Preface | iii | ||
|
|||
Risk Analysis in Disaster Planning by Superposition of Infrastructure and Societal Networks | 1 | (11) | |
|
|||
The Fuzzy Logic Paradigm of Risk Analysis | 12 | (11) | |
|
|||
A Dynamic Risk Model for Information Technology Security in a Critical Infrastructure Environment | 23 | (17) | |
|
|||
Quantifying and Communicating Model Uncertainty for Decisionmaking in the Everglades | 40 | (19) | |
|
|||
Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries | 59 | (18) | |
|
|||
Applying the General Theory of Quantitative Risk Assessment (QRA) to Terrorism Risk | 77 | (5) | |
|
|||
Vulnerability of Water Systems to Acts of Terrorism and Acts of Nature | 82 | (9) | |
|
|||
Toward a Systems-Based Vulnerability Assessment Methodology for Water Supply Systems | 91 | (13) | |
|
|||
Demand-Reduction Input-Output (I-O) Analysis for Modeling Interconnectedness | 104 | (15) | |
|
|||
Belief Systems and Reducing Risks from Terrorism | 119 | (7) | |
|
|||
GIS Model for Estimating Dam Failure Life Loss | 126 | (20) | |
|
|||
Disintegrated Water Resources Management in the US: The Union of Sisyphus and Pandora | 146 | (9) | |
|
|||
Vulnerability to Terrorism: Addressing the Human Variables | 155 | (5) | |
|
|||
Session 3 Summary-Lessons Learned from Experience Dealing with Risks of Extreme Events: Part I | 160 | (3) | |
|
|||
Session 4 Summary-Lessons Learned from Experience Dealing with Risks of Extreme Events: Part II | 163 | (5) | |
|
|||
Session 8 Summary-Panel Discussion: Synthesis-What Does It All Mean? | 168 | (3) | |
|
|||
Summary of Responses to Participant Questionnaires | 171 | (46) | |
List of Participants | 217 | (2) | |
Program | 219 | (8) | |
Subject Index | 227 | (2) | |
Author Index | 229 |