Literature DB >> 19000071

Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.

Louis Anthony Tony Cox1.   

Abstract

Several important risk analysis methods now used in setting priorities for protecting U.S. infrastructures against terrorist attacks are based on the formula: Risk = Threat x Vulnerability x Consequence. This article identifies potential limitations in such methods that can undermine their ability to guide resource allocations to effectively optimize risk reductions. After considering specific examples for the Risk Analysis and Management for Critical Asset Protection (RAMCAP) framework used by the Department of Homeland Security, we address more fundamental limitations of the product formula. These include its failure to adjust for correlations among its components, nonadditivity of risks estimated using the formula, inability to use risk-scoring results to optimally allocate defensive resources, and intrinsic subjectivity and ambiguity of Threat, Vulnerability, and Consequence numbers. Trying to directly assess probabilities for the actions of intelligent antagonists instead of modeling how they adaptively pursue their goals in light of available information and experience can produce ambiguous or mistaken risk estimates. Recent work demonstrates that two-level (or few-level) hierarchical optimization models can provide a useful alternative to Risk = Threat x Vulnerability x Consequence scoring rules, and also to probabilistic risk assessment (PRA) techniques that ignore rational planning and adaptation. In such two-level optimization models, defender predicts attacker's best response to defender's own actions, and then chooses his or her own actions taking into account these best responses. Such models appear valuable as practical approaches to antiterrorism risk analysis.

Year:  2008        PMID: 19000071     DOI: 10.1111/j.1539-6924.2008.01142.x

Source DB:  PubMed          Journal:  Risk Anal        ISSN: 0272-4332            Impact factor:   4.000


  7 in total

1.  Separated by a common language: awareness of term usage differences between languages and disciplines in biopreparedness.

Authors:  M Gunnar Andersson; Katharina Tomuzia; Charlotta Löfström; Bernd Appel; Luca Bano; Haralampos Keremidis; Rickard Knutsson; Mikael Leijon; Susanna Ekströmer Lövgren; Dario De Medici; Andrea Menrath; Bart J van Rotterdam; Henk J Wisselink; Gary C Barker
Journal:  Biosecur Bioterror       Date:  2013-09

2.  A probabilistic analysis reveals fundamental limitations with the environmental impact quotient and similar systems for rating pesticide risks.

Authors:  Robert K D Peterson; Jerome J Schleier
Journal:  PeerJ       Date:  2014-04-22       Impact factor: 2.984

3.  Ten most important accomplishments in risk analysis, 1980-2010.

Authors:  Michael Greenberg; Charles Haas; Anthony Cox; Karen Lowrie; Katherine McComas; Warner North
Journal:  Risk Anal       Date:  2012-05       Impact factor: 4.000

4.  AbSRiM: An Agent-Based Security Risk Management Approach for Airport Operations.

Authors:  Stef Janssen; Alexei Sharpanskykh; Richard Curran
Journal:  Risk Anal       Date:  2019-02-05       Impact factor: 4.000

5.  Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method.

Authors:  Rongchen Zhu; Xiaofeng Hu; Xin Li; Han Ye; Nan Jia
Journal:  Int J Environ Res Public Health       Date:  2020-03-19       Impact factor: 3.390

6.  The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.

Authors:  Luca Allodi; Fabio Massacci; Julian Williams
Journal:  Risk Anal       Date:  2021-05-07       Impact factor: 4.302

7.  Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation.

Authors:  Mariana G Cains; Liberty Flora; Danica Taber; Zoe King; Diane S Henshel
Journal:  Risk Anal       Date:  2021-02-14       Impact factor: 4.302

  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.