Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2011.01627.x
Download full text from publisher
References listed on IDEAS
- Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
- Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
- Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
- Weber,Elke U. & Baron,Jonathan & Loomes,Graham (ed.), 2001. "Conflict and Tradeoffs in Decision Making," Cambridge Books, Cambridge University Press, number 9780521772389, October.
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
- Adam Rose & Shu‐Yi Liao, 2005. "Modeling Regional Economic Resilience to Disasters: A Computable General Equilibrium Analysis of Water Service Disruptions," Journal of Regional Science, Wiley Blackwell, vol. 45(1), pages 75-112, February.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Michael L. Lahr & Benjamin H. Stevens, 2002. "A Study of the Role of Regionalization in the Generation of Aggregation Error in Regional Input –Output Models," Journal of Regional Science, Wiley Blackwell, vol. 42(3), pages 477-507, August.
- repec:ucp:bkecon:9780226108599 is not listed on IDEAS
- Ian Dobson & Janghoon Kim & Kevin R. Wierzbicki, 2010. "Testing Branching Process Estimators of Cascading Failure with Data from a Simulation of Transmission Line Outages," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 650-662, April.
- Crucitti, Paolo & Latora, Vito & Marchiori, Massimo, 2004. "A topological analysis of the Italian electric power grid," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 338(1), pages 92-97.
- Terje Aven & Ortwin Renn, 2009. "The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 29(4), pages 587-600, April.
- Michael R. Greenberg & Michael Lahr & Nancy Mantell, 2007. "Understanding the Economic Costs and Benefits of Catastrophes and Their Aftermath: A Review and Suggestions for the U.S. Federal Government," Risk Analysis, John Wiley & Sons, vol. 27(1), pages 83-96, February.
- Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
- Joshua M. Epstein & Robert L. Axtell, 1996. "Growing Artificial Societies: Social Science from the Bottom Up," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262550253, April.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Bing Wu & Xinping Yan & Yang Wang & Di Zhang & C. Guedes Soares, 2017. "Three‐Stage Decision‐Making Model under Restricted Conditions for Emergency Response to Ships Not under Control," Risk Analysis, John Wiley & Sons, vol. 37(12), pages 2455-2474, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
- Michael Greenberg & Paul Lioy & Birnur Ozbas & Nancy Mantell & Sastry Isukapalli & Michael Lahr & Tayfur Altiok & Joseph Bober & Clifton Lacy & Karen Lowrie & Henry Mayer & Jennifer Rovito, 2013. "Passenger Rail Security, Planning, and Resilience: Application of Network, Plume, and Economic Simulation Models as Decision Support Tools," Risk Analysis, John Wiley & Sons, vol. 33(11), pages 1969-1986, November.
- Michael Greenberg & Charles Haas & Anthony Cox & Karen Lowrie & Katherine McComas & Warner North, 2012. "Ten Most Important Accomplishments in Risk Analysis, 1980–2010," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 771-781, May.
- Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
- Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
- Joost R. Santos, 2006. "Inoperability input‐output modeling of disruptions to interdependent economic systems," Systems Engineering, John Wiley & Sons, vol. 9(1), pages 20-34, March.
- Stephanie E. Chang & Timothy McDaniels & Jana Fox & Rajan Dhariwal & Holly Longstaff, 2014. "Toward Disaster‐Resilient Cities: Characterizing Resilience of Infrastructure Systems with Expert Judgments," Risk Analysis, John Wiley & Sons, vol. 34(3), pages 416-434, March.
- Naqvi, Asjad, 2017. "Deep Impact: Geo-Simulations as a Policy Toolkit for Natural Disasters," World Development, Elsevier, vol. 99(C), pages 395-418.
- de Wildt, T.E. & Chappin, E.J.L. & van de Kaa, G. & Herder, P.M. & van de Poel, I.R., 2019. "Conflicting values in the smart electricity grid a comprehensive overview," Renewable and Sustainable Energy Reviews, Elsevier, vol. 111(C), pages 184-196.
- Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:31:y:2011:i:12:p:1849-1858. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.