Risk assessment for water infrastructure safety and security
[Book]
Anna Doro-on.
Boca Raton, FL
CRC Press
2012
xxxiii, 397 Seiten : Illustrationen
IntroductionObjectiveScopePurposeActs of Terrorism and the Biological, Chemical, and Radiological Weapons Used against Water InfrastructureIntroductionCharacterization of TerrorismChemical Terrorism ActsPotential Hazards of the Chemical ThreatsPotential Reduction Approach for Chemical ThreatsBiological ThreatsRadiological ThreatsPrescription Drugs (Pharmaceuticals), Personal Care Products, andEndocrine Disrupting Compounds in the Water SystemIllustrative Example for Quantifying the Chemical Threats toYield Mass Casualties and Acute Injuries Explosives Used Against Water InfrastructureIntroductionCharacterization of Explosive MaterialsComponents and Applications of Explosive MaterialsHazards of ExplosivesThe Challenge of Improvised Explosive Device in the United StatesWater InfrastructureIntroductionActs of Terrorism against Water Infrastructure Groundwater ResourcesSurface WaterDesalination Treatment FacilitiesWater Tanks Reservoirs DamsAqueductsMunicipal Water Treatment PlantsMunicipal Wastewater Treatment PlantsImpactsRegulatory Policies for the Protection of Water InfrastructureUS Regulatory Policies for Groundwater and Water SupplySystem ProtectionFunding for Protection ResearchEnforcement of RegulationsAgencies Involved in Protection PoliciesCode of Federal Regulations Dams, Reservoirs, and AqueductsFunding for Protection Research Related to Dams,Reservoirs, and AqueductsAgencies and Programs Involved in the Protection Policies forDams, Reservoirs, and AqueductsIntroduction to Risk and Vulnerability AssessmentIntroduction Standard Risk and Vulnerability Strategies and Models Historical Perspective of Prospect TheoryThe Cumulative Prospect TheoryAdvances in Prospect TheoryA Need of Risk-Acceptability AnalysisStandard Risk and Vulnerability AssessmentIntroductionStandard Homeland Security Risk Assessment and RAMCAP Plus ProcessesCARVER MatrixCARVER + ShockModel-Based Vulnerability AnalysisVulnerability Self-Assessment ToolSecurity Vulnerability Self-Assessment Guide for SmallDrinking Water SystemAutomated Security Survey and Evaluation Tool (ASSET)Security Vulnerability AssessmentRequirement of Incremental Risk Acceptability AnalysisQuantitative Risk Estimation ModelElements of Risk AssessmentRisk Estimated by Event Tree AnalysisEstimation of Risk and Risk FactorsFault Tree Analysis Cumulative Prospect Theory and Risk AcceptabilityIntroductionPublic Perception of RiskStrategic Determination of Risk AcceptabilityQuantitative Revealed Societal Preference MethodEstablishing the Risk ReferentImplicationEmergency Preparedness, Response, and Preventive MeasuresIntroductionNational Response FrameworkEmergency PreparednessResponseBaseline PrioritiesActivate and Deploy ResourcesProactive Response to Catastrophic IncidentsRecoveryPreventive MeasuresStrategic Intelligence Analysis for Water Infrastructure Terrorism PreventionIntroductionIntelligence Analysis Traditional Intelligence Cycle Quantitative Risk Estimation Model to Aid Intelligence Analysis Event Tree Analysis Model Perspectives of Risk Acceptability in Strategic Intelligence Analysis ImplicationIndex