A risk-based approach to setting priorities in protecting bridges against terrorist attacks

被引:44
|
作者
Leung, M [1 ]
Lambert, JH [1 ]
Mosenthal, A [1 ]
机构
[1] Univ Virginia, Dept Syst & Informat Engn, Ctr Risk Management Engn Syst, Charlottesville, VA USA
关键词
resource allocation; risk management; risk ranking; security; terrorism; transportation;
D O I
10.1111/j.0272-4332.2004.00500.x
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
This article presents an approach to the problem of terrorism risk assessment and management by adapting the framework of the risk filtering, ranking, and management method. The assessment is conducted at two levels: (1) the system level, and (2) the asset-specific level. The system-level risk assessment attempts to identify and prioritize critical infrastructures from an inventory of system assets. The definition of critical infrastructures offered by Presidential Decision Directive 63 was used to determine the set of attributes to identify critical assets-categorized according to national, regional, and local impact. An example application is demonstrated using information from the Federal Highway Administration National Bridge Inventory for the State of Virginia. Conversely, the asset-specific risk assessment performs an in-depth analysis of the threats and vulnerabilities of a specific critical infrastructure. An illustration is presented to offer some insights in risk scenario identification and prioritization, multiobjective evaluation of management options, and extreme-event analysis for critical infrastructure protection.
引用
收藏
页码:963 / 984
页数:22
相关论文
共 50 条
  • [31] Adopting a risk-based approach
    Yohe, Gary
    Leichenko, Robin
    [J]. CLIMATE CHANGE ADAPTATION IN NEW YORK CITY: BUILDING A RISK MANAGEMENT RESPONSE, 2010, 1196 : 29 - 40
  • [32] Protecting ocean worlds: Europa Clipper planetary protection inputs to a probabilistic risk-based approach
    Smith, Alvin L.
    Hendrickson, Ryan C.
    [J]. INTERNATIONAL JOURNAL OF ASTROBIOLOGY, 2022,
  • [33] A Game Theory Approach for the Reallocation of Security Forces against Terrorist Diversionary Attacks
    Chen, Yi-Ming
    Wu, Dachrahn
    Wu, Cheng-Kuang
    [J]. ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 89 - +
  • [34] Driving Priorities in Risk-based Regulation: What's the Problem?
    Baldwin, Robert
    Black, Julia
    [J]. JOURNAL OF LAW AND SOCIETY, 2016, 43 (04) : 565 - 595
  • [35] Optimal Risk-Based Management of Coastal Bridges Vulnerable to Hurricanes
    Mondoro, Alysson
    Frangopol, Dan M.
    Soliman, Mohamed
    [J]. JOURNAL OF INFRASTRUCTURE SYSTEMS, 2017, 23 (03)
  • [36] Tanker inspection and a risk-based approach
    Ma, K
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL OFFSHORE AND POLAR ENGINEERING CONFERENCE, VOL 4, 1998, : 504 - 512
  • [37] A Risk-Based Approach to Penicillin Allergy
    Trubiano, Jason A.
    [J]. IMMUNOLOGY AND ALLERGY CLINICS OF NORTH AMERICA, 2022, 42 (02) : 375 - 389
  • [38] The risk-based approach to Polar Code
    不详
    [J]. NAVAL ARCHITECT, 2011, : 32 - +
  • [39] A Risk-Based Approach to Deviation Management
    Bredehoeft, Gail
    O'Hara, Judy
    [J]. BIOPHARM INTERNATIONAL, 2009, 22 (04) : 48 - +
  • [40] A risk-based approach for a national assessment
    Whelan, G
    Laniak, GF
    [J]. RISK-BASED CORRECTIVE ACTION AND BROWNFIELDS RESTORATIONS, 1998, (82): : 55 - 74