Identification of critical locations across multiple infrastructures for terrorist actions

被引:132
|
作者
Patterson, S. A.
Apostolakis, G. E. [1 ]
机构
[1] MIT, Dept Nucl Sci & Engn, Cambridge, MA 02139 USA
[2] MIT, Engn Sci Div, Cambridge, MA 02139 USA
关键词
infrastructures; networks; terrorism; risk analysis; decision analysis;
D O I
10.1016/j.ress.2006.08.004
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 in of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIs) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIs system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures are analyzed individually. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1183 / 1203
页数:21
相关论文
共 50 条
  • [1] Terrorist critical infrastructures, organizational capacity and security risk
    Zoli, Cord
    Steinberg, Laura J.
    Grabowski, Martha
    Hermann, Margaret
    [J]. SAFETY SCIENCE, 2018, 110 : 121 - 130
  • [2] Terrorism and simulation of terrorist incidents across critical Infrastructure
    Birkett, Dave
    Mala-Jetmarova, Helena
    [J]. 19TH INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2011), 2011, : 3240 - 3245
  • [3] Identification of Critical Locations of Power Systems
    Onwuachumba, Amamihe
    Lerley, Paul
    Musavi, Mohamad
    [J]. 2017 NINTH ANNUAL IEEE GREEN TECHNOLOGIES CONFERENCE (GREENTECH 2017), 2017, : 290 - 296
  • [4] Risk management goals and identification of critical infrastructures
    Fekete, Alexander
    Lauwe, Peter
    Geier, Wolfram
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2012, 8 (04) : 336 - 353
  • [5] Optimal deployment of power reserves across telecom critical infrastructures
    O'Reilly, Gerard P.
    Chu, Chi-Hung Kelvin
    [J]. BELL LABS TECHNICAL JOURNAL, 2008, 12 (04) : 127 - 141
  • [6] The "Big Picture" of insider IT sabotage across US critical infrastructures
    Moore, Andrew P.
    Cappelli, Dawn M.
    Trzeciak, Randall F.
    [J]. INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 17 - +
  • [7] Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector
    Nikolaou, Nikolaos
    Papadakis, Andreas
    Psychogyios, Konstantinos
    Zahariadis, Theodore
    [J]. ELECTRONICS, 2023, 12 (14)
  • [8] Conceptualising multiple hazards and cascading effects on critical infrastructures
    Barquet, Karina
    Englund, Mathilda
    Inga, Katarina
    Andre, Karin
    Segnestam, Lisa
    [J]. DISASTERS, 2024, 48 (01)
  • [9] Action Quality Assessment Across Multiple Actions
    Parmar, Paritosh
    Morris, Brendan Tran
    [J]. 2019 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2019, : 1468 - 1476
  • [10] Modelling the Role of Software in the Propagation of Failures across National Critical Infrastructures
    Johnson, Chris W.
    [J]. ERCIM NEWS, 2008, (75): : 23 - 24