Skip to main content

Advertisement

Log in

Identification of potential target locations and attractiveness assessment due to terrorism in the freight transport

  • Published:
Journal of Transportation Security Aims and scope Submit manuscript

Abstract

Recent terrorist attacks on transportation means and related implications have established a threat of extreme severity. The freight sector, whilst being less attractive to the terrorist than the passenger one, demands equal attention. Supply chains play the key role for global commerce and are potentially attractive targets for terrorism. Since complete protection is unrealistic and economically unfeasible, there is need for identification and prioritisation of the attractiveness of locations. This paper presents a screening/evaluation methodology based on a multi criteria analysis, which will essentially assess the degree of attractiveness of a specific location as target to a terrorist attack employing freight transportation, either as means for launching the attack or by using cargo itself as the weapon. Thus, it will provide a tool for the authorities to develop countermeasures ensuring that these will be appropriately allocated to such potentially target locations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  • Abkowitz MD (2003) Transportation risk management: a new paradigm. Transportation Research Board CD-ROM, Washington, DC

  • Apostolakis GE, Lemon DM (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Anal, Washington 25:361–376

    Google Scholar 

  • Banomyong R (2005) The impact of port and trade security initiatives on maritime supply-chain management. Marit Policy Manage 32:1–3

    Article  Google Scholar 

  • Brewster RM, LeVert R (2005) Identifying vulnerabilities and security management practices in agricultural and food commodity transportation. Transportation Research Board CD-ROM, Annual Meeting, Washington, DC

  • Closs D, McGarell E (2004) Enhancing security throughout the supply chain. Special Report series, IBM Center for the Business of Government

  • Commission of the European Communities. Critical infrastructure protection in the fight against terrorism. Communication from the Commission to the Council and the European Parliament, COM 702 final, 2004

  • Country Indicators for Foreign Policy. Indicators descriptions. CIFP Risk Assessment Indicators Definitions. Available via http://www.carleton.ca/cifp/docs/RiskAssessmentIndicators_FullDescriptions.pdf. Accessed July 17, 2007

  • Daisler PF Jr (2002) A perspective: risk analysis as a tool for reducing the risks of terrorism. Risk Anal 22(6):1039–1040

    Article  Google Scholar 

  • DTLR (2000) Multi-criteria analysis manual. DETR, London

    Google Scholar 

  • Eder A (2001) After September 11. How transit agencies prepare for the threat of terrorism. Transportation Research Record, No 1927. Transportation Research Board, Washington DC, pp 92–100

    Google Scholar 

  • Fink CNY (2003) Antiterrorism security and surface transportation systems review of case studies and current tactics. Transportation Research Record, No 1822. Transportation Research Board, Washington, DC, pp 9–17

    Google Scholar 

  • Garrick BJ, Hall JE, Kilger M, McDonald JC, O’Toole T, Probst PS, Rindskopf Parker E, Rosenthal R, Trivelpiece AW, Van Arsdale LA, Zebroski EL (2004) Confronting the risks of terrorism: making the right decisions. Reliab Eng Syst Saf 86:129–176

    Article  Google Scholar 

  • Haimes YY, Longstaff T (2002) The role of risk analysis in the protection of critical infrastructures against terrorism. Risk Anal 22(3):439–444

    Article  Google Scholar 

  • Huang B (2004) A GIS-AHP method for HAZMAT route planning with consideration of security. Environ Inf Arch 2:818–830

    Google Scholar 

  • Moteff J, Copeland C, Fisher J (2002) Critical infrastructures. What makes an infrastructure critical? Report for Congress, No 31556, Congressional Research Service, The Library of Congress

  • News Worthiness, Resource Book, Press Base. Available via: http://library.thinkquest.org/18806/pressbase/resourcebook/newsworthy.shtml Accessed 23 July, 2007

  • Paté-Cornell ME, Guikema S (2002) Probabilistic modelling of terrorist threats: a systems analysis approach to setting priorities among countermeasures. Mil Oper Res 7:5–20

    Google Scholar 

  • Patterson SA, Apostolakis GE (2007) Identification of critical locations across multiple infrastructures for terrorist actions. Reliab Eng Syst Saf 92:1183–1203

    Article  Google Scholar 

  • Prozzi J, Spurgeon K, Harrison R (2003) Secret lives of containers evidence from Texas. Transportation Research Record, 1833. Transportation Research Board, Washington, DC

    Google Scholar 

  • Risk Management Solutions (2004) Countering the terrorist threats to corporations. Using computer models to prioritize risk management decisions. Risk Management Solutions Inc.

  • Rowshan S, Smith MC, Krill SJ, Seplow JE, Sauntry WC (2003) Highway vulnerability assessment: a guide for state departments of transportation. Transportation Research Record, 1827. National Academy Press, Washington, DC, pp 55–62

    Google Scholar 

  • Shahar Y (2005) Toward a target-specific method of threat assessment. Springer, Berlin

    Google Scholar 

  • The President. Critical Infrastructure Protection. Executive Order 13010 (1996). Fed Regist 61(138)

  • Threat Advisory System Response (TASR) (2004) Guideline considerations and potential actions in response to the Department of Homeland Security Advisory System. ASIS International GDL TASR 09

  • United States Government Accountability Office (GAO) (1998) Combating terrorism: threat and risk assessments can help prioritize and target programme investments. Report to Congressional Requesters

  • Van de Voort M, Willis H, Ortiz D, Martonosi S, Rahman A (2006) Policy considerations in securing the global containerized supply chain. Presentation at risk management tools for port security, Critical Infrastructure and Sustainability, Venice, Italy

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitrios Tsamboulas.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tsamboulas, D., Moraiti, P. Identification of potential target locations and attractiveness assessment due to terrorism in the freight transport. J Transp Secur 1, 189–207 (2008). https://doi.org/10.1007/s12198-008-0016-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12198-008-0016-x

Keywords

Navigation