Likelihood Estimation of Intentional Events in Risk Management: Evidence Based Intelligent Morphological Analysis Approach

Risk management as a special Engineering Management field involves understanding the risks called risk assessment. Risk assessment is a highly complex strategic activity and requires a structured quantified methodology for identifying undesired events and estimating their likelihoods . However, undesired events like human caused intentional events are deliberate, innovative, and unpredictable acts unlike accidental failures and different from random events. Although there is a significant increase in the number of intentional events such as homeland and cyber security events in recent years, current risk assessment methods are not suitable for risk assessment of intentional events. In this study, a novel intelligent technique called evidence based Morphological Analysis (EMA) model based on Dempster-Shafer theory of evidence (DST) and Morphological Analysis (MA) methodology is proposed to quantify the likelihood of intentional events as threats by identifying them. It is based on the appropriate uncertainty model and supplementary methods for a risk management of a critical facility protection considering both information at hand and information requirements of decision makers. The proposed approach is presented step by step and applied to a simple case study on an airport. The two common DST combination rules are also analysed by considering decision maker’s attitude either risk averse or risk seeking. The results show that EMA analyses a wide range of plausible threat scenarios more easily than hierarchical techniques as tree structures with modest computational effort. Therefore, EMA can be used to reason about risk assessment by providing required output data precision for comparing and ranking of scenarios systematically.

[1]  J. Kohlas,et al.  A Mathematical Theory of Hints: An Approach to the Dempster-Shafer Theory of Evidence , 1995 .

[2]  Tom Ritchey,et al.  Wicked Problems – Social Messes , 2011 .

[3]  Shun-Peng Zhu,et al.  Risk evaluation in failure mode and effects analysis of aircraft turbine rotor blades using Dempster–Shafer evidence theory under uncertainty , 2011 .

[4]  Ortwin Renn,et al.  Concepts of risk : a classification , 1992 .

[5]  Philippe Smets,et al.  Analyzing the combination of conflicting belief functions , 2007, Inf. Fusion.

[6]  Anjali Awasthi,et al.  Using AHP and Dempster-Shafer theory for evaluating sustainable transport solutions , 2011, Environ. Model. Softw..

[7]  Christian Kirchsteiger On the use of probabilistic and deterministic methods in risk analysis , 1999 .

[8]  Hans-Jürgen Zimmermann,et al.  An application-oriented view of modeling uncertainty , 2000, Eur. J. Oper. Res..

[9]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[11]  F. Zwicky Discovery, Invention, Research through the morphological approach , 1969 .

[12]  R. Yager Quasi-associative operations in the combination of evidence , 1987 .

[13]  James H. Lambert,et al.  Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .

[14]  D. Dubois,et al.  On the Combination of Evidence in Various Mathematical Frameworks , 1992 .

[15]  R. Yager On the dempster-shafer framework and new combination rules , 1987, Inf. Sci..

[16]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[17]  Bernard Harris Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[18]  Éloi Bossé,et al.  Reducing Algorithm Complexity for Computing an Aggregate Uncertainty Measure , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[19]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[20]  M. Singh,et al.  An Evidential Reasoning Approach for Multiple-Attribute Decision Making with Uncertainty , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[21]  Thierry Denoeux,et al.  Risk assessment based on weak information using belief functions: a case study in water treatment , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[22]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[23]  Sarah J. Dunnett,et al.  Event-tree analysis using binary decision diagrams , 2000, IEEE Trans. Reliab..

[24]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[25]  Ilker Akgun,et al.  Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism , 2010, Expert Syst. Appl..

[26]  Donald E. Knuth,et al.  The Art of Computer Programming: Volume 3: Sorting and Searching , 1998 .

[27]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[28]  J. C. Helton,et al.  Uncertainty and sensitivity analysis in the presence of stochastic and subjective uncertainty , 1997 .

[29]  S. Krimsky,et al.  Social Theories of Risk , 1992 .

[30]  A. N. Kolmogorov,et al.  Foundations of the theory of probability , 1960 .

[31]  Zahir Irani,et al.  Applying a fuzzy‐morphological approach to complexity within management decision making , 2006 .

[32]  T. Latourrette,et al.  Reducing Terrorism Risk at Shopping Centers: An analysis of Potential Security Options , 2007 .

[33]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[34]  Jon C. Helton,et al.  Challenge Problems : Uncertainty in System Response Given Uncertain Parameters ( DRAFT : November 29 , 2001 ) , 2001 .

[35]  Ronald R. Yager,et al.  Classic Works of the Dempster-Shafer Theory of Belief Functions: An Introduction , 2008, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[36]  Christer Carlsson,et al.  Past, present, and future of decision support technology , 2002, Decis. Support Syst..

[37]  L. Zadeh Fuzzy sets as a basis for a theory of possibility , 1999 .

[38]  Mohammad Abdullah-Al-Wadud,et al.  A skin detection approach based on the Dempster-Shafer theory of evidence , 2012, Int. J. Approx. Reason..

[39]  Jian-Bo Yang,et al.  A preference aggregation method through the estimation of utility intervals , 2005, Comput. Oper. Res..