2014
DOI: 10.1111/risa.12266
|View full text |Cite
|
Sign up to set email alerts
|

A Decision Framework for Managing Risk to Airports from Terrorist Attack

Abstract: This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 10 publications
(24 reference statements)
0
22
0
Order By: Relevance
“…Special journal issues show a range of concerns and approaches, including the effects of terrorist attacks on utilities, (43) the use of historical data on disturbances to analyze utility risk, (44) and methods for assessing the vulnerability of critical infrastructures. (45) Recent work provides assessment methods for terrorist threats to airports specifically, (46) and methods that recognize the interaction of countermeasures in a portfolio-based analysis. (47) A central aspect of much of this work is the mutual adaptation between attackers and defenders.…”
Section: Risk Of Deliberate Harmmentioning
confidence: 99%
See 1 more Smart Citation
“…Special journal issues show a range of concerns and approaches, including the effects of terrorist attacks on utilities, (43) the use of historical data on disturbances to analyze utility risk, (44) and methods for assessing the vulnerability of critical infrastructures. (45) Recent work provides assessment methods for terrorist threats to airports specifically, (46) and methods that recognize the interaction of countermeasures in a portfolio-based analysis. (47) A central aspect of much of this work is the mutual adaptation between attackers and defenders.…”
Section: Risk Of Deliberate Harmmentioning
confidence: 99%
“…(47) We do not deal with the effects on dependent infrastructures, (80) and we ignore the costs of risk measures, which form an important component of other methods. (46) We also neglect the problem of multiple actors facing independent choices about protective actions that are nonetheless interdependent. (81) And we do not address the analysis of threat agents, their capacities, incentives, and motivations.…”
Section: Limitations and Further Workmentioning
confidence: 99%
“…We adopt the concept of intrusion areas or zones as defined in the International Telecommunications Union (ITU) standard K.81, (21) and applied in several risk analyses in the security context, e.g., Shafieezadeh et al (22) Zones are geographical areas or volumes bounded by barriers. Each zone may contain several different points of entry (PoE) (23) from which the operation of an IEMI source causes the target different levels of damage or effect.…”
Section: Setting the Scene Of Iemi Attacks On Critical Infrastructuresmentioning
confidence: 99%
“…Risk analysis for safety is closely related to security. There is no doubt that terrorist attacks, (14) import security for food, (15) aviation security, (16) and cyber crimes are all important security-related issues, which can be much enhanced if we make a wise use of data for risk analysis.…”
Section: Sscsmentioning
confidence: 99%