메뉴 건너뛰기




Volumn 31, Issue 8, 2011, Pages 1175-1186

On the complex quantification of risk: Systems-based perspective on terrorism

Author keywords

Resilience; Risk; State variables; Vulnerability

Indexed keywords

ASSESSMENT PROCESS; INITIATING EVENTS; INTELLIGENCE GATHERING; MANAGEMENT POLICY; MODELING PROCESS; MULTIDIMENSIONAL FUNCTION; QUALITATIVE INFORMATION; QUANTITATIVE METRICS; RESILIENCE; RISK FUNCTION; STATE VARIABLES; TERRORIST NETWORKS; TIME FRAME; VULNERABILITY; VULNERABLE SYSTEMS;

EID: 80051668321     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2011.01603.x     Document Type: Article
Times cited : (26)

References (72)
  • 1
    • 33645274938 scopus 로고    scopus 로고
    • On the definition of vulnerabilities in measuring risks to infrastructures
    • Haimes YY. On the definition of vulnerabilities in measuring risks to infrastructures. Risk Analysis, 2006; 26:293-296.
    • (2006) Risk Analysis , vol.26 , pp. 293-296
    • Haimes, Y.Y.1
  • 2
    • 62749127251 scopus 로고    scopus 로고
    • On the definition of resilience in systems
    • Haimes YY. On the definition of resilience in systems. Risk Analysis, 2009; 29:498-501.
    • (2009) Risk Analysis , vol.29 , pp. 498-501
    • Haimes, Y.Y.1
  • 3
    • 72249089745 scopus 로고    scopus 로고
    • On the complex definition of risk: A systems-based approach
    • Haimes YY. On the complex definition of risk: A systems-based approach. Risk Analysis, 2009; 29:1647-1654.
    • (2009) Risk Analysis , vol.29 , pp. 1647-1654
    • Haimes, Y.Y.1
  • 10
    • 55349106566 scopus 로고    scopus 로고
    • Some limitations of "risk = threat x vulnerability x consequence" for risk analysis of terrorist attacks
    • Cox LA. Some limitations of "risk = threat x vulnerability x consequence" for risk analysis of terrorist attacks. Risk Analysis, 2008; 28:1749-1761.
    • (2008) Risk Analysis , vol.28 , pp. 1749-1761
    • Cox, L.A.1
  • 11
    • 60349102468 scopus 로고    scopus 로고
    • Risk-based decision making for terrorism applications
    • Dillon R. Risk-based decision making for terrorism applications. Risk Analysis, 2009; 29:342-342.
    • (2009) Risk Analysis , vol.29 , pp. 342-342
    • Dillon, R.1
  • 12
    • 80051665494 scopus 로고    scopus 로고
    • United States Government Accountability Office (GAO), Homeland Security. DHS Risk-Based Methodology is Reasonable, but Current Version's Measure of Vulnerability is Limited. GAO-08-852 Washington, DC, Available at:. Accessed on May 27, 2009.
    • United States Government Accountability Office (GAO), Homeland Security. DHS Risk-Based Methodology is Reasonable, but Current Version's Measure of Vulnerability is Limited. GAO-08-852 Washington, DC, 2008. Available at:. Accessed on May 27, 2009.
    • (2008)
  • 13
    • 72249097468 scopus 로고    scopus 로고
    • National Research Council of the National Academies, Department of Homeland Security. Washington, DC National Academies Press, Available at:, Accessed February 25, 2011.
    • National Research Council of the National Academies, Department of Homeland Security. Bioterrorism Risk Assessment. Washington, DC National Academies Press, 2008. Available at:, Accessed February 25, 2011.
    • (2008) Bioterrorism Risk Assessment
  • 14
    • 61349184579 scopus 로고    scopus 로고
    • National Research Council of the National Academies.: Washington, DC National Academies Press, Available at:, Accessed February 25, 2011.
    • National Research Council of the National Academies. Science and Decisions: Advancing Risk Assessment.: Washington, DC National Academies Press, 2009. Available at:, Accessed February 25, 2011.
    • (2009) Science and Decisions: Advancing Risk Assessment
  • 15
    • 60349107654 scopus 로고    scopus 로고
    • Improving risk-based decision making for terrorism applications
    • Cox LA. Improving risk-based decision making for terrorism applications. Risk Analysis, 2009; 29:336-341.
    • (2009) Risk Analysis , vol.29 , pp. 336-341
    • Cox, L.A.1
  • 16
    • 35448938538 scopus 로고    scopus 로고
    • Risk analysis for critical asset protection
    • McGill W, Ayyub B, Kaminskiy M. Risk analysis for critical asset protection. Risk Analysis, 2007; 27:1265-1281.
    • (2007) Risk Analysis , vol.27 , pp. 1265-1281
    • McGill, W.1    Ayyub, B.2    Kaminskiy, M.3
  • 18
    • 84937550545 scopus 로고    scopus 로고
    • Hollnagel E, Woods D, Leveson N (eds). Aldershot, UK Ashgate
    • Hollnagel E, Woods D, Leveson N (eds). Resilience Engineering: Concepts and Precepts. Aldershot, UK Ashgate, 2006.
    • (2006) Resilience Engineering: Concepts and Precepts
  • 20
    • 56749142849 scopus 로고    scopus 로고
    • Homeland security preparedness: Balancing protection with resilience in emergent systems
    • Haimes Y, Crowther K, Horowitz B. Homeland security preparedness: Balancing protection with resilience in emergent systems. Systems Engineering, 2008; 11:287-308.
    • (2008) Systems Engineering , vol.11 , pp. 287-308
    • Haimes, Y.1    Crowther, K.2    Horowitz, B.3
  • 21
    • 33947196204 scopus 로고    scopus 로고
    • Creating foresight: Lessons for resilience from Columbia
    • Farjoun M, Starbuck W (eds). Hoboken, NJ Blackwell
    • Woods D. Creating foresight: Lessons for resilience from Columbia. Pp. 289-308 in Farjoun M, Starbuck W (eds). Organization at the Limit: NASA and the Columbia Disaster. Hoboken, NJ Blackwell, 2005.
    • (2005) Organization at the Limit: NASA and the Columbia Disaster , pp. 289-308
    • Woods, D.1
  • 22
    • 84937563307 scopus 로고    scopus 로고
    • Essential characteristics of resilience
    • Hollnagel E, Woods D, Leveson N (eds). Aldershot, UK Ashgate Press
    • Woods D. Essential characteristics of resilience. Pp. 21-34 in Hollnagel E, Woods D, Leveson N (eds). Resilience Engineering: Concepts and Precepts. Aldershot, UK Ashgate Press, 2006.
    • (2006) Resilience Engineering: Concepts and Precepts , pp. 21-34
    • Woods, D.1
  • 23
    • 80051669372 scopus 로고    scopus 로고
    • RAMCAP. Available at:, Accessed on March 12, 2010.
    • RAMCAP 2006. Available at:, Accessed on March 12, 2010.
    • (2006)
  • 27
    • 0039066589 scopus 로고    scopus 로고
    • eds). Special Issue of the Annals of the American Academy of Political and Social Science. Thousand Oaks, CA Sage
    • Kunreuther H, Slovic P (eds). Challenges in Risk Assessment and Risk Management. Special Issue of the Annals of the American Academy of Political and Social Science. Thousand Oaks, CA Sage, 1996.
    • (1996) Challenges in Risk Assessment and Risk Management
    • Kunreuther, H.1    Slovic, P.2
  • 28
    • 0036087967 scopus 로고    scopus 로고
    • Terrorism as hazard: A new species of trouble
    • Slovic P. Terrorism as hazard: A new species of trouble. Risk Analysis, 2002; 22:425-426.
    • (2002) Risk Analysis , vol.22 , pp. 425-426
    • Slovic, P.1
  • 30
  • 31
    • 80051669639 scopus 로고    scopus 로고
    • Networks and Netwars. Pittsburgh, PA National Defense Research Institute, RAND
    • Arquilla J, Ronfeldt D. Networks and Netwars. Pittsburgh, PA National Defense Research Institute, RAND, 2001.
    • (2001)
    • Arquilla, J.1    Ronfeldt, D.2
  • 33
    • 0031214723 scopus 로고    scopus 로고
    • The words of risk analysis
    • Kaplan S. The words of risk analysis. Risk Analysis, 2006; 17:407-417.
    • (2006) Risk Analysis , vol.17 , pp. 407-417
    • Kaplan, S.1
  • 34
    • 45549110613 scopus 로고
    • A critique of current practice for the use of expert opinions in probabilistic risk assessment
    • Mosleh A, Bier V, Apostolakis G. A critique of current practice for the use of expert opinions in probabilistic risk assessment. Reliability Engineering & System Safety, 1988; 20: 63-85.
    • (1988) Reliability Engineering & System Safety , vol.20 , pp. 63-85
    • Mosleh, A.1    Bier, V.2    Apostolakis, G.3
  • 37
    • 0019540987 scopus 로고
    • On the quantitative definition of risk
    • Kaplan S, Garrick B. On the quantitative definition of risk. Risk Analysis, 1981; 1:11-27.
    • (1981) Risk Analysis , vol.1 , pp. 11-27
    • Kaplan, S.1    Garrick, B.2
  • 38
    • 0025914419 scopus 로고
    • Total risk management
    • Haimes Y. Total risk management. Risk Analysis, 1991; 11:169-171.
    • (1991) Risk Analysis , vol.11 , pp. 169-171
    • Haimes, Y.1
  • 40
    • 0030286892 scopus 로고    scopus 로고
    • Uncertainties in risk analysis: Six levels of treatment
    • Paté-Cornell E. Uncertainties in risk analysis: Six levels of treatment. Reliability Engineering System Safety, 1996; 54:95-111.
    • (1996) Reliability Engineering System Safety , vol.54 , pp. 95-111
    • Paté-Cornell, E.1
  • 41
    • 0000462221 scopus 로고
    • aspects of engineering system safety: The case of offshore platforms
    • Organizational
    • Pate-Cornell M. Organizational aspects of engineering system safety: The case of offshore platforms. Science, 1990; 250:1210-1217.
    • (1990) Science , vol.250 , pp. 1210-1217
    • Pate-Cornell, M.1
  • 48
    • 0242345641 scopus 로고    scopus 로고
    • Risk of cyber attack to water utility supervisory control and data acquisition systems
    • Ezell B, Haimes Y, Lambert J. Risk of cyber attack to water utility supervisory control and data acquisition systems. Military Operations Research, 2001; 6:23-33.
    • (2001) Military Operations Research , vol.6 , pp. 23-33
    • Ezell, B.1    Haimes, Y.2    Lambert, J.3
  • 50
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier V, Oliveros S, Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 2007; 9:563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 51
    • 80051664341 scopus 로고    scopus 로고
    • Asymmetric Wargaming: Toward a Game Theoretic Perspective. Washington, DC MITRE Corp, Available at:, Accessed on March 12, 2010.
    • Whittaker G. Asymmetric Wargaming: Toward a Game Theoretic Perspective. Washington, DC MITRE Corp, 2000. Available at:, Accessed on March 12, 2010.
    • (2000)
    • Whittaker, G.1
  • 52
    • 80051664771 scopus 로고    scopus 로고
    • Formative Evaluation of a Massively Multi-Player Persistent (MMP) Environment for Asymmetric Warfare Exercises. Arlington, VA: U.S. Army Research Institute for the Behavioral and Social Sciences
    • April
    • Singer M, Long R, Stahl J, Kusumoto L, Goldberg S. Formative Evaluation of a Massively Multi-Player Persistent (MMP) Environment for Asymmetric Warfare Exercises. Arlington, VA: U.S. Army Research Institute for the Behavioral and Social Sciences. Technical Report number 1227. April 2008.
    • (2008) Technical Report number , pp. 1227
    • Singer, M.1    Long, R.2    Stahl, J.3    Kusumoto, L.4    Goldberg, S.5
  • 53
    • 80051668867 scopus 로고    scopus 로고
    • PRA vs. Game Theory vs. (fill in the blank) in Terrorism Threat Assessment
    • December 6-8, Baltimore, MD
    • Ross R. PRA vs. Game Theory vs. (fill in the blank) in Terrorism Threat Assessment. Society for Risk Analysis Annual Meeting, December 6-8, 2009, Baltimore, MD.
    • (2009) Society for Risk Analysis Annual Meeting
    • Ross, R.1
  • 54
    • 34447325155 scopus 로고    scopus 로고
    • Choosing what to protect
    • Bier V. Choosing what to protect. Risk Analysis, 2007; 27:607-620.
    • (2007) Risk Analysis , vol.27 , pp. 607-620
    • Bier, V.1
  • 56
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
    • Zhuang J, Bier V. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007;55:976-991.
    • (2007) Operations Research , vol.55 , pp. 976-991
    • Zhuang, J.1    Bier, V.2
  • 57
    • 42249094900 scopus 로고    scopus 로고
    • What's wrong with risk matrices?
    • Cox LA. What's wrong with risk matrices? Risk Analysis, 2008;28:497-512.
    • (2008) Risk Analysis , vol.28 , pp. 497-512
    • Cox, L.A.1
  • 58
    • 67650465763 scopus 로고    scopus 로고
    • What's wrong with hazard-ranking systems? An expository note, perspective
    • Cox LA. What's wrong with hazard-ranking systems? An expository note, perspective. Risk Analysis, 2009;29:940-948.
    • (2009) Risk Analysis , vol.29 , pp. 940-948
    • Cox, L.A.1
  • 60
    • 9644301807 scopus 로고
    • Perspectives on the theory and practice of belief functions
    • Shafer G. Perspectives on the theory and practice of belief functions. International Journal of Approximate Reasoning, 1990; 3:1-40.
    • (1990) International Journal of Approximate Reasoning , vol.3 , pp. 1-40
    • Shafer, G.1
  • 61
    • 0035673585 scopus 로고    scopus 로고
    • Fitting hierarchical holographic modeling into the theory of scenario structuring and a resulting refinement of the quantitative definition of risk
    • Kaplan S, Haimes Y, Garrick B. Fitting hierarchical holographic modeling into the theory of scenario structuring and a resulting refinement of the quantitative definition of risk. Risk Analysis, 2001; 21:807-815.
    • (2001) Risk Analysis , vol.21 , pp. 807-815
    • Kaplan, S.1    Haimes, Y.2    Garrick, B.3
  • 63
    • 33646775315 scopus 로고    scopus 로고
    • A probabilistic model for acute bystander exposure and risk assessment for soil fumigants
    • Reiss R, Griffin J. A probabilistic model for acute bystander exposure and risk assessment for soil fumigants. Atmospheric Environment, 2006; 40:3548-3560.
    • (2006) Atmospheric Environment , vol.40 , pp. 3548-3560
    • Reiss, R.1    Griffin, J.2
  • 64
    • 0034581326 scopus 로고    scopus 로고
    • A systematic uncertainty analysis of an evaluative fate and exposure model
    • Hertwich E, McKone T, Pease W. A systematic uncertainty analysis of an evaluative fate and exposure model. Risk Analysis, 2000; 20:439-454.
    • (2000) Risk Analysis , vol.20 , pp. 439-454
    • Hertwich, E.1    McKone, T.2    Pease, W.3
  • 65
    • 33644531338 scopus 로고    scopus 로고
    • Demographic factors and their association with outcomes in pediatric submersion injury
    • Lee L, Mao C, Thompson K. Demographic factors and their association with outcomes in pediatric submersion injury. Academic Emergency Medicine, 2006; 13:308-313.
    • (2006) Academic Emergency Medicine , vol.13 , pp. 308-313
    • Lee, L.1    Mao, C.2    Thompson, K.3
  • 66
    • 33845675418 scopus 로고    scopus 로고
    • Evaluation of response scenarios to potential polio outbreaks using mathematical models
    • Thompson K, Duinter TR, Pallansch M. Evaluation of response scenarios to potential polio outbreaks using mathematical models. Risk Analysis, 2006; 26:1541-1556.
    • (2006) Risk Analysis , vol.26 , pp. 1541-1556
    • Thompson, K.1    Duinter, T.R.2    Pallansch, M.3
  • 67
    • 35448952451 scopus 로고    scopus 로고
    • A risk assessment model for campylobacter in broiler meat
    • Nauta MJ, Jacobs-Reitsma W, Havelaar A. A risk assessment model for campylobacter in broiler meat. Risk Analysis, 2007; 27:845-861.
    • (2007) Risk Analysis , vol.27 , pp. 845-861
    • Nauta, M.J.1    Jacobs-Reitsma, W.2    Havelaar, A.3
  • 68
    • 34249011752 scopus 로고    scopus 로고
    • Phantom system models for emergent multiscale systems
    • Haimes Y. Phantom system models for emergent multiscale systems. Journal of Infrastructural Systems, 2007; 13:81-87.
    • (2007) Journal of Infrastructural Systems , vol.13 , pp. 81-87
    • Haimes, Y.1
  • 70
    • 80051664715 scopus 로고    scopus 로고
    • Phantom system models and the art and science of modeling systems of systems. Submitted for publication in Systems Engineering February 16, 2011.
    • Haimes YY. Phantom system models and the art and science of modeling systems of systems. Submitted for publication in Systems Engineering February 16, 2011.
    • Haimes, Y.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.