IDEAS home Printed from https://ideas.repec.org/r/wly/riskan/v27y2007i3p597-606.html

Guiding Resource Allocations Based on Terrorism Risk

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
  2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
  3. Robert Brigantic & Jennifer Willis & Rachel Pulliam & Brian Lewis & Julianna Puccio & Kathryn Otte & Emily Bonus & Brenda Forland & Nick Betzsold & Atithi Bharth & Jonathan Mills & Casey Perkins, 2024. "Aviation security screening optimizer for risk and throughput (ASSORT)," Journal of Transportation Security, Springer, vol. 17(1), pages 1-26, December.
  4. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
  5. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
  6. Jon T Selvik & Eirik B Abrahamsen, 2017. "On the meaning of accuracy and precision in a risk analysis context," Journal of Risk and Reliability, , vol. 231(2), pages 91-100, April.
  7. Samrat Chatterjee & Mark D. Abkowitz, 2011. "A Methodology for Modeling Regional Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 31(7), pages 1133-1140, July.
  8. Ruipeng Tong & Yanwei Zhang & Pengcheng Cui & Cunli Zhai & Meng Shi & Surui Xu, 2018. "Characteristic Analysis of Unsafe Behavior by Coal Miners: Multi-Dimensional Description of the Pan-Scene Data," IJERPH, MDPI, vol. 15(8), pages 1-18, July.
  9. Hou, Benwei & Chen, Pengxu & Zhao, Xudong & Chen, Zhilong, 2025. "Optimal allocation of defensive resources in regional railway networks under intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 257(PB).
  10. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
  11. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
  12. Gilboa, Shaked & Seger-Guttmann, Tali & Partouche-Sebban, Judith, 2022. "Increasing customer loyalty and WOM in an age of terror: Cross-cultural development and validation of the customers’ reactions to terror scale (CRTS)," Journal of Retailing and Consumer Services, Elsevier, vol. 64(C).
  13. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
  14. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
  15. Josefa López-Marín & Amparo Gálvez & Francisco M. del Amor & Jose M. Brotons, 2020. "The Financial Valuation Risk in Pepper Production: The Use of Decoupled Net Present Value," Mathematics, MDPI, vol. 9(1), pages 1-19, December.
  16. Ruipeng Tong & Cunli Zhai & Qingli Jia & Chunlin Wu & Yan Liu & Surui Xue, 2018. "An Interactive Model among Potential Human Risk Factors: 331 Cases of Coal Mine Roof Accidents in China," IJERPH, MDPI, vol. 15(6), pages 1-20, June.
  17. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
  18. M. Elisabeth Paté-Cornell, 2012. "Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations," Decision Analysis, INFORMS, vol. 9(2), pages 186-203, June.
  19. Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
  20. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
  21. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
  22. Guantao Wang & Jingjing Pei, 2019. "Macro Risk: A Versatile and Universal Strategy for Measuring the Overall Safety of Hazardous Industrial Installations in China," IJERPH, MDPI, vol. 16(10), pages 1-13, May.
  23. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
  24. Terje Aven & Ortwin Renn, 2009. "The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 29(4), pages 587-600, April.
  25. Chong Li & Yingqi Li, 2023. "Factors Influencing Public Risk Perception of Emerging Technologies: A Meta-Analysis," Sustainability, MDPI, vol. 15(5), pages 1-37, February.
  26. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
  27. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
  28. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
  29. Navid Ghaffarzadegan, 2008. "How a System Backfires: Dynamics of Redundancy Problems in Security," Risk Analysis, John Wiley & Sons, vol. 28(6), pages 1669-1687, December.
  30. Cameron A. MacKenzie, 2014. "Summarizing Risk Using Risk Measures and Risk Indices," Risk Analysis, John Wiley & Sons, vol. 34(12), pages 2143-2162, December.
  31. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
  32. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
  33. Xiaojian Yi & Peng Hou & Haiping Dong, 2020. "A Novel Risk-Based Prioritization Approach for Wireless Sensor Network Deployment in Pipeline Networks," Energies, MDPI, vol. 13(6), pages 1-15, March.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.