2007
DOI: 10.1016/j.ress.2006.08.004
|View full text |Cite
|
Sign up to set email alerts
|

Identification of critical locations across multiple infrastructures for terrorist actions

Abstract: This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region which represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic regions, are condi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 144 publications
(59 citation statements)
references
References 11 publications
0
59
0
Order By: Relevance
“…Patterson and Apostolakis [24] further develop the MIT ranking methodology by identifying critical locations within multiple overlapping infrastructures. They apply the methodology to the chilled water supply, domestic water supply, steam supply, natural gas, and electric power infrastructures on the MIT campus.…”
Section: Nsementioning
confidence: 99%
“…Patterson and Apostolakis [24] further develop the MIT ranking methodology by identifying critical locations within multiple overlapping infrastructures. They apply the methodology to the chilled water supply, domestic water supply, steam supply, natural gas, and electric power infrastructures on the MIT campus.…”
Section: Nsementioning
confidence: 99%
“…The other is that vulnerability applies to express a critical system component, a geographical location, or an aspect of a system [39]. According to these interpretations, there are different types of vulnerability analyses, ranging from global vulnerability analysis [44] and critical component analysis [42] to critical geographical locations analysis [45].…”
Section: Vulnerability Of Infrastructurementioning
confidence: 99%
“…Levitin (2007) considers the optimal element separation and protection in a complex multistate series-parallel system and suggests an algorithm for determining the expected damage caused by a strategic terrorist. Patterson and Apostolakis (2007) introduce importance measures for ranking the system elements in complex systems exposed to terrorist actions. Michaud and Apostolakis (2006) analyze such measures of damage caused by the terror and its impact on people, the environment, public image, etc.…”
Section: Literature Reviewmentioning
confidence: 99%