IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v25y2005i2p361-376.html
   My bibliography  Save this article

A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism

Author

Listed:
  • George E. Apostolakis
  • Douglas M. Lemon

Abstract

The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in these infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures. We model the infrastructures as interconnected digraphs and employ graph theory to identify the candidate vulnerable scenarios. These scenarios are screened for the susceptibility of their elements to a terrorist attack, and a prioritized list of vulnerabilities is produced. The prioritization methodology is based on multiattribute utility theory. The impact of losing infrastructure services is evaluated using a value tree that reflects the perceptions and values of the decisionmaker and the relevant stakeholders. These results, which are conditional on a specified threat, are provided to the decisionmaker for use in risk management. The methodology is illustrated through the presentation of a portion of the analysis conducted on the campus of the Massachusetts Institute of Technology.

Suggested Citation

  • George E. Apostolakis & Douglas M. Lemon, 2005. "A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism," Risk Analysis, John Wiley & Sons, vol. 25(2), pages 361-376, April.
  • Handle: RePEc:wly:riskan:v:25:y:2005:i:2:p:361-376
    DOI: 10.1111/j.1539-6924.2005.00595.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2005.00595.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2005.00595.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Robert J. Budnitz & George Apostolakis & David M. Boore & Lloyd S. Cluff & Kevin J. Coppersmith & C. Allin Cornell & Peter A. Morris, 1998. "Use of Technical Expert Panels: Applications to Probabilistic Seismic Hazard Analysis," Risk Analysis, John Wiley & Sons, vol. 18(4), pages 463-469, August.
    2. M. Granger Morgan & H. Keith Florig & Michael L. DeKay & Paul Fischbeck, 2000. "Categorizing Risks for Risk Ranking," Risk Analysis, John Wiley & Sons, vol. 20(1), pages 49-58, February.
    3. B. John Garrick, 2002. "Perspectives on the Use of Risk Assessment to Address Terrorism," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 421-423, June.
    4. George E. Apostolakis, 2004. "How Useful Is Quantitative Risk Assessment?," Risk Analysis, John Wiley & Sons, vol. 24(3), pages 515-520, June.
    5. Paul F. Deisler, 2002. "A Perspective: Risk Analysis as a Tool for Reducing the Risks of Terrorism," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 405-413, June.
    6. Yacov Y. Haimes & Thomas Longstaff, 2002. "The Role of Risk Analysis in the Protection of Critical Infrastructures Against Terrorism," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 439-444, June.
    7. George E. Apostolakis & Susan E. Pickett, 1998. "Deliberation: Integrating Analytical Results into Environmental Decisions Involving Multiple Stakeholders," Risk Analysis, John Wiley & Sons, vol. 18(5), pages 621-634, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Emanuele Borgonovo & Veronica Cappelli & Fabio Maccheroni & Massimo Marinacci, 2015. "Risk Analysis and Decision Theory: Foundations," Working Papers 556, IGIER (Innocenzo Gasparini Institute for Economic Research), Bocconi University.
    2. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    3. Pu Jiang & Yacov Y. Haimes, 2004. "Risk Management for Leontief‐Based Interdependent Systems," Risk Analysis, John Wiley & Sons, vol. 24(5), pages 1215-1229, October.
    4. Shuying Li & Jun Zhuang & Shifei Shen, 2017. "Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1287-1297, July.
    5. Amanda P. Rehr & Mitchell J. Small & Paul S. Fischbeck & Patricia Bradley & William S. Fisher, 2014. "The role of scientific studies in building consensus in environmental decision making: a coral reef example," Environment Systems and Decisions, Springer, vol. 34(1), pages 60-87, March.
    6. Denys Yemshanov & Frank H. Koch & Yakov Ben‐Haim & Marla Downing & Frank Sapio & Marty Siltanen, 2013. "A New Multicriteria Risk Mapping Approach Based on a Multiattribute Frontier Concept," Risk Analysis, John Wiley & Sons, vol. 33(9), pages 1694-1709, September.
    7. S. Cucurachi & E. Borgonovo & R. Heijungs, 2016. "A Protocol for the Global Sensitivity Analysis of Impact Assessment Models in Life Cycle Assessment," Risk Analysis, John Wiley & Sons, vol. 36(2), pages 357-377, February.
    8. Johnson, Caroline A. & Flage, Roger & Guikema, Seth D., 2021. "Feasibility study of PRA for critical infrastructure risk analysis," Reliability Engineering and System Safety, Elsevier, vol. 212(C).
    9. Timothy L. McDaniels & Stephanie E. Chang & David Hawkins & Gerard Chew & Holly Longstaff, 2015. "Towards disaster-resilient cities: an approach for setting priorities in infrastructure mitigation efforts," Environment Systems and Decisions, Springer, vol. 35(2), pages 252-263, June.
    10. Stéphane Hallegatte, 2014. "Modeling the Role of Inventories and Heterogeneity in the Assessment of the Economic Costs of Natural Disasters," Risk Analysis, John Wiley & Sons, vol. 34(1), pages 152-167, January.
    11. J. C. Helton & F. J. Davis, 2002. "Illustration of Sampling‐Based Methods for Uncertainty and Sensitivity Analysis," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 591-622, June.
    12. Terje Aven, 2018. "An Emerging New Risk Analysis Science: Foundations and Implications," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 876-888, May.
    13. D. Warner North, 2010. "Probability Theory and Consistent Reasoning," Risk Analysis, John Wiley & Sons, vol. 30(3), pages 377-380, March.
    14. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    15. Noel T. Brewer & Sarah E. Lillie & William K. Hallman, 2006. "Why People Believe They Were Exposed to Biological or Chemical Warfare: A Survey of Gulf War Veterans," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 337-345, April.
    16. Hua Li & George E. Apostolakis & Joseph Gifun & William VanSchalkwyk & Susan Leite & David Barber, 2009. "Ranking the Risks from Multiple Hazards in a Small Community," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 438-456, March.
    17. Zio, E., 2018. "The future of risk assessment," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 176-190.
    18. Salter, Mark B., 2007. "SeMS and sensibility: Security management systems and the management of risk in the Canadian Air Transport Security Authority," Journal of Air Transport Management, Elsevier, vol. 13(6), pages 389-398.
    19. Ine H. J. Van Der Fels‐Klerx & Louis H. J. Goossens & Helmut W. Saatkamp & Suzan H. S. Horst, 2002. "Elicitation of Quantitative Data from a Heterogeneous Expert Panel: Formal Process and Application in Animal Health," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 67-81, February.
    20. Senderov, Sergey M. & Smirnova, Elena M. & Vorobev, Sergey V., 2020. "Analysis of vulnerability of fuel supply systems in gas-consuming regions due to failure of critical gas industry facilities," Energy, Elsevier, vol. 212(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:25:y:2005:i:2:p:361-376. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.