IDEAS home Printed from https://ideas.repec.org/a/bla/popmgt/v29y2020i7p1789-1815.html
   My bibliography  Save this article

Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials

Author

Listed:
  • Sushil Gupta
  • Martin K. Starr
  • Reza Zanjirani Farahani
  • Mahsa Mahboob Ghodsi

Abstract

In this study, we review POM‐based research related to prevention of terrorism. According to the Federal Emergency Management Agency (FEMA) terrorist attacks have the potential to be prevented. Consequently, the focus of this study is on security enhancement and improving the resiliency of a nation to prevent terrorist attacks. Accordingly, we review articles from the 25 top journals, [following procedures developed by Gupta et al. (2016)], in the fields of Production and Operations Management, Operations Research, Management Science, and Supply Chain Management. In addition, we searched some selected journals in the fields of Information Sciences, Political Science, and Economics. This literature is organized and reviewed under the following seven core capabilities defined by the Department of Homeland Security (DHS): (1) Intelligence and Information Sharing, (2) Planning, (3) Interdiction and Disruption, (4) Screening, Search, and Detection, (5) Forensics and Attribution, (6) Public Information and Warning, and (7) Operational Coordination. We found that POM research on terrorism is primarily driven by the type of information that a defending country and a terrorist have about each other. Game theory is the main technique that is used in most research papers. Possible directions for future research are discussed.

Suggested Citation

  • Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
  • Handle: RePEc:bla:popmgt:v:29:y:2020:i:7:p:1789-1815
    DOI: 10.1111/poms.13192
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/poms.13192
    Download Restriction: no

    File URL: https://libkey.io/10.1111/poms.13192?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Ryusuke Hohzaki & Takehiro Higashio, 2016. "An attrition game on a network ruled by Lanchester’s square law," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 67(5), pages 691-707, May.
    2. Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
    3. Jin, Jian Gang & Lu, Linjun & Sun, Lijun & Yin, Jingbo, 2015. "Optimal allocation of protective resources in urban rail transit networks against intentional attacks," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 84(C), pages 73-87.
    4. Laura A. McLay & Sheldon H. Jacobson & John E. Kobza, 2006. "A multilevel passenger screening problem for aviation security," Naval Research Logistics (NRL), John Wiley & Sons, vol. 53(3), pages 183-197, April.
    5. Kelly J. Cormican & David P. Morton & R. Kevin Wood, 1998. "Stochastic Network Interdiction," Operations Research, INFORMS, vol. 46(2), pages 184-197, April.
    6. Lindelauf, R.H.A. & Hamers, H.J.M. & Husslage, B.G.M., 2013. "Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda," European Journal of Operational Research, Elsevier, vol. 229(1), pages 230-238.
    7. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    8. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    9. Lapan, Harvey E. & Sandler, Todd, 1993. "Terrorism and signalling," European Journal of Political Economy, Elsevier, vol. 9(3), pages 383-397, August.
    10. Anonymous, 2014. "Introduction to the Issue," Journal of Wine Economics, Cambridge University Press, vol. 9(2), pages 109-110, August.
    11. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
    12. Sundararaghavan, P.S. & Kunnathur, Anand & Fang, Xiao, 2010. "Sequencing questions to ferret out terrorists: Models and heuristics," Omega, Elsevier, vol. 38(1-2), pages 12-19, February.
    13. Todd Sandler & Kevin Siqueira, 2006. "Global terrorism: deterrence versus pre-emption," Canadian Journal of Economics, Canadian Economics Association, vol. 39(4), pages 1370-1387, November.
    14. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    15. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    16. Dorit Hochbaum & Barak Fishbain, 2011. "Nuclear threat detection with mobile distributed sensor networks," Annals of Operations Research, Springer, vol. 187(1), pages 45-63, July.
    17. G Levitin & K Hausken, 2013. "Defence resource distribution between protection and decoys for constant resource stockpiling pace," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 64(9), pages 1409-1417, September.
    18. Qianmei (May) Feng & Hande Sahin & Marvin Karson, 2009. "Bayesian analysis models for aviation baggage screening," IISE Transactions, Taylor & Francis Journals, vol. 41(11), pages 995-1006.
    19. Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
    20. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    21. Anonymous, 2014. "Introduction to the Issue," Journal of Wine Economics, Cambridge University Press, vol. 9(1), pages 1-2, May.
    22. Javier Cano & David Ríos Insua & Alessandra Tedeschi & Ug̃ur Turhan, 2016. "Security economics: an adversarial risk analysis approach to airport protection," Annals of Operations Research, Springer, vol. 245(1), pages 359-378, October.
    23. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    24. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    25. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    26. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    27. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    28. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    29. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    30. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    31. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    32. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    33. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    34. Jong Hee Park, 2010. "Structural Change in U.S. Presidents' Use of Force," American Journal of Political Science, John Wiley & Sons, vol. 54(3), pages 766-782, July.
    35. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    36. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    37. Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.
    38. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    39. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
    40. Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
    41. W. Matthew Carlyle & Shane G. Henderson & Roberto Szechtman, 2011. "Allocating capacity in parallel queues to improve their resilience to deliberate attack," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(8), pages 731-742, December.
    42. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    43. Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
    44. T J Sullivan & W L Perry, 2004. "Identifying indicators of chemical, biological, radiological, and nuclear (CBRN) weapons development activity in sub-national terrorist groups," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 55(4), pages 361-374, April.
    45. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    46. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    47. McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
    48. FitzGerald, Valpy, 2004. "Global financial information, compliance incentives and terrorist funding," European Journal of Political Economy, Elsevier, vol. 20(2), pages 387-401, June.
    49. Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
    50. Bruce Golden, 1978. "A problem in network interdiction," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 25(4), pages 711-713, December.
    51. Roberto Szechtman & Moshe Kress & Kyle Lin & Dolev Cfir, 2008. "Models of sensor operations for border surveillance," Naval Research Logistics (NRL), John Wiley & Sons, vol. 55(1), pages 27-41, February.
    52. Michael P. Atkinson & Lawrence M. Wein, 2008. "TECHNICAL NOTE---Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack," Operations Research, INFORMS, vol. 56(1), pages 247-254, February.
    53. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    54. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
    55. Kyle Y. Lin & Moshe Kress & Roberto Szechtman, 2009. "Scheduling policies for an antiterrorist surveillance system," Naval Research Logistics (NRL), John Wiley & Sons, vol. 56(2), pages 113-126, March.
    56. Bruno S. Frey & Simon Luechinger, "undated". "How to Fight Terrorism: Alternatives to Deterrence," IEW - Working Papers 137, Institute for Empirical Research in Economics - University of Zurich.
    57. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    58. Martin K. Starr & Luk N. Van Wassenhove, 2014. "Introduction to the Special Issue on Humanitarian Operations and Crisis Management," Production and Operations Management, Production and Operations Management Society, vol. 23(6), pages 925-937, June.
    59. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    60. Nicky J. Welton & Howard H. Z. Thom, 2015. "Value of Information," Medical Decision Making, , vol. 35(5), pages 564-566, July.
    61. Loch, Christoph H. & Wu, Yaozhong, 2007. "Behavioral Operations Management," Foundations and Trends(R) in Technology, Information and Operations Management, now publishers, vol. 1(3), pages 121-232, December.
    62. Brandt, Patrick T. & George, Justin & Sandler, Todd, 2016. "Why concessions should not be made to terrorist kidnappers," European Journal of Political Economy, Elsevier, vol. 44(C), pages 41-52.
    63. Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.
    64. Nedialko B Dimitrov & Moshe Kress & Yuval Nevo, 2016. "Finding the needles in the haystack: efficient intelligence processing," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 67(6), pages 801-812, June.
    65. Edward H. Kaplan, 2012. "OR Forum---Intelligence Operations Research: The 2010 Philip McCord Morse Lecture," Operations Research, INFORMS, vol. 60(6), pages 1297-1309, December.
    66. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    67. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    68. Michael P. Atkinson & Zheng Cao & Lawrence M. Wein, 2008. "Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 353-371, April.
    69. Viscusi, W Kip & Zeckhauser, Richard J, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
    70. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    71. Frey, Bruno S. & Luechinger, Simon, 2004. "Decentralization as a disincentive for terror," European Journal of Political Economy, Elsevier, vol. 20(2), pages 509-515, June.
    72. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    73. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    74. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    75. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    76. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chunlin Wu & Han Yao & Xin Ning & Lei Wang, 2021. "Emergence of Informal Safety Leadership: A Social–Cognitive Process for Accident Prevention," Production and Operations Management, Production and Operations Management Society, vol. 30(11), pages 4288-4305, November.
    2. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    3. Xiaoshuai Fan & Ying‐Ju Chen & Christopher S. Tang, 2023. "Allocating scarce resources in the presence of private information and heterogeneous favoritism," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2068-2086, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    2. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    3. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    5. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    6. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    7. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    8. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    9. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    10. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Discussion Papers of DIW Berlin 1050, DIW Berlin, German Institute for Economic Research.
    11. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    12. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    13. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    14. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    15. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    16. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    17. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    18. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    19. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    20. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:popmgt:v:29:y:2020:i:7:p:1789-1815. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1937-5956 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.