Wiley Handbook of Science and Technology for Homeland Security 2008
DOI: 10.1002/9780470087923.hhs033
|View full text |Cite
|
Sign up to set email alerts
|

Terrorism Risk

Abstract: Terrorism risk emerged as a quantitative modeling discipline after 9/11. This article describes methods that have been developed for modeling the terrorism risk from Islamist militants. While the damage wrought by a terrorist attack is amenable to engineering loss analysis, the terrorist modus operandi is a function of human behavior, and hence requires special methods drawn from fields such as game theory, social psychology, and network analysis. In order to analyze the global terrorist threat from Islamist m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Intelligence officers can assess quite well the terrorism threat (Woo 2010), but are no better capable of predicting a terrorist attack than seismologists can predict an earthquake. In the United Kingdom, the terrorist threat color-code level was lowered shortly before the 7 July 2005 London transport bombing.…”
Section: Taxonomy Of Loss Mitigating Operationsmentioning
confidence: 99%
“…Intelligence officers can assess quite well the terrorism threat (Woo 2010), but are no better capable of predicting a terrorist attack than seismologists can predict an earthquake. In the United Kingdom, the terrorist threat color-code level was lowered shortly before the 7 July 2005 London transport bombing.…”
Section: Taxonomy Of Loss Mitigating Operationsmentioning
confidence: 99%
“…They follow principles of human behaviour, and can be analysed by methods from social psychology, game theory, and network analysis (Leson, 2005;Rios, 2010). Woo (2008) models the terrorists' target selection process with these rules: Terrorist usually choose weapon modes and targets, against which the technical, logistical and security barriers to mission success are least.…”
Section: Terroristic Tacticsmentioning
confidence: 99%