Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-5g6vh Total loading time: 0 Render date: 2024-04-27T19:59:01.194Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  30 July 2009

Philip E. Auerswald
Affiliation:
George Mason University, Virginia
Lewis M. Branscomb
Affiliation:
Harvard University, Massachusetts
Todd M. La Porte
Affiliation:
George Mason University, Virginia
Erwann O. Michel-Kerjan
Affiliation:
University of Pennsylvania
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Seeds of Disaster, Roots of Response
How Private Action Can Reduce Public Vulnerability
, pp. 507 - 530
Publisher: Cambridge University Press
Print publication year: 2006

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adamic, L. A. undated. Zipf, Power-laws, and Pareto – A Ranking Tutorial. http://www.hpl.hp.com/research/idl/papers/ranking/ranking.html (accessed June 27, 2006).
Adams, J. 2001. Virtual Defense. Foreign Affairs 80: 98–112.CrossRefGoogle Scholar
Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction. 2000. Second Annual Report to the President and Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, edited by James S. Gilmore et al. Washington, DC.
Albert, R., Jeong,, H. and Barabasi, A.. 2000. Attack and Error Tolerance of Complex Networks. Nature 406: 6794.CrossRefGoogle ScholarPubMed
Aljazeera. 2004. Full transcript of bin Ladin's speech. November 1. http://english.aljazeera.net/NR/exeres/79C6AF22-98FB-4A1C-B21F-2BC36E87F61F.htm (accessed January 12, 2006).
American Academy of Actuaries. 2005. Statement by American Academy of Actuaries' TRIA Subgroup on Extending or Replacing the Terrorism Risk Insurance Act of 2002 (TRIA) December 1. http://www.actuary.org/pdf/casualty/tria_dec05.pdf (accessed February 25, 2006).
American Enterprise Institute (AEI). 2005. Should the Terrorism Risk Insurance Act of 2002 Be Extended? July 8. http://www.aei.org/events/eventID.1099,filter.all/event_detail.asp (accessed February 25, 2006).
Anonymous. 2003. Communication between a security executive who requested anonymity and the author, April 5.
AON. 2005. Property Terrorism Update: TRIA In The Balance. AON Risk Services October. http://www.aon.com/about/publications/pdf/issues/AonPropertyUpdate-TRIA,Oct2005.pdf (accessed February 25, 2006).
Apt, J.,Lave, L. B., Talukdar, S., Morgan, M. G., and Ilic, M.. 2004. Electrical Blackouts: A Systemic Problem. Issues in Science and Technology 20(4): 55–61.Google Scholar
Apt, Jay, Daniel Hoffman, , Howard Kunreuther, , and Michel-Kerjan, Erwann. 2006. Insurance Industry and Global Warming. Philadelphia, PA: Wharton School, Center for Risk Management.Google Scholar
Associated Press. 2005a. Bush and Clinton, in Thailand, Start Tour of Tsunami Region. New York Times. February 20.
Associated Press. 2005b. London Bombings Trigger Surge in Inquiries. AP Online. August 16.
Associated Press. 2006. Report: Telecoms Helped NSA Wiretapping. February 6. http://www.msnbc.msn.com/id/11202938/ (accessed February 28, 2006).
Bak, Per. 1996. How Nature Works: The Science of Self-Organized Criticality. New York: Springer-Verlag Telos.CrossRefGoogle Scholar
Barabasi, A-L., Buldyrev, S. V., Stanley, H. E., and Suki, B.. 1996. Avalanches in the Lung: A Statistical Mechanical Model. Physical Review Letters 76(12): 2192–2195.CrossRefGoogle ScholarPubMed
Barabasi, A-L. 2003. Linked. New York: Penguin Books.Google Scholar
Bell, Coral M. 1978. Decision-making by governments in crisis situations. In International Crises and Crisis Management. An East-West Symposium, edited by Frei, D.. New York: Praeger Publishers, 50–58.Google Scholar
Benfield Group Limited. 2005. Outrageous Fortune: Reinsurance Market and Renewals Review. January, 13–15.
Benjamin, Daniel, and Steven Simon. 2005. The Next Attack: The Failure of the War on Terror and a Strategy for Getting it Right. New York: NYTimes Books.
Bennis, W., and Nanus, B.. 1997. Leaders: Strategies for Taking Charge. New York: Harper & Row.Google Scholar
Bequai, A. 2002. White Collar Crime: A Handmaiden of International Tech Terrorism. Computers & Security 21(6): 514–519.CrossRefGoogle Scholar
Bergen, Peter. 2002. Al Qaeda's New Tactics. New York Times, November 15, A31.Google Scholar
Berinato, S. 2002. The Truth about Cyberterrorism. CIO Magazine, March 15. http://www.cio.com/archive/031502/truth.html (accessed May 2, 2003).Google Scholar
Bernstein, Peter L. 1996. Against the Gods. The Remarkable Story of Risk. New York: John Wiley & Sons.Google Scholar
Berrick, Cathleen A., Director, Homeland Security and Justice Issues. 2006. Aviation Security: Significant Management Challenges May Adversely Affect Implementation of the Transportation Security Administration's Secure Flight Program. Testimony before the Senate Committee on Commerce, Science, and Transportation. February 9. Government Accountability Office, GAO-06-374T, Washington, DC.
Best's Aggregates & Averages. 2005. AM Best, Olde Wyke, N.J. p. 98.
Biographies in Naval History. 2001. Admiral Hyman G. Rickover. http://www.history.navy.mil/bios/rickover.htm (accessed June 27, 2006).
Block, Robert. 2005. U.S. Finds Ally in Terrorism Fight in FedEx: Since September 11, Firms Cooperate More Often with Officials, Raising Privacy Concerns. Wall Street Journal Europe. May 30, A6.
Boardman, Michelle. 2004. Known Unknowns: The Delusion of Terrorism Insurance. George Mason University School of Law, Paper 244. http://law.bepress.com/cgi/viewcontent.cgi?article=1593&context=expresso (accessed February 25, 2006).
Bosk, C. L. 2003. Forgive and Remember: Managing Medical Failure. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Boulter, J. 1995. Tic-Tac-Toe. http://boulter.com/ttt/ (accessed June 27, 2006).
Bourrier, M. 1996. Organizing Maintenance Work at Two American Nuclear Power Plants. Journal of Crisis and Contingency Management 4(2): 104–112.CrossRefGoogle Scholar
Brady, Matt. 2006. TRIA Coverage Light, Says Moody's, January 19. National Underwriter Inc.
Braga, G. A., Sanchis, R., Schieber, T. A.. 2005. Critical Percolation on a Bethe Lattice Revisited. SIAM Review (47)2: 349–365.CrossRefGoogle Scholar
Branscomb, Lewis M. 2004. Japanese–American Collaborative Efforts to Counter Terrorism. In The Bridge: Linking Engineering and Society: National Academy of Engineering 34(2): 11–16.Google Scholar
Branscomb, Lewis M. 2006. Sustainable Cities: Safety and Security. Technology in Society 20(1–2): 225–234.CrossRefGoogle Scholar
Brown, J.. Cummins, C. Lewis, and Wei, R.. 2004. An Empirical Analysis of the Economic Impact of Federal Terrorism Reinsurance. Journal of Monetary Economics51: 861–898.CrossRefGoogle Scholar
Buchanan, M. 2001. Ubiquity. New York: Three Rivers Press.Google Scholar
Bureau of Labor Statistics. 2003. Occupational Employment and Wage Estimates, National NAICS 3-digit Industry Specific Estimates spreadsheet. Occupational Employment Statistics Program. http://www.bls.gov/oes/oes_dl.htm#2003_m (accessed July 2004).
Burns, R. E., J. Wilhelm, J. McGarvey, and T. Lehmann. 2003. Security-Related Cost Recovery in Utility Network Industries. White paper National Regulatory Research Institute, Columbus, OH. http://www.nrri.ohio-state.edu/dspace/bitstream/2068/366/1/05-03.pdf (accessed February 2, 2006).
Bush, George W. 2001. Executive Order 13231. Critical Infrastructure Protection in the Information Age. White House, Washington, DC.Google Scholar
Bush, George W. 2002. Protecting Critical Infrastructure and Key Assets. National Strategy for Homeland Security. White House, Washington, DC. July 16.Google Scholar
Bush, George W. 2003a. Critical Infrastructure Identification, Prioritization, and Protection. Homeland Security Presidential Directive 7. White House, Washington, DC. December 17.Google Scholar
Bush, George W. 2003b. Homeland Security Presidential Directive 8. White House, Washington, DC. December 17.Google Scholar
Bush, George W. 2003c. Protecting Key Assets. National Strategy for the Physical Protection of Critical Infrastructure and Key Assets. White House, Washington, DC. February 2003, p. 2.Google Scholar
Bush, George W. 2004. Press Conference of the President, April 13. http://www.whitehouse.gov/news/releases/2004/04/print/20040413-20.html (accessed February 25, 2006).
Carney, Bill. 2005. TRIA Sunset and it's Impact on Workers' Compensation. IAIABC Journal. Fall. 42(2): 167. http://www.iaiabc.org/publications/journal/2005/IAIABC%20Journal%20Fall%202005%20Vol%2042(2)%20cover.pdf (accessed March 4 2006).Google Scholar
Cauley, Leslie, and John Diamond, . 2006. Telecoms Let NSA Spy on Calls. USA Today, February 5. http://www.usatoday.com/news/washington/2006-02-05-nsa-telecoms_x.htmm (accessed February 28, 2006).Google Scholar
CBS News. 2005. Airline Passenger Privacy Betrayed, CBS News. March 26. http://www.cbsnews.com/stories/2005/03/26/politics/main683296.shtml (accessed November 2005).
Chalk, Peter, Hoffman, Bruce, Kasupski, Anna-Britt, Reville, Robert T.. 2005. Trends in Terrorism. June. RAND Corporation, Santa Monica, CA.Google Scholar
Chandler, Alfred. 1977. The Visible Hand: The Managerial Revolution in American Business. Cambridge, MA: Belknap Press.Google Scholar
Chertoff, Michael. 2005. Second Stage Review Remarks. Speech at the Ronald Reagan Building, U.S. Department of Homeland Security. July 13. Washington, D. C. http://www.dhs.gov/dhspublic/display?content=4597 (accessed February 28, 2006).
Chisholm, D. 1989. Coordination without Hierarchy: Informal Structures in Multi-Organizational Systems. Berkeley, CA: University of California Press.Google Scholar
Clarke, L. 1993. The Disqualification Heuristic: When Do Organizations Misperceive Risk?Research in Social Problems and Public Policy 5: 289–312.Google Scholar
Clarke, Richard (ed.). 2004. Defeating the Jihadists: A Blueprint for Action. New York: Century Foundation Task Force Report.Google Scholar
Clinton, William J. 1995. U.S. Policy on Counter Terrorism. Washington, DC: White House.Google Scholar
Clinton, William. 1996. Critical Infrastructure Protection. Washington, DC: White House.Google Scholar
Clinton, William. 1998. U.S. Policy on Counter Terrorism. Washington, DC: White House.Google Scholar
Clinton, William. 1999. National Infrastructure Assurance Council. Washington, DC.Google Scholar
CNN. 2002. Official: Voice on Tape is bin Laden's, November 13. http://archives.cnn.com/2002/WORLD/meast/11/12/binladen/statement/ (accessed January 12, 2006).
Coalition for Secure Ports. 2005. Fact sheet. http://www.secureports.org/improving_security/factsheet_screening.html (accessed November 2005).
Coalition to Insure Against Terrorism (CIAT). 2005. Fed Chairman Questions Ability of Private Market Alone To Insure against Terrorism. Press release, February 17. http://www.cmbs.org/Terrorism_Insurance_Files/2_17_05_CIAT_Press_Release.pdf (accessed February 25, 2006).
Coglianese, C., and Lazer, D.. 2003. Management-Based Regulation: Prescribing Private Management to Achieve Public Goals. Law & Society Review 37: 691–730.CrossRefGoogle Scholar
Coglianese, Cary, Zeckhauser, Richard J., and Parson, Edward. 2004. Seeking Truth for Power: Informational Strategy and Regulatory Policymaking. Minnesota Law Review 89(2): 277–341.Google Scholar
Collins, Susan. 2006. Luncheon speech, conference on Protecting Our Future, National Press Club, Washington DC, March 15.Google Scholar
Coluccio, F. 2005. Of Fiber Cuts and Mega RBOC Mergers. http://www.merit.edu/mail.archives/nanog/2005-08/msg00332.html (accessed March 14, 2006).
Columbia Encyclopedia. 2004. Rickover, Hyman George. http://www.bartleby.com/65/ri/Rickover.html.
Comfort, Louise. 2002a. Governance Under Fire: Organizational Fragility in Complex Systems. Paper presented at Symposium on Governance and Public Security, Syracuse, NY, January 18.Google Scholar
Comfort, Louise. 2002b. Institutional Re-orientation and Change: Security as a Learning Strategy. The Forum 1(2).CrossRefGoogle Scholar
Commission of European Communities. 2005. Green Paper on a European Programme for Critical Infrastructure Protection. Brussels. November 17.
Commission on National Security. 2001. New World Coming: American Security in the 21st Century. Washington, DC.
Commission on the Intelligence Capabilities of the United States. 2005. Report Regarding Weapons of Mass Destruction. March 3. http://www.wmd.gov/report/report.html#chapter9 (accessed November 2005).
Commission on the Roles and Capabilities of the U.S. Intelligence Community. 1996. Preparing for the 21st Century: An Appraisal of U.S. Intelligence. http://www.gpoaccess.gov/int/report.html (accessed November 2005).
Con Edison. 2005. Con Edison Reports, earnings news release, http://www.coned.com/newsroom/news/pr20060126.asp?from=hc (accessed February 8, 2006).
Congressional Budget Office. 1983. Public Works Infrastructures: Policy Considerations of the 1980s. Washington, DC: U.S. Congress.
Congressional Budget Office. 2004. Homeland Security and the Private Sector. December. Washington, DC.
Congressional Budget Office. 2005. Federal Terrorism Reinsurance: An Update. January. Washington, DC.
Council on Competitiveness. 2002. Creating Opportunity Out of Adversity. Paper presented at National Symposium on Competitiveness and Security, December.
C-SPAN. 2005. Extending the Terrorism Risk Insurance Act of 2002. July 8.
Cukier, Kenneth Neil, Viktor Mayer-Schoenberger, , and Lewis Branscomb, . 2005. Ensuring (and Insuring?) Critical Information Infrastructure Protection. Working paper number RWP05-055. Cambridge, MA: Kennedy School of Government, Harvard University.Google Scholar
Cummins, D. 2005. Should the Government Provide Insurance for Catastrophes. Paper presented at the 30th Annual Economic Policy Conference, Federal Credit and Insurance Programs, Federal Reserve Bank of St. Louis, October 20–21.
Customs and Border Protection. 2004. Securing the Global Supply Chain: C-TPAT Strategic Plan. Washington, DC: U.S. Government Printing Office, November.
Dacy, Douglas C., and Howard Kunreuther, . 1969. The Economics of Natural Disasters: Implications for Federal Policy. New York: The Free Press.Google Scholar
Daniels, R., Kellt, D., and Kunreuther, H. (eds.). 2006. On Risk and Disaster: Lessons from Hurricane Katrina. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Bruijne, M., Eeten, M., Roe, E., and Schulman, P.. In press. On Assuring High Reliability of Service Provision in Critical Infrastructures. International Journal of Critical Infrastructures.Google Scholar
Dean, J. 2002. Report Stresses Management's Role in Boosting Cybersecurity. http://www.govexec.com/dailyfed/0202/021402j1.htm (accessed May 2, 2003).
Defense Threat Reduction Agency. 2003. Program Review. March 3. Arlington, VA.
Degnan, John. 2003. Statement of John Degnan to the National Commission on Terrorist Attacks Upon The United States. November 19. National Commission on Terrorist Attacks upon the United States. http://www.globalsecurity.org/security/library/congress/9-11_commission/031119-degnan.htm (accessed March 3, 2006).
Dempsey, James. 2004. Moving from “Need to Know” to “Need to Share”: A Review of the 9/11 Commission's Recommendations. Testimony to the House Committee on Government Reform. http://www.markle.org/downloadable_assets/james_dempsey_testimony_080304.pdf (accessed November 2005).
Department of Energy. 1993. Earning Public Trust and Confidence: Requisite for Managing Radioactive Waste. Washington, DC: Task Force on Radioactive Waste Management, Secretary of Energy Advisory Board.
Department of Energy. 2003. Causes of the August 14 Blackout in the U.S. and Canada. Washington, D.C. U.S.–Canada Power System Outage Task Force.
Department of Homeland Security. 2004. Survey of the Information Analysis and Infrastructure Protection Directorate. February, OIG 04–13.
Department of Homeland Security. 2006. Personal communication by the NIPP office at DHS to the author, January 20.
Department of Justice. 2001. Press release. http://www.cybercrime.gov/ivanovIndict2.htm (accessed March 14, 2006).
Department of State. 2005. Country Reports on Terrorism. Office of the Coordinator on Counterterrorism. http://www.state.gov/s/ct/rls/45321.htm (accessed January 12, 2006).
Devol, R. C., A. Bedroussian, F. Fogelbach, N. H. Goetz, R. R. Gongalez, and P. Wong. 2002. The Impact of September 11 on U. S. Metropolitan Economies. Milken Institute, Santa Monica, CA. http://www.milkeninstitute.org/pdf/National_Metro_Impact_Report.pdf (accessed February 25, 2006).
DiMaggio, , Paul, J., and Walter, W. Powell. 1983. The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields. American Sociological Review 48(2): 147–160.CrossRefGoogle Scholar
Dixit, A. K. 2003. Clubs with Entrapment. American Economic Review 93( 5 ): 1824–1829.CrossRefGoogle Scholar
Dixon, Lloyd, and Rachel Kaganoff Stern, . 2004. Compensation for Losses from the 9/11 Attacks. MG-264-ICJ. Santa Monica, CA: Rand Corporation.Google Scholar
Dixon, Lloyd, and Robert Reville. 2005. National Security and Compensation for Terrorism Losses. Catastrophic Risks and Insurance, Policy Issues in Insurance No. 8, Organization for Economic Co-operation and Development, 59–71.
Dixon, Lloyd, John Arlington, , Stephen Carroll, , Darius Lakdawalla, , Robert Reville, , and David Adamson, . 2004. Issues and Options for Government Intervention in the Market for Terrorism Insurance. OP-135-ICJ. Santa Monica, CA: Rand Corporation.Google Scholar
Doherty, N. 2000. Integrated Risk Management. New York: McGraw-Hill.Google Scholar
Donahue, John D. 1989. The Privatization Decision: Public Ends, Private Means. New York: Basic Books.Google Scholar
Donahue, John D. 2003. Parks and Partnership in New York City A: Adrian Benepe's Challenge. Cambridge, MA: Kennedy School of Government Case Program.Google Scholar
Donahue, John D., and Susan Rosegrant, . 2004. Parks and Partnership in New York City B: The Spectrum of Engagement. Cambridge, MA: Kennedy School of Government Case Program.Google Scholar
Donahue, John D., and Richard J. Zeckhauser: 2006. Public–Private Collaboration. In The Oxford Handbook of Public Policy, edited by Michael Moran, , Martin Rein, , and Robert, E. Goodin. New York: Oxford University Press.Google Scholar
Economist. 2003. Fighting the worms of mass destruction. November 27. http://www.economist.co.uk/science/displayStory.cfm?story_id=2246018 (accessed May 2, 2003).
Economist. 2005a. Horrible Business: Terror Insurance. November 19.
Economist. 2005b. In Europe's Midst. July 16.
Electricity Consumers Resource Council (ELCON). 2004. The Economic Impacts of the August 2003 Blackout. Washington, DC: ELCON. http://www.elcon.org/Documents/EconomicImpactsOfAugust2003Blackout.pdf (accessed Feb 8, 2006).
Elias, Bart, Krouse, W., and Rappaprot, E.. 2005. Homeland Security: Air Passenger Prescreening and Counterterrorism. RL32802, March 4. Washington, DC: Congressional Research Service.Google Scholar
Ellis, J. IIIUndated. Terrorism in the Homeland: A Brief Historical Survey of Violent Extremism in the United States. Memorial Institute for the Prevention of Terrorism, Oklahoma City.
Enders,, W., and Sandler, T.. 2000. Is Transnational Terrorism Becoming More Threatening?Journal of Conflict Resolution 44(3): 307–332.CrossRefGoogle Scholar
Enders, W., and Sandler, T.. 2006. The Political Economy of Terrorism. New York: Cambridge University Press.Google Scholar
Energy Advisory Board Task Force on Electric System Reliability. 1998. Final Report of the Secretary of Energy Advisory Board Task Force on Electric System Reliability, September 29. http://www.seab.energy.gov/publications/esrfinal.pdf (accessed February 2, 2006).
Energy Information Agency. 2003. Electricity Transmission Fact Sheet. Department of Energy, August 19. http://www.eia.doe.gov/cneaf/electricity/page/fact_sheets/transmission.html (accessed February 8, 2006).
Energy Information Agency. 2004. Electric Power Annual with data 2004, Table 2.2 Existing Capacity by Energy Source, 2004 (Megawatts). Department of Energy. http://www.eia.doe.gov/cneaf/electricity/epa/epat2p2.html (accessed February 8, 2006).
Etzioni, A. 1965. Organizational Control Structure. In Handbook of Organizations, edited by March, J. G.. New York: Rand McNally.Google Scholar
Fairly, P. 2004. The Unruly Power Grid. IEEE Spectrum 41(8): 22–27.CrossRefGoogle Scholar
Farrell, A. E., and Zerriffi, H.. 2004. Electric Power: Critical Infrastructure Protection. In Encyclopedia of Energy. Amsterdam, Netherlands, Boston: Elsevier.Google Scholar
Farrell, A. E., Zerriffi, H., and Dowlatabadi, H.. 2005. Energy Infrastructure and Security. In Annual Review of Environment and Resources 29: 421–469.CrossRefGoogle Scholar
Farrell, A. E., Lave, L. B., and Morgan, G.. 2002. Bolstering the Security of the Electric Power System. Issues in Science and Technology 18(3): 49–56.Google Scholar
Farrell, J., and Saloner, G.. 1985. Standardization, Compatibility, and Innovation. The Rand Journal of Economics. Spring, 16(1): 70–83.CrossRefGoogle Scholar
Farson, R., and Keyes, R.. 2002. The Failure-Tolerant Leader. Harvard Business Review64–71.Google ScholarPubMed
Federal Bureau of Investigation. 2001. E-commerce Vulnerabilities. NIPC Advisory 01-003, March 8. http://www.fbi.gov/pressrel/pressrel01/nipc030801.htm (accessed May 2, 2003).
Federal Bureau of Investigation. 2002. Terrorism 2000/2001. Publication 0328. Washington, DC: Department of Justice, Counterterrorism Division.
Federal Communications Commission. 2001. Network Outage Reporting System. http://ftp.fcc.gov/oet/outage (accessed May 7, 2003).
Federation of American Scientists. 2004. Tracing the Rise and Fall of Intelligence Spending: As Portrayed in Official Government Publications. June 7. http://www.fas.org/irp/budget/ (accessed November 2005).
Feinberg, Kenneth R. 2005. 9/11 Victim Compensation Fund: Successes, Failures, and Lessons for Tort Reform. January 13. Washington, DC: Comments at Manhattan Institute Center for Legal Policy Conference.Google Scholar
Feinberg, Kenneth R., Camille, S. Biros, Jordana Harris Feldman, , Deborah, E. Greenspan, and Jacqueline, E. Zins. 2004. Final Report of the Special Master for the September 11th Victim Compensation Fund of 2001. Washington, DC: U.S. Department of Justice. http://www.usdoj.gov/final_report.pdf (accessed January 9, 2006).Google Scholar
Fellman, P. V., and Wright, R.. 2003. Modeling Terrorist Networks – Complex Systems at the Mid-Range. Conference on Complexity and Creativity, London School of Economics, UK, September. http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf (accessed June 27, 2006).
Fellman, P. V., and R. Wright. Undated. Modeling Terrorist Networks – Complex Systems at the Mid-Range. http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf (accessed March 22, 2006).
FERC. 2001. Statement of Policy on Extraordinary Expenditures Necessary to Safeguard National Energy Supplies. 96 FERC ¶61,299, Docket PL01-6-000. September 14.
Financial Services Sector Coordinating Council. 2005. Protecting the U.S. Critical Financial Infrastructure: An Agenda for 2005. http://www.fsscc.org/reports/FSSCC_2005_Agenda.pdf (accessed March 22, 2006).
Financial Times. 2005. Special Report on Business Continuity. June 27.
Finnegan, W. 2005. The New Yorker, July 25.
Finnegan, William. 2005. A Reporter at Large: The Terrorism Beat, New Yorker. July 25.Google Scholar
Fisher, David Hackett. 2004. Washington's Crossing. New York: Oxford University Press.Google Scholar
Florig, H. Keith. 2002. Is Safe Mail Worth the Price?Science 295: 1467–1468.CrossRefGoogle ScholarPubMed
Flynn, M. F. 2005. Protective Security Division (PSD) Programs and Operations. Department of Homeland Security, March 8. http://www.nrc.gov/public-involve/conference-symposia/ric/past/2005/slides/03-b2-flynn.pdf (accessed March 7, 2006).
Flynn, Stephen E. 2004. The Neglected Home Front. Foreign Affairs 83(1): 20–33.CrossRefGoogle Scholar
Flynn, Stephen. 2005a. Color Me Scared. New York Times. May 25.Google Scholar
Flynn, Stephen. 2005b. U.S. Senate Committee on Homeland Security and Government Affairs. The Security of America's Chemical Facilities: Testimony. 109: 1. April 27.
Fonow, R. C. 2003. Beyond the Mainland: Chinese Telecommunications Expansion. Defense Horizons 29: 1–8.Google Scholar
Frank, Thomas. 2004. Terror Warning Surprises Homeland Security Department. Newsday. May 28.Google Scholar
Frey, B. S. 2004. Dealing with Terrorism: Stick or Carrot. Cheltenham, UK: Edward Elgar Publishing.CrossRefGoogle Scholar
Frey, Darcy. 1996. Something's Got to Give. New York Times Magazine. March 24, 42-ff.Google Scholar
Furnell, S. M., and Warren, M. J.. 1999. Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium. Computers & Security 18(1): 28–34.CrossRefGoogle Scholar
Gabrielov, A., Keilis-Borok, V., Zaliapin, I., and Newman, W. I.. 2000. Critical Transitions in Colliding Cascades. Physical Review E (62) 1, 237–249.CrossRefGoogle ScholarPubMed
Gerth, H. H., and Mills, C. Wright (eds.). 1946. From Max Weber. Oxford, UK: Oxford University Press, 78.
Gertz, B. 2001. Al Qaeda Appears To Have Links with Russian Mafia. Washington Times. September 27.Google Scholar
Glasser, Susan B. 2005. U.S. Figures Show Sharp Global Rise in Terrorism State Department Will Not put Data in Report. Washington Post. April 27, A01.Google Scholar
Glassner, B. 1999. The Culture of Fear: Why Americans Are Afraid of the Wrong Things. New York: Basic Books.Google Scholar
Global Intelligence Challenges. 2005. Meeting Long-Term Challenges with a Long-Term Strategy, Testimony of Director of Central Intelligence Porter J. Goss Before the Senate Select Committee on Intelligence. http://www.cia.gov/cia/public_affairs/speeches/2004/Goss_testimony_02162005.html (accessed February 25, 2006).
Godard, Olivier, Claude Henry, , Patrick Lagadec, , and Erwann Michel-Kerjan, . 2002. Treatise on New Risks. Precaution, Crisis, and Insurance. Paris: Gallimard, Folio-Actuel.Google Scholar
Goo, Sara Kehaulani. 2004. Confidential Passenger Data Used for Air Security Project. Washington Post January 17.Google Scholar
Gorman, Sean P. 2004. Networks, Complexity, and Security: The Role of Public Policy in Critical Infrastructure Protection. Ph.D. dissertation. School of Public Policy, George Mason University, Fairfax, VA.
Government Accountability Office (GAO; formerly General Accounting Office). 2002. Terrorism Insurance: Rising Uninsured Exposure to Attacks Heightens Potential Economic Vulnerabilities. Testimony of Richard J. Hillman before the Subcommittee on Oversight and Investigations, Committee on Financial Services, House of Representatives, February 27.
Government Accountability Office (GAO; formerly General Accounting Office). 2003a. Catastrophe Insurance Risks. Status of Efforts to Securitize Natural Catastrophe and Terrorism Risk. September 24, GAO-03-1033. Washington, DC: U.S. General Accounting Office. http://www.gao.gov/new.items/d031033.pdf (accessed February 25, 2006).
Government Accountability Office (GAO; formerly General Accounting Office). 2003b. Critical Infrastructure Protection: Efforts of the Financial Services Sector To Address Cyber Threats. Report to the Subcommittee on Domestic Monetary Policy, Technology, and Economic Growth, Committee on Financial Services, House of Representatives Washington, DC: U.S. General Accounting Office. http://www.gao.gov/new.items/d03173.pdf (accessed May 7, 2003).
Government Accountability Office (GAO; formerly General Accounting Office). 2003c. Transportation Security: Federal Action Needed to Enhance Security Efforts. September 9, GAO-03-1154T. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO; formerly General Accounting Office). 2004a. Critical Infrastructure Protection: Establishing Effective Information Sharing with Infra-structure Sectors. April 21. GAO-04-699T. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO; formerly General Accounting Office). 2004b. Critical Infrastructure Protection: Improving Information Sharing With Infrastructure Sectors. GAO-04-780, July. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO; formerly General Accounting Office). 2004c. Determining Security Clearance Eligibility for Industry Personnel. May. GAO-04-632, Washington, DC.
Government Accountability Office (GAO; formerly General Accounting Office). 2004d. Security Clearances: FBI Has Enhanced its Process for State and Local Law Enforcement Officials. GAO-04-596, April. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO; formerly General Accounting Office). 2004e. Terrorism Insurance: Effects of the Terrorism Risk Insurance Act of 2002. May 18. GAO-04-806T, Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO). 2005a. Aviation Security: Secure Flight Development and Testing Under Way, but Risks Should Be Managed as System Is Further Developed. March. GAO-05-356. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO). 2005b. Aviation Security: Transportation Security Administration Did Not Fully Disclose Uses of Personal Information During Secure Flight Program Testing in Initial Privacy Notices, But Has Recently Taken Steps to More Fully Inform the Public, Government Accountability Office, GAO-05-864R, July 22. Washington, DC: U.S. General Accounting Office.
Government Accountability Office (GAO). 2005c. Catastrophe Risk: U.S. and European Approached to Insure Natural Catastrophes and Terrorism Risks. February. GAO-05-199. Washington, DC: U.S. General Accounting Office. http://www.gao.gov/new.items/d03173.pdf (accessed March 3, 2006).
Government Accountability Office (GAO). 2005d. Protection of Chemical and Water Infrastructure: Federal Requirements, Actions at Selected Facilities, and Remaining Challenges. March, GAO-05-327. Washington, DC: U.S. General Accounting Office.
Grabowski, Martha, and Karlene Roberts, . 1997. Risk Mitigation in Large-Scale Systems: Lessons from high Reliability Organizations. California Management Review 39(4): 152–162.CrossRefGoogle Scholar
Grace, Martin, Robert Klein, , Paul Kleindorfer, , and Michael Murray, . 2003. Catastrophe Insurance. Boston: Kluwer.CrossRefGoogle Scholar
Graham, J. D., and Weiner, J. B. (eds.). 1995. Risk vs. Risk. Cambridge, MA: Harvard University Press.
Green, J. 2002. The Myth of Cyberterrorism. November. Washington Monthly. http://www.washingtonmonthly.com/features/2001/0211.green.html (accessed May 2, 2003).Google Scholar
Green, R. M. 1980. Inter-Generational Distributive Justice and Environmental Responsibility. In Responsibilities to Future Generations: Environmental Ethics, edited by Partridge, E. D.. Buffalo, NY: Prometheus Books.Google Scholar
Grid Today. 2003. Grid Technology Used to Hijack PC's? http://www.gridtoday.com/03/0721/101704.html (accessed May 2, 2003).
Grimmett, G. 1999. Percolation. Berlin, Germany: Springer-Verlag.CrossRefGoogle Scholar
Guttman, B., and Elburg, K.. 2002. Israel: Cyber terrorism. Computer und Recht International 5: 156–157.Google Scholar
Halfele, W. 1990. Energy from Nuclear Power. Scientific American 263(3): 136–144.CrossRefGoogle Scholar
Halsne, C. 2003. North Sound 911 Service Repeatedly Targeted. KIRO TV http://www.kirotv.com/news/2601577/detail.html (accessed May 7, 2003).
Hamilton, Donald. 2005. Telephone interview with Donald Hamilton, Executive Director, National Memorial Institute for the Prevention of Terrorism. Oklahoma City, OK. March.
Hardin, Garrett. 1968. The Tragedy of the Commons. Science 162(1968): 1243–1248.Google ScholarPubMed
Harrington, Caitlin. 2005. Former CIA Man Simmons Shoots Again for Unclassified Intelligence Unit at DHS. CQ Homeland Security, June 21.Google Scholar
Harris, Shane. 2004. Defense Department Lacks Staff to Tackle Security Clearance Backlog. GovExec.com. May 27. http://www.govexec.com/dailyfed/0504/052704h1.htm (accessed March 1, 2006).
Hartocollis, Anemona. 2005. Port Authority Found Negligent in 1993 Bombing. New York Times. October 27. http://select.nytimes.com/search/restricted/article?res=F30616F63A5B0C748EDDA90994DD404482 (accessed March 4, 2006).Google Scholar
Hartwig, Robert P. 2002. Industry Financial and Outlook – 2001 Year-End Results, Insurance Information Institute. http://www.iii.org/media/industry/financials/2001yearend/ (accessed June 23, 2004).
Hartwig, Robert. 2004. The Cost of Terrorism: How Much Can We Afford? National Association of Economics Conference. http://www.iii.org/media/presentations/tria/(accessed February 25, 2006).
Heal, G., and H. Kunreuther. 2005a. You Only Die Once: Interdependent Security in an Uncertain World. In The Economic Impacts of Terrorist Attacks,. edited by Richardson, H. W., Gordon, P. and Moore, J. E. II.Cheltenham, UK: Edward Elgar.CrossRefGoogle Scholar
Heal, G., and H. Kunreuther. 2005b. IDS Models of Airline Security. Journal of Conflict Resolution 49: 201–217.
Heal, G., and H. Kunreuther. 2006. Security, Supermodularity and Tipping. NBER Working Paper 12281. June.
Heimann, C. F. L. 1993. Understanding the Challenger Disaster: Organizational Structure and the Design of Reliable Systems. American Political Science Review 87: 421–435.CrossRefGoogle Scholar
Heinrich, C. 2005. RFID and Beyond. New York: John Wiley & Sons.Google Scholar
Heller, Miriam. 2001. Interdependencies in Civil Infrastructure Systems. The Bridge 31(4).Google Scholar
Hendershot, D. C. 2004. Inherently Safer Design, in Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence, edited by James R. Phimister, Vicki M. Bier, and Howard C. Kunreuther. Washington, DC: National Academy of Engineering, pp. 103–117.Google Scholar
Hendricks, K. B., and Singhal, V. R.. 2005. An Empirical Analysis of the Effect of Supply Chain Disruptions on Long-Run Stock Price and Equity Risk of the Firm. Production and Operations Management 14(1).Google Scholar
Heymann, Philip, and Juliette Kayyem, . 2005. Protecting Liberty in an Age of Terror.Cambridge, MA: The MIT Press.Google Scholar
Hobijn, Bart. 2002. What Will Homeland Security Cost?Economic Policy Review November, 21–33.Google Scholar
Hoekstra, Peter. 2005. Secrets and Leaks: The Costs and Consequences for National Security. July 29. WebMemo #809, Heritage Foundation. http://new.heritage.org/Research/HomelandDefense/wm809.cfm (accessed November 2005).
Hoffman, B. 1998. Inside Terrorism. New York: Columbia University Press.Google Scholar
Horch, Stephen, Howard Kunreuther, , and Robert Gunter, (eds.). 2001. Wharton on Making Decisions. New York: John Wiley & Sons.Google Scholar
Howarth, R. 1991. Inter-Generational Competitive Equilibria under Technological Uncertainty and an Exhaustible Resource Constraint. Journal of Environmental Economics and Management 21: 225–243.CrossRefGoogle Scholar
http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf (accessed June 27, 2006).
Hunter, J. Robert. 2004. The Terrorism Risk Insurance Act: Should it Be Renewed? April 19. Washington, DC: Consumer Federation of America. http://www.consumerfed.org/pdfs/terrorism_insurance_report.pdf (accessed February 25, 2006).
Iannaccone G., C. N. Chuah, S. Bhattacharyya, C. Diot. 2003. Feasibility of IP Restoration in a ier-1 backbone. Sprint Atlanta Technical Report TR03-ATL-030666, March. http://www.cambridge.intel-research.net/~gianluca/papers/restoration.pdf (accessed September 14, 2005).
Institute Of Medicine of the National Academies. 2005. Proceedings. Paper read at Protecting Against Foodborne Threats to Health. October 25–26.
Insurance Information Institute. Undated. Facts and Statistics. http://www.iii.org/media/facts/statsbyissue/catastrophes/ (accessed February 15, 2006).
Insurance Journal. 2005. Greenspan: Private Insurers Can't Cover Terror Risk Without Government. July 20. http://www.insurancejournal.com/news/national/2005/07/20/57478.htm (accessed February 25, 2006).
ISAC Council (Information Sharing and Analysis Centers Council). 2004a. A Functional Model for Critical Infrastructure Information Sharing and Analysis: Maturing and Expanding Efforts. ISAC Council white paper, January 31, 2004. http://www.isaccouncil.org/pub/Information_Sharing_and_Analysis_013104.pdf (accessed March 22, 2006).
ISAC Council (Information Sharing and Analysis Centers Council). 2004b. Government–Private Sector Relations. ISAC Council white paper, January 31, 2004. http://www.isaccouncil.org/pub/Government_Private_Sector_Relations_013104.pdf (accessed March 22, 2006).
ISAC Council (Information Sharing and Analysis Centers Council). 2004c. A Policy Framework for the ISAC Community. ISAC Council white paper, January 31. http://www.isaccouncil.org/pub/Policy_Framework_for_ISAC_Community_013104.pdf (accessed March 22, 2006).
Jaffee, D. 2005. The Role of Government in the Coverage of Terrorism Risks. Chapter 7 in Terrorism Risk Insurance in OECD Countries. Paris: OECD.
Jaffee, D., and T. Russell. 2005. Should Governments Support the Private Terrorism Insurance Market? WRIEC Conference, Salt Lake City, August.
Johnston, Donald. 2005. Dealing with Disasters and Protecting Critical Services: An International Perspective from the Organization for Economic Cooperation and Development (OECD). Address to the International Risk Governance Council 2005 General Conference, Beijing, September 20–21.
Jones, Donald, and Ronald, Skelton. 1999. The Next Generation Threat to Grid Reliability–Data Security. IEEE Spectrum June: 46–49.CrossRefGoogle Scholar
Kahneman, D., and Tversky, A.. 2000. Choices, Values and Frames. New York: Cambridge University Press.Google Scholar
Kane, M. 2002. U.S. Vulnerable to Data Sneak Attack. CNET News.com. August 13. http://news.com.com/2100-1017-949605.html (accessed May 2, 2003).
Kauffman, Stuart. 1993. The Origins of Self-Organization Selection in Evolution. New York: Oxford University Press.Google Scholar
Kearns, M. 2005. Economics, Computer Science, and Policy. Issues in Science and Technology Winter: 37–47.Google Scholar
Kearns, M., and L. Ortiz. 2004. Algorithms for Interdependent Security Games. In Advances in Neural Information Processing Systems 16, edited by Thrun, S., Saul, L., and Scholkopf, B.. Cambridge, MA: MIT Press.Google Scholar
Keohane, N., and Zeckhauser, R.. 2003. The Ecology of Terror Defense. Journal of Risk and Uncertainty, Special Issue on Terrorist Risks, 26(2/3, March/May): 201–229.CrossRefGoogle Scholar
Kettl, Donald (ed.). 2004. The Department of Homeland Security's First Year: A Report Card. New York: Century Foundation.Google Scholar
King, D., and M. G. Morgan. 2003. Guidance for Drafting State Legislation to Facilitate the Growth of Independent Electric Power Micro-Grids. Carnegie Mellon Electricity Industry Center Working Paper CEIC-03-17. http://wpweb2k.gsia.cmu.edu/ceic/papers/ceic-03-17.asp (accessed February 2, 2006).
Kleindorfer, P. R., and Saad, G. H.. 2005. Managing Disruption Risks in Supply Chains. Production and Operations Management 14(1).Google Scholar
Kleindorfer, P. R., and L. Van Wassenhove. 2004. Risk Management for Global Supply Chains: An Overview. In The Alliance on Globalizing, edited by Gatignon, H. and Kimberly, J.. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Knake, Robert. 2005. Kennedy School of Government, interview with DHS PCII office, April.
Korten, D. 1980. Community Organization and Rural Development: A Learning Process Approach. Public Administration Review 40(5).CrossRefGoogle Scholar
Kunreuther, H. 2001. Protective Decisions: Fear or Prudence. In Wharton on Making Decisions, edited by Hoch, S. and Kunreuther, H.. New York: Wiley.Google Scholar
Kunreuther, H. 2002. The Role of Insurance in Managing Extreme Events: Implications for Terrorism Coverage. Risk Analysis 22: 427–437.CrossRefGoogle ScholarPubMed
Kunreuther, Howard. 2006. Has the Time Come for Comprehensive Natural Disaster Insurance? In On Risk and Disaster Lessons from Hurricane Katrina, edited by Ronald Daniels, , Donald Kettl, , and Howard Kunreuther, . Philadelphia, PA: University of Pennsylvania Press, 175–202.Google Scholar
Kunreuther, Howard, and Geoffrey Heal, . 2003. Interdependent Security. Journal of Risk and Uncertainty Special Issue on Terrorist Risk, March/May, 26: 231–249.CrossRefGoogle Scholar
Kunreuther, H., and Michel-Kerjan, E.. 2004. Challenges for Terrorism Risk Insurance in the United States. Journal of Economic Perspectives Fall, 18(4): 201–214.CrossRefGoogle Scholar
Kunreuther, H., and Michel-Kerjan, E.. 2005a. Insurability of (Mega)-Terrorism, Report for the OECD Task Force on Terrorism Insurance. In Terrorism Insurance in OECD Countries, Paris: Organization for Economic Cooperation and Development, July 5.Google Scholar
Kunreuther, H., and Michel-Kerjan, E. 2005b. Terrorism Insurance 2005. Where Do We Go from Here? Regulation. The Cato Review for Business and Government, Washington, DC: Cato Institute, Spring, 44–51.Google Scholar
Kunreuther, Howard, and Adam Rose (eds.). 2004. The Economics of Natural Hazards, two volumes. International Library of Critical Writings in Economics Series #178. North-ampton, MA: Edward Elgar Publishing, Inc.
Kunreuther, Howard, et al. 1978. Disaster Insurance Protections: Public Policy Lessons. New York: John Wiley and Sons.Google Scholar
Kunreuther, H., P., McNulty, and Y., Kang. 2002a. Improving Environmental Safety Through Third Party Inspection. Risk Analysis. 22: 309–318.CrossRefGoogle Scholar
Kunreuther, Howard, Geoffrey Heal, and Peter Orszag. 2002b. Interdependent Security: Implications for Homeland Security Policy and Other Areas. Policy Brief #108, October. Washington, DC: Brookings Institution.
Kunreuther, Howard, Erwann Michel-Kerjan, and Beverly Porter. 2003. Assessing, Managing and Financing Extreme Events: Dealing with Terrorism. November 20. Wharton School and National Bureau of Economic Research. http://opim.wharton.upenn.edu/risk/downloads/03-12.pdf (accessed February 25, 2006).
Kunreuther, Howard, Erwann Michel-Kerjan, and Beverly Porter. 2005. Extending Catastrophe Modeling to Terrorism. In Catastrophe Modeling: A New Approach to Managing Risk, edited by Grossi, and Kunreuther, , with Patel, . New York: Springer.CrossRefGoogle Scholar
Lagadec, Patrick. 1993. Preventing Chaos in Crisis. London: McGraw Hill.Google Scholar
Lagadec, Patrick, and Erwann Michel-Kerjan, . 2005. A New Era Calls for a New Model. International Herald Tribune, Opinion, November 2.Google Scholar
Lagadec, Patrick, and Uriel Rosenthal, (eds.). 2003. Anthrax and Beyond: New Challenges, New Responsibilities. Journal of Contingencies and Crisis Management Special Issue 11(3).Google Scholar
Lakdawalla, Darius, and George, Zanjani. 2005. Insurance, Self-Protection, and the Economics of Terrorism. Journal of Public Economics 89: 1891–1905.CrossRefGoogle Scholar
Landau, M. 1969. Redundancy, Rationality, and the Problem of Duplication and Overlap. Public Administration Review 27: 346–358.CrossRefGoogle Scholar
Porte, T. 1996. High Reliability Organizations: Unlikely, Demanding, and at Risk. Journal of Contingencies and Crisis Management 40: 60–71.CrossRefGoogle Scholar
La Porte, T. R. 2003. Institutional Challenges for High-Reliability Systems Across Many Operational Generations – Can Watchfulness be Sustained? Paper presented at AAAS Symposium, Nuclear Waste: File and Forget? February 18, Denver, CO.
La Porte, Todd R. 2004. Challenges of Assuring High Reliability When Facing Suicidal Terrorism. Paper presented at workshop Private Efficiency, Public Vulnerability: Protecting Critical Infrastructure, Cambridge, MA, May 26–28.
Porte, , T., R., and , P. M. Consolini. 1991. Working in Practice but Not in Theory: Theoretical Challenges of “High Reliability Organizations.” Journal of Public Administration Research and Theory: J-PART 1(1): 19–48.Google Scholar
Porte, T. R., and Keller, A.. 1996. Assuring Institutional Constancy: Requisite for Managing Long-Lived Hazards. Public Administration Review 56(6): 535–544.Google Scholar
Porte, T. R., and Thomas, C.. 1994. Regulatory Compliance and the Ethos of Quality Enhancement: Surprises in Nuclear Power Plant Operations. Journal of Public Administration Research and Theory 5(4): 250–295.Google Scholar
LaPorte, T. R., K. Roberts, and G. I. Rochlin. 1989. High Reliability Organizations: The Research Challenge. Institute of Governmental Studies, University of California, Berkeley, April.
Lawyer, G. 2003. The Battle of the Bug: Government, Industry Move To Protect Internet from Cyber Attacks, Viruses. http://www.xchangemag.com/articles/1B1front4.html (accessed May 2, 2003).
Leavitt, Leonard. 2005. NYPD's Voice Loud and Clear. Newsday. October 14. http://www.nynewsday.com/news/local/newyork/ny-nyplaz144468713oct14,0,5267183.column?coll=ny-ny-columnists (accessed November 2005).Google Scholar
Lerner, A. W. 1986. There Is More than One Way to be Redundant: A Comparison of Alternatives for the Design and Use of Redundancy in Organizations. Administration and Society 18: 334–359.CrossRefGoogle Scholar
Lerten, B. 2003. Tower Saboteur: I Was Only Pointing Out Flaws. Bend Bugle. November 23. http://bend.com/news/ar_view^3Far_id^3D12260.htm (accessed May 7, 2003).Google Scholar
Liang Q, Xiangsui. 1999. Unrestricted Warfare. Beijing: PLA Literature and Arts Publishing House.
Lindahl, Erik. 1919. Die Gerechtigkeit der Besteuerung Lund: Gleerupska Universitets-Bokhandeln.
Lindstrom, A. 2001. Tunnel Vision? Broadbandweek.com. http://www.broadbandweek.com/news/010806/010806_news_fiber.htm (accessed July 23, 2002).
Lipson, H. F., and D. A. Fisher. 1999. Survivability – A New Technical and Business Perspective on Security. Proceedings of the 1999 New Security Paradigms Workshop, Caledon Hills, Ontario, Association for Computing Machinery.
Lipton, E. and Johnson, K.. 2001. Tracking Bioterrorism's Tangled Course. New York Times Magazine. December 26, A1.Google Scholar
Lipton, Eric. 2005. Audit Faults U.S. for Its Spending on Port Defense. New York Times. February 20, A1.Google Scholar
Lipton, Eric, . 2006. Chertoff Seeks a Chemical Security Law, Within Limits. New York Times, March 22. http://www.nytimes.com/2006/03/22/politics/22chemical.html (accessed March 27, 2006).Google Scholar
Little, Richard. 2002. Controlling Cascading Failure: Understanding the Vulnerabilities of Interconnected Infrastructures. Journal of Urban Technology 9(1): 109–123.CrossRefGoogle Scholar
Loch, Stephen, and Howard Kunreuther, (eds.). 2001. Wharton on Making Decisions. New York: John Wiley & Sons.Google Scholar
Lopez, Brian. 2003a. Critical Assets Workshop Guide: Lawrence Livermore National Laboratory, Vulnerability and Risk Assessment Program.
Lopez, Brian. 2003b. New Approaches Guidance: Lawrence Livermore National Laboratory, Vulnerability and Risk Assessment Program.
Lopez, Brian. 2004. Five Key Pieces on the Board: Lawrence Livermore National Laboratory, Vulnerability and Risk Assessment.
Lundberg, Kristen. 2004. Smarter Foreign Aid? USAID's Global Development Alliance Initiative. Cambridge, MA: Kennedy School of Government Case Program.Google Scholar
Lundberg, Kristen. 2005. Public Service or Gravy Train: The Federal Guaranteed Student Loan Program. Cambridge, MA: Kennedy School of Government Case Program.Google Scholar
Lunev, S. 2001. ‘Red Mafia’ Operating in the U.S. – Helping Terrorists. http://www.newsmax.com/archives/articles/2001/9/28/90942.shtml (accessed May 2, 2003).
Madigan, Sean. 2005. Shut Out: Overdue Security Clearances Make Fire Officials Smolder. May 2. CQ Homeland Security, Congressional Quarterly.Google Scholar
Maine PUC (Public Utility Commission). 2003. Docket Number 2002243. http://www.state.me.us/mpuc/misctranscripts/2002-243%20080503.htm (accessed May 7, 2003).
Mandelbrot, B. B. 1982. The Fractal Geometry of Nature. New York: W. H. Freeman and Company.Google Scholar
Marks, Alexandra. 2004. ABCs of the CIA: A To-Do List for Porter Goss. Christian Science Monitor. August 13.Google Scholar
Marsh Inc, . 2005a. The Impact of Nature: The Aftermath of Hurricanes Katrina and Rita. November. http://solutions.marsh.com/hurricane/documents/MarshTheImpactofNature.pdf (accessed March 22, 2006).
Marsh Inc. 2005b. Marketwatch: Terrorism Insurance 2005. Research report. Marsh Inc. Item # 100162 04/05 Compliance # MA5-10185. http://www.marsh.dk/files/Marketwatch_Terrorism_Insurance_2005.pdf (accessed February 25, 2006).
Marsh, R. T. 1997. Critical Foundations. Washington, DC: Commission on Critical Infrastructure.Google Scholar
Mayntz, Renate, and Thomas, P. Hughes (eds.). 1988. Development of Large Technical Systems. Berlin, Germany: Springer-Verlag.Google Scholar
McCall, William. 2005. City Council Approves Portland's Withdrawal from the JTTF. Associated Press from KATU News. April 28. Portland, Oregon.
McCullagh, Declan, and Anne Broache. 2006. Some Companies Helped the NSA, But Which? February 6. CNET News.com. http://news.com.com/Some+companies+helped+the+NSA,+but+who/2100-1028_3-6035305.html (accessed February 28, 2006).
McDonald, H. 2003. Beijing Spies a Useful Friend in Castro. The Age. February 27. http://www.theage.com.au/articles/2003/02/26/1046064102910.html (accessed May 2, 2003).Google Scholar
McWilliams, B. 2003. Cloaking Device Made for Spammers. http://www.wired.com/news/infostructure/0,1377,60747,00.html (accessed May 2, 2003).
Mendeloff, J. 1988. The Dilemma of Toxic Substance Regulation: How Overregulation Leads to Underregulation. Cambridge, MA: MIT Press.Google Scholar
Messmer, L. 2003. Navy Marine Corps Intranet hit by Welchia Worm. Network World Fusion. http://www.nwfusion.com/news/2003/0819navy.html (accessed November 10, 2003).Google Scholar
Michael, D. 1973. On Learning to Plan and Planning to Learn. San Francisco, CA: Jossey-Bass.Google Scholar
Michel-Kerjan, Erwann. 2003a. Large-scale Terrorism: Risk Sharing and Public Policy. Revue d'Economie Politique 113(5): 625–648.CrossRefGoogle Scholar
Michel-Kerjan, Erwann. 2003b. New Challenges in Critical Infrastructures: A U.S. Perspective. Journal of Contingencies and Crisis Management 11(3): 132–141.CrossRefGoogle Scholar
Michel-Kerjan, E. 2006. An Unnoticed Paradox: Insurance, the 14th Critical Sector. Working Paper, Center for Risk Management and Decision Processes. Philadelphia, PA: Wharton School.Google Scholar
Michel-Kerjan, E., and Pedell, B.. 2005. Terrorism Risk Coverage in the Post- 9/11 Era: A Comparison of New Public–Private Partnerships in France, Germany and the U.S. The Geneva Papers on Risk and Insurance, 30(1): 144–170.CrossRefGoogle Scholar
Michel-Kerjan, Erwann, and Nathalie de Marcellis-Warin, . 2006. Public-Private Programs for Covering Extreme Events: The Impact of Information Sharing on Risk Sharing. Asia-Pacific Journal of Risk and Insurance 1(2): 21–49.CrossRefGoogle Scholar
Mintz, John, and Susan Schmidt, . 2004. Ashcroft Assailed on Terror Warning. Washington Post. May 28, A04. http://www.washingtonpost.com/wp-dyn/articles/A61742-2004May27.html (accessed November 2005).Google Scholar
Mintzberg, H. 1979. The Structuring of Organizations. Saddle River, NJ: Prentice-Hall.Google Scholar
Moran, Michael, Rein, Martin, and Goodin, Robert E. (eds.). 2006. The Oxford Handbook of Public Policy. New York and Oxford: Oxford University Press.Google Scholar
Morgan, M. G., and Zerriffi, H.. 2002. The Regulatory Environment for Small Independent Micro-Grid Companies. The Electricity Journal 15(9): 52–57.CrossRefGoogle Scholar
Morgan, M. Granger, Baruch Fischhoff, , Ann Bostrom, , and Cynthia, J. Atman. 2002. Risk Communication: A Mental Models Approach. Cambridge, UK: Cambridge University Press.Google Scholar
Moteff, John D. 2000. Critical Infrastructures: Background and Early Implementation of PDD-63. Congressional Research Service, Report #RL30153. http://www.ncseonline.org/NLE/CRSreports/Science/st-46.cfm?&CFID=558905&CFTOKEN=30895709 (accessed November 2005).
NARUC/NRRI. 2003. Survey on Critical Infrastructure Protection. http://www.nrri.ohio-state.edu/dspace/bitstream/2068/296/1/04-01.pdf (accessed February 2, 2006).
National Aeronautics and Space Administration. 2003. Final Report of the Columbia Accident Investigation Board, 2003. http://www.caib.us (accessed June 3, 2006).
National Center for Infectious Diseases. 1999. Emerging Infectious Diseases. In Special Issue on Bioterrorism. Atlanta, GA: Centers for Disease Control.
National Commission on Terrorism. 2000. Countering the Changing Threat of International Terrorism (Bremer Report). Washington, DC: National Commission on Terrorism.
National Commission on Terrorist Attacks upon the United States. 2004. The 9/11 Commission Report. Washington, DC: Government Printing Office. http://www.9-11commission.gov/report/911Report.pdf (accessed February 25, 2006).
National Council on Public Works Improvement. 1988. Fragile Foundations: A Report on America's public Works. Final Report to the President and Congress. Washington, DC.
National Infrastructure Simulation and Analysis Center. 2003. Defense Treat Reduction Agency Program Review. Arlington, VA.
National Institute of Standards and Technology. 1995. The Impact of the FCC's Open Network Architecture on NS/NP Telecommunications Security Washington DC: National Institute of Standards and Technology. http://csrc.nist.gov/publications/nistpubs/800-11/titleona.html (accessed May 7, 2003).
National Research Council. 2002a. Cybersecurity Today and Tomorrow: Pay Now or Pay Later. Washington, DC: National Academies Press.
National Research Council. 2002b. Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Committee On Science and Technology for Countering Terrorism Washington, DC: National Academies Press.
National Security Telecommunications Advisory Committee. 2002. Network Security/Vulnerability Assessments Task Force Report. Washington, DC: President's National Security Telecommunications Advisory Committee. http://www.ncs.gov/nstac/reports/2002/NSVATF-Report-(FINAL).htm (accessed March 6, 2006).
National Task Force on Interoperability. 2003. “Why Can't We Talk? Working Together To Bridge the Communications Gap To Save Lives. National Institute of Justice. http://www.ojp.usdoj.gov/nij/topics/commtech/ntfi_guide.pdf (accessed March 27, 2006).
National Transportation Safety Board. 2006a. Rail Accidents 2006. http://ntsb.gov/Publictn/R_Acc.htm. (accessed March 10, 2006).
National Transportation Safety Board. 2006b. Train Crew Failed to Reline Main Line Switches and Causes Collision and Derailment in South Carolina NTSB Finds. November 29. http://www.ntsb.gov/Pressrel/2005/051129.htm (accessed March 10, 2006).
National Vulnerability Database. 2005. CVE Vulnerability Search Engine. http://nvd.nist.gov/statistics.cfm (accessed February 22, 2006).
Neuman, P. 1991. NY Area Fiber-Optic Telephone Cable Severed; Extensive Effects. The Risk Digest. http://catless.ncl.ac.uk/Risks/10.75.html#subj1 (accessed May 7, 2003).Google Scholar
Neuman, P. 2000. Week-long outage after cable cut downs 11,000 phone lines. The Risk Digest 20:84. http://catless.ncl.ac.uk/Risks/20.84.html#subj6.1 (accessed May 7, 2003).Google Scholar
New York Times. 2003. Northeastern United States and Canada power blackout, August 14, 2003, p. A1.
Newman, R. 2002. Wall Street Worries. U.S. News & World Report, September 23, 46–48.Google Scholar
Nickel, B., and Wilkinson, D.. 1983. Invasion Percolation on the Cayley Tree: Exact Solution of a Modified Percolation Model. Physical Review Letters 51(2): 71–74.CrossRefGoogle Scholar
North American Electric Reliability Council. 2001. System Disturbance Reports. Disturbance Analysis Working Group, review of Selected Electric System Disturbances in North America, 1996, 1998, and 2001. Princeton, NJ: NERC. http://www.nerc.com/~filez/dawg-disturbancereports.html (accessed February 8, 2006).
North American Electric Reliability Council. 2006. System Disturbance Reports. Disturbance Analysis Working Group 2001. http://www.nerc.com/~filez/dawg-disturbancereports.html (accessed February 8, 2006).
Norton, B. 1982. Environmental Ethics and the Rights of Future Generations. Environmental Ethics Winter: 319–338.CrossRefGoogle Scholar
O'Hanlon, M. E., P. R. Orszag, I. H. Daalder, I. M. Destler, D. L. Gunter, R. E. Litan, and J. B. Steinberg. 2002. Protecting the American Homeland: A Preliminary Analysis. Chapter 6: Principles for Providing and Financing Homeland Security. Washington, DC: Brookings Institution. http://www.brookings.edu/fp/projects/homeland/fullhomeland.pdf (accessed February 2, 2006).
Office of Homeland Security. 2002. National Strategies for Homeland Security. Washington, DC: Office of the President.
Office of Management and Budget. 2004. Budget of the United States Government, Fiscal Year 2004, Historical Table 1–2. http://www.whitehouse.gov/news/usbudget/budget-fy2004/hist.html (accessed March 4, 2006).
Office of the President. 1998. The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63. White paper. May 22. http://www.usdoj.gov/criminal/cybercrime/white_pr.htm (accessed November 2005).
Office of the President. 2003. National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. Washington, DC.
Organization for Economic Cooperation and Development. 2005. Terrorism Insurance in OECD Countries. July 5. Paris: OECD.
Ortolani, Alex, and Robert Block, . 2005. Keeping Cargo Safe From Terror: Hong Kong Port Project Scans All Containers; U.S. Doesn't See the Need. Wall Street Journal, July 29, B1.Google Scholar
Paine, Thomas. 1776. Common Sense. http://www.alumni.uchicago.edu/commontext/paine/documents/CommonSense.pdf (accessed February 25, 2006).
Papadakis, I. S., and W. T. Ziemba. 2001. Derivative Effects of the 1999 Earthquake in Taiwan to U.S. Personal Computer Manufacturers. In Mitigation and Financing of Seismic Risks, edited by Kleindorfer, P. R. and Sertel, M. R.. Boston: Kluwer Academic Publishers.Google Scholar
Perrings, C. 1991. Reserved Rationality and the Precautionary Principle: Technological Change, Time and Uncertainty in Environmental Decision Making. In Ecological Economics: The Science and Management of Sustainability, edited by Costanza, R.. New York: Columbia University Press.Google Scholar
Perrow, C. 1984. Normal Accidents: Living with High-Risk Technologies. New York: Basic Books.Google Scholar
Perrow, C. 1999. Normal Accidents. Princeton, NJ: Princeton University Press.Google Scholar
Peters, Guy B. 1998. Managing Horizontal Government: The Politics of Coordination: Canadian Centre for Management Development, Minister of Supply and Services.
Peters, Ralph. 1999. Fighting for the Future: Will America Win?Mechanicsburg, PA: Stackpole Books.Google Scholar
Philippsohn, S. 2001. Trends in Cybercrime – An Overview of Current Financial Crimes on the Internet. Computers & Security 20(1): 53–69.CrossRefGoogle Scholar
Phillips, Lord, J. Bridgeman, and M. Ferguson-Smith. 2000. The BSE Inquiry, vol 1. Findings and Conclusions. October, section 1176. London: Stationary Office.
Phimister, James R., Bier, Vicki M., and Kunreuther, Howard C. (eds.). 2004. Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence. Washington, DC: National Academy of Engineering.Google Scholar
Pidgeon, Nick, Roger Kasperson, , and Paul Slovic, (eds.). 2003. The Social Amplification of Risk. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Pillar, P. 2001. Terrorism and U.S. Foreign Policy. Washington, DC: Brookings Institution Press.Google Scholar
Posner, Gerald. 2003. Why America Slept. New York: Random House.Google Scholar
Posner, Richard A. 2004. Catastrophe: Risk and Response. New York: Oxford University Press.Google Scholar
Potok, M. 2004. The American Radical Right: The 1990s and Beyond. In Western Democracies and the New Extreme Right Challenge, edited by Eatwell, R. and Mudde, C.. Oxford, UK: Routledge.Google Scholar
President's Commission on Critical Infrastructure Protection. 1997. Critical Foundations, Protecting America's Infrastructures. Washington, DC.
President's Council of Advisors on Science and Technology. 2002. Report on Maximizing the Contribution of Science and Technology Within the new Department of Homeland Security.
President's Council of Science and Technology Advisors. 2003. The Science and Technology of Combating Terrorism.
Pressman, J. L., and Wildavsky, A.. 1984. Implementation. 2nd ed. Berkeley, CA: University of California Press.Google Scholar
PSERC. 2003. Public Utilities of Commission of Ohio, sequence of events on August 14. http://www.pserc.wisc.edu/Ohio_Only_Sequence_of_Events.pdf (accessed December 7, 2003).
Ralyea, Harold C., and Jeffrey W. Seifert. 2004. Information Sharing for Homeland Security: A Brief Overview. September 30, RL32597. Washington, DC: Congressional Research Service, 22–25.
Reason, J. 1997. Managing the Risks of Organizational Accidents. Hampshire, England: Ashgate Publishing Company.Google Scholar
Rees, Joseph. 1996. Hostages of Each Other: The Transformation of Nuclear Safety since Three Mile Island. Chicago: University of Chicago Press.Google Scholar
Rees, T. 1994. Hostages to Each Other. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Regalado, A., and Fields, G.. 2003. Blackout a Reminder of Grid's Vulnerability to Terror. Wall Street Journal, August 15.Google Scholar
Reisner, Robert. 2002. Homeland Security Brings Ratepayers vs. Taxpayers to Center Stage. In Postal and Delivery Services. Delivering on Competition, edited by Crew, and Kleindorfer, . Boston: Kluwer Academic Publishers.CrossRefGoogle Scholar
Renesys. 2003. Blackout Results in Widespread Network Outages. August 14. http://www.renesys.com/news/index.html (accessed December 7, 2003).
Renz, Loren, Elizabeth Cuccaro, , and Leslie Marino, . 2003. 9/11 Relief and Regranting Funds: A Summary Report on Funds Raised and Assistance Provided. New York: Foundation Center, December.Google Scholar
Revised Draft National Infrastructure Protection Base Plan. 2006. Version 2.0 January. http://cryptome.org/nipp-v2.zip (accessed March 8, 2006).
Risen, James, and Eris Lichtblau, . 2005. Bush Lets U.S. Spy on Callers Without Courts. New York Timeshttp://www.nytimes.com/2005/12/16/politics/16program.html?ex=1292389200&en=e32072d786623ac1&ei=5090&partner=rssuserland&emc=rss (accessed March 14, 2006).Google Scholar
Rittel, Horst, and Melvin Webber, . 1973. Dilemmas in a General Theory of Planning. Policy Sciences 4: 155–169.CrossRefGoogle Scholar
Rivlin, Gary. 2005. New Orleans Utility Struggles To Relight a City of Darkness. New York Times, New YorkCity edition, Nov. 19, A1.Google Scholar
Roberts, H. K., and Libuser, C.. 1993. From Bhopal to Banking: Organizational Design can Mitigate Risk. Organizational Dynamics 21: 15–26.CrossRefGoogle Scholar
Roberts, Karlene. 1990a. Managing High Reliability Organizations. California Management Review 32, 4: 101–114.CrossRefGoogle Scholar
Roberts, K. H. 1990b. Some Characteristics of High Reliability Organizations. Organization Science 1(2): 160–177.CrossRefGoogle Scholar
Roberts, K. H. 1993. Some Aspects of Organizational Cultures and Strategies to Manage Them in Reliability Enhancing Organizations. Journal of Managerial Issues 5: 165–181.Google Scholar
Roberts, K. H., and G. Gargano. 1989. Managing a High Reliability Organization: A Case for Interdependence. In Managing Complexity in High Technology Industries: Systems and People, edited by VonGlinow, M. A. and Mohrmon, S.. New York: Oxford University Press.Google Scholar
Roberts, Nancy. 2001. Coping with Wicked Problems: The Case of Afghanistan. In Learning from International Public Management Reform, Vol. 11B. Amsterdam: Elsevier Science Ltd.Google Scholar
Rochlin, G. I. 1993a. Defining High Reliability Organizations in Practice. In New Challenges to Understanding Organizations, edited by Roberts, K.. New York: Macmillan.Google Scholar
Rochlin, G. I. 1993b. Trapped in the Net: the Unanticipated Consequences of Computerization. Princeton, NJ: Princeton University Press.Google Scholar
Rochlin, G. I. 1996. Reliable Organizations: Present Research and Future Directions. Journal of Crisis and Contingency Management (Issue on High Reliable Organization Research) 4(2): 55–59.CrossRefGoogle Scholar
Rochlin, G. I. 1999. Safe Operations as a Social Construct. Ergonomics 42(11): 1549–1560.CrossRefGoogle Scholar
Rochlin, G. I. 2001. Highly Reliable Organizations: Exploration and Research Perspectives. In Organiser la Fiabilite, edited by Bourrie, M.. Paris: L'Harmattan.Google Scholar
Rochlin, G. I., and Meier, A.. 1994. Nuclear Power Operations: A Cross-Cultural Perspective. Annual Review of Energy and the Environment 19: 153–187.CrossRefGoogle Scholar
Rochlin, G. I., Todd, R. LaPorte, and Karlene, H. Roberts. 1987. The Self-Designing High-Reliability Organization: Aircraft Carrier Flight Operations at Sea. Naval War College Review76–90.Google Scholar
Roe, E., Eeten, M. J. G., Schulman, P. R., and Bruijne, M.. 2002. California's Electricity Restructuring: The Challenge to Providing Service and Grid Reliability. Palo Alto, CA: California Energy Commission, Lawrence Berkeley National Laboratory, and the Electrical Power Research Institute.Google Scholar
Roe, E., Schulman, P., Eeten, M. J. G., and Bruijne, M.. 2005. High Reliability Bandwidth Management: Findings and Implications of Two Case Studies. Journal of Public Administration Research and Theory 15: 263–280.CrossRefGoogle Scholar
Saleh, Mohamad. 2003. Al Qaeda Claims Responsibility for Power Blackout in U.S.!Dar Al Hayat, August 18. http://english.daralhayat.com/arab_news/08-2003/Article-20030818-14bdd659-c0a8-01ed-0079-6e1c903b7552/story.html (accessed October 21, 2003).Google Scholar
Sandler, T., and Enders, W.. 2004. An Economic Perspective of Transnational Terrorism. European Journal of Political Economy 20(2): 301–316.CrossRefGoogle Scholar
Sarkar, Dibya. 2004. DOJ Writes to Share. Federal Computer Week, October 15. http://www.fcw.com/fcw/articles/2004/1011/web-doj-10-15-04.asp (accessed November 2005).Google Scholar
Scalfane, Susanne. 2006. Unexpected Surplus Climb: Despite Storms, Industry Profits Rise, National Underwriter P&C. January 2/9, 110, 1. http://cms.nationalunderwriter.com/cms/NUPC/Weekly%20Issues/Issues/2006/01/News/P01ISONINE-ss?searchfor=despite%20storms%20january%202006 (accessed March 4, 2006).
Schein, E. H. 1994. Organizational and Managerial Culture as a Facilitator or Inhibitor of Organizational Learning. http://www.solonline.org/res/wp/10004.html.
Schelling, T. 1978. Micromotives and Macrobehavior. New York: Norton Interdependent Security.Google Scholar
Schratz, P. R. 1983. Admiral Rickover and the Cult of Personality. Air University Review, July–August. http://airpower.maxwell.af.mil/airchronicles/aureview/1983/jul-aug/schratz.html (accessed June 27, 2006).Google Scholar
Schulman, Paul R. 1993a. The Analysis of High Reliability Organizations: A Comparative Framework. In New Challenges to Organization Research: High Reliability Organization, edited by Roberts, K. H.. New York: Macmillan.Google Scholar
Schulman, P. R. 1993b. A Comparative Framework for the Analysis of High Reliability Organizations. In New Challenges to Understanding Organizations, edited by Roberts, K.. New York: Macmillan.Google Scholar
Schulman, P. R. 1993c. Negotiated Order of Organizational Reliability. Administration and Society 25(3): 356–372.CrossRefGoogle Scholar
Schulman, P. R. 2002. Medical Errors: How Reliable Is Reliability Theory? In Medical Error: 200–216, edited by Rosenthal, M. M. and Sutcliffe, L. M.. San Francisco, CA: Jossey-Bass.Google Scholar
Schulman, Paul R., and Emery Roe, . 2004. Managing for Reliability in an Age of Terror. Paper presented at Private Efficiency, Public Vulnerability Workshop, Cambridge, MA, May 28.Google Scholar
Schulman, P. R., Roe, E., , M. van Eeten, and Bruijne, M.. 2004. High Reliability and the Management of Critical Infrastructures. Journal of Contingencies and Crisis Management 12(1): 14–28.CrossRefGoogle Scholar
Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina. 2006. A Failure of Initiative. U.S. House of Representatives. http://katrina.house.gov/full_katrina_report.htm (accessed March 23, 2006).
Seligman, A. 2000. The Problem of Trust. Princeton, NJ: Princeton University Press.Google Scholar
Seltzer, L. 2004. Who Wrote Sobig? eWeek. http://www.eweek.com/article2/0,1759,1716992,00.asp (accessed December 7, 2005).
Selznick, P. 1957. Leadership in Administration. New York: Harper & Row.Google Scholar
Sherman, Mark. 2005. Subway Threat Puzzle: When Local Officials, Feds Disagree. Associated Press. October 7. http://www.nctimes.com/articles/2005/10/08/news/nation/15_32_5810_7_05.txt (accessed November 2005).Google Scholar
Short, T. 2002. Reliability Indices. Conference report, T&D World Expo 2002, Indianapolis, IN, May 7–9, 2002. http://www.epri-peac.com/td/pdfs/reliability2002.pdf (accessed March 25, 2006).
Shrader, R., and Woolsey, R. J.. 2002. Business Has To Be Involved in Security Planning. Financial Times, January 16.Google Scholar
Shrader-Frechette, K. 1993. Risk Methodology and Institution Bias. Research in Social Problems and Public Policy 5: 207–223.Google Scholar
Simon, Steven, and David Benjamin, . 2005. The Next Attack. New York: Henry Holt & Company.Google Scholar
Singel, Ryan. 2005a. Passenger Screening, Take 10. Wired News. January 31. http://www.wired.com/news/privacy/0,1848,66433,00.html?tw=wn_story_related (accessed November 2005).
Singel, Ryan. 2005b. Secure Flight Hits Turbulence. Wired News. June 15. http://www.wired.com/news/privacy/0,1848,67875,00.html?tw=wn_story_related (accessed November 2005).Google Scholar
Singer, Peter. 2002. Corporate Warriors. Washington, DC: Brookings Institution Press.Google Scholar
Slovic, P. 1993. Perceived Risk, Trust, and Democracy. Risk Analysis 13(6): 675–682.CrossRefGoogle Scholar
Slovic, P. 1999. Trust, Emotion, Sex, Politics, and Science: Surveying the Risk-Assessment Battlefield. Risk Analysis 19(4): 689–701.CrossRefGoogle ScholarPubMed
Slovic, Paul. 2000. The Perception of Risk. London: Earthscan Publications.Google Scholar
Smetters, K. 2004. Insuring Against Terrorism: The Policy Challenge. In Brookings-Wharton Papers on Financial Services, edited by Litan, R. and Herring, R., 139–182.Google Scholar
Sood, Sunil K. 2004. Food Poisoning. eMedicine. http://www.emedicine.com/ped/topic795.htm (accessed March 10, 2006).
Stacey, Ralph. 1996. Strategic Management & Organizational Dynamics. London: Pitman.Google Scholar
Starks, Tim, and Martin, E. Andersen. 2004. Congress, Industry Both Dismay over Homeland Security's Performance on Critical Infrastructure. CQ Homeland Security.Google Scholar
State of New York Public Service Commission. 2005. CASE 04-E-0822 – In the Matter of Staff's Investigation into New York State's Electric Utility Transmission Right-of-Way Management Practices, filed in Case 27605. http://www3.dps.state.ny.us/pscweb/webfileroom.nsf/ArticlesByCategory/BDB52B0CC15BBE74852570260063242B/$File/301.04e0822.pdf?OpenElement (accessed February 9, 2006).
Stauffer, D., and Aharony, A.. 1994. Introduction to Percolation Theory. London and New York: Routledge.Google Scholar
Stephenson, John B. 2005. Homeland Security: Federal and Industrial Efforts Are Addressing Security Issues at Chemical Facilities, but Additional Action Is Needed. Testimony by John B. Stephenson, U. S. Accountability Office, before the Committee on Homeland Security and Governmental Affairs, U. S. Senate, April 27.
Stern, J. 2003. Terror in the Name of God: Why Religious Militants Kill. New York: Harper Collins.Google Scholar
Strohm, Chris. 2004. Threat Warning Creates Confusion Over Homeland Security Roles. GovExec.com. http://www.govexec.com/dailyfed/0504/052804c1.htm (accessed November 2005).
Sturgeon W. 2003. Organized Crime behind Sobig – Virus Expert. http://news.zdnet.co.uk/internet/security/0,39020375,39115886,00.htm (accessed May 24, 2004).
Swiss Re. 2006. Natural Catastrophes and Man-Made Disasters in 2005. Sigma, N2. February.
Talukdar, S., Apt, J., Ilic, M., Lave, L., and Morgan, M. G.. 2003. Cascading Failures: Survival vs. Prevention. Electricity Journal 16(9): 25–31.CrossRefGoogle Scholar
Terrorism Risk Insurance Act of 2002, Pub. Law No. 107–297, 116 Stat. 2322; 31 C.F.R. Part 50. http://www.ustreas.gov/offices/domestic-finance/financial-institution/terrorism-insurance/ (accessed February 25, 2006).
Terrorist Risk Reinsurance Program. 2005. U.S. House of Representatives, July 1.
Thompson, William C. 2002. One Year Later: The Fiscal Impact of 9/11 on New York City. http://comptroller.nyc.gov/bureaus/bud/reports/impact-9-11-year-later.pdf (accessed February 25, 2006).
Tillinghast-Towers Perrin. 2002. September 11, 2001: Implications for the Insurance Industry, Towers Perrin Reinsurance, T193-01, September 21, 2001. New York: Tillinghast-Towers Perrin. http://www.towersperrin.com/tillinghast/publications/reports/Sept_11_Implications_For_Insurance/2002051310.pdf (accessed January 10, 2006).
Time Magazine. 1977. Night of Terror. July 25. 12–26.
Transmission & Distribution World. 2005. AREVA to Build De-Icing and Power-Quality System. http://tdworld.com/mag/power_areva_build_deicing (accessed February 8, 2006).
Transportation of Highly Reliable Organizations: Past Research and Future Explorations. 1999. Paper presented at Workshop on Approaches to Organizational Reliability, October 7–8, at Department Technologies et Sciences de l'Homme, Universite de Technologies de Compiegne, France.
Tuchman, Barbara. 1962. The Guns of August. Toronto: Bantam.Google Scholar
Tucker, Jonathan B. 1999. Historical Trends Related to Bioterrorism: An Empirical Analysis. National Symposium on Medical and Public Health Response to Bioterrorism. Emerging Infectious Diseases, July–August, 5(4): 498–504.CrossRef
Tucker, Jonathan B., and Amy Sands. 1999. An Unlikely Threat. Bulletin of the Atomic Scientists 55(4).
Turner, Barry A. 1976. The Organizational and Interorganizational Development of Disasters. Administrative Science Quarterly 21(3): 378–397.CrossRefGoogle Scholar
Turner, Barry A. 1978. Man-Made Disasters: The Failure of Foresight. New York: Crane, Russak.
Turner, Barry A., and Nick F. Pidgeon. 1997. Man-Made Disasters. 2nd ed. Oxford, United Kingdom Butterworth-Heinemann.
U.S. Congress. 2002. Terrorism Risk Insurance Act of 2002. HR 3210 (became Pub. L. 107–297, 116 Stat. 2322). http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ297.107.pdf (accessed March 20, 2006).
U.S. Department of Justice. 1988. The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63. White Paper, May 22. http://www.usdoj.gov/criminial/cybercrime/white_pr.htm (accessed November 2005).
U.S. Department of State. 2004. Global Patterns in Terrorism. Washington, DC: Office of the Coordinator for Counterterrorism.
U.S. Department of State. 2005. Country Reports on Terrorism. Released by the Office of the Coordinator on Counterterrorism, April 27. http://www.state.gov/s/ct/rls/45321.htm (accessed January 12, 2006).
U.S. Department of the Treasury. 2005. Assessment: The Terrorism Risk Insurance Act of 2002. Washington, DC: Office of Economic Policy. June 30.
U.S.–Canada Power System Outage Task Force. 2004. Final Report on the August 14, 2003, Blackout in the United States and Canada: Causes and Recommendations. April 5. Washington, DC: U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability.
Van Eeten, M. J. G., E. M. Roe, P. Schulman, and M. L. C. de Bruijne. 2006. The Enemy Within: System Complexity and Organizational Surprises. In International CIIP Handbook 2006 Vol. II Analyzing Issues, Challenges, and Prospects, edited by M. Dunn and V. Mayer. Zurich: Center for Security Studies of the ETH Zurich, 89–109.
Vegh, S. 2002. Activists or Cyberterrorists? The Changing Media Discourse on Hacking. Firstmonday 7:10. http://www.firstmonday.dk/issues/issue7_10/vegh/ (accessed May 7, 2003).Google Scholar
Verton, D. 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill Osborne Media.Google Scholar
Wall Street Journal. 2005. A Massive Repair Job Begins To Fix Gulf's Broken Oil Network. September 8.
Watts, D. 2003. Security and Vulnerability in Electric Power Systems. Proceedings of the 35th North American Power Symposium, University of Missouri-Rolla, October 20–21, 559–566.
Weber, Max. 1946. Politics as a Vocation. In From Max Weber: Essays in Sociology, edited by Gerth, H. H. and Wright Mills, C.. New York: Oxford University Press.Google Scholar
Wedgwood, R. 2002. Al Qaeda, Terrorism, and Military Commissions. American Journal of International Law 96(2): 328–337.CrossRefGoogle Scholar
Weick, K. E. 1987. Organizational Culture as a Source of High Reliability. California Management Review 29: 112–127.CrossRefGoogle Scholar
Weick, Karl, and Kathleen Sutcliffe, . 2001. Managing the Unexpected: Assuring High Performance in an Age of Complexity. University of Michigan Business School Management Series. San Francisco, CA: Jossey-Bass.Google Scholar
Weick, K. E., Sutcliffe, K. M., and Obstfeld, D.. 1999. Organizing for High Reliability: Quantitative and Qualitative Assessment Aboard Nuclear Powered Aircraft Carriers. Journal of High Technology Management Research 5(1): 141–161.Google Scholar
Weisstein, Eric W. 1999. Cayley Tree. In MathWorld – A Wolfram Web Resource. http://mathworld.wolfram.com/CayleyTree.html (accessed June 27, 2006).
Wenz, P. 1983. Ethics, Energy Policy, and Future Generations. Environmental Ethics 5: 195–209.CrossRefGoogle Scholar
Western Systems Coordinating Council. 1996. Disturbance Report for the Power System Outage that Occurred on the Western Interconnection, August 10. 1548 PAST, Published October 18, 1996.
Wharton Risk Management and Decision Processes Center. 2005. TRIA and Beyond. Wharton School, University of Pennsylvania, Philadelphia p. 208. http://grace.wharton.upenn.edu/risk/downloads/TRIA%20and%20Beyond.pdf (accessed February 25, 2006).
White House. 1998. Protecting America's Critical Infrastructure: PDD 63 Fact Sheet. Washington, DC.
White House, . 2002. National Strategy for Homeland Security. Washington, DC, July.Google Scholar
White House. 2003a. Homeland Security Presidential Directive/HSPD-7. December 17. http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html (accessed November 2005).
White House. 2003b. The National Strategy to Secure Cyberspace Washington, DC: White House Critical Infrastructure Protection Board. http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf (accessed December 3, 2003).
White House. 2004a. President Bush Celebrates Independence Day, West Virginia Capitol Grounds. http://www.whitehouse.gov/news/releases/2004/07/20040704.html (accessed January 12, 2006).
White House. 2004b. Remarks by the Vice President at the 123rd Coast Guard Academy Commencement. http://www.whitehouse.gov/news/releases/2004/05/20040519-5.html (accessed January 12, 2006).
White House. 2005a. Executive Order: Further Strengthening the Sharing of Terrorism Information to Protect Americans. http://www.whitehouse.gov/news/releases/2005/10/20051025-5.html (accessed November 2005).
White House. 2005b. The National Strategy for Homeland Security. July. http://www.whitehouse.gov/homeland/book/index.html (accessed July 12, 2006).
Wiening, Eric A. 2002. Foundations of Risk Management and Insurance. American Institute for Chartered Property and Casualty Underwriters/Insurance Institute of America, Malvern, PA.
Wiening, Eric A. 2002. Foundations of Insurance Risk Management and Insurance. AICPCU/IIA, 1st ed.
Wildavsky, Aaron. 1988. Searching for Safety. New Brunswick, NJ: Transaction Books.Google Scholar
Wilson, J. 2003. Blackout: The Conspiracy Theory. Popular Mechanics 180(11): 38, 40.Google Scholar
Wilson, J. Q. 1989. Bureaucracy. New York: Basic Books.Google Scholar
Wired. 2004. August 11. http://www.wired.com/news/print/0,1294,64168,00.html (accessed July 15, 2004).
World Health Organization. 2003a. SARS Outbreak Contained Worldwide. http://www.who.int/mediacentre/news/releases/2003/pr56/en/ (accessed February 9, 2006).
World Health Organization. 2003b. Update 95 – SARS: Chronology of a Serial Killer. http://www.who.int/csr/don/2003_07_04/en/index.html (accessed February 9, 2006).
Yoran, Amit. 2004a. Locking Your Cyber Front Door – the Challenges facing Home Users and Small Businesses. Statement of the Director, National Cyber Security Division, Office of Infrastructure Protection, U.S. Department of Homeland Security before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, Committee on Government Reform, U.S. House of Representatives, June 16.
Yoran, Amit. 2004b. Virtual Threat, Real Terror: Cyberterrorism in the 21st Century. Statement before the Senate Committee on the Judiciary Subcommittee on Terrorism, Technology and Homeland Security, February 24.
Yoshihara, T. 2001. Chinese Information Warfare: A Phantom Menace or Emerging Threat?Strategic Studies Institute. http://www.iwar.org.uk/iwar/resources/china/iw/chininfo.pdf (accessed May 7, 2003).Google Scholar
Zerriffi, H. 2004. Electric Power Systems Under Stress: An Evaluation of Centralized versus Distributed System Architectures. PhD Dissertation, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, PA. http://wpweb2k.gsia.cmu.edu/ceic/theses/Hisham_Zerriffi_PhD_Thesis_2004.pdf.
Zipf, G. K. 1929. Relative frequency as a determinant of phonetic change. Harvard Studies in Classical Philology 15: 1–95.CrossRefGoogle Scholar
Zipf, G. K. 1965. Psycho-biology of Languages. Cambridge, MA: MIT Press.Google Scholar
Zuboff, Shoshana. 1988. In the Age of the Smart Machine. New York: Basic Books.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×