Skip to main content

The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

Field proven Root Cause Analysis (RCA) from the industrial sector can assist the terrorism community in decompiling terrorist acts to further understand the mentalities that trigger such events to escalate. RCA is a disciplined thought process that is not specific to any industry or given situation, but specific to the human being. We will focus on how to logically breakdown a seemly complex event into it more manageable sub-components.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A registered trademark of Reliability Center, Inc., Root Cause Analysis Improving Performance for Bottom Line Results, 2nd edn., 246 p. CRC Press, Boca Raton (2002) ISBN: 0:8493-1318-X, www.reliability.com

  2. Reasons, J.: Managing the Risks of Organizational Accidents, p. 9. Ashgate Publishing, England (1998)

    Google Scholar 

  3. Goldratt, E.M., Cox, J.: The Goal. Gower Publishing, Croftroad (1993)

    Google Scholar 

  4. The 9/11 Commission Report, Official Government Edn. (2004), ISBN 0-16-072304-3

    Google Scholar 

  5. Challenger: Disaster and Investigation. Cananta Communications Corp. (1987)

    Google Scholar 

  6. Lewis, R.S.: Challenger: The Final Voyage. Columbia University Press, New York (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Latino, R.J. (2005). The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_62

Download citation

  • DOI: https://doi.org/10.1007/11427995_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics