IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v7y1987i1p35-47.html
   My bibliography  Save this article

Risk Analysis of Terrorist Attacks

Author

Listed:
  • Harry F. Martz
  • Mark E. Johnson

Abstract

A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed‐site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based on event tree models of the site/security configuration. This calculation incorporates a realistic engagement model (in the event a guard force engages the terrorists prior to completion of their objective) and information on barrier penetration times (for example, distribution of the time to defeat a chain link fence or vault door, traverse an open area, and so forth). Two security analyses are described to illustrate the methodology. One example considers a terrorist attack on a convoy transporting a missile from a storage to a launch facility. The second example involves an attack on a munitions storage facility.

Suggested Citation

  • Harry F. Martz & Mark E. Johnson, 1987. "Risk Analysis of Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 7(1), pages 35-47, March.
  • Handle: RePEc:wly:riskan:v:7:y:1987:i:1:p:35-47
    DOI: 10.1111/j.1539-6924.1987.tb00967.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.1987.tb00967.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.1987.tb00967.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jeffrey S. Simonoff & Carlos E. Restrepo & Rae Zimmerman, 2007. "Risk‐Management and Risk‐Analysis‐Based Decision Tools for Attacks on Electric Power," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 547-570, June.
    2. Edouard Kujawski & Gregory A. Miller, 2007. "Quantitative risk‐based analysis for military counterterrorism systems," Systems Engineering, John Wiley & Sons, vol. 10(4), pages 273-289, December.
    3. Raymond A. Zilinskas & Bruce Hope & D. Warner North, 2004. "A Discussion of Findings and Their Possible Implications from a Workshop on Bioterrorism Threat Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 901-908, August.
    4. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    5. Bilal M. Ayyub & William L. McGill & Mark Kaminskiy, 2007. "Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 789-801, August.
    6. Cynthia Lum & Leslie W. Kennedy & Alison J. Sherley, 2006. "The Effectiveness of Counter‐Terrorism Strategies," Campbell Systematic Reviews, John Wiley & Sons, vol. 2(1), pages 1-50.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:7:y:1987:i:1:p:35-47. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.