IDEAS home Printed from https://ideas.repec.org/r/wly/riskan/v22y2002i2p383-397.html
   My bibliography  Save this item

Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Barry M. Horowitz & Yacov Y. Haimes, 2003. "Risk‐based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism," Systems Engineering, John Wiley & Sons, vol. 6(3), pages 152-169.
  2. Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
  3. Avner Engel & Shalom Shachar, 2006. "Measuring and optimizing systems' quality costs and project duration," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 259-280, September.
  4. Wenjun Zhang & Yingjun Zhang & Weiliang Qiao, 2022. "Risk Scenario Evaluation for Intelligent Ships by Mapping Hierarchical Holographic Modeling into Risk Filtering, Ranking and Management," Sustainability, MDPI, vol. 14(4), pages 1-18, February.
  5. Jesus Palomo & David Rios Insua & Fabrizio Ruggeri, 2007. "Modeling External Risks in Project Management," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 961-978, August.
  6. Abhinav B. Agrawal & Kash Barker & Yacov Y. Haimes, 2011. "Adaptive multiplayer approach for risk‐based decision‐making: 2006 Virginia Gubernatorial Inauguration," Systems Engineering, John Wiley & Sons, vol. 14(4), pages 455-470, December.
  7. Madelynn R. D. Stackhouse & Robert Stewart, 2017. "Failing to Fix What is Found: Risk Accommodation in the Oil and Gas Industry," Risk Analysis, John Wiley & Sons, vol. 37(1), pages 130-146, January.
  8. James H. Lambert & Rachel K. Jennings & Nilesh N. Joshi, 2006. "Integration of risk identification with business process models," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 187-198, September.
  9. Hong Sun & Fangquan Yang & Peiwen Zhang & Yunxiang Zhao, 2023. "Flight Training Risk Identification and Assessment Based on the HHM-RFRM Model," Sustainability, MDPI, vol. 15(2), pages 1-20, January.
  10. Aven, Terje, 2017. "Improving risk characterisations in practical situations by highlighting knowledge aspects, with applications to risk matrices," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 42-48.
  11. Ioanna Ioannou & Jaime E. Cadena & Willy Aspinall & David Lange & Daniel Honfi & Tiziana Rossetto, 2022. "Prioritization of hazards for risk and resilience management through elicitation of expert judgement," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 112(3), pages 2773-2795, July.
  12. M. F. Leung & J. R. Santos & Y. Y. Haimes, 2003. "Risk Modeling, Assessment, and Management of Lahar Flow Threat," Risk Analysis, John Wiley & Sons, vol. 23(6), pages 1323-1335, December.
  13. Joost R. Santos & Lucia Castro Herrera & Krista Danielle S. Yu & Sheree Ann T. Pagsuyoin & Raymond R. Tan, 2014. "State of the Art in Risk Analysis of Workforce Criticality Influencing Disaster Preparedness for Interdependent Systems," Risk Analysis, John Wiley & Sons, vol. 34(6), pages 1056-1068, June.
  14. Hassler, Madison L. & Andrews, Daniel J. & Ezell, Barry C. & Polmateer, Thomas L. & Lambert, James H., 2020. "Multi-perspective scenario-based preferences in enterprise risk analysis of public safety wireless broadband network," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
  15. Yacov Y. Haimes & Alfred Anderegg, 2015. "Sequential Pareto‐Optimal Decisions Made During Emergent Complex Systems of Systems: An Application to the FAA NextGen," Systems Engineering, John Wiley & Sons, vol. 18(1), pages 28-44, January.
  16. Sean S. Baggott & Joost R. Santos, 2020. "A Risk Analysis Framework for Cyber Security and Critical Infrastructure Protection of the U.S. Electric Power Grid," Risk Analysis, John Wiley & Sons, vol. 40(9), pages 1744-1761, September.
  17. Rogerson, Ellen C. & Lambert, James H., 2012. "Prioritizing risks via several expert perspectives with application to runway safety," Reliability Engineering and System Safety, Elsevier, vol. 103(C), pages 22-34.
  18. M Barad & A Engel, 2006. "Optimizing VVT strategies: a decomposition approach," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 57(8), pages 965-974, August.
  19. Luca Urciuoli & Juha Hintsa, 2021. "Can digital ecosystems mitigate risks in sea transport operations? Estimating benefits for supply chain stakeholders," Maritime Economics & Logistics, Palgrave Macmillan;International Association of Maritime Economists (IAME), vol. 23(2), pages 237-267, June.
  20. Elizabeth B. Connelly & Lisa M. Colosi & Andres F. Clarens & James H. Lambert, 2015. "Risk Analysis of Biofuels Industry for Aviation with Scenario‐Based Expert Elicitation," Systems Engineering, John Wiley & Sons, vol. 18(2), pages 178-191, March.
  21. Andrew G. Huff & James S. Hodges & Shaun P. Kennedy & Amy Kircher, 2015. "Evaluation of the Food and Agriculture Sector Criticality Assessment Tool (FASCAT) and the Collected Data," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1448-1467, August.
  22. Gregory A. Lamm & Yacov Y. Haimes, 2002. "Assessing and managing risks to information assurance: A methodological approach," Systems Engineering, John Wiley & Sons, vol. 5(4), pages 286-314.
  23. Zhenyu Yan & Yacov Y. Haimes, 2011. "Risk‐based multiobjective resource allocation in hierarchical systems with multiple decisionmakers. Part I: Theory and methodology," Systems Engineering, John Wiley & Sons, vol. 14(1), pages 1-16, March.
  24. Barry Charles Ezell, 2007. "Infrastructure Vulnerability Assessment Model (I‐VAM)," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 571-583, June.
  25. Patrick L. Yorio & Dana R. Willmer & Joel M. Haight, 2014. "Interpreting MSHA Citations Through the Lens of Occupational Health and Safety Management Systems: Investigating Their Impact on Mine Injuries and Illnesses 2003–2010," Risk Analysis, John Wiley & Sons, vol. 34(8), pages 1538-1553, August.
  26. Heckmann, Iris & Comes, Tina & Nickel, Stefan, 2015. "A critical review on supply chain risk – Definition, measure and modeling," Omega, Elsevier, vol. 52(C), pages 119-132.
  27. Ofer Zwikael & Mark Ahn, 2011. "The Effectiveness of Risk Management: An Analysis of Project Risk Planning Across Industries and Countries," Risk Analysis, John Wiley & Sons, vol. 31(1), pages 25-37, January.
  28. Matthew H. Henry & Yacov Y. Haimes, 2009. "A Comprehensive Network Security Risk Model for Process Control Networks," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 223-248, February.
  29. Susana Freiria & Alexandre O. Tavares & Rui Pedro Julião, 2015. "The Multiscale Importance of Road Segments in a Network Disruption Scenario: A Risk‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 484-500, March.
  30. James H. Lambert & Benjamin L. Schulte & Priya Sarda, 2005. "Tracking the complexity of interactions between risk incidents and engineering systems," Systems Engineering, John Wiley & Sons, vol. 8(3), pages 262-277, September.
  31. Seyed Mohammad Seyedhoseini & Siamak Noori & Mohammad Ali Hatefi, 2009. "An Integrated Methodology for Assessment and Selection of the Project Risk Response Actions," Risk Analysis, John Wiley & Sons, vol. 29(5), pages 752-763, May.
  32. Avner Engel & Miryam Barad, 2003. "A methodology for modeling VVT risks and costs," Systems Engineering, John Wiley & Sons, vol. 6(3), pages 135-151.
  33. Joost R. Santos & Yacov Y. Haimes & Chenyang Lian, 2007. "A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1283-1297, October.
  34. James H. Lambert & Jeffrey M. Keisler & William E. Wheeler & Zachary A. Collier & Igor Linkov, 2013. "Multiscale approach to the security of hardware supply chains for energy systems," Environment Systems and Decisions, Springer, vol. 33(3), pages 326-334, September.
  35. Baiardi, F. & Telmon, C. & Sgandurra, D., 2009. "Hierarchical, model-based risk management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1403-1415.
  36. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
  37. Shital A. Thekdi & Joost Santos, 2019. "Decision‐Making Analytics Using Plural Resilience Parameters for Adaptive Management of Complex Systems," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 871-889, April.
  38. Jalal Ali & Joost R. Santos, 2015. "Modeling the Ripple Effects of IT‐Based Incidents on Interdependent Economic Systems," Systems Engineering, John Wiley & Sons, vol. 18(2), pages 146-161, March.
  39. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.