EconPapers    
Economics at your fingertips  
 

A user-layered approach for modelling and simulating terrorist attacks

Tanya Le Sage, Hervé Borrion and Sonia Toubaline

International Journal of Critical Infrastructures, 2014, vol. 10, issue 3/4, 398-412

Abstract: Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terrorist attack, allowing multiple scenarios to be simulated with ease without imposing extensive time or cost constraints. The aim of this paper is to provide a comprehensive model for the different categories of users who are likely to be involved in the modelling and simulation of a terrorist attack. The model focuses on assessing protection measures for implementation within a single building. It takes into account the different types of threat (biological, chemical and explosive) that may occur within or around such a target infrastructure. Finally it considers that a specific company may be required to invest in one or more protection technologies to reduce the risk of an attack occurring, be it a single threat or a combination of threats.

Keywords: client-servers; critical infrastructures; modelling; scenario analysis; security systems; terrorist attacks; terrorism; simulation; user categories; protection technologies; biological threat; chemical threat; explosive threat. (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=66342 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijcist:v:10:y:2014:i:3/4:p:398-412

Access Statistics for this article

More articles in International Journal of Critical Infrastructures from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijcist:v:10:y:2014:i:3/4:p:398-412