Some Limitations of "Risk = Threat x Vulnerability x Consequence" for Risk Analysis of Terrorist Attacks

被引:137
作者
Cox, Louis Anthony , Jr. [1 ]
机构
[1] Cox Associates, Denver, CO 80218 USA
关键词
Game theory; hierarchical optimization; RAMCAP; rational opponent; terrorism risk assessment; two-level optimization;
D O I
10.1111/j.1539-6924.2008.01142.x
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Several important risk analysis methods now used in setting priorities for protecting U.S. infrastructures against terrorist attacks are based on the formula: Risk = Threat x Vulnerability x Consequence. This article identifies potential limitations in such methods that can undermine their ability to guide resource allocations to effectively optimize risk reductions. After considering specific examples for the Risk Analysis and Management for Critical Asset Protection (RAMCAP (TM)) framework used by the Department of Homeland Security, we address more fundamental limitations of the product formula. These include its failure to adjust for correlations among its components, nonadditivity of risks estimated using the formula, inability to use risk-scoring results to optimally allocate defensive resources, and intrinsic subjectivity and ambiguity of Threat, Vulnerability, and Consequence numbers. Trying to directly assess probabilities for the actions of intelligent antagonists instead of modeling how they adaptively pursue their goals in light of available information and experience can produce ambiguous or mistaken risk estimates. Recent work demonstrates that two-level (or few-level) hierarchical optimization models can provide a useful alternative to Risk = Threat x Vulnerability x Consequence scoring rules, and also to probabilistic risk assessment (PRA) techniques that ignore rational planning and adaptation. In such two-level optimization models, defender predicts attacker's best response to defender's own actions, and then chooses his or her own actions taking into account these best responses. Such models appear valuable as practical approaches to antiterrorism risk analysis.
引用
收藏
页码:1749 / 1761
页数:13
相关论文
共 13 条
[1]   Conservation laws, extended polymatroids and multiarmed bandit problems; A polyhedral approach to indexable systems [J].
Bertsimas, D ;
Nino-Mora, J .
MATHEMATICS OF OPERATIONS RESEARCH, 1996, 21 (02) :257-306
[2]  
BIER VM, 2009, GAME THEORETIC RISK, pCH1
[3]   Defending critical infrastructure [J].
Brown, Gerald ;
Carlyle, Matthew ;
Salmeron, Javier ;
Wood, Kevin .
INTERFACES, 2006, 36 (06) :530-544
[4]  
COX LA, 1990, NEW RISKS ISSUES MAN, P331
[5]   What's wrong with risk matrices? [J].
Cox, Louis Anthony , Jr. .
RISK ANALYSIS, 2008, 28 (02) :497-512
[6]   Index policies for stochastic search in a forest with an a application to R&D project management [J].
Denardo, EV ;
Rothblum, UG ;
Van der Heyden, L .
MATHEMATICS OF OPERATIONS RESEARCH, 2004, 29 (01) :162-181
[7]   Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks [J].
Golany, Boaz ;
Kaplan, Edward H. ;
Marmur, Abraham ;
Rothblum, Uriel G. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2009, 192 (01) :198-208
[8]  
INDUSI JP, 2003, BNL713832003CP
[9]  
Infanger G, 2006, HDB ASSET LIABILITY, V1
[10]  
National Research Council (NRC), 2008, COMM METH IMPR DEP H