Quantitative risk-based analysis for military counterterrorism systems

被引:14
|
作者
Kujawski, Edouard [1 ]
Miller, Gregory A. [1 ]
机构
[1] USN, Postgrad Sch, Dept Syst Engn, Monterey, CA 93943 USA
关键词
terrorism; counterterrorism; threats; needs analysis; quantitative probabilistic risk assessment; risk assessment matrix; decision-attack event tree; Monte Carlo simulation; UNCERTAINTIES; TREES;
D O I
10.1002/sys.20075
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. it therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counter-terrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper documents the analysis for a hypothetical case of three potential threats. (C) 2007 Wiley Periodicals, Inc.
引用
收藏
页码:273 / 289
页数:17
相关论文
共 50 条
  • [21] Risk-based modelling of air conditioning systems
    Kajtár, L
    Bánhidi, L
    Leitner, A
    INDOOR AIR 2005: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INDOOR AIR QUALITY AND CLIMATE, VOLS 1-5, 2005, : 1213 - 1218
  • [22] Risk-based efficiency assessment of information systems
    Isaev, Eugeni A.
    Pervukhin, Dmitry, V
    Rytikov, Georgy O.
    Filyugina, Ekaterina K.
    Hayrapetyan, Diana A.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2021, 15 (01): : 19 - 29
  • [23] Risk-based Design of Computer Systems Validation
    Roemer, Markus
    PHARMAZEUTISCHE INDUSTRIE, 2013, 75 (05): : 818 - 820
  • [24] A methodology for risk-based inspection of pressurized systems
    Hagemeijer, PM
    Kerkveld, G
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART E-JOURNAL OF PROCESS MECHANICAL ENGINEERING, 1998, 212 (E1) : 37 - 47
  • [25] Risk-Based Decision Making in IoT Systems
    Blinowski, Grzegorz J.
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, PT I, 2018, 655 : 230 - 241
  • [26] Privacy Considerations for Risk-Based Authentication Systems
    Wiefling, Stephan
    Tolsdorf, Jan
    Lo Iacono, Luigi
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 320 - 327
  • [27] Risk-based approach for the transfer of quantitative methods:: Bioanalytical applications
    Rozet, E.
    Dewe, W.
    Morello, R.
    Chiap, P.
    Lecomte, F.
    Ziemons, E.
    Boos, K. S.
    Boulanger, B.
    Crommen, J.
    Hubert, Ph.
    JOURNAL OF CHROMATOGRAPHY A, 2008, 1189 (1-2) : 32 - 41
  • [28] A quantitative risk-based maintenance strategy for coastal RC structures
    Zheng, J. J.
    Shao, L.
    Mao, K. F.
    Li, C. Q.
    Wang, Z. F.
    STRUCTURAL HEALTH MONITORING AND INTELLIGENT INFRASTRUCTURE, VOLS 1 AND 2, 2006, : 1317 - 1321
  • [29] A quantitative optimization model for dynamic risk-based compliance management
    Mueller, S.
    Supatgiat, C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2007, 51 (3-4) : 295 - 307
  • [30] Adversarial Risk Analysis for Counterterrorism Modeling
    Rios, Jesus
    Insua, David Rios
    RISK ANALYSIS, 2012, 32 (05) : 894 - 915