Quantitative risk-based analysis for military counterterrorism systems
نویسندگان
چکیده
This paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. It therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counterterrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper Regular Paper *This is a US Government work, and, as such, is in the public domain in the United States of America. †Author to whom all correspondence should be addressed (e-mail: [email protected]). Systems Engineering, Vol. 10, No. 4, 2007 © 2007 Wiley Periodicals, Inc.
منابع مشابه
Semantic Wiki for Visualization of Social Media Analysis
A semantic wiki provides visualization of social media analysis applicable to military Information Operations and law enforcement counterterrorism efforts. Using inputs from disparate data sets, semantic software exports data to link analysis, geospatial displays, and temporal representation. Challenges encountered in software development include the balance between automated and human assisted...
متن کاملAdversarial Risk Analysis: Applications to Basic Counterterrorism Models
Interest in counterterrorism modelling has increased recently. A common theme in the approaches adopted is the need to develop methods to analyse decisions when there are intelligent opponents ready to increase our risks. Most of the approaches have a clear game theoretic flavour, although there have been some decision analytic based approaches. We have recently introduced a framework for adver...
متن کاملAdversarial risk analysis for counterterrorism modeling.
Recent large-scale terrorist attacks have raised interest in models for resource allocation against terrorist threats. The unifying theme in this area is the need to develop methods for the analysis of allocation decisions when risks stem from the intentional actions of intelligent adversaries. Most approaches to these problems have a game-theoretic flavor although there are also several intere...
متن کاملDesigning the Curriculum of General Medicine with Military Approach
Background: Military medicine is one of the important orders of military systems that takes responsibility for providing health services to the military forces. Military physicians need knowledge and skills required for their role. In today's world, different countries have designed and developed certain activities and curricula for military medical education at general and pro...
متن کاملA conceptual approach for military data fusion
Military operations become more and more complex. Information overload, and uncompleted and uncertain data made military information system design a challenge that would confer or withhold information superiority. The latter could represent military superiority especially in complex warfare such as urban operations or counterterrorism. This paper proposes a process for military information syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Systems Engineering
دوره 10 شماره
صفحات -
تاریخ انتشار 2007