IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v27y2007i4p789-801.html
   My bibliography  Save this article

Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework

Author

Listed:
  • Bilal M. Ayyub
  • William L. McGill
  • Mark Kaminskiy

Abstract

This article develops a quantitative all‐hazards framework for critical asset and portfolio risk analysis (CAPRA) that considers both natural and human‐caused hazards. Following a discussion on the nature of security threats, the need for actionable risk assessments, and the distinction between asset and portfolio‐level analysis, a general formula for all‐hazards risk analysis is obtained that resembles the traditional model based on the notional product of consequence, vulnerability, and threat, though with clear meanings assigned to each parameter. Furthermore, a simple portfolio consequence model is presented that yields first‐order estimates of interdependency effects following a successful attack on an asset. Moreover, depending on the needs of the decisions being made and available analytical resources, values for the parameters in this model can be obtained at a high level or through detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided.

Suggested Citation

  • Bilal M. Ayyub & William L. McGill & Mark Kaminskiy, 2007. "Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 789-801, August.
  • Handle: RePEc:wly:riskan:v:27:y:2007:i:4:p:789-801
    DOI: 10.1111/j.1539-6924.2007.00911.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2007.00911.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2007.00911.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    2. Louis Anthony (Tony) Cox & Djangir Babayev & William Huber, 2005. "Some Limitations of Qualitative Risk Rating Systems," Risk Analysis, John Wiley & Sons, vol. 25(3), pages 651-662, June.
    3. Harry F. Martz & Mark E. Johnson, 1987. "Risk Analysis of Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 7(1), pages 35-47, March.
    4. Emanuele Borgonovo, 2006. "Measuring Uncertainty Importance: Investigation and Comparison of Alternative Approaches," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1349-1361, October.
    5. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    2. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    3. Andrew G. Huff & James S. Hodges & Shaun P. Kennedy & Amy Kircher, 2015. "Evaluation of the Food and Agriculture Sector Criticality Assessment Tool (FASCAT) and the Collected Data," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1448-1467, August.
    4. Susana Freiria & Alexandre O. Tavares & Rui Pedro Julião, 2015. "The Multiscale Importance of Road Segments in a Network Disruption Scenario: A Risk‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 484-500, March.
    5. Elianne A. Zijlstra & Mijntje D. C. ten Brummelaar & Mileen S. Cuijpers & Wendy J. Post & Ingrid D. C. van Balkom & Hamed Seddighi, 2022. "A Safe Home? A Qualitative Study into the Experiences of Adolescents Growing Up in the Dutch Area Impacted by Earthquakes Induced by Gas Extraction," IJERPH, MDPI, vol. 19(8), pages 1-13, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    2. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    3. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    4. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    5. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    6. Louis Anthony (Tony)Cox, 2008. "What's Wrong with Risk Matrices?," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 497-512, April.
    7. Ibsen Chivatá Cárdenas & Saad S. H. Al‐Jibouri & Johannes I. M. Halman & Wim van de Linde & Frank Kaalberg, 2014. "Using Prior Risk‐Related Knowledge to Support Risk Management Decisions: Lessons Learnt from a Tunneling Project," Risk Analysis, John Wiley & Sons, vol. 34(10), pages 1923-1943, October.
    8. S. Cucurachi & E. Borgonovo & R. Heijungs, 2016. "A Protocol for the Global Sensitivity Analysis of Impact Assessment Models in Life Cycle Assessment," Risk Analysis, John Wiley & Sons, vol. 36(2), pages 357-377, February.
    9. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
    10. Roger C. Jensen & Haley Hansen, 2020. "Selecting Appropriate Words for Naming the Rows and Columns of Risk Assessment Matrices," IJERPH, MDPI, vol. 17(15), pages 1-17, July.
    11. Wenbin Ruan & Zhenzhou Lu & Longfei Tian, 2013. "A modified variance-based importance measure and its solution by state dependent parameter," Journal of Risk and Reliability, , vol. 227(1), pages 3-15, February.
    12. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    13. Ronald Wintrobe, 2006. "Extremism, Suicide Terror, and Authoritarism," ICER Working Papers 8-2006, ICER - International Centre for Economic Research.
    14. Yun, Wanying & Lu, Zhenzhou & Feng, Kaixuan & Li, Luyi, 2019. "An elaborate algorithm for analyzing the Borgonovo moment-independent sensitivity by replacing the probability density function estimation with the probability estimation," Reliability Engineering and System Safety, Elsevier, vol. 189(C), pages 99-108.
    15. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    16. Ibsen Chivatá Cárdenas & Saad S.H. Al‐Jibouri & Johannes I.M. Halman & Frits A. van Tol, 2014. "Modeling Risk‐Related Knowledge in Tunneling Projects," Risk Analysis, John Wiley & Sons, vol. 34(2), pages 323-339, February.
    17. Garcia-Alonso, Maria D.C. & Levine, Paul & Smith, Ron, 2016. "Military aid, direct intervention and counterterrorism," European Journal of Political Economy, Elsevier, vol. 44(C), pages 112-135.
    18. Hua Li & George E. Apostolakis & Joseph Gifun & William VanSchalkwyk & Susan Leite & David Barber, 2009. "Ranking the Risks from Multiple Hazards in a Small Community," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 438-456, March.
    19. Vassili Kolokoltsov, 2017. "The Evolutionary Game of Pressure (or Interference), Resistance and Collaboration," Mathematics of Operations Research, INFORMS, vol. 42(4), pages 915-944, November.
    20. TOSHIHIRO IHORI & MARTIN C. McGUIRE, 2007. "Collective Risk Control and Group Security: The Unexpected Consequences of Differential Risk Aversion," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(2), pages 231-263, April.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:27:y:2007:i:4:p:789-801. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.