IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v95y2010i5p478-483.html
   My bibliography  Save this article

Assessing risk from intelligent attacks: A perspective on approaches

Author

Listed:
  • Guikema, Seth D.
  • Aven, Terje

Abstract

Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

Suggested Citation

  • Guikema, Seth D. & Aven, Terje, 2010. "Assessing risk from intelligent attacks: A perspective on approaches," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 478-483.
  • Handle: RePEc:eee:reensy:v:95:y:2010:i:5:p:478-483
    DOI: 10.1016/j.ress.2009.12.001
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832009002683
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2009.12.001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bruno S. Frey & Simon Luechinger, "undated". "Terrorism: Deterrence May Backfire," IEW - Working Papers 136, Institute for Empirical Research in Economics - University of Zurich.
    2. Levitin, Gregory & Ben-Haim, Hanoch, 2008. "Importance of protections against intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 93(4), pages 639-646.
    3. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    4. Todd Sandler & John L. Scott, 1987. "Terrorist Success in Hostage-Taking Incidents," Journal of Conflict Resolution, Peace Science Society (International), vol. 31(1), pages 35-53, March.
    5. Daniel Ellsberg, 1961. "Risk, Ambiguity, and the Savage Axioms," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 75(4), pages 643-669.
    6. Terje Aven & Ortwin Renn, 2009. "On risk defined as an event where the outcome is uncertain," Journal of Risk Research, Taylor & Francis Journals, vol. 12(1), pages 1-11, January.
    7. Aven, Terje, 2008. "A semi-quantitative approach to risk analysis, as an alternative to QRAs," Reliability Engineering and System Safety, Elsevier, vol. 93(6), pages 790-797.
    8. Sandler, Todd & Tschirhart, John T. & Cauley, Jon, 1983. "A Theoretical Analysis of Transnational Terrorism," American Political Science Review, Cambridge University Press, vol. 77(1), pages 36-54, March.
    9. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    10. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    11. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.
    2. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    3. Roshanak Nateghi & Seth D. Guikema & Yue (Grace) Wu & C. Bayan Bruss, 2016. "Critical Assessment of the Foundations of Power Transmission and Distribution Reliability Metrics and Standards," Risk Analysis, John Wiley & Sons, vol. 36(1), pages 4-15, January.
    4. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    5. Buede, Dennis M. & Mahoney, Suzanne & Ezell, Barry & Lathrop, John, 2012. "Using plural modeling for predicting decisions made by adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 108(C), pages 77-89.
    6. Iaiani, Matteo & Sorichetti, Riccardo & Tugnoli, Alessandro & Cozzani, Valerio, 2024. "Modelling standoff distances to prevent escalation in shooting attacks to tanks storing hazardous materials," Reliability Engineering and System Safety, Elsevier, vol. 241(C).
    7. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    8. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    9. Wang, Jia & Ni, Shunjiang & Shen, Shifei & Li, Shuying, 2019. "Empirical study of crowd dynamic in public gathering places during a terrorist attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1-9.
    10. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    11. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.
    12. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Peter J. Phillips & Gabriela Pohl, 2017. "Terrorist choice: a stochastic dominance and prospect theory analysis," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(2), pages 150-164, March.
    2. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    3. Selvik, J.T. & Aven, T., 2011. "A framework for reliability and risk centered maintenance," Reliability Engineering and System Safety, Elsevier, vol. 96(2), pages 324-331.
    4. Phillips Peter J. & Pohl Gabriela, 2018. "The Deferral of Attacks: SP/A Theory as a Model of Terrorist Choice when Losses Are Inevitable," Open Economics, De Gruyter, vol. 1(1), pages 71-85, February.
    5. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    6. Christina Leuker & Thorsten Pachur & Ralph Hertwig & Timothy J. Pleskac, 2019. "Do people exploit risk–reward structures to simplify information processing in risky choice?," Journal of the Economic Science Association, Springer;Economic Science Association, vol. 5(1), pages 76-94, August.
    7. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    8. Itzhak Gilboa & Andrew Postlewaite & Larry Samuelson & David Schmeidler, 2019. "What are axiomatizations good for?," Theory and Decision, Springer, vol. 86(3), pages 339-359, May.
    9. Liu, Hui-hui & Song, Yao-yao & Liu, Xiao-xiao & Yang, Guo-liang, 2020. "Aggregating the DEA prospect cross-efficiency with an application to state key laboratories in China," Socio-Economic Planning Sciences, Elsevier, vol. 71(C).
    10. James K. Hammitt, 2020. "Valuing mortality risk in the time of COVID-19," Journal of Risk and Uncertainty, Springer, vol. 61(2), pages 129-154, October.
    11. André Lapied & Thomas Rongiconi, 2013. "Ambiguity as a Source of Temptation: Modeling Unstable Beliefs," Working Papers halshs-00797631, HAL.
    12. Chorvat, Terrence, 2006. "Taxing utility," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 35(1), pages 1-16, February.
    13. Brandt, Patrick T. & George, Justin & Sandler, Todd, 2016. "Why concessions should not be made to terrorist kidnappers," European Journal of Political Economy, Elsevier, vol. 44(C), pages 41-52.
    14. Stefano DellaVigna, 2009. "Psychology and Economics: Evidence from the Field," Journal of Economic Literature, American Economic Association, vol. 47(2), pages 315-372, June.
    15. Iñigo Iturbe-Ormaetxe & Giovanni Ponti & Josefa Tomás, 2016. "Myopic Loss Aversion under Ambiguity and Gender Effects," PLOS ONE, Public Library of Science, vol. 11(12), pages 1-11, December.
    16. Zimper, Alexander, 2012. "Asset pricing in a Lucas fruit-tree economy with the best and worst in mind," Journal of Economic Dynamics and Control, Elsevier, vol. 36(4), pages 610-628.
    17. Courgeau, Daniel, 2012. "Probability and social science : methodologial relationships between the two approaches ?," MPRA Paper 43102, University Library of Munich, Germany.
    18. S. Larsson & G. R. Chesley, 1986. "An analysis of the auditor's uncertainty about probabilities," Contemporary Accounting Research, John Wiley & Sons, vol. 2(2), pages 259-282, March.
    19. Mercè Roca & Robin Hogarth & A. Maule, 2006. "Ambiguity seeking as a result of the status quo bias," Journal of Risk and Uncertainty, Springer, vol. 32(3), pages 175-194, May.
    20. Mohammed Abdellaoui & Horst Zank, 2023. "Source and rank-dependent utility," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 75(4), pages 949-981, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:95:y:2010:i:5:p:478-483. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.