IDEAS home Printed from https://ideas.repec.org/a/igg/jrcm00/v2y2013i4p39-49.html
   My bibliography  Save this article

A Threat-Response Model of Counter-Terrorism: Implications for Information Security and Infrastructure Risks

Author

Listed:
  • William C. Wood

    (Department of Economics, James Madison University, Harrisonburg, VA, USA)

  • J. Brian O'Roark

    (Department of Economics and Legal Studies, Robert Morris University, Pittsburgh, PA, USA)

  • Lauren M. DeLaCruz

    (James Madison University, Harrisonburg, VA, USA)

Abstract

This paper critically reviews the literature and best practices to develop and apply a qualitative model for managing terrorism threats. The research shows how risk is too complicated to be reduced to a binary system of safe and unsafe attributes. The researchers show how uncertainty can be reduced through the application of resources, by using a protection profile. The second component in the model is a damage profile, which shows how, as security increases, the additional value of more security decreases. When this relationship is adjusted for the costs of security (reflected in the protection profile), the result is an equilibrium showing an economically-rationalized level of security but generally short of complete safety. The model is then simulated to show how the equilibrium is shifted by such factors as an increase in vulnerability or consequences, a more effective adversary, changed costs and advances in technology. Although an equilibrium model with known functions is useful, a number of real-world limitations prevent straightforward application of the model to calculate a security equilibrium. These limitations include discontinuous risks and distributed decision-making authority. Finally, the model is analyzed to estimate the likely effects of litigation and security mandates on counter-terrorism.

Suggested Citation

  • William C. Wood & J. Brian O'Roark & Lauren M. DeLaCruz, 2013. "A Threat-Response Model of Counter-Terrorism: Implications for Information Security and Infrastructure Risks," International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 2(4), pages 39-49, October.
  • Handle: RePEc:igg:jrcm00:v:2:y:2013:i:4:p:39-49
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijrcm.2013100103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jrcm00:v:2:y:2013:i:4:p:39-49. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.