Quantitative risk-based analysis for military counterterrorism systems

被引:14
|
作者
Kujawski, Edouard [1 ]
Miller, Gregory A. [1 ]
机构
[1] USN, Postgrad Sch, Dept Syst Engn, Monterey, CA 93943 USA
关键词
terrorism; counterterrorism; threats; needs analysis; quantitative probabilistic risk assessment; risk assessment matrix; decision-attack event tree; Monte Carlo simulation; UNCERTAINTIES; TREES;
D O I
10.1002/sys.20075
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. it therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counter-terrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper documents the analysis for a hypothetical case of three potential threats. (C) 2007 Wiley Periodicals, Inc.
引用
收藏
页码:273 / 289
页数:17
相关论文
共 50 条
  • [31] Risk-Based Maintenance Planning for Rail Fastening Systems
    Kaewunruen, Sakdirat
    Osman, Mohd Haniff
    Eric, Wong Hao Cheng
    ASCE-ASME JOURNAL OF RISK AND UNCERTAINTY IN ENGINEERING SYSTEMS PART A-CIVIL ENGINEERING, 2019, 5 (03):
  • [32] ESIA Expert System for Systems Audit Risk-Based
    Dario Duque-Mendez, Nestor
    Tabares-Morales, Valentina
    Gonzalez, Hector
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2018, 2018, 11238 : 483 - 494
  • [33] A new methodology for risk-based availability analysis
    Khan, Faisal I.
    Haddara, Mahmoud
    KrIshnasamy, Loganathan
    IEEE TRANSACTIONS ON RELIABILITY, 2008, 57 (01) : 103 - 112
  • [34] Application of risk-based maintenance on material handling systems
    Ishikawajima Harima Giho, 1600, 1 (7-13):
  • [35] Risk-Based Asset Management Framework for Subway Systems
    Abouhamad, Mona
    Zayed, Tarek
    JOURNAL OF CONSTRUCTION ENGINEERING AND MANAGEMENT, 2019, 145 (11)
  • [36] A Risk-Based Regulatory Approach To Autonomous Weapon Systems
    Alexander Blanchard
    Claudio Novelli
    Luciano Floridi
    Mariarosaria Taddeo
    Digital Society, 2025, 4 (1):
  • [37] Risk-based analysis of squeeze cementing operations
    Izadi, M.
    Trudel, E.
    Frigaard, I. A.
    GEOENERGY SCIENCE AND ENGINEERING, 2024, 234
  • [38] Cost analysis of risk-based corrective action
    Davis, KL
    Kiernan, C
    Reed, GD
    IN SITU AND ON-SITE BIOREMEDIATION, VOL 4, 1997, 4(4) (04): : 317 - 321
  • [39] Risk-based Analysis of Business Process Executions
    Alizadeh, Mandi
    Zannone, Nicola
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 130 - 132
  • [40] Risk-based Decision Method for Access Control Systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    Mankovski, Serge
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 189 - 192