1987
DOI: 10.1111/j.1539-6924.1987.tb00967.x
|View full text |Cite
|
Sign up to set email alerts
|

Risk Analysis of Terrorist Attacks

Abstract: A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed-site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

1987
1987
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…Another body of literature has attempted to model outages, but primarily by building scenarios and/or through grid network disruption estimates (see, for example, Ezell et al , 2000a, 2000b; Haimes, 1981; Salmeron et al , 2004; Lemon & Apostolakis, 2004; Apostolakis & Lemon, 2005). A third related literature uses scenario‐based or simulation‐based modeling of infrastructure interdependencies in general (see, for example, Garrick et al , 2004; Martz & Johnson, 1987; Masiello et al , 2004; Paté‐Cornell & Guikema, 2002).…”
Section: Introductionmentioning
confidence: 99%
“…Another body of literature has attempted to model outages, but primarily by building scenarios and/or through grid network disruption estimates (see, for example, Ezell et al , 2000a, 2000b; Haimes, 1981; Salmeron et al , 2004; Lemon & Apostolakis, 2004; Apostolakis & Lemon, 2005). A third related literature uses scenario‐based or simulation‐based modeling of infrastructure interdependencies in general (see, for example, Garrick et al , 2004; Martz & Johnson, 1987; Masiello et al , 2004; Paté‐Cornell & Guikema, 2002).…”
Section: Introductionmentioning
confidence: 99%
“…Ezell et al (2010) review probabilistic risk analysis (PRA) and event tree analysis , often used together, as well as some of the controversies that have accompanied their use in terrorism applications (see, for example, Martz and Johnson, 1987 ; Smith Stegen et al Gleason, 1988 ). Aven and Renn (2009) stress the diffi culties in establishing reasonable probability estimates for events occurring.…”
Section: Methodsmentioning
confidence: 98%
“…For the two-device system depicted in Fig. 1, the Type I and 11 error probabilities for the Case 1 system are P(AD21NADl fl N T ) = P?hT + E &~~~~ Therefore, Similarly, ( 5 ) and (6) can be written as and respectively. 0 Corollary 1 gives expressions for the error probabilities in (3-6) that relate the dependent and independent systems, by quantifying the error introduced when device responses are incorrectly assumed to be independent.…”
Section: System Dependence In the Two-device Systemmentioning
confidence: 97%