A Methodology for Modeling Regional Terrorism Risk
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2010.01565.x
Download full text from publisher
References listed on IDEAS
- Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Rongchen Zhu & Xiaofeng Hu & Xin Li & Han Ye & Nan Jia, 2020. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method," IJERPH, MDPI, vol. 17(6), pages 1-23, March.
- Mark Abkowitz & Janey Camp, 2017. "Structuring an Enterprise Risk Assessment Protocol: Traditional Practice and New Methods," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 20(1), pages 79-97, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
- Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
- Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
- M. Elisabeth Paté-Cornell, 2012. "Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations," Decision Analysis, INFORMS, vol. 9(2), pages 186-203, June.
- Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
- Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
- Jon T Selvik & Eirik B Abrahamsen, 2017. "On the meaning of accuracy and precision in a risk analysis context," Journal of Risk and Reliability, , vol. 231(2), pages 91-100, April.
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Guantao Wang & Jingjing Pei, 2019. "Macro Risk: A Versatile and Universal Strategy for Measuring the Overall Safety of Hazardous Industrial Installations in China," IJERPH, MDPI, vol. 16(10), pages 1-13, May.
- Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
- Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
- Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
- Xiaojian Yi & Peng Hou & Haiping Dong, 2020. "A Novel Risk-Based Prioritization Approach for Wireless Sensor Network Deployment in Pipeline Networks," Energies, MDPI, vol. 13(6), pages 1-15, March.
- Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
- Josefa López-Marín & Amparo Gálvez & Francisco M. del Amor & Jose M. Brotons, 2020. "The Financial Valuation Risk in Pepper Production: The Use of Decoupled Net Present Value," Mathematics, MDPI, vol. 9(1), pages 1-19, December.
- Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Navid Ghaffarzadegan, 2008. "How a System Backfires: Dynamics of Redundancy Problems in Security," Risk Analysis, John Wiley & Sons, vol. 28(6), pages 1669-1687, December.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:31:y:2011:i:7:p:1133-1140. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.