IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v35y2015i12p2162-2171.html
   My bibliography  Save this article

On the Concept and Definition of Terrorism Risk

Author

Listed:
  • Terje Aven
  • Seth Guikema

Abstract

In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries.

Suggested Citation

  • Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
  • Handle: RePEc:wly:riskan:v:35:y:2015:i:12:p:2162-2171
    DOI: 10.1111/risa.12518
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12518
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12518?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    2. B. John Garrick, 2002. "Perspectives on the Use of Risk Assessment to Address Terrorism," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 421-423, June.
    3. Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
    4. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    5. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    6. Aven, Terje, 2013. "Probabilities and background knowledge as a tool to reflect uncertainties in relation to intentional acts," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 229-234.
    7. Aven, Terje, 2011. "On the new ISO guide on risk management terminology," Reliability Engineering and System Safety, Elsevier, vol. 96(7), pages 719-726.
    8. Enders, Walter & Sandler, Todd, 1995. "Terrorism: Theory and applications," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 1, chapter 9, pages 213-249, Elsevier.
    9. Terje Aven & Ortwin Renn, 2009. "The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 29(4), pages 587-600, April.
    10. Sandler, Todd & Tschirhart, John T. & Cauley, Jon, 1983. "A Theoretical Analysis of Transnational Terrorism," American Political Science Review, Cambridge University Press, vol. 77(1), pages 36-54, March.
    11. Seth Guikema, 2012. "Modeling Intelligent Adversaries for Terrorism Risk Assessment: Some Necessary Conditions for Adversary Models," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1117-1121, July.
    12. Keith Hartley & Todd Sandler (ed.), 1995. "Handbook of Defense Economics," Handbook of Defense Economics, Elsevier, edition 1, volume 1, number 1.
    13. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    14. Todd Sandler & John L. Scott, 1987. "Terrorist Success in Hostage-Taking Incidents," Journal of Conflict Resolution, Peace Science Society (International), vol. 31(1), pages 35-53, March.
    15. Enders, Walter & Sandler, Todd, 1993. "The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis," American Political Science Review, Cambridge University Press, vol. 87(4), pages 829-844, December.
    16. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Benjamin Donald Oakes & Lars‐Göran Mattsson & Per Näsman & Andrés Alayón Glazunov, 2018. "A Systems‐Based Risk Assessment Framework for Intentional Electromagnetic Interference (IEMI) on Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 38(6), pages 1279-1305, June.
    2. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    3. Thomas Ying‐Jeh Chen & Valerie Nicole Washington & Terje Aven & Seth David Guikema, 2020. "Review and Evaluation of the J100‐10 Risk and Resilience Management Standard for Water and Wastewater Systems," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 608-623, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Walter Enders & Todd Sandler, 2000. "Is Transnational Terrorism Becoming More Threatening?," Journal of Conflict Resolution, Peace Science Society (International), vol. 44(3), pages 307-332, June.
    2. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    3. Øystein Amundrud & Terje Aven & Roger Flage, 2017. "How the definition of security risk can be made compatible with safety definitions," Journal of Risk and Reliability, , vol. 231(3), pages 286-294, June.
    4. William Shughart, 2006. "An analytical history of terrorism, 1945–2000," Public Choice, Springer, vol. 128(1), pages 7-39, July.
    5. Bruno S. Frey & Simon Luechinger, "undated". "Terrorism: Deterrence May Backfire," IEW - Working Papers 136, Institute for Empirical Research in Economics - University of Zurich.
    6. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    7. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    8. Christophe Muller & Pierre Pecher, 2021. "Terrorism, Insurgency, State Repression, and Cycles of Violence," Working Papers halshs-03134347, HAL.
    9. Sylvain Baumann, 2018. "Protection, Technological Transfer and Alliance against Terrorist Conflict," Post-Print hal-02949083, HAL.
    10. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    11. Walter Enders & Todd Sandler, 2005. "Transnational Terrorism 1968‐2000: Thresholds, Persistence, and Forecasts," Southern Economic Journal, John Wiley & Sons, vol. 71(3), pages 467-482, January.
    12. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
    13. Thomas Ying‐Jeh Chen & Valerie Nicole Washington & Terje Aven & Seth David Guikema, 2020. "Review and Evaluation of the J100‐10 Risk and Resilience Management Standard for Water and Wastewater Systems," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 608-623, March.
    14. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    15. B. Peter Rosendorff & Todd Sandler, 2004. "Too Much of a Good Thing?," Journal of Conflict Resolution, Peace Science Society (International), vol. 48(5), pages 657-671, October.
    16. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    17. L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
    18. Guikema, Seth D. & Aven, Terje, 2010. "Assessing risk from intelligent attacks: A perspective on approaches," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 478-483.
    19. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    20. Kevin Siqueira, 2005. "Political and Militant Wings within Dissident Movements and Organizations," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 218-236, April.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:35:y:2015:i:12:p:2162-2171. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.