Library

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Electronic Resource
    Electronic Resource
    Berkeley, Calif. : Berkeley Electronic Press (now: De Gruyter)
    Journal of homeland security and emergency management 3 (2006), S. 2 
    ISSN: 1547-7355
    Source: Berkeley Electronic Press Academic Journals
    Topics: Political Science , Sociology
    Notes: Terrorist attacks may involve large-scale systems with multiple points of vulnerability and intervention. For example, chemical and biological terrorist attacks can be targeted at large-scale distribution system, such as those associated with agriculture, meat products, or water. These supply-chain systems can be thought of as having three distinct points of potential contamination: at the source, during processing, or at delivery. Prevention and mitigation strategies can be applied at any of these points. The effectiveness of a risk management program involves the ability to evaluate the trade-offs associated with allocating available resources to mitigation strategies that could be implemented at various points along the supply chain.The paper presents a conceptual model for evaluation the cost-effectiveness of these strategies. Structured as an event tree representing potential contamination entry points at various places in the supply chain, decisions related to where and how resources should be allocated to deterrence, detection and response can be evaluated. This approach focuses on the likelihood of the success of the homeland's actions, rather than on the probability of the terrorists' actions, which can be more difficult to quantify.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...