[go: up one dir, main page]

IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v276y2019i2p626-636.html
   My bibliography  Save this article

Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems

Author

Listed:
  • Bier, Vicki
  • Gutfraind, Alexander
Abstract
A common problem in risk analysis is to characterize the overall security of a system of valuable assets (e.g., government buildings or communication hubs), and to suggest measures to mitigate any hazards or security threats. Currently, analysts typically rely on a combination of indices, such as resilience, robustness, redundancy, security, and vulnerability. However, these indices are not by themselves sufficient as a guide to action; for example, while it is possible to develop policies to decrease vulnerability, such policies may not always be cost-effective.

Suggested Citation

  • Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
  • Handle: RePEc:eee:ejores:v:276:y:2019:i:2:p:626-636
    DOI: 10.1016/j.ejor.2019.01.011
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S037722171930013X
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2019.01.011?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Helfgott, Ariella, 2018. "Operationalising systemic resilience," European Journal of Operational Research, Elsevier, vol. 268(3), pages 852-864.
    4. John H. Miller & Scott E. Page, 2007. "Social Science in Between, from Complex Adaptive Systems: An Introduction to Computational Models of Social Life," Introductory Chapters, in: Complex Adaptive Systems: An Introduction to Computational Models of Social Life, Princeton University Press.
    5. Sergey V. Buldyrev & Roni Parshani & Gerald Paul & H. Eugene Stanley & Shlomo Havlin, 2010. "Catastrophic cascade of failures in interdependent networks," Nature, Nature, vol. 464(7291), pages 1025-1028, April.
    6. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    7. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    8. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    9. Gregory Levitin, 2009. "Optimizing Defense Strategies for Complex Multi-State Systems," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 3, pages 33-64, Springer.
    10. Alexander Gutfraind, 2010. "Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks," PLOS ONE, Public Library of Science, vol. 5(11), pages 1-7, November.
    11. Trigeorgis, Lenos & Tsekrekos, Andrianos E., 2018. "Real Options in Operations Research: A Review," European Journal of Operational Research, Elsevier, vol. 270(1), pages 1-24.
    12. George E. Apostolakis & Douglas M. Lemon, 2005. "A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism," Risk Analysis, John Wiley & Sons, vol. 25(2), pages 361-376, April.
    13. Yacov Y. Haimes, 2006. "On the Definition of Vulnerabilities in Measuring Risks to Infrastructures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 293-296, April.
    14. John H. Miller & Scott E. Page, 2007. "Complexity in Social Worlds, from Complex Adaptive Systems: An Introduction to Computational Models of Social Life," Introductory Chapters, in: Complex Adaptive Systems: An Introduction to Computational Models of Social Life, Princeton University Press.
    15. Sunstein, Cass R, 2003. "Terrorism and Probability Neglect," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 121-136, March-May.
    16. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    17. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    18. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    19. Christine Izuakor & Richard White, 2017. "Critical infrastructure asset identification: seemingly simple but frustratingly elusive," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 13(1), pages 16-28.
    20. Bilal M. Ayyub & William L. McGill & Mark Kaminskiy, 2007. "Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework," Risk Analysis, John Wiley & Sons, vol. 27(4), pages 789-801, August.
    21. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    3. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A data-driven distributionally robust approach for the optimal coupling of interdependent critical infrastructures under random failures," European Journal of Operational Research, Elsevier, vol. 309(2), pages 872-889.
    4. Suyuan Luo & Tsan‐Ming Choi, 2022. "E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?," Production and Operations Management, Production and Operations Management Society, vol. 31(5), pages 2107-2126, May.
    5. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    6. Ebina, Takeshi & Matsushima, Noriaki & Nishide, Katsumasa, 2022. "Demand uncertainty, product differentiation, and entry timing under spatial competition," European Journal of Operational Research, Elsevier, vol. 303(1), pages 286-297.
    7. Gu, Yu & Fu, Xiao & Liu, Zhiyuan & Xu, Xiangdong & Chen, Anthony, 2020. "Performance of transportation network under perturbations: Reliability, vulnerability, and resilience," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 133(C).
    8. Rana Alabdan, 2020. "Phishing Attacks Survey: Types, Vectors, and Technical Approaches," Future Internet, MDPI, vol. 12(10), pages 1-37, September.
    9. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    10. Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    3. Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
    4. David A. Broniatowski & Conrad Tucker, 2017. "Assessing causal claims about complex engineered systems with quantitative data: internal, external, and construct validity," Systems Engineering, John Wiley & Sons, vol. 20(6), pages 483-496, November.
    5. Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
    6. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    7. Li, Xue-yan & Li, Xue-mei & Li, Xue-wei & Qiu, He-ting, 2017. "Multi-agent fare optimization model of two modes problem and its analysis based on edge of chaos," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 469(C), pages 405-419.
    8. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    9. Bednar, Jenna & Jones-Rooy, Andrea & Page, Scott E., 2015. "Choosing a future based on the past: Institutions, behavior, and path dependence," European Journal of Political Economy, Elsevier, vol. 40(PB), pages 312-332.
    10. Martí Rosas-Casals & Sandro Bologna & Ettore F. Bompard & Gregorio D'Agostino & Wendy Ellens & Giuliano Andrea Pagani & Antonio Scala & Trivik Verma, 2015. "Knowing power grids and understanding complexity science," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 11(1), pages 4-14.
    11. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    12. Citera, Emanuele & Sau, Lino, 2019. "Complexity, Conventions and Instability: the role of monetary policy," Department of Economics and Statistics Cognetti de Martiis. Working Papers 201924, University of Turin.
    13. Theodosio, Bruno Miller & Weber, Jan, 2023. "Back to the classics: R-evolution towards statistical equilibria," ifso working paper series 28, University of Duisburg-Essen, Institute for Socioeconomics (ifso).
    14. Jeffery S. McMullen & Dimo Dimov, 2013. "Time and the Entrepreneurial Journey: The Problems and Promise of Studying Entrepreneurship as a Process," Journal of Management Studies, Wiley Blackwell, vol. 50(8), pages 1481-1512, December.
    15. Gräbner, Claudius, 2016. "From realism to instrumentalism - and back? Methodological implications of changes in the epistemology of economics," MPRA Paper 71933, University Library of Munich, Germany.
    16. Thomas Kourouxous & Thomas Bauer, 2019. "Violations of dominance in decision-making," Business Research, Springer;German Academic Association for Business Research, vol. 12(1), pages 209-239, April.
    17. Niceto S. Poblador, 2011. "The Strategy Dilemma : Why Big Business Moves Seldom Pan Out as Planned," UP School of Economics Discussion Papers 201105, University of the Philippines School of Economics.
    18. repec:lib:000cis:v:5:y:2017:i:1:p:26-34 is not listed on IDEAS
    19. Flaminio Squazzoni, 2010. "The impact of agent-based models in the social sciences after 15 years of incursions," History of Economic Ideas, Fabrizio Serra Editore, Pisa - Roma, vol. 18(2), pages 197-234.
    20. Fuat Oğuz, 2020. "Hayekian complexity and the role of regulation in electricity markets," Economic Affairs, Wiley Blackwell, vol. 40(3), pages 406-418, October.
    21. Mykola Odrekhivskyi & Orysya Pshyk-Kovalska & Volodymyr Zhezhukha & Iryna Ivanochko, 2022. "Intelligent Management of Enterprise Business Processes," Mathematics, MDPI, vol. 11(1), pages 1-15, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:276:y:2019:i:2:p:626-636. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.