TECHNICAL PAPERS
Mar 1, 2007

Risk-Based Prioritization of Terrorist Threat Mitigation Measures on Bridges

Publication: Journal of Bridge Engineering
Volume 12, Issue 2

Abstract

This paper describes a risk-based methodology developed to facilitate prioritization of terrorist threat mitigation strategies on individual bridges. Numerous risk-based methods have been used for prioritization among a group of bridges or other assets. However, this methodology is unique in that it is specifically designed to focus on a single bridge and the risk associated with each of its many individual structural components. “Risk,” as discussed herein, describes the relative potential for a terrorist attack against a specific component and the associated consequence from the attack. It is based on such factors as the component’s importance to overall structural stability, its location and thus accessibility to terrorists, and its resistance to the specific threat. The component-specific risk factors and their modifying attributes are described. The result of the methodology is a rank-ordered list of components most at risk to an attack, allowing prioritization and optimization of the mitigation design for the bridge. Once mitigation schemes are identified, the methodology can then be utilized to recalculate mitigated risk, allowing for a direct indication of cost/benefit of the mitigation design. The methodology and comparison criteria are described and a simple application example is given to demonstrate the usefulness of the methodology.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

Several engineers provided valuable input to the development of this methodology and their contributions are greatly appreciated. They are: Timothy Campbell, Patrick Lindsey, Bruce Walton, Gregory Jizba, Richard Thorsen, Eric Munley, Sudhakar Pallaki, and Michael Huff. Permission to publish this paper was granted by the Federal Highway Administration, Office of Bridge Technology, and the Director, Geotechnical and Structures Laboratory, U.S. Army Engineer Research and Development Center.

References

American Association of State Highway and Transportation Officials (AASHTO). (2002). A guide to highway vulnerability assessment for critical asset identification and protection, Science Applications International Corporation, Washington, D.C.
American Association of State Highway and Transportation Officials (AASHTO). (2003). Recommendations for bridge and tunnel security, Blue Ribbon Panel on Bridge and Tunnel Security, Washington, D.C.
Ragsdale, C. T. (2002). Spreadsheet modeling and analysis, 4th Ed., Thomson South-Western, Cincinnati.

Information & Authors

Information

Published In

Go to Journal of Bridge Engineering
Journal of Bridge Engineering
Volume 12Issue 2March 2007
Pages: 140 - 146

History

Received: Sep 30, 2005
Accepted: Dec 28, 2005
Published online: Mar 1, 2007
Published in print: Mar 2007

Permissions

Request permissions for this article.

Authors

Affiliations

James C. Ray
P.E.
Research Structural Engineer, Geotechnical and Structures Laboratory, Engineer Research and Development Center, 3909 Halls Ferry Rd., Vicksburg, MS 39180-6199.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share