Risk-Based Prioritization of Terrorist Threat Mitigation Measures on Bridges
Publication: Journal of Bridge Engineering
Volume 12, Issue 2
Abstract
This paper describes a risk-based methodology developed to facilitate prioritization of terrorist threat mitigation strategies on individual bridges. Numerous risk-based methods have been used for prioritization among a group of bridges or other assets. However, this methodology is unique in that it is specifically designed to focus on a single bridge and the risk associated with each of its many individual structural components. “Risk,” as discussed herein, describes the relative potential for a terrorist attack against a specific component and the associated consequence from the attack. It is based on such factors as the component’s importance to overall structural stability, its location and thus accessibility to terrorists, and its resistance to the specific threat. The component-specific risk factors and their modifying attributes are described. The result of the methodology is a rank-ordered list of components most at risk to an attack, allowing prioritization and optimization of the mitigation design for the bridge. Once mitigation schemes are identified, the methodology can then be utilized to recalculate mitigated risk, allowing for a direct indication of cost/benefit of the mitigation design. The methodology and comparison criteria are described and a simple application example is given to demonstrate the usefulness of the methodology.
Get full access to this article
View all available purchase options and get full access to this article.
Acknowledgments
Several engineers provided valuable input to the development of this methodology and their contributions are greatly appreciated. They are: Timothy Campbell, Patrick Lindsey, Bruce Walton, Gregory Jizba, Richard Thorsen, Eric Munley, Sudhakar Pallaki, and Michael Huff. Permission to publish this paper was granted by the Federal Highway Administration, Office of Bridge Technology, and the Director, Geotechnical and Structures Laboratory, U.S. Army Engineer Research and Development Center.
References
American Association of State Highway and Transportation Officials (AASHTO). (2002). A guide to highway vulnerability assessment for critical asset identification and protection, Science Applications International Corporation, Washington, D.C.
American Association of State Highway and Transportation Officials (AASHTO). (2003). Recommendations for bridge and tunnel security, Blue Ribbon Panel on Bridge and Tunnel Security, Washington, D.C.
Ragsdale, C. T. (2002). Spreadsheet modeling and analysis, 4th Ed., Thomson South-Western, Cincinnati.
Information & Authors
Information
Published In
Copyright
© 2007 ASCE.
History
Received: Sep 30, 2005
Accepted: Dec 28, 2005
Published online: Mar 1, 2007
Published in print: Mar 2007
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.