IDEAS home Printed from https://ideas.repec.org/a/sae/risrel/v222y2008i3p315-326.html
   My bibliography  Save this article

An approach for evaluating and selecting methods for risk and vulnerability assessments

Author

Listed:
  • E P Ford
  • T Aven
  • W Røed
  • H S Wiencke

Abstract

This paper presents and discusses an approach for evaluating and selecting methods for risk and vulnerability assessments, covering both accidental events and security issues. The approach provides guidance on the selection of one specific, suitable method for various types of decision situations, reflecting different levels of potential consequences and associated uncertainties. The evaluation addresses the various stages of the risk assessment process, covering planning, execution, and use of the risk and vulnerability analyses. An example from information and communication technology (ICT) is used to illustrate the method.

Suggested Citation

  • E P Ford & T Aven & W Røed & H S Wiencke, 2008. "An approach for evaluating and selecting methods for risk and vulnerability assessments," Journal of Risk and Reliability, , vol. 222(3), pages 315-326, September.
  • Handle: RePEc:sae:risrel:v:222:y:2008:i:3:p:315-326
    DOI: 10.1243/1748006XJRR120
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1243/1748006XJRR120
    Download Restriction: no

    File URL: https://libkey.io/10.1243/1748006XJRR120?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    2. Aven, Terje, 2010. "Some reflections on uncertainty analysis and management," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 195-201.
    3. Annika Djurle & Beth Young & Anna Berlin & Ivar Vågsholm & Anne-Lie Blomström & Jim Nygren & Anders Kvarnheden, 2022. "Addressing biohazards to food security in primary production," Food Security: The Science, Sociology and Economics of Food Production and Access to Food, Springer;The International Society for Plant Pathology, vol. 14(6), pages 1475-1497, December.
    4. Cagno, Enrico & De Ambroggi, Massimiliano & Grande, Ottavio & Trucco, Paolo, 2011. "Risk analysis of underground infrastructures in urban areas," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 139-148.
    5. Aven, Terje, 2013. "A conceptual framework for linking risk and the elements of the data–information–knowledge–wisdom (DIKW) hierarchy," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 30-36.
    6. Terje Aven & Ortwin Renn, 2015. "An Evaluation of the Treatment of Risk and Uncertainties in the IPCC Reports on Climate Change," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 701-712, April.
    7. Nai Fovino, Igor & Masera, Marcelo & De Cian, Alessio, 2009. "Integrating cyber attacks within fault trees," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1394-1402.
    8. Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.
    9. Aven, Terje, 2013. "Practical implications of the new risk perspectives," Reliability Engineering and System Safety, Elsevier, vol. 115(C), pages 136-145.
    10. Tang, Yang & Liu, Qingyou & Jing, Jiajia & Yang, Yan & Zou, Zhengwei, 2017. "A framework for identification of maintenance significant items in reliability centered maintenance," Energy, Elsevier, vol. 118(C), pages 1295-1303.
    11. Alexandros Korkovelos & Dimitrios Mentis & Morgan Bazilian & Mark Howells & Anwar Saraj & Sulaiman Fayez Hotaki & Fanny Missfeldt-Ringius, 2020. "Supporting Electrification Policy in Fragile States: A Conflict-Adjusted Geospatial Least Cost Approach for Afghanistan," Sustainability, MDPI, vol. 12(3), pages 1-34, January.
    12. Marroni, Giulia & Casini, Leonardo & Bartolucci, Andrea & Kuipers, Sanneke & Casson Moreno, Valeria & Landucci, Gabriele, 2024. "Development of fragility models for process equipment affected by physical security attacks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
    13. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    14. Morgan Bazilian & Debabrata Chattopadhyay, 2015. "Considering Power System Planning in Fragile and Conflict States," Cambridge Working Papers in Economics 1530, Faculty of Economics, University of Cambridge.
    15. Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
    16. Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.
    17. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    18. Longxia Qian & Ren Zhang & Mei Hong & Hongrui Wang & Lizhi Yang, 2016. "A new multiple integral model for water shortage risk assessment and its application in Beijing, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(1), pages 43-67, January.
    19. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    20. Piètre-Cambacédès, L. & Bouissou, M., 2013. "Cross-fertilization between safety and security engineering," Reliability Engineering and System Safety, Elsevier, vol. 110(C), pages 110-126.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:risrel:v:222:y:2008:i:3:p:315-326. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.