Búsqueda

A Screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>A Screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism</title>
</titleInfo>
<titleInfo type="alternative">
<title>Risk analysis : an international journal</title>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080296346">
<namePart>Apostolakis, George E.</namePart>
<nameIdentifier>MAPA20080296346</nameIdentifier>
</name>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080198220">
<namePart>Lemon, Douglas M.</namePart>
<nameIdentifier>MAPA20080198220</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<dateIssued encoding="marc">2005</dateIssued>
<issuance>serial</issuance>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<form authority="marccategory">microform</form>
</physicalDescription>
<abstract>The extreme importance of critical infrastructures to modern society is widely recognized. These infrastrustures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures</abstract>
<note type="statement of responsibility">George E. Apostolakis and Douglas M. Lemon</note>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080556808">
<topic>Terrorismo</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080549756">
<topic>Atentados</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080571009">
<topic>Vulnerabilidad</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080569235">
<topic>Identificación</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080578886">
<topic>Análisis en redes</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080576325">
<topic>Infraestructuras</topic>
</subject>
<classification authority="">7</classification>
<relatedItem type="host">
<titleInfo>
<title>Risk analysis : an international journal</title>
</titleInfo>
<originInfo>
<publisher>New York and London</publisher>
</originInfo>
<identifier type="local">MAP20077000345</identifier>
<part>
<text>Vol. 25, nº 2, April 2005 ; p. 361-376</text>
</part>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">050715</recordCreationDate>
<recordChangeDate encoding="iso8601">20080418125331.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20071506995</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>