 2009. "A Generalized Gittins Index for a Class of Multiarmed Bandits with General Resource Requirements," Mathematics of Operations Research, INFORMS, vol. 34(1), pages 26-44, February.
- Anthony M. Barrett, 2010. "Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention," Decision Analysis, INFORMS, vol. 7(4), pages 366-377, December.
- José Niño-Mora, 2006. "Restless Bandit Marginal Productivity Indices, Diminishing Returns, and Optimal Control of Make-to-Order/Make-to-Stock M/G/1 Queues," Mathematics of Operations Research, INFORMS, vol. 31(1), pages 50-84, February.
- Louis Anthony (Tony)Cox, 2008. "What's Wrong with Risk Matrices?," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 497-512, April.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- José R. Correa & Maurice Queyranne, 2012. "Efficiency of equilibria in restricted uniform machine scheduling with total weighted completion time as social cost," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(5), pages 384-395, August.
- Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
- L. Robin Keller & Ali Abbas & Manel Baucells & Vicki M. Bier & David Budescu & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Ahti Salo & George Wu, 2010.
"From the Editors..,"
Decision Analysis, INFORMS, vol. 7(4), pages 327-330, December.
- L. Robin Keller & Manel Baucells & Kevin F. McCardle & Gregory S. Parnell & Ahti Salo, 2007. "From the Editors..," Decision Analysis, INFORMS, vol. 4(4), pages 173-175, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2008. "From the Editors..," Decision Analysis, INFORMS, vol. 5(4), pages 173-176, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2009. "From the Editors ..," Decision Analysis, INFORMS, vol. 6(4), pages 199-201, December.
- Zheng Tang & Yijia Li & Xiaofeng Hu & Huanggang Wu, 2019. "Risk Analysis of Urban Dirty Bomb Attacking Based on Bayesian Network," Sustainability, MDPI, vol. 11(2), pages 1-12, January.
- David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
- Andrei Sleptchenko & M. Eric Johnson, 2015. "Maintaining Secure and Reliable Distributed Control Systems," INFORMS Journal on Computing, INFORMS, vol. 27(1), pages 103-117, February.
- Ulrich Hendel, 2016. "‘Look like the innocent flower, but be the serpent under’t’: mimicking behaviour of growth-oriented terrorist organizations," Defence and Peace Economics, Taylor & Francis Journals, vol. 27(5), pages 665-687, September.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- José Niño-Mora, 2020. "Fast Two-Stage Computation of an Index Policy for Multi-Armed Bandits with Setup Delays," Mathematics, MDPI, vol. 9(1), pages 1-36, December.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:28:y:2008:i:6:p:1749-1761. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.