Skip to main content

Security in the Chemical Industry: Theory and Practice

  • Chapter
  • First Online:
The Handbook of Security
  • 1090 Accesses

Abstract

Chao Chen and Genserik Reniers focus on security in the chemical industry which has attracted increasing attention in the academic and industrial domains since the “9/11” terrorist attack in 2001. With reference to three different security theories and five security risk assessment and management methods used in the chemical industry, they trace documented improvements in security management. They argue the case for integrating safety and security to avoid protection overlaps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • American Petroleum Institute (API), 2004. Recommended practice for security vulnerability assessment for petroleum and petrochemical facilities. American Petroleum Institute.

    Google Scholar 

  • API, 2013. ANSI/API Standard 780—Security risk assessment methodology for the petroleum and petrochemical industry. American Petroleum Institute.

    Google Scholar 

  • Arab News, 2020. Saudi Arabia says Jeddah fuel tank blast caused by ‘Houthi terrorist missile’. Retrieved from. (Accessed September 30, 2021).

    Google Scholar 

  • Argenti F, Bajpai S, Baybutt P, et al., 2017. Security risk assessment: in the chemical and process industry[M]. Walter de Gruyter GmbH & Co KG.

    Google Scholar 

  • Baybutt, P., 2002. Assessing risks from threats to process plants: Threat and vulnerability analysis. Process Safety Progress 21, 269–275.

    Article  Google Scholar 

  • Baybutt, P., 2003. Strategies for protecting process plants against terrorism, sabotage and other criminal acts. Homeland Defence Journal 2, 1–7.

    Google Scholar 

  • Baybutt, P., 2017. Issues for security risk assessment in the process industries. Journal of Loss Prevention in the Process Industries 49, 509–518. https://doi.org/10.1016/j.jlp.2017.05.023

    Article  Google Scholar 

  • Bier, V.M., Nagaraj, A., Abhichandani, V., 2005. Protection of simple series and parallel systems with components of different values. Reliability Engineering & System Safety 87, 315–323. https://doi.org/10.1016/j.ress.2004.06.003

    Article  Google Scholar 

  • Casciano, M., Khakzad, N., Reniers, G., Cozzani, V., 2019. Ranking chemical industrial clusters with respect to safety and security using analytic network process. Process Safety and Environmental Protection 132, 200–213. https://doi.org/10.1016/j.psep.2019.10.024

    Article  Google Scholar 

  • Casson Moreno, V., Reniers, G., Salzano, E., Cozzani, V., 2018. Analysis of physical and cyber security-related events in the chemical and process industry. Process Safety and Environmental Protection 116, 621–631. https://doi.org/10.1016/j.psep.2018.03.026

    Article  Google Scholar 

  • CCPS, 2001. Layer of Protection Analysis: Simplified Process Risk Assessment. AIChE–CCPS, New York.

    Google Scholar 

  • CCPS, 2003. Guidelines for analyzing and managing the security vulnerabilities of fixed chemical sites. American Institute of Chemical Engineers.

    Google Scholar 

  • CCPS, 2011. Layer of protection analysis: simplified process risk assessment. American Institute of Chemical Engineers - Center of Chemical Process Safety, New York.

    Google Scholar 

  • Chen, C., Li, C., Reniers, G., Yang, F., 2021. Safety and security of oil and gas pipeline transportation: A systematic analysis of research trends and future needs using WoS. Journal of Cleaner Production 279. https://doi.org/10.1016/j.jclepro.2020.123583

  • Chen, C., Reniers, G., 2020. Chemical industry in China: The current status, safety problems, and pathways for future sustainable development. Safety Science 128. https://doi.org/10.1016/j.ssci.2020.104741

  • Chen, C., Reniers, G., Khakzad, N., 2019. Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: a dynamic graph approach. Reliability Engineering & System Safety 191. https://doi.org/10.1016/j.ress.2019.04.023

  • Chen, C., Reniers, G., Khakzad, N., 2020a. “Cost-benefit management of intentional domino effects in chemical industrial areas.” Process Safety and Environmental Protection 134, 392–405. https://doi.org/10.1016/j.psep.2019.10.007

  • Chen, C., Reniers, G., and Khakzad. N., 2020b. “A thorough classification and discussion of approaches for modeling and managing domino effects in the process industries.” Safety science 125, 104618.

    Google Scholar 

  • Collins, S.J., Newhouse, R., Porter, J., Talsma, A., 2014. Effectiveness of the surgical safety checklist in correcting errors: a literature review applying Reason’s Swiss cheese model. AORN J 100, 65–79 e65. https://doi.org/10.1016/j.aorn.2013.07.024

    Article  Google Scholar 

  • Cox, J.L.A., 2009. Game Theory and Risk Analysis. Risk analysis 29, 1062–1068. https://doi.org/10.1111/j.1539-6924.2009.01247.x

    Article  Google Scholar 

  • Cox, L.A., Jr., 2008. Some limitations of “Risk = Threat x Vulnerability x Consequence” for risk analysis of terrorist attacks. Risk Anal 28, 1749–1761. https://doi.org/10.1111/j.1539-6924.2008.01142.x

    Article  Google Scholar 

  • Garcia, M.L., 2007. Design and evaluation of physical protection systems. Elsevier.

    Google Scholar 

  • Gavious, A., Mizrahi, S., Shani, Y., Minchuk, Y., 2009. The costs of industrial accidents for the organization: developing methods and tools for evaluation and cost–benefit analysis of investment in safety. Journal of Loss Prevention in the Process Industries 22, 434–438.

    Article  Google Scholar 

  • Gibbons, R., 1992. A primer in game theory. Harvester Wheatsheaf, New York.

    Google Scholar 

  • Jallon, R., Imbeau, D., de Marcellis-Warin, N., 2011. Development of an indirect-cost calculation model suitable for workplace use. J Safety Res 42, 149–164. https://doi.org/10.1016/j.jsr.2011.05.006

    Article  Google Scholar 

  • Khakzad, N., 2015. Application of dynamic Bayesian network to risk analysis of domino effects in chemical infrastructures. Reliability Engineering & System Safety 138, 263–272. https://doi.org/10.1016/j.ress.2015.02.007

    Article  Google Scholar 

  • Khakzad, N., Khan, F., Amyotte, P., 2011. Safety analysis in process facilities: Comparison of fault tree and Bayesian network approaches. Reliability Engineering & System Safety 96, 925–932. https://doi.org/10.1016/j.ress.2011.03.012

    Article  Google Scholar 

  • Khakzad, N., Reniers, G., 2017. Cost-effective allocation of safety measures in chemical plants w.r.t land-use planning. Safety Science 97, 2–9. https://doi.org/10.1016/j.ssci.2015.10.010

    Article  Google Scholar 

  • Khakzad, N., Reniers, G., 2019. Low-capacity utilization of process plants: A cost-robust approach to tackle man-made domino effects. Reliability Engineering & System Safety 191. https://doi.org/10.1016/j.ress.2018.03.030

  • Khakzad, N., Reniers, G., Abbassi, R., Khan, F., 2016. Vulnerability analysis of process plants subject to domino effects. Reliability Engineering & System Safety 154, 127–136. https://doi.org/10.1016/j.ress.2016.06.004

    Article  Google Scholar 

  • Khakzad, N., Reniers, G., van Gelder, P., 2017. A multi-criteria decision making approach to security assessment of hazardous facilities. Journal of Loss Prevention in the Process Industries 48, 234–243. https://doi.org/10.1016/j.jlp.2017.05.006

    Article  Google Scholar 

  • Lauritzen, S.L., Nilsson, D., 2001. Representing and solving decision problems with limited information. Management Science 47, 1235–1251 %@ 0025-1909.

    Google Scholar 

  • Lee, Y., Kim, J., Kim, J., Kim, J., Moon, I., 2010. Development of a risk assessment program for chemical terrorism. Korean Journal of Chemical Engineering 27, 399–408. https://doi.org/10.1007/s11814-010-0094-x

    Article  Google Scholar 

  • Lemke, C.E., Howson, J., Joseph T, 1964. Equilibrium points of bimatrix games. Journal of the Society for industrial and Applied Mathematics 12, 413–423.

    Article  Google Scholar 

  • Liu, D., Wang, X., Camp, J., 2008. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection 1, 75–80. https://doi.org/10.1016/j.ijcip.2008.08.001

    Article  Google Scholar 

  • Matteini, A., Argenti, F., Salzano, E., Cozzani, V., 2018. A comparative analysis of security risk assessment methodologies for the chemical industry. Reliability Engineering & System Safety. https://doi.org/10.1016/j.ress.2018.03.001

  • Misuri, A., Khakzad, N., Reniers, G., Cozzani, V., 2018. A Bayesian network methodology for optimal security management of critical infrastructures. Reliability Engineering & System Safety. https://doi.org/10.1016/j.ress.2018.03.028

  • Moore, D.A., Fuller, B., Hazzan, M., Jones, J.W., 2007. Development of a security vulnerability assessment process for the RAMCAP chemical sector. Journal of hazardous materials 142, 689–694.

    Article  Google Scholar 

  • Paté-Cornell, E., Guikema, S., 2002. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research 7, 5–23.

    Article  Google Scholar 

  • Powell, R., 2007. Defending against terrorist attacks with limited resources. American Political Science Review 101, 527–541.

    Article  Google Scholar 

  • Reason, J., 1997. Managing the risks of organizational accidents. Ashgate, Aldershot.

    Google Scholar 

  • Reniers, G., 2009. Man-made domino effect disasters in the chemical industry: the need for integrating safety and security in chemical clusters. Disaster Advances 2, 3–5.

    Google Scholar 

  • Reniers, G., Brijs, T., 2014. Major accident management in the process industry: An expert tool called CESMA for intelligent allocation of prevention investments. Process Safety and Environmental Protection 92, 779–788. https://doi.org/10.1016/j.psep.2014.02.003

    Article  Google Scholar 

  • Reniers, G., Cozzani, V., 2013. Domino Effects in the Process Industries, Modeling, Prevention and Managing. Elsevier, Amsterdam, The Netherlands.

    Google Scholar 

  • Reniers, G., Dullaert, W., Audenaert, A., Ale, B.J., Soudan, K., 2008. Managing domino effect-related security of industrial areas. Journal of Loss Prevention in the Process Industries 21, 336–343.

    Article  Google Scholar 

  • Reniers, G., Khakzad, N., Gelder, P.V., 2018. Security risk assessment in the chemical and process industry. Walter de Gruyter GmbH & Co KG.

    Google Scholar 

  • Reniers, G., Landucci, G., Khakzad, N., 2020. What safety models and principles can be adapted and used in security science? Journal of Loss Prevention in the process industries 64. https://doi.org/10.1016/j.jlp.2020.104068

  • Reniers, G., Soudan, K., 2010. A game-theoretical approach for reciprocal security-related prevention investment decisions. Reliability Engineering & System Safety 95, 1–9.

    Article  Google Scholar 

  • Reniers, G., Van Lerberghe, P., Van Gulijk, C., 2015. Security risk assessment and protection in the chemical and process industry. Process Safety Progress 34, 72–83. https://doi.org/10.1002/prs.11683

    Article  Google Scholar 

  • Reniers, G.L., Van Erp, H.N., 2016. Operational safety economics: a practical approach focused on the chemical and process industries. John Wiley & Sons.

    Book  Google Scholar 

  • Rios, J., Insua, D.R., 2012. Adversarial risk analysis for counterterrorism modeling. Risk analysis 32, 894–915.

    Article  Google Scholar 

  • Saaty, T.L., 1990. Decision making for leaders: the analytic hierarchy process for decisions in a complex world. RWS publications.

    Google Scholar 

  • Saaty, T.L., Vargas, L.G., 2006. Decision making with the analytic network process. Springer.

    Google Scholar 

  • Shachter, R.D., 1986. Evaluating influence diagrams. Operations Research 34, 871–882.

    Article  Google Scholar 

  • Staalduinen, M.A.v., Khan, F., Gadag, V., 2016. SVAPP methodology: A predictive security vulnerability assessment modeling method. Journal of Loss Prevention in the Process Industries 43, 397–413. https://doi.org/10.1016/j.jlp.2016.06.017

  • Tambe, M., 2011. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press.

    Book  Google Scholar 

  • Villa, V., Reniers, G.L.L., Paltrinieri, N., Cozzani, V., 2017. Development of an economic model for counter terrorism measures in the process-industry. Journal of Loss Prevention in the Process Industries 49, 437–460. https://doi.org/10.1016/j.jlp.2017.06.001

    Article  Google Scholar 

  • Willis, H.H., 2007. Guiding resource allocations based on terrorism risk. Risk Anal 27, 597–606. https://doi.org/10.1111/j.1539-6924.2007.00909.x

    Article  Google Scholar 

  • Zhang, L., Reniers, G., 2016. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. Risk Anal 36, 2285–2297. https://doi.org/10.1111/risa.12569

    Article  Google Scholar 

  • Zhang, L., Reniers, G., 2018. Applying a Bayesian Stackelberg game for securing a chemical plant. Journal of Loss Prevention in the Process Industries 51, 72–83. https://doi.org/10.1016/j.jlp.2017.11.010

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chen, C., Reniers, G. (2022). Security in the Chemical Industry: Theory and Practice. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-91735-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91735-7_18

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-91734-0

  • Online ISBN: 978-3-030-91735-7

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics