8 research outputs found

    ALONG FOR THE RIDE: THE UNITED STATES NEEDS TO PREPARE SECURITY STANDARDS NOW FOR COMMERCIAL SPACE TRAVEL

    Get PDF
    The concept of regulating the physical security of commercial spaceports has received little attention. Currently, no federal agency is responsible for developing physical security standards or enforcing regulatory compliance within the industry. This thesis examines the need to create and apply ground-based physical security standards to commercial space facilities within the United States. This thesis explores three policy options as potential paths forward if commercial space travel is designated as critical infrastructure and assesses their effectiveness, cost, political challenges, and viability. The analysis determines that taking proactive measures now will mitigate the potential costs and impacts of an attack and would save substantial amounts of money, keep a burgeoning market on track, and could save lives. Ultimately, this thesis concludes that implementing a regulatory approach like the one employed by the Transportation Security Administration’s surface transportation program would be effective if it prevents the explosion of one Falcon 9 rocket, or similar, every approximately 188 years.Civilian, Department of Homeland SecurityApproved for public release. Distribution is unlimited

    Risk analysis beyond vulnerability and resilience - characterizing the defensibility of critical systems

    Full text link
    A common problem in risk analysis is to characterize the overall security of a system of valuable assets (e.g., government buildings or communication hubs), and to suggest measures to mitigate any hazards or security threats. Currently, analysts typically rely on a combination of indices, such as resilience, robustness, redundancy, security, and vulnerability. However, these indices are not by themselves sufficient as a guide to action; for example, while it is possible to develop policies to decrease vulnerability, such policies may not always be cost-effective. Motivated by this gap, we propose a new index, defensibility. A system is considered defensible to the extent that a modest investment can significantly reduce the damage from an attack or disruption. To compare systems whose performance is not readily commensurable (e.g., the electrical grid vs. the water-distribution network, both of which are critical, but which provide distinct types of services), we defined defensibility as a dimensionless index. After defining defensibility quantitatively, we illustrate how the defensibility of a system depends on factors such as the defender and attacker asset valuations, the nature of the threat (whether intelligent and adaptive, or random), and the levels of attack and defense strengths and provide analytical results that support the observations arising from the above illustrations. Overall, we argue that the defensibility of a system is an important dimension to consider when evaluating potential defensive investments, and that it can be applied in a variety of different contexts.Comment: 36 pages; Keywords: Risk Analysis, Defensibility, Vulnerability, Resilience, Counter-terroris

    Collusion-Proof Mechanism in Compensation for Failed Generic Technological Innovation Projects: Based on Information Topology

    Get PDF
    Against the backdrop of innovation fault-tolerance, government compensation for failed generic technological innovation projects is beneficial to stimulate re-innovation behaviour. However, considering the information asymmetry, a collusion tendency exists between the compensated party and the evaluator during the process of compensation. To prompt the government to build collusion-proof mechanisms to reduce collusion loss, the evolutionary game method was used to build replicated dynamic equations and a Jacobian matrix of both sides based on the information topology between the conspirators and regulator. Through the evolutionary equilibrium analysis and numerical simulation, evolutionary stability strategies (ESS) under different topological relationship information (non-intersect, partial intersect, and inclusive type) were found. Results show that the collusion behaviour can be effectively restrained when the government is unaware of collusion information, the net defense income is positive, and the penalty threshold is the product of the net collusive income and the ratio of the collusive and regulatory information. With the increasing amount of collusive information available to the government, the conspirators tend to adhere to moral principles subject to strict regulation. In addition, the moderating effect of penalty factor is positively correlated with the private information possessed by both sides. The conclusion is beneficial to provide theoretical support for optimizing the government-led compensation mechanism for failed generic technological innovation projects

    Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors

    Get PDF
    Abstract In a security screening system, a tighter screening policy not only increases the security level, but also causes congestion for normal people, which may deter their use and decrease the approver's payoff. Adapting to the screening policies, adversary and normal applicants choose whether to enter the screening system. Security managers could use screening policies to deter adversary applicants, but could also lose the benefits of admitting normal applicants when they are deterred, which generates a tradeoff. This paper analyzes the optimal screening policies in an imperfect two-stage screening system with potential screening errors at each stage, balancing security and congestion in the face of strategic normal and adversary applicants. We provide the optimal levels of screening strategies for the approver and the best-response application strategies for each type of applicant. This paper integrates game theory and queueing theory to study the optimal two-stage policies under discriminatory and non-discriminatory screening policies. We extend the basic model to the optimal allocation of total service rate to the assumed two types of applicants at the second stage and find that most of the total service rate are assigned to the service rate for the assumed "Bad" applicants. This paper provides some novel policy insights which may be useful for security screening practices

    Holistic Resilience Quantification Framework of Rural Communities

    Get PDF
    Communities need to prepare for anticipated hazards, adapt to varying conditions, and resist and recover rapidly from disturbances. Protecting the built environment from natural and man-made hazards and understanding the impact of these hazards helps allocate resources efficiently. Recently, an indicator-based and time-dependent approach was developed for defining and measuring the functionality and disaster resilience continuously at the community level. This computational method uses seven dimensions that find qualitative characteristics and transforms them into quantitative measures. The proposed framework is used to study the resilience of rural communities’ subject to severe flooding events. Harlan County in the Appalachian region is chosen as a case study to evaluate the proposed resilience quantification framework subject to severe flooding. The results show the validity of the proposed approach as a decision-support mechanism to assess and enhance the resilience of rural communities

    Prevention of terrorism : an assessment of prior POM work and future potentials

    Get PDF
    © 2020 Production and Operations Management Society In this study, we review POM-based research related to prevention of terrorism. According to the Federal Emergency Management Agency (FEMA) terrorist attacks have the potential to be prevented. Consequently, the focus of this study is on security enhancement and improving the resiliency of a nation to prevent terrorist attacks. Accordingly, we review articles from the 25 top journals, [following procedures developed by Gupta et al. (2016)], in the fields of Production and Operations Management, Operations Research, Management Science, and Supply Chain Management. In addition, we searched some selected journals in the fields of Information Sciences, Political Science, and Economics. This literature is organized and reviewed under the following seven core capabilities defined by the Department of Homeland Security (DHS): (1) Intelligence and Information Sharing, (2) Planning, (3) Interdiction and Disruption, (4) Screening, Search, and Detection, (5) Forensics and Attribution, (6) Public Information and Warning, and (7) Operational Coordination. We found that POM research on terrorism is primarily driven by the type of information that a defending country and a terrorist have about each other. Game theory is the main technique that is used in most research papers. Possible directions for future research are discussed

    Trade-offs between target hardening and overarching protection

    No full text
    Defenders concerned about protecting multiple targets can either protect them individually (through target hardening), or collectively (through overarching protections such as border security, public health, emergency response, or intelligence). Decision makers may find it relatively straightforward to choose which targets to harden, but are likely to find it more difficult to compare seemingly incommensurate forms of protection - e.g., target hardening, versus a reduction in the likelihood of weapons being smuggled across the border. Unfortunately, little previous research has addressed this question, and fundamental research is needed to provide guidance and practical solution approaches. In this paper, we first develop a model to optimally allocate resources between target hardening and overarching protection, then investigate the factors affecting the relative desirability of target hardening versus overarching protection, and finally apply our model to a case study involving critical assets in Wisconsin. The case study demonstrates the value of our method by showing that the optimal solution obtained using our model is in some cases substantially better than the historical budget allocation.Decision analysis Game theory Resource allocation Terrorism Natural disaster

    The contribution of shopping center development to happy cities

    Get PDF
    No abstractDissertation (MSc)--University of Pretoria, 2018.Town and Regional PlanningMScUnrestricte
    corecore