Wiley Handbook of Science and Technology for Homeland Security 2008
DOI: 10.1002/9780470087923.hhs404
|View full text |Cite
|
Sign up to set email alerts
|

The Use of Threat, Vulnerability, and Consequence (TVC) Analysis for Decision Making on The Deployment of Limited Security Resources

Abstract: The allocation of security resources to counterterrorism is a complex task that requires decisions on the risk allocation mechanism, estimation of risk, and tolerable levels of risk. The purpose of this article is to provide an understanding of threat, vulnerability, and consequence (TVC) analysis, its use in the deployment of limited resources, and some of the challenges associated with using TVC as a risk‐based allocation mechanism for homeland security.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…As such, we sought to determine how best to capture the performance of national biosecurity and biosafety mechanisms [1214]. Given that the definition of “biosecurity” often varies between countries, some of the themes we identified were similarly divergent [15].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, we sought to determine how best to capture the performance of national biosecurity and biosafety mechanisms [1214]. Given that the definition of “biosecurity” often varies between countries, some of the themes we identified were similarly divergent [15].…”
Section: Resultsmentioning
confidence: 99%
“…Additionally, geopolitical and economic instability were also found to modulate state vulnerability to health security threats; Linacre, for example, notes that countries with low GDPs and primarily agrarian economies are uniquely vulnerable to the threat of agroterrorism, given its potential to slow economic growth. Poor economies, in turn, could subsequently give rise to social unrest and insurgent activity [15].…”
Section: Resultsmentioning
confidence: 99%
“…Numerous risk analysis methods are being employed in setting priorities for protecting the infrastructures of SMEs, large‐scale companies, etc. One of the most popular ones is the “Risk = Threat × Vulnerability × Consequence (R = TVC)” approach (Linacre et al., 2005). In 2008, some potential restrictions and limitations of this method were presented (Cox, 2008).…”
Section: Hybrid Swara‐bwm Approach For Cyber Risk Assessmentmentioning
confidence: 99%
“…IDSP needs to be expanded and strengthened, and should also have linkages with surveillance networks of neighbouring countries as well as internationally, through agencies like Food and Agriculture Organization (FAO) and WHO. It should incorporate technical and operational research tools such as mapping; use of geographical information system (GIS) and new methodologies for risk-based allocation of resources, like threat, vulnerability and consequence (TVC) analysis (NDMA, 2008, p. 31; Linacren et al, 2005).…”
Section: Mitigating the Threat: Recommendationsmentioning
confidence: 99%