Modeling Interdependent Infrastructures for Sustainable Counterterrorism
Publication: Journal of Infrastructure Systems
Volume 10, Issue 2
Get full access to this article
View all available purchase options and get full access to this article.
References
Alberts, D. S., Garstka, J. J., and Stein, F. P. (1999). Network centric warfare: Developing and leveraging information superiority, C41SR Cooperative Research Program (CCRP).
Arquilla, J., and Ronfeldt, D. (2001). Networks and netwars, National Defense Research Institute, RAND, Pittsburgh.
Asbeck, E. L., and Haimes, Y. Y.(1984). “The partitioned multiobjective risk method (PMRM).” Large Scale Systems, 6(1), 13–38.
Baden, J. A., and Noonan, D. S. (1998). Managing the commons, 2nd Ed., Indiana University Press, Indianapolis.
Bailey, D., and Wright, E. (2003). Practical SCADA for industry, Newnes, Oxford, U.K.
Bier, V. M., and Abhichandani, V. (2003). “Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries.” Risk-based decisionmaking in water resources X, Y. Y. Haimes, D. A. Moser, and E. Z. Stakhiv, eds., ASCE, Reston, Va.
Bromley, D. W., ed. (1992). Making the commons work, ICS Press, San Francisco.
Brown, L. R. (1990). State of the World 1990: A Worldwatch Institute report on progress toward a sustainable society, W. W. Norton, New York.
Center for Risk Management of Engineering Systems (CRMES). (1999). “Incorporating risk management with critical infrastructure protection.” Rep. to Joint Program Office/Infrastructure Assurance and Naval Surface Warfare Center, Univ. of Virginia, Charlottesville, Va.
Clark, W. C. (1989). “Managing planet Earth.” Lead editorial, special issue, Sci. Am., 261(3).
Dombroski, M. (2001). “A risk-based decision support methodology for operations other than war.” MS thesis, Dept. of Systems and Information Engineering, Univ. of Virginia, Charlottesville, Va.
Dombroski, M., Haimes, Y. Y., Lambert, J. H., Schlussel, K., and Sulkoski, M.(2002). “Risk-based methodology for support of operations other than war.” Military Oper. Res., 7(1), 19–38.
Elliott, E., and Kiel, L. D.(2004). “A complex systems approach for developing public policy toward terrorism: An agent-based approach.” Chaos, Solitons, Fractals, 20, 63–68.
Gladwell, M. (2002). The tipping point: How little things can make a big difference, Little Brown, Boston.
Gordon, W. J. J. (1968). Synectics: The development of creative capacity, Collier, New York.
Haimes, Y. Y.(1981). “Hierarchical holographic modeling.” IEEE Trans. Syst. Man Cybern., 11(9), 606–617.
Haimes, Y. Y. (1995). “Risk management: A requisite for sustainable development.” UNESCO/IHP IV Project M-4.3, Prepared for the UNESCO Task Committee on Sustainable Criteria, Water Resources Planning and Management Division, ASCE, and Working Group.
Haimes, Y. Y. (1998). Risk modeling, assessment, and management, Wiley, New York.
Haimes, Y. Y.(2002). “Roadmap for modeling risks of terrorism to the homeland.” J. Infrastruct. Syst., 8(2), 35–41.
Haimes, Y. Y. (2004). Risk modeling, assessment, and management, 2nd Ed., Wiley, New York.
Haimes, Y. Y., and Jiang, P.(2001). “Leontief-based model of risk in complex interconnected infrastructures.” J. Infrastruct. Syst., 7(1), 1–12.
Haimes, Y. Y., Tarvainen, K., Shima, T., and Thadathil, J. (1990). Hierarchical multiobjective analysis of large scale systems, Hemisphere Publishing, New York.
Haimes, Y. Y., Kaplan, S., and Lambert, J. H.(2002). “Risk filtering, ranking, and management framework using hierarchical holographic modeling.” Risk Anal, 22(2), 383–397.
Haimes, Y. Y. et al. (2004). “Applying inoperability input-output model (IIM) to the impact of high-altitude electromagnetic pulse (HEMP) on interdependent infrastructure sectors.” Rep. to Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, January 30.
Hall, A. D. III (1989). Metasystems methodology: A new synthesis and unification, Pergamon, New York.
Hardin, G.(1968). “The tragedy of the commons.” Science, 162, 1343–1348.
Hoffman, B. (1998). Inside terrorism, Columbia University Press, New York.
Horowitz, B., and Haimes, Y. Y. (2003). “Risk-based methodology for scenario tracking for terrorism: a possible new approach for intelligence collection and analysis.” Syst. Eng., 6(3).
Hudson, R. A. (2002). Who becomes a terrorist and why: The 1999 government report on profiling terrorist, Lysons Press, Guilford, Conn.
Jacoby, L. E. (2004). “Testimony to the Senate Select Committee on Intelligence, February 24, 2004.” 〈http://intelligence.senate.gov/0402hrg/040224/jacoby.pdf〉 (February 26, 2004).
Jiang, P. (2003). “Input-output inoperability risk model and beyond.” PhD dissertation, Dept. of Systems and Information Engineering, Univ. of Virginia, Charlottesville, Va.
Johnson, S. E., Libicki, M. C., Treverton, G. F., and Lewis C. S., eds. (2003). New challenges, new tools for defense decisionmaking, RAND, Arlington, Va.
Kaplan, S., Haimes, Y. Y., and Garrick, B. J.(2001). “Fitting hierarchical holographic modeling (HHM) into the theory of scenario structuring, and a refinement to the quantitative definition of risk.” Risk Anal, 21(5), 807–819.
Kübler-Ross, E. (1997). On death and dying, Simon & Schuster, New York.
Latora, V., and Marchiori, M.(2004). “How the science of complex networks can help developing strategies against terrorism.” Chaos, Solitons, Fractals, 20, 69–75.
Lempert, R. J., Popper, S. W., and Bankes, S. C. (2003). Shaping the next one hundred years, RAND, Arlington, Va.
Leontief, W. W. (1951a). “Input/output economics.” Sci. Am., 185(4).
Leontief, W. W. (1951b). The structure of the American economy, 1919–1939, 2nd Ed., Oxford University Press, New York.
Lesser, I. O., Hoffman, B., Arquilla, J., Ronfeldt, D., Zanini, M. (1999). Countering the new terrorism, RAND, Washington, D.C.
Lowrance, W. W. (1976). Of acceptable risk: Science and the determination of safety, William Kaufmann, Los Altos, Calif.
Lewis, B. (2002). What went wrong?: Western impact and Middle Eastern response, Oxford University Press, New York.
Liang, Q., and Xiangsui, W. (2002). Unrestricted warfare: China’s master plan to destroy America, Pan American Publishing, Panama City, Panama.
National Research Council (NRC). (1999). Trust in cyberspace, committee on information system trustworthiness, National Academy Press, Washington, D.C.
National Research Council (NRC). (2002). Making the nation safer: The role of science and technology in countering terrorism, National Academies Press, Washington, D.C.
National Science Foundation (NSF). (2002). Workshop report: Integrated research in risk analysis and decision making in a democratic society, July 17–18, 2002, Arlington, Va.
Nye, J. F. (2004). Soft power: The means to success in world power, Public Affiars, New York.
O’Hanlon, M. E., Orszag, P. R., Daalder, I. H., Destler, I. M., Gunter, D. L., Litan, R. E., Steinberg, J. B. (2002). Protecting the American homeland: A preliminary analysis, Brookings Institution Press, Washington, D.C.
Perrow, C. (1984). Normal accidents: Living with high-risk technologies, Basic Books, New York.
Putnam, R. D. (1999). Bowling alone, Simon & Schuster, New York.
Riggs, J. M. (2003). The Army in 2020, White Paper, November 1, Dept. of the Army, Washington, D.C.
Santos, J. R. (2003). “Interdependency analysis: Extensions to demand reduction inoperability input-output modeling and portfolio selection.” PhD dissertation, Univ. of Virginia, Charlottesville, Va.
Slovic, P. (2000). The perception of risk, Earthscan Publications, Sterling, Va.
Smelser, N. J. (1963). Theory of collective behavior, Free Press, New York.
Smelser, N. J., and Smelser, W. T. (1963). Personality and social systems, Wiley, New York.
World Commission on Environment and Development (WCED). (1987). Our common future, Oxford University Press, Oxford, U.K.
Wulf, W. A., Haimes, Y. Y., and Longstaff, T. A.(2003). “Strategic alternative responses to risks of terrorism.” Risk Anal, 23(3), 429–444.
Zigler, B. P. (1984). Multifaceted modeling and discrete event simulation, Academic, New York.
Information & Authors
Information
Published In
Copyright
Copyright © 2004 American Society of Civil Engineers.
History
Published online: May 14, 2004
Published in print: Jun 2004
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.