Skip to main content

Optimal Emergency Resources Deployment Under a Terrorist Threat: The Hazmat Case and Beyond

  • Chapter
  • First Online:
Handbook of OR/MS Models in Hazardous Materials Transportation

Part of the book series: International Series in Operations Research & Management Science ((ISOR,volume 193))

  • 1202 Accesses

Abstract

Most logistics systems are designed to operate under standard conditions, i.e., when the transportation and communication networks are fully operative, the suppliers are able to deliver what they are asked for and the demand patterns fluctuate within (somewhat) known boundaries, as well as availability of human resources and vehicles to distribute products and services from production sites to consumption points.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahmed S, Shapiro A (2002) The sample average approximation method for stochastic programs with integer recourse. Optimization online. www.optimization-online.org. Accessed Apr 2013

  • Arce D, Sandler T (2003) Terrorism and game theory. In Simulation and gaming, 34:319 (accessed online april 2013 at sag.sagepub.com/content/34/319

  • Bienstock D, Shapiro A (1988) Optimizing resource acquisition decisions by stochastic programming. Manage Sci 34:215–229

    Article  Google Scholar 

  • Clauset A, Young M, Gledistch KS (2007) On the frequency of severe terrorist attacks. J Conflict Resolut 51(1):58–88

    Article  Google Scholar 

  • Dadkar Y, Nozick L, Jones D (2010) Routing of hazardous material shipments under the threat of terrorist attack. In: Bell M, Hosseinloo S, Kanturska U (eds) Security and environmental sustainability of multimodal transport. Springer with NATO Public Diplomacy Division, NATO Science for Peace and Security Series C, pp 89–110

    Google Scholar 

  • Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):5175–5189

    Article  Google Scholar 

  • Frost JR (1999) Principles of search theory, Part I: detection. Response 17(2):1–7

    Google Scholar 

  • Garrido RA (2010) Terrorists and hazmat: a methodology to identify potential routes. In: Bell M, Hosseinloo S, Kanturska U (eds) Security and environmental sustainability of multimodal transport. Springer with NATO Public Diplomacy Division, NATO Science for Peace and Security Series C, pp 149–166

    Google Scholar 

  • Harris J, Hall S (1992) Comparison of event tree, fault tree and Markov methods for probabilistic safety assessment and application to accident mitigation. Major hazards onshore and offshore, vol 15, p 59

    Google Scholar 

  • Hoel D (1985) Mathematical dose-response models and their application to risk estimation. In: Vouk VB, Butler GC, Hoel DG, Peakall DB (eds) Methods for estimating risk of chemical injury: human and nonhuman biota and ecosystems. SCOPE, John Wiley & Sons, Chichester, New York, Brisbane, Toronto, Singapore, pp 347–360

    Google Scholar 

  • Holguin-Veras J, Prez N, Ukkusuri S, Wachtendorf T, Brown B (2007) Emergency logistics issues affecting the response to Katrina: a synthesis and preliminary suggestions for improvement. Transport Res Rec J Transport Res Board 2022(1):76–82

    Article  Google Scholar 

  • Lepofsky M (2012) Security of hazmat transports by road. In: Reniers GLL, Zamparini L (eds) Security aspects of uni and multimodal hazmat transportation systems. Wiley-VCH; 1 edition (April 16, 2012) ISBN-10: 3527329900 pp 29–48

    Google Scholar 

  • Luedtke J, Ahmed S (2008) A sample approximation approach for optimization with probabilistic constraints. SIAM J Optim 19(2):674–699

    Article  Google Scholar 

  • Major J (2002) Advanced techniques for modeling terrorism risk. J Risk Finance Fall 15–24

    Google Scholar 

  • Murray-Tuite PM (2008) Transportation network risk profile for an origin-destination pair: security measures, terrorism, and target and attack method substitution. Transport Res Rec 2041:19–28

    Article  Google Scholar 

  • Murray-Tuite PM, Fei X (2010) A methodology for assessing transportation network terrorism risk with attacker and defender interactions. Comput Aided Civ Infrastruct Eng 25:396–410

    Article  Google Scholar 

  • Murray-Tuite PM, Garrido RA, Nune R (2007) Path prediction methodology for hazardous materials transported by malicious entities. Conference proceedings of the 11th world conference on transport research, University Berkeley, USA

    Google Scholar 

  • Nune R (2007) Path prediction and path diversion identifying methodologies for hazardous materials transported by malicious entities. M.Sc. thesis, Virginia Polytechnic Institute and State University, Falls Church, Virginia

    Google Scholar 

  • Nagurney A (1999) Network economics: a variational inequality approach. Kluwer Academic Publishers, Boston

    Google Scholar 

  • Ortega JM, Rheinboldt WC (2000) Iterative solution of nonlinear equations in several variables. Academic, New York

    Book  Google Scholar 

  • Overgaard PB (1993) The scale of terrorist attacks as a signal of resources. Economics Working Papers 1993-20, School of Economics and Management, University of Aarhus

    Google Scholar 

  • Pagnoncelli BK, Ahmed S, Shapiro A (2009) Sample average approximation method for chance-constrained programming: theory and applications. J Optim Theory Appl 142(2):399–416

    Article  Google Scholar 

  • Powers M, Shen Z (2009) Colonel Blotto in the war on terror: implications for event frequency. J Homeland Security Emerg Manage 6(1):1–16

    Google Scholar 

  • Siqueira K, Sandler T (2008) Defensive counterterrorism measures and domestic politics. Defense Peace Econ 19:405–413

    Article  Google Scholar 

  • Sandler T, Siqueira K (2009) Games and terrorism: recent developments. Simulat Gaming 40: 164–192

    Article  Google Scholar 

  • Siqueira K, Sandler T (2010) Terrorist networks, support, and delegation. Public Choice 142: 237–253

    Article  Google Scholar 

  • Siqueira K, Sandler T, Cauley J (2009) Common agency and state-owned enterprise reform. China Econ Rev 20:208–217

    Article  Google Scholar 

  • Shapiro A, Homem-de-Mello (1998) A simulation-based approach to two-stage stochastic programming with recourse. Math Program 81:301–325

    Google Scholar 

  • Sunstein CR (2003) Terrorism and probability neglect. J Risk Uncertainty 26(2/3):121–136

    Article  Google Scholar 

  • Szyliowicz JS (2012) Safeguarding hazmat shipments in the US: policies and challenges. In Reniers GLL, Zamparini L (eds) Security aspects of uni and multimodal hazmat transportation systems. Wiley-VCH; 1 edition (April 16, 2012) ISBN-10: 3527329900, pp 237–261

    Google Scholar 

  • Willis H, Morral A, Kelly T, Medby J (2005) Estimating terrorism risk. Rand Corp. Center for Terrorism Risk Management Policy Monograph Series

    Google Scholar 

  • Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991

    Article  Google Scholar 

Download references

Acknowledgements

The author wants to thank the Chilean National Fund for Development of the Science and Technology FONDECYT through Grant 1120046 as well as Vicerectoria Academica at Universidad Diego Portales.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rodrigo A. Garrido .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Garrido, R.A. (2013). Optimal Emergency Resources Deployment Under a Terrorist Threat: The Hazmat Case and Beyond. In: Batta, R., Kwon, C. (eds) Handbook of OR/MS Models in Hazardous Materials Transportation. International Series in Operations Research & Management Science, vol 193. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6794-6_8

Download citation

Publish with us

Policies and ethics