FORUM
May 14, 2004

Modeling Interdependent Infrastructures for Sustainable Counterterrorism

Publication: Journal of Infrastructure Systems
Volume 10, Issue 2
First page of PDF

Get full access to this article

View all available purchase options and get full access to this article.

References

Alberts, D. S., Garstka, J. J., and Stein, F. P. (1999). Network centric warfare: Developing and leveraging information superiority, C41SR Cooperative Research Program (CCRP).
Arquilla, J., and Ronfeldt, D. (2001). Networks and netwars, National Defense Research Institute, RAND, Pittsburgh.
Asbeck, E. L., and Haimes, Y. Y.(1984). “The partitioned multiobjective risk method (PMRM).” Large Scale Systems, 6(1), 13–38.
Baden, J. A., and Noonan, D. S. (1998). Managing the commons, 2nd Ed., Indiana University Press, Indianapolis.
Bailey, D., and Wright, E. (2003). Practical SCADA for industry, Newnes, Oxford, U.K.
Bier, V. M., and Abhichandani, V. (2003). “Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries.” Risk-based decisionmaking in water resources X, Y. Y. Haimes, D. A. Moser, and E. Z. Stakhiv, eds., ASCE, Reston, Va.
Bromley, D. W., ed. (1992). Making the commons work, ICS Press, San Francisco.
Brown, L. R. (1990). State of the World 1990: A Worldwatch Institute report on progress toward a sustainable society, W. W. Norton, New York.
Center for Risk Management of Engineering Systems (CRMES). (1999). “Incorporating risk management with critical infrastructure protection.” Rep. to Joint Program Office/Infrastructure Assurance and Naval Surface Warfare Center, Univ. of Virginia, Charlottesville, Va.
Clark, W. C. (1989). “Managing planet Earth.” Lead editorial, special issue, Sci. Am., 261(3).
Dombroski, M. (2001). “A risk-based decision support methodology for operations other than war.” MS thesis, Dept. of Systems and Information Engineering, Univ. of Virginia, Charlottesville, Va.
Dombroski, M., Haimes, Y. Y., Lambert, J. H., Schlussel, K., and Sulkoski, M.(2002). “Risk-based methodology for support of operations other than war.” Military Oper. Res., 7(1), 19–38.
Elliott, E., and Kiel, L. D.(2004). “A complex systems approach for developing public policy toward terrorism: An agent-based approach.” Chaos, Solitons, Fractals, 20, 63–68.
Gladwell, M. (2002). The tipping point: How little things can make a big difference, Little Brown, Boston.
Gordon, W. J. J. (1968). Synectics: The development of creative capacity, Collier, New York.
Haimes, Y. Y.(1981). “Hierarchical holographic modeling.” IEEE Trans. Syst. Man Cybern., 11(9), 606–617.
Haimes, Y. Y. (1995). “Risk management: A requisite for sustainable development.” UNESCO/IHP IV Project M-4.3, Prepared for the UNESCO Task Committee on Sustainable Criteria, Water Resources Planning and Management Division, ASCE, and Working Group.
Haimes, Y. Y. (1998). Risk modeling, assessment, and management, Wiley, New York.
Haimes, Y. Y.(2002). “Roadmap for modeling risks of terrorism to the homeland.” J. Infrastruct. Syst., 8(2), 35–41.
Haimes, Y. Y. (2004). Risk modeling, assessment, and management, 2nd Ed., Wiley, New York.
Haimes, Y. Y., and Jiang, P.(2001). “Leontief-based model of risk in complex interconnected infrastructures.” J. Infrastruct. Syst., 7(1), 1–12.
Haimes, Y. Y., Tarvainen, K., Shima, T., and Thadathil, J. (1990). Hierarchical multiobjective analysis of large scale systems, Hemisphere Publishing, New York.
Haimes, Y. Y., Kaplan, S., and Lambert, J. H.(2002). “Risk filtering, ranking, and management framework using hierarchical holographic modeling.” Risk Anal, 22(2), 383–397.
Haimes, Y. Y. et al. (2004). “Applying inoperability input-output model (IIM) to the impact of high-altitude electromagnetic pulse (HEMP) on interdependent infrastructure sectors.” Rep. to Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, January 30.
Hall, A. D. III (1989). Metasystems methodology: A new synthesis and unification, Pergamon, New York.
Hardin, G.(1968). “The tragedy of the commons.” Science, 162, 1343–1348.
Hoffman, B. (1998). Inside terrorism, Columbia University Press, New York.
Horowitz, B., and Haimes, Y. Y. (2003). “Risk-based methodology for scenario tracking for terrorism: a possible new approach for intelligence collection and analysis.” Syst. Eng., 6(3).
Hudson, R. A. (2002). Who becomes a terrorist and why: The 1999 government report on profiling terrorist, Lysons Press, Guilford, Conn.
Jacoby, L. E. (2004). “Testimony to the Senate Select Committee on Intelligence, February 24, 2004.” 〈http://intelligence.senate.gov/0402hrg/040224/jacoby.pdf〉 (February 26, 2004).
Jiang, P. (2003). “Input-output inoperability risk model and beyond.” PhD dissertation, Dept. of Systems and Information Engineering, Univ. of Virginia, Charlottesville, Va.
Johnson, S. E., Libicki, M. C., Treverton, G. F., and Lewis C. S., eds. (2003). New challenges, new tools for defense decisionmaking, RAND, Arlington, Va.
Kaplan, S., Haimes, Y. Y., and Garrick, B. J.(2001). “Fitting hierarchical holographic modeling (HHM) into the theory of scenario structuring, and a refinement to the quantitative definition of risk.” Risk Anal, 21(5), 807–819.
Kübler-Ross, E. (1997). On death and dying, Simon & Schuster, New York.
Latora, V., and Marchiori, M.(2004). “How the science of complex networks can help developing strategies against terrorism.” Chaos, Solitons, Fractals, 20, 69–75.
Lempert, R. J., Popper, S. W., and Bankes, S. C. (2003). Shaping the next one hundred years, RAND, Arlington, Va.
Leontief, W. W. (1951a). “Input/output economics.” Sci. Am., 185(4).
Leontief, W. W. (1951b). The structure of the American economy, 1919–1939, 2nd Ed., Oxford University Press, New York.
Lesser, I. O., Hoffman, B., Arquilla, J., Ronfeldt, D., Zanini, M. (1999). Countering the new terrorism, RAND, Washington, D.C.
Lowrance, W. W. (1976). Of acceptable risk: Science and the determination of safety, William Kaufmann, Los Altos, Calif.
Lewis, B. (2002). What went wrong?: Western impact and Middle Eastern response, Oxford University Press, New York.
Liang, Q., and Xiangsui, W. (2002). Unrestricted warfare: China’s master plan to destroy America, Pan American Publishing, Panama City, Panama.
National Research Council (NRC). (1999). Trust in cyberspace, committee on information system trustworthiness, National Academy Press, Washington, D.C.
National Research Council (NRC). (2002). Making the nation safer: The role of science and technology in countering terrorism, National Academies Press, Washington, D.C.
National Science Foundation (NSF). (2002). Workshop report: Integrated research in risk analysis and decision making in a democratic society, July 17–18, 2002, Arlington, Va.
Nye, J. F. (2004). Soft power: The means to success in world power, Public Affiars, New York.
O’Hanlon, M. E., Orszag, P. R., Daalder, I. H., Destler, I. M., Gunter, D. L., Litan, R. E., Steinberg, J. B. (2002). Protecting the American homeland: A preliminary analysis, Brookings Institution Press, Washington, D.C.
Perrow, C. (1984). Normal accidents: Living with high-risk technologies, Basic Books, New York.
Putnam, R. D. (1999). Bowling alone, Simon & Schuster, New York.
Riggs, J. M. (2003). The Army in 2020, White Paper, November 1, Dept. of the Army, Washington, D.C.
Santos, J. R. (2003). “Interdependency analysis: Extensions to demand reduction inoperability input-output modeling and portfolio selection.” PhD dissertation, Univ. of Virginia, Charlottesville, Va.
Slovic, P. (2000). The perception of risk, Earthscan Publications, Sterling, Va.
Smelser, N. J. (1963). Theory of collective behavior, Free Press, New York.
Smelser, N. J., and Smelser, W. T. (1963). Personality and social systems, Wiley, New York.
World Commission on Environment and Development (WCED). (1987). Our common future, Oxford University Press, Oxford, U.K.
Wulf, W. A., Haimes, Y. Y., and Longstaff, T. A.(2003). “Strategic alternative responses to risks of terrorism.” Risk Anal, 23(3), 429–444.
Zigler, B. P. (1984). Multifaceted modeling and discrete event simulation, Academic, New York.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 10Issue 2June 2004
Pages: 33 - 42

History

Published online: May 14, 2004
Published in print: Jun 2004

Permissions

Request permissions for this article.

Authors

Affiliations

Yacov Y. Haimes
Center for Risk Management of Engineering Systems, Univ. of Virginia, Charlottesville, VA 22904.
Barry M. Horowitz
Center for Risk Management of Engineering Systems, Univ. of Virginia, Charlottesville, VA 22904.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share