EDITORIAL
May 15, 2002

Roadmap for Modeling Risks of Terrorism to the Homeland

Publication: Journal of Infrastructure Systems
Volume 8, Issue 2

Abstract

The terrorist acts of September 11, 2001, were a wake-up call for changing our past practices in ensuring homeland security. The positive results of these changes, however, are accompanied by myriad visible and invisible risks. Accepting change implies assessing and managing these risks in a comprehensive and systemic fashion, avoiding an ad hoc approach. This paper offers a holistic risk assessment and management framework for modeling the risks of terrorism to the homeland. Two major interconnected systems are addressed: the homeland system and the terrorist networks system. In modeling the two systems, the centrality of state variables is highlighted. It is worth noting that the community of risk analysts has been developing and applying systems-based methodologies and tools for many years. The roadmap presented in this paper builds on the findings of many prior analyses.

Get full access to this article

View all available purchase options and get full access to this article.

References

Arquilla, J. and Ronfeldt, D. (2001). Networks and netwars, National Defense Research Institute, Rand, Pittsburgh.
Carter, A. B.(2001). “The architecture of government in the face of terrorism.” Int. Security, 23(3), 5–23.
Copeland, T. E. (2000). “The information revolution and national security.” Strategic Studies Institute, U.S. Army War College, Washington, D.C.
Davenport, T. H., and Prusak, L. (1998). Working knowledge: How organizations manage what they know, Harvard Business School Press, Boston.
Dombroski, M. (2001). “A risk-based decision support methodology for operations other than war (OOTW).” MS thesis, Systems Engineering Dept., Univ. of Virginia, Charlottesville, Va.
Dombroski, M. J., Haimes, Y. Y., Lambert, J. H., Schlussel, K., and Sulcoski, M. (2002). “Risk-based methodology for support of operations other than war.” Military Oper. Res. J., 7(1), 19–38.
Ezell, B. C. (1998). “Risks of cyber attack to supervisory control and data acquisition for water supply.” MS thesis, Systems Engineering Dept., Univ. of Virginia, Charlottesville, Va.
Haimes, Y. Y.(1981). “Hierarchical holographic modeling.” IEEE Trans. Syst. Man Cybern., 11(9), 606–617.
Haimes, Y. Y.(1991). “Total risk management.” Risk Anal., 11(2), 169–171.
Haimes, Y. Y. (1998). Risk modeling, assessment, and management, Wiley, New York.
Haimes, Y. Y.(2001). “Risk analysis, systems analysis, and Covey’s seven habits.” Risk Anal., 2(2), 217–224.
Haimes, Y. Y., and Jiang, P.(2001). “Leontief-based model of risk in Complex interconnected infrastructures.” J. Infrastruc. Syst., 7(1), 1–12.
Kaplan, S., and Garrick, B. J.(1981). “On the quantitative definition of risk.” Risk Anal., 1(1), 11–27.
Kaplan, S., Haimes, Y. Y., and Garrick, B. J.(2001). “Fitting hierarchical holographic modeling into the theory of scenario structuring and a resulting refinement to the quan- titative definition of risk.” Risk Anal., 21(5), 807–819.
Lamm, G. A. (2001). “Assessing and managing risks to information assurance: A methodological approach.” MS thesis, Systems Engineering Dept., Univ. of Virginia, Charlottesville, Va.
Leontief, W. W. (1951a). “Input/output economics.” Sci. Am., 185(4).
Leontief, W. W. (1951b). The structure of the American economy, 1939, 2nd Ed., Oxford University Press, New York.
Leontief, W. W. (1966). Input output economics, Oxford University Press, New York.
Longstaff, T. A., and Haimes, Y. Y. (2002). “A holistic roadmap for survivable infrastructure systems.” IEEE Trans. Syst., Man Cybern., in press.
Mahoney, B. (2001). “Quantitative risk analysis of GPS as a critical infrastructure for civilian transportation applications.” MS thesis, Systems Engineering Dept., Univ. of Virginia, Charlottesville, Va.
NIC. (2000). Global Trends 2015, National Intelligence Council Access available via PURL 〈http://www.cia.gov/cia/publications/globaltrends2015/index.html〉.
Watson, R. L. (1998). “Risk analysis of the physical vulnerabilities of hydroelectric power plants.” MS thesis, Systems Engineering Dept., Univ. of Virginia, Charlottesville, Va.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 8Issue 2June 2002
Pages: 35 - 41

History

Received: Mar 13, 2002
Published online: May 15, 2002
Published in print: Jun 2002

Permissions

Request permissions for this article.

Authors

Affiliations

Yacov Y. Haimes
Lawrence R. Quarles Professor of Systems and Information Engineering, Director, Center for Risk Management of Engineering Systems, Univ. of Virginia, Charlottesville, VA 22903.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share