Skip to main content

Technological Risk Assessment And Management:Can We Integrate Terrorist Attacks?

  • Conference paper
Integration of Information for Environmental Security

Safety and security from major hazards posed by high-risk technical installations and systems is an essential component of quality of life for all industrial societies with their considerable dependencies on these technological systems. Traditionally, this is the domain of Quantitative Risk Analysis (QRA).

This paper proposes new methodologies for an alternative risk assessment for high-risk technical installations (from Seveso-II class industrial plants to waterworks or major dams) using a combination of Artificial Intelligence methods and classical QRA with fate and transport modeling to assess emergency scenarios that can represent cases of terrorist attack, leading to a new class of worst case scenarios. It also discusses the data and information requirements, and approaches to the consistent integration of these data. The paper also explores how the same methods of analysis can be used to improve emergency preparedness and emergency response and management for this class of worst case scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Crichton, 2005, State of Fear, Harper Collins, London 715 pp.

    Google Scholar 

  2. J. F. Broder, 2006, Risk Analysis and the Security Survey. 391 pp., Butterworth Heinemann,Burlington, MA.

    Google Scholar 

  3. K. Fedra, 2006, Technological Risk Assessment and Management: GIS, simulation models and real-time expert systems. For natural resources and environmental management. 10 pp.,In: Map Middle East 2006, Proceedings, CD edition.

    Google Scholar 

  4. K. Fedra, 1998, Integrated Risk Assessment and Management: Overview and State-of-the-Art. Journal of Hazardous Materials, 61 (1998) 5–22.

    Article  Google Scholar 

  5. A. H. Cordesman, 2002, Terrorism, asymmetric warfare, and weapons of mass destruction.Praeger Publishers, Westport, 2002.

    Google Scholar 

  6. R. Dixon and R. T. Leville, 2006, National Security and Private-Sector Risk Management for Terrorism. In: Philip Auerswald, Lewis M. Branscomb, Todd M. La Porte, Erwann Michel-

    Google Scholar 

  7. J. Major “Advanced techniques for modeling terrorism risk”. Journal of Risk Finance, 2002.

    Google Scholar 

  8. A. Briggs, and A. Gray, 2000. Using Cost Effectiveness Information. British Medical Journal, 320 (7229), 246.

    Article  Google Scholar 

  9. D. M. Cutler, A. B. Rosen, S. Vijan, 2006, Value of medical innovation in the United States:1960–2000. N Engl, J Med, 355:920–927.

    Article  Google Scholar 

  10. K. Fedra, 1995, Chemicals in the Environment: GIS, Models, and Expert Systems. In James Devillers [Ed.] Toxicology Modeling. Vol. 1, No. 1. Carfax Publishing Company, UK. pp.43–55.

    Google Scholar 

  11. B. A. Jackson, 2006, Information Sharing and Emergency Responder Safety Management. Testimony presented before the House Government Reform Committee on March 30, 2006.http://www.rand.org/pubs/testimonies/CT258/

  12. H. Kunreuther, 2002, “The role of insurance in managing extreme events: implications for terrorism coverage”. Risk Analysis, 22, No.3, (2002), pp. 427–438.

    Article  Google Scholar 

  13. J. Rasmussen, O. M. Pedersen, C. D. Groenberg, 1987, Risoe National Laboratory, 4000 Roskilde, Denmark. Commission of the European Communities — JRC Ispra — Evaluation of the Use of Advanced Information Technology (Expert System) for Data Base System Development and Emergency Management in Non-Nuclear Industries. Preprint April, 1987.

    Google Scholar 

  14. R. J. Decker, 2001, Homeland Security: Key elements of a Risk Management Approach.Testimony before the Subcommittee on National Security, Veterans Affairs, and International Relations; House Committee on Government Reform. http://www.gao.gov/new.items/d02150t.pdf

  15. J. Arquilla, D. Ronfeldt, M. Zanini, 2002, “Information-age terrorism”. Current History, 99(2002), pp. 179–185.

    Google Scholar 

  16. K. J. Riley, 2006, Border Security and the terrorist Threat. Testimony presented to the House Homeland Security Committee, Subcommittee on Economic Security, Infrastructure Protection, and Cyber security, Subcommittee on Emergency Preparedness, Science, and Technology on August 8, 2006. http://www.rand.org/pubs/testimonies/CT266/

  17. H. Willis, 2006, Analyzing Terrorism Risk. Written testimony submitted to the House Financial Services Committee, Subcommittee on Oversight and Investigations, and the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing,and Terrorism Risk Assessment on July 25, 2006. http://www.rand.org/pubs/testimonies/CT265/

  18. J. K. Bradford, et al., 1994, Trend report: Biological Hazard and Emergency Management.Journal of Contingencies and Crisis Management, Vol. 2, No. 1 March 1994, Basil Blackwell Ltd. — Oxford.

    Google Scholar 

  19. C. Meade, and R. C. Molander, 2006, Considering the Effects of a Catastrophic Terrorist Attack. Technical Report TR391, 72 pp, RAND Corporation, St. Monica, CA.http://www.rand.org/pubs/technical_reports/TR391/

  20. D. V Winterfeld, and H. Rosoff, 2005, Using Project Risk Analysis to Counter Terrorism.Symposium on Terrorism Risk Analysis January 13–14, 2005 http://www.usc.edu/dept/create/events/2005_01_31/Using_Project_Risk_Analysis_to_Counter_Terrorism.pdf

  21. G. Woo, 2005, Quantitative Terrorism Risk assessment. http://www.rms.com/NewsPress/Quantitative_Terrorism_Risk_Assessment.pdf

  22. K. Fedra, 2003, From Data Management to Decision Support. In: Integrated Technologies for Environmental Monitoring and Information Production. N. B. Harmancioglu, S. D. Ozkul, O. Fisitkoglu, and P. Geerders, [eds]. 395–410 pp., NATO Science Series, IV, Earth and Environmental Sciences, Vol. 23, Kluwer Academic Publishers, Dordrecht.

    Google Scholar 

  23. K. Hausken, 2002, Probabilistic risk analysis and game theory. Risk Analysis, 22, No.1, (2002), pp. 17–27.

    Article  Google Scholar 

  24. R. Benoit, C. Gamelin, R. Hausler, J. Vincent, 1996, Training Concept for Environmental Emergency Measures: Structuring Knowledge. Journal of Contingencies and Crisis Management Agency Report Vol. 4, No. 3, September 1996, Blackwell Publisher Ltd. -Oxford.

    Google Scholar 

  25. G. Beroggi, W. Wallace, 1995, Real-Time Decision Support for Emergency Management: An Integration of Advanced Computer and Communication Technology, Basil Blackwell Ltd. - Oxford.

    Google Scholar 

  26. K. Fedra, and L. Winkelbauer, 2002, A hybrid expert system, GIS and simulation modeling for environmental and technological risk management. Computer-Aided Civil and Infrastructure Engineering, 17 (2002) 131–146.

    Article  Google Scholar 

  27. I. Mitroff, 1995, The role of Computer and Decision Aids in Crisis Management: A developer's Report. Basil Blackwell Ltd. - Oxford.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Fedra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V

About this paper

Cite this paper

Fedra, K. (2008). Technological Risk Assessment And Management:Can We Integrate Terrorist Attacks?. In: Coskun, H.G., Cigizoglu, H.K., Maktav, M.D. (eds) Integration of Information for Environmental Security. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6575-0_24

Download citation

Publish with us

Policies and ethics