Abstract
Most logistics systems are designed to operate under standard conditions, i.e., when the transportation and communication networks are fully operative, the suppliers are able to deliver what they are asked for and the demand patterns fluctuate within (somewhat) known boundaries, as well as availability of human resources and vehicles to distribute products and services from production sites to consumption points.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed S, Shapiro A (2002) The sample average approximation method for stochastic programs with integer recourse. Optimization online. www.optimization-online.org. Accessed Apr 2013
Arce D, Sandler T (2003) Terrorism and game theory. In Simulation and gaming, 34:319 (accessed online april 2013 at sag.sagepub.com/content/34/319
Bienstock D, Shapiro A (1988) Optimizing resource acquisition decisions by stochastic programming. Manage Sci 34:215–229
Clauset A, Young M, Gledistch KS (2007) On the frequency of severe terrorist attacks. J Conflict Resolut 51(1):58–88
Dadkar Y, Nozick L, Jones D (2010) Routing of hazardous material shipments under the threat of terrorist attack. In: Bell M, Hosseinloo S, Kanturska U (eds) Security and environmental sustainability of multimodal transport. Springer with NATO Public Diplomacy Division, NATO Science for Peace and Security Series C, pp 89–110
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):5175–5189
Frost JR (1999) Principles of search theory, Part I: detection. Response 17(2):1–7
Garrido RA (2010) Terrorists and hazmat: a methodology to identify potential routes. In: Bell M, Hosseinloo S, Kanturska U (eds) Security and environmental sustainability of multimodal transport. Springer with NATO Public Diplomacy Division, NATO Science for Peace and Security Series C, pp 149–166
Harris J, Hall S (1992) Comparison of event tree, fault tree and Markov methods for probabilistic safety assessment and application to accident mitigation. Major hazards onshore and offshore, vol 15, p 59
Hoel D (1985) Mathematical dose-response models and their application to risk estimation. In: Vouk VB, Butler GC, Hoel DG, Peakall DB (eds) Methods for estimating risk of chemical injury: human and nonhuman biota and ecosystems. SCOPE, John Wiley & Sons, Chichester, New York, Brisbane, Toronto, Singapore, pp 347–360
Holguin-Veras J, Prez N, Ukkusuri S, Wachtendorf T, Brown B (2007) Emergency logistics issues affecting the response to Katrina: a synthesis and preliminary suggestions for improvement. Transport Res Rec J Transport Res Board 2022(1):76–82
Lepofsky M (2012) Security of hazmat transports by road. In: Reniers GLL, Zamparini L (eds) Security aspects of uni and multimodal hazmat transportation systems. Wiley-VCH; 1 edition (April 16, 2012) ISBN-10: 3527329900 pp 29–48
Luedtke J, Ahmed S (2008) A sample approximation approach for optimization with probabilistic constraints. SIAM J Optim 19(2):674–699
Major J (2002) Advanced techniques for modeling terrorism risk. J Risk Finance Fall 15–24
Murray-Tuite PM (2008) Transportation network risk profile for an origin-destination pair: security measures, terrorism, and target and attack method substitution. Transport Res Rec 2041:19–28
Murray-Tuite PM, Fei X (2010) A methodology for assessing transportation network terrorism risk with attacker and defender interactions. Comput Aided Civ Infrastruct Eng 25:396–410
Murray-Tuite PM, Garrido RA, Nune R (2007) Path prediction methodology for hazardous materials transported by malicious entities. Conference proceedings of the 11th world conference on transport research, University Berkeley, USA
Nune R (2007) Path prediction and path diversion identifying methodologies for hazardous materials transported by malicious entities. M.Sc. thesis, Virginia Polytechnic Institute and State University, Falls Church, Virginia
Nagurney A (1999) Network economics: a variational inequality approach. Kluwer Academic Publishers, Boston
Ortega JM, Rheinboldt WC (2000) Iterative solution of nonlinear equations in several variables. Academic, New York
Overgaard PB (1993) The scale of terrorist attacks as a signal of resources. Economics Working Papers 1993-20, School of Economics and Management, University of Aarhus
Pagnoncelli BK, Ahmed S, Shapiro A (2009) Sample average approximation method for chance-constrained programming: theory and applications. J Optim Theory Appl 142(2):399–416
Powers M, Shen Z (2009) Colonel Blotto in the war on terror: implications for event frequency. J Homeland Security Emerg Manage 6(1):1–16
Siqueira K, Sandler T (2008) Defensive counterterrorism measures and domestic politics. Defense Peace Econ 19:405–413
Sandler T, Siqueira K (2009) Games and terrorism: recent developments. Simulat Gaming 40: 164–192
Siqueira K, Sandler T (2010) Terrorist networks, support, and delegation. Public Choice 142: 237–253
Siqueira K, Sandler T, Cauley J (2009) Common agency and state-owned enterprise reform. China Econ Rev 20:208–217
Shapiro A, Homem-de-Mello (1998) A simulation-based approach to two-stage stochastic programming with recourse. Math Program 81:301–325
Sunstein CR (2003) Terrorism and probability neglect. J Risk Uncertainty 26(2/3):121–136
Szyliowicz JS (2012) Safeguarding hazmat shipments in the US: policies and challenges. In Reniers GLL, Zamparini L (eds) Security aspects of uni and multimodal hazmat transportation systems. Wiley-VCH; 1 edition (April 16, 2012) ISBN-10: 3527329900, pp 237–261
Willis H, Morral A, Kelly T, Medby J (2005) Estimating terrorism risk. Rand Corp. Center for Terrorism Risk Management Policy Monograph Series
Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991
Acknowledgements
The author wants to thank the Chilean National Fund for Development of the Science and Technology FONDECYT through Grant 1120046 as well as Vicerectoria Academica at Universidad Diego Portales.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Garrido, R.A. (2013). Optimal Emergency Resources Deployment Under a Terrorist Threat: The Hazmat Case and Beyond. In: Batta, R., Kwon, C. (eds) Handbook of OR/MS Models in Hazardous Materials Transportation. International Series in Operations Research & Management Science, vol 193. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6794-6_8
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6794-6_8
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6793-9
Online ISBN: 978-1-4614-6794-6
eBook Packages: Business and EconomicsBusiness and Management (R0)