z-logo
Premium
A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks
Author(s) -
Leung Maria,
Lambert James H.,
Mosenthal Alexander
Publication year - 2004
Publication title -
risk analysis
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.972
H-Index - 130
eISSN - 1539-6924
pISSN - 0272-4332
DOI - 10.1111/j.0272-4332.2004.00500.x
Subject(s) - risk analysis (engineering) , critical infrastructure , risk management , risk assessment , asset (computer security) , directive , identification (biology) , terrorism , critical infrastructure protection , ranking (information retrieval) , factor analysis of information risk , asset management , risk management framework , bridge (graph theory) , business , computer science , it risk management , risk management information systems , computer security , information system , engineering , management information systems , finance , political science , biology , machine learning , medicine , programming language , botany , electrical engineering , law
This article presents an approach to the problem of terrorism risk assessment and management by adapting the framework of the risk filtering, ranking, and management method. The assessment is conducted at two levels: (1) the system level, and (2) the asset‐specific level. The system‐level risk assessment attempts to identify and prioritize critical infrastructures from an inventory of system assets. The definition of critical infrastructures offered by Presidential Decision Directive 63 was used to determine the set of attributes to identify critical assets—categorized according to national, regional, and local impact. An example application is demonstrated using information from the Federal Highway Administration National Bridge Inventory for the State of Virginia. Conversely, the asset‐specific risk assessment performs an in‐depth analysis of the threats and vulnerabilities of a specific critical infrastructure. An illustration is presented to offer some insights in risk scenario identification and prioritization, multiobjective evaluation of management options, and extreme‐event analysis for critical infrastructure protection.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here