2005
DOI: 10.1111/j.1539-6924.2005.00595.x
|View full text |Cite
|
Sign up to set email alerts
|

A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism

Abstract: The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in these infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
108
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 227 publications
(110 citation statements)
references
References 20 publications
0
108
0
Order By: Relevance
“…Potential infrastructure targets include agriculture and food, banking and finance, dams, high-profile events, information systems, public health, national monuments, nuclear power plants, and water systems. Apostolakis and Lemon (2005) used MAUT to prioritize the vulnerabilities in an infrastructure that they modeled using interconnected diagraphs and applied graph theory to identify candidate scenarios. Brown et al (2004) applied simulation to study the impacts of disruptions and used risk analysis to assess infrastructure interdependencies.…”
Section: Critical Infrastructure Protectionmentioning
confidence: 99%
“…Potential infrastructure targets include agriculture and food, banking and finance, dams, high-profile events, information systems, public health, national monuments, nuclear power plants, and water systems. Apostolakis and Lemon (2005) used MAUT to prioritize the vulnerabilities in an infrastructure that they modeled using interconnected diagraphs and applied graph theory to identify candidate scenarios. Brown et al (2004) applied simulation to study the impacts of disruptions and used risk analysis to assess infrastructure interdependencies.…”
Section: Critical Infrastructure Protectionmentioning
confidence: 99%
“…In this sense, vulnerability is the manifestation of the inherent states of the system that express the extent of adverse effects caused by disruptive events that originate both within and outside the system boundary [17][18][19][20][21]. The second definition focuses on the fact that a system component or an aspect of a system can weaken or limit the system's ability to withstand a threat or to resume a new stable condition [22][23][24]. Given that the objective of this paper is to explore the global system vulnerability, the first definition is the one employed in this research.…”
Section: Vulnerability Factors Of Rail Transit Systemmentioning
confidence: 99%
“…It has been widely used with infrastructures in form of visible networking, such as power grid networks [33,34], transportation networks [35,36], and pipeline networks [37,38]. In addition, graph theory and multiattribute utility theory have also been employed to identify and prioritize candidate infrastructure scenarios vulnerable to terrorist attack [39].…”
Section: Approaches To Studymentioning
confidence: 99%
“…One is that vulnerability is regarded as a system property which means the severity of consequences under the occurrence of a specific hazardous event [43]. The other is that vulnerability applies to express a critical system component, a geographical location, or an aspect of a system [39]. According to these interpretations, there are different types of vulnerability analyses, ranging from global vulnerability analysis [44] and critical component analysis [42] to critical geographical locations analysis [45].…”
Section: Vulnerability Of Infrastructurementioning
confidence: 99%