Evaluation of the Food and Agriculture Sector Criticality Assessment Tool (FASCAT) and the Collected Data
Author
Abstract
Suggested Citation
DOI: 10.1111/risa.12377
Download full text from publisher
References listed on IDEAS
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- Charles Vlek, 2013. "What Can National Risk Assessors Learn from Decision Theorists and Psychologists?," Risk Analysis, John Wiley & Sons, vol. 33(8), pages 1389-1393, August.
- Terje Aven & Ortwin Renn, 2009. "The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 29(4), pages 587-600, April.
- Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
- Bilal M. Ayyub & William L. McGill & Mark Kaminskiy, 2007. "Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 789-801, August.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- Susana Freiria & Alexandre O. Tavares & Rui Pedro Julião, 2015. "The Multiscale Importance of Road Segments in a Network Disruption Scenario: A Risk‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 484-500, March.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- J. Park & T. P. Seager & P. S. C. Rao & M. Convertino & I. Linkov, 2013. "Integrating Risk and Resilience Approaches to Catastrophe Management in Engineering Systems," Risk Analysis, John Wiley & Sons, vol. 33(3), pages 356-367, March.
- Avner Engel & Shalom Shachar, 2006. "Measuring and optimizing systems' quality costs and project duration," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 259-280, September.
- James H. Lambert & Rachel K. Jennings & Nilesh N. Joshi, 2006. "Integration of risk identification with business process models," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 187-198, September.
- Hassler, Madison L. & Andrews, Daniel J. & Ezell, Barry C. & Polmateer, Thomas L. & Lambert, James H., 2020. "Multi-perspective scenario-based preferences in enterprise risk analysis of public safety wireless broadband network," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
- Rogerson, Ellen C. & Lambert, James H., 2012. "Prioritizing risks via several expert perspectives with application to runway safety," Reliability Engineering and System Safety, Elsevier, vol. 103(C), pages 22-34.
- Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
- Matthew H. Henry & Yacov Y. Haimes, 2009. "A Comprehensive Network Security Risk Model for Process Control Networks," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 223-248, February.
- James H. Lambert & Benjamin L. Schulte & Priya Sarda, 2005. "Tracking the complexity of interactions between risk incidents and engineering systems," Systems Engineering, John Wiley & Sons, vol. 8(3), pages 262-277, September.
- Terje Aven & Ortwin Renn, 2012. "On the Risk Management and Risk Governance of Petroleum Operations in the Barents Sea Area," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1561-1575, September.
- Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
- Madelynn R. D. Stackhouse & Robert Stewart, 2017. "Failing to Fix What is Found: Risk Accommodation in the Oil and Gas Industry," Risk Analysis, John Wiley & Sons, vol. 37(1), pages 130-146, January.
- Hong Sun & Fangquan Yang & Peiwen Zhang & Yunxiang Zhao, 2023. "Flight Training Risk Identification and Assessment Based on the HHM-RFRM Model," Sustainability, MDPI, vol. 15(2), pages 1-20, January.
- Ioanna Ioannou & Jaime E. Cadena & Willy Aspinall & David Lange & Daniel Honfi & Tiziana Rossetto, 2022. "Prioritization of hazards for risk and resilience management through elicitation of expert judgement," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 112(3), pages 2773-2795, July.
- Yacov Y. Haimes & Alfred Anderegg, 2015. "Sequential Pareto‐Optimal Decisions Made During Emergent Complex Systems of Systems: An Application to the FAA NextGen," Systems Engineering, John Wiley & Sons, vol. 18(1), pages 28-44, January.
- Zhenyu Yan & Yacov Y. Haimes, 2011. "Risk‐based multiobjective resource allocation in hierarchical systems with multiple decisionmakers. Part I: Theory and methodology," Systems Engineering, John Wiley & Sons, vol. 14(1), pages 1-16, March.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:35:y:2015:i:8:p:1448-1467. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.