IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v31y2011i8p1175-1186.html
   My bibliography  Save this article

On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism

Author

Listed:
  • Yacov Y. Haimes

Abstract

This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems‐based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality‐impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: “What is the likelihood?” and “What are the consequences?” can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences.

Suggested Citation

  • Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
  • Handle: RePEc:wly:riskan:v:31:y:2011:i:8:p:1175-1186
    DOI: 10.1111/j.1539-6924.2011.01603.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2011.01603.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2011.01603.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Paul Slovic & Baruch Fischhoff & Sarah Lichtenstein, 1982. "Why Study Risk Perception?," Risk Analysis, John Wiley & Sons, vol. 2(2), pages 83-93, June.
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    4. Maarten J. Nauta & Wilma F. Jacobs‐Reitsma & Arie H. Havelaar, 2007. "A Risk Assessment Model for Campylobacter in Broiler Meat," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 845-861, August.
    5. Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
    6. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    7. Paul Slovic, 2002. "Terrorism as Hazard: A New Species of Trouble," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 425-426, June.
    8. Yacov Y. Haimes, 2006. "On the Definition of Vulnerabilities in Measuring Risks to Infrastructures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 293-296, April.
    9. Edgar G. Hertwich & Thomas E. McKone & William S. Pease, 2000. "A Systematic Uncertainty Analysis of an Evaluative Fate and Exposure Model," Risk Analysis, John Wiley & Sons, vol. 20(4), pages 439-454, August.
    10. Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
    11. Stan Kaplan & Yacov Y. Haimes & B. John Garrick, 2001. "Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 21(5), pages 807-807, October.
    12. Yacov Y. Haimes, 1991. "Total Risk Management," Risk Analysis, John Wiley & Sons, vol. 11(2), pages 169-171, June.
    13. Kimberly M. Thompson & Radboud J. Duintjer Tebbens & Mark A. Pallansch, 2006. "Evaluation of Response Scenarios to Potential Polio Outbreaks Using Mathematical Models," Risk Analysis, John Wiley & Sons, vol. 26(6), pages 1541-1556, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
    2. Yacov Y Haimes, 2012. "Strategic Preparedness for Recovery from Catastrophic Risks to Communities and Infrastructure Systems of Systems," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1834-1845, November.
    3. Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.
    4. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    5. Yacov Y. Haimes & Clyde C. Chittister, 2012. "Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 213-224, June.
    6. Michele Bristow & Liping Fang & Keith W. Hipel, 2012. "System of Systems Engineering and Risk Management of Extreme Events: Concepts and Case Study," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1935-1955, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.
    2. Yacov Y Haimes, 2012. "Strategic Preparedness for Recovery from Catastrophic Risks to Communities and Infrastructure Systems of Systems," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1834-1845, November.
    3. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    4. Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
    5. Kenneth G. Crowther & Yacov Y. Haimes & Gideon Taub, 2007. "Systemic Valuation of Strategic Preparedness Through Application of the Inoperability Input‐Output Model with Lessons Learned from Hurricane Katrina," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1345-1364, October.
    6. Massimo Andretta, 2014. "Some Considerations on the Definition of Risk Based on Concepts of Systems Theory and Probability," Risk Analysis, John Wiley & Sons, vol. 34(7), pages 1184-1195, July.
    7. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    8. Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
    9. Kenneth G. Crowther & Yacov Y. Haimes, 2005. "Application of the inoperability input—output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, John Wiley & Sons, vol. 8(4), pages 323-341.
    10. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    11. Michael J. Pennock & Yacov Y. Haimes, 2002. "Principles and guidelines for project risk management," Systems Engineering, John Wiley & Sons, vol. 5(2), pages 89-108.
    12. Yacov Y. Haimes & Clyde C. Chittister, 2012. "Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 213-224, June.
    13. Benjamin Donald Oakes & Lars‐Göran Mattsson & Per Näsman & Andrés Alayón Glazunov, 2018. "A Systems‐Based Risk Assessment Framework for Intentional Electromagnetic Interference (IEMI) on Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 38(6), pages 1279-1305, June.
    14. Christopher W. Karvetski & James H. Lambert, 2012. "Evaluating deep uncertainties in strategic priority‐setting with an application to facility energy investments," Systems Engineering, John Wiley & Sons, vol. 15(4), pages 483-493, December.
    15. Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
    16. Francesca Marsili & Jörg Bödefeld, 2021. "Integrating Cluster Analysis into Multi-Criteria Decision Making for Maintenance Management of Aging Culverts," Mathematics, MDPI, vol. 9(20), pages 1-18, October.
    17. S. Cucurachi & E. Borgonovo & R. Heijungs, 2016. "A Protocol for the Global Sensitivity Analysis of Impact Assessment Models in Life Cycle Assessment," Risk Analysis, John Wiley & Sons, vol. 36(2), pages 357-377, February.
    18. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    19. James H. Lambert & Rachel K. Jennings & Nilesh N. Joshi, 2006. "Integration of risk identification with business process models," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 187-198, September.
    20. Michael Greenberg & Paul Lioy & Birnur Ozbas & Nancy Mantell & Sastry Isukapalli & Michael Lahr & Tayfur Altiok & Joseph Bober & Clifton Lacy & Karen Lowrie & Henry Mayer & Jennifer Rovito, 2013. "Passenger Rail Security, Planning, and Resilience: Application of Network, Plume, and Economic Simulation Models as Decision Support Tools," Risk Analysis, John Wiley & Sons, vol. 33(11), pages 1969-1986, November.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:31:y:2011:i:8:p:1175-1186. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.