IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v95y2010i8p823-827.html
   My bibliography  Save this article

Is ALARP applicable to the management of terrorist risks?

Author

Listed:
  • Guikema, S.D.
  • Aven, T.

Abstract

In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

Suggested Citation

  • Guikema, S.D. & Aven, T., 2010. "Is ALARP applicable to the management of terrorist risks?," Reliability Engineering and System Safety, Elsevier, vol. 95(8), pages 823-827.
  • Handle: RePEc:eee:reensy:v:95:y:2010:i:8:p:823-827
    DOI: 10.1016/j.ress.2010.03.007
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832010000736
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2010.03.007?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    2. Darren W. Davis & Brian D. Silver, 2004. "Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America," American Journal of Political Science, John Wiley & Sons, vol. 48(1), pages 28-46, January.
    3. Aven, Terje, 2008. "A semi-quantitative approach to risk analysis, as an alternative to QRAs," Reliability Engineering and System Safety, Elsevier, vol. 93(6), pages 790-797.
    4. Viscusi, W Kip & Zeckhauser, Richard J, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Langdalen, Henrik & Abrahamsen, Eirik Bjorheim & Selvik, Jon Tømmerås, 2020. "On the importance of systems thinking when using the ALARP principle for risk management," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Terje Aven, 2013. "On How to Deal with Deep Uncertainties in a Risk Assessment and Management Context," Risk Analysis, John Wiley & Sons, vol. 33(12), pages 2082-2091, December.
    3. Wu, Zhongqun & Yang, Chan & Zheng, Ruijin, 2022. "Developing a holistic fuzzy hierarchy-cloud assessment model for the connection risk of renewable energy microgrid," Energy, Elsevier, vol. 245(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kenneth D. Nguyen & Heather Rosoff & Richard S. John, 2017. "Valuing Equal Protection in Aviation Security Screening," Risk Analysis, John Wiley & Sons, vol. 37(12), pages 2405-2419, December.
    2. Bozzoli, Carlos & Müller, Cathérine, 2011. "Perceptions and attitudes following a terrorist shock: Evidence from the UK," European Journal of Political Economy, Elsevier, vol. 27(S1), pages 89-106.
    3. Joseph A Hamm & Corwin Smidt & Roger C Mayer, 2019. "Understanding the psychological nature and mechanisms of political trust," PLOS ONE, Public Library of Science, vol. 14(5), pages 1-20, May.
    4. April K. Clark & Michael Clark & Marie A. Eisenstein, 2014. "Stability and Change," SAGE Open, , vol. 4(1), pages 21582440145, March.
    5. Neelke Doorn, 2015. "The Blind Spot in Risk Ethics: Managing Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 354-360, March.
    6. Sambuddha Ghatak & Aaron Gold & Brandon C. Prins, 2019. "Domestic Terrorism in Democratic States: Understanding and Addressing Minority Grievances," Journal of Conflict Resolution, Peace Science Society (International), vol. 63(2), pages 439-467, February.
    7. Farrow Scott & Shapiro Stuart, 2009. "The Benefit-Cost Analysis of Security Focused Regulations," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 6(1), pages 1-22, April.
    8. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    9. Henning Finseraas & Ola Listhaug, 2013. "It can happen here: the impact of the Mumbai terror attacks on public opinion in Western Europe," Public Choice, Springer, vol. 156(1), pages 213-228, July.
    10. Bruno Frey & Simon Luechinger & Alois Stutzer, 2009. "The life satisfaction approach to valuing public goods: The case of terrorism," Public Choice, Springer, vol. 138(3), pages 317-345, March.
    11. Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2007. "Calculating Tragedy: Assessing The Costs Of Terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 21(1), pages 1-24, February.
    12. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    13. Niels Spierings, 2017. "Trust and Tolerance across the Middle East and North Africa: A Comparative Perspective on the Impact of the Arab Uprisings," Politics and Governance, Cogitatio Press, vol. 5(2), pages 4-15.
    14. Alia Aghajanian & Patricia Justino & Jean-Pierre Tranchant, 2020. "Riots and social capital in urban India," WIDER Working Paper Series wp-2020-42, World Institute for Development Economic Research (UNU-WIDER).
    15. Ríos Insua, David & Ruggeri, Fabrizio & Soyer, Refik & Rasines, Daniel G., 2018. "Adversarial issues in reliability," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1113-1119.
    16. Kamel Karoui, 2016. "Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server," International Journal of Network Management, John Wiley & Sons, vol. 26(6), pages 553-578, November.
    17. Stefan Rass & Sandra König & Stefan Schauer, 2017. "Defending Against Advanced Persistent Threats Using Game-Theory," PLOS ONE, Public Library of Science, vol. 12(1), pages 1-43, January.
    18. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    19. Nikolova, Milena & Popova, Olga, 2023. "Echoes of the Past: The Enduring Impact of Communism on Contemporary Freedom of Speech Values," IZA Discussion Papers 16657, Institute of Labor Economics (IZA).
    20. Frederick Solt, 2008. "Diversionary Nationalism: Economic Inequality and the Formation of National Pride," LIS Working papers 495, LIS Cross-National Data Center in Luxembourg.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:95:y:2010:i:8:p:823-827. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.