Seeds of Disaster, Roots of Response: Interdependent Security in Interconnected Networks

@inproceedings{Heal2006SeedsOD,
  title={Seeds of Disaster, Roots of Response: Interdependent Security in Interconnected Networks},
  author={Geoffrey Heal and Michael Kearns and Paul R. Kleindorfer and Howard Kunreuther},
  year={2006}
}
In an interdependent world, the risks faced by any individual, firm, region, or country depend not only on its own choices but also on those of others. In the context of terrorism, the risks faced by any airline, for example, are tied to the security standards of other carriers and airports. To illustrate this point, consider the destruction of Pan Am flight 103 in 1988. In Malta, terrorists checked a bag containing a bomb on Malta Airlines, which had minimal security procedures. The bag was… 

Figures and Tables from this paper

Assessing, Managing and Benefiting from Global Interdependent Risks: The Case of Terrorism and National Disasters
With the increasing globalization of economic and social activities, the world has now become so interdependent that actions taken today 5,000 miles away could affect you tomorrow. Conventional
The Economics of Security Externalities Assessing, Managing and Benefiting from Global Interdependent Risks
With the increasing globalization of economic and social activities, the world has now become so interdependent that actions taken today 5,000 miles away could affect you tomorrow. Conventional
THE STATE AND THE THREAT OF CASCADING FAILURE ACROSS CRITICAL INFRASTRUCTURES: THE IMPLICATIONS OF EMPIRICAL EVIDENCE FROM MEDIA INCIDENT REPORTS
The threat of cascading failures across critical infrastructures has been identified as a key challenge for governments. Cascading failure is seen as potentially catastrophic, extremely difficult to
The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good
TLDR
This research will employ a mixed methods approach in an effort to extend limited empirical research regarding the problem of national security in cyberspace and employ an agent-based model to analyze the cyber security investment decision in the defense industrial base.
Strategic investment in protection in networked systems
TLDR
The incentives that agents have to invest in costly protection against cascading failures in networked systems are studied, and the equilibrium concept is flexible enough to allow for comparative statics in terms of network properties.
Strategic Investment in Protection in Networked Systems
TLDR
The incentives that agents have to invest in costly protection against cascading failures in networked systems are studied and it is shown that different kinds of applications lead to very different equilibrium patterns of investments in protection, with important welfare and risk implications.
Uncertainty modeling of hurricane-based disruptions to interdependent economic and infrastructure systems
Extreme risks associated with natural and man-made disasters involve disruptions to the production of goods or provision of services in interdependent systems. The reduced supply of goods and
Uncertainty Analysis of Interdependencies in Dynamic Infrastructure Recovery: Applications in Risk-Based Decision Making
The development of preparedness strategies for natural and malevolent man-made hazards and approaches with which to compare such investments is fraught with uncertainty. The dynamic inoperability
Reliability Consequences of Liberalization in the Electricity Sector: Existing Research and Remaining Questions
The generation, transmission and distribution of energy are among the most vital prerequisites for the functioning of modern societies. Since the early 1990s, the energy sectors of Western societies
Towards a Model to Support the Reconciliation of Security Actions across Enterprises
TLDR
The design of a model is explored which replicates the human decision-making process with regards to the reconciliation of conflicting security needs at this higher level, particularly on the initial tasks of negotiating and reconciling their high-level security needs.
...
1
2
...

References

SHOWING 1-10 OF 14 REFERENCES
P1: JZZ 0521857961c16 CUFX054/Auerswald 0 521 85796 1 cupusbw July 14
  • P1: JZZ 0521857961c16 CUFX054/Auerswald 0 521 85796 1 cupusbw July 14
  • 2006
2005 for a detailed discussion of the costs and benefits of RFID technology for security and other purposes
  • 2005
2005 for a discussion of how C-TPAT integrates with other supply chain security and risk management practices
  • 2005
See Heinrich 2005 for a detailed discussion of the costs and benefits of RFID technology for security and other purposes. 12
  • 2005
See Kunreuther and Heal 2003 and Heal and Kunreuther
  • See Kunreuther and Heal 2003 and Heal and Kunreuther
  • 2005
for a discussion of how C-TPAT integrates with other supply chain security and risk management practices. 10. See USCBP
  • for a discussion of how C-TPAT integrates with other supply chain security and risk management practices. 10. See USCBP
  • 2004
For more details on this approach, see
  • 2002
For more details on this approach, see Kunreuther et al
  • For more details on this approach, see Kunreuther et al
  • 2002
For more details, see Kunreuther
  • 2001
For more details, see Kunreuther 2001. 19. Kunreuther and Heal
  • Keohane and Zeckhauser 2003. 21. Heal and Kunreuther 2005b. 22. Kunreuther and Heal
  • 2000
...
1
2
...