Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-08T05:07:45.770Z Has data issue: false hasContentIssue false

16 - Interdependent Security in Interconnected Networks

Published online by Cambridge University Press:  30 July 2009

Geoffrey Heal
Affiliation:
Columbia Business School
Michael Kearns
Affiliation:
Professor in the Computer and Information Science Department The Wharton School, University of Pennsylvania
Paul Kleindorfer
Affiliation:
Anheuser Busch Professor of Management Science The Wharton School, University of Pennsylvania
Howard Kunreuther
Affiliation:
Cecilia Yen Koo Professor of Decision Sciences and Public Policy The Wharton School, University of Pennsylvania
Philip E. Auerswald
Affiliation:
George Mason University, Virginia
Lewis M. Branscomb
Affiliation:
Harvard University, Massachusetts
Todd M. La Porte
Affiliation:
George Mason University, Virginia
Erwann O. Michel-Kerjan
Affiliation:
University of Pennsylvania
Get access

Summary

In an interdependent world, the risks faced by any individual, firm, region, or country depend not only on its own choices but also on those of others. In the context of terrorism, the risks faced by any airline, for example, are tied to the security standards of other carriers and airports.

To illustrate this point, consider the destruction of Pan Am flight 103 in 1988. In Malta, terrorists checked a bag containing a bomb on Malta Airlines, which had minimal security procedures. The bag was transferred in Frankfurt to a Pan Am feeder line and then loaded onto Pan Am 103 in London's Heathrow Airport. The transferred piece of luggage was not inspected at either Frankfurt or London – the assumption in each subsequent airport being that baggage had been inspected at the point of origin. The bomb had been designed to explode above 28,000 feet, a height normally attained only on the transatlantic route. The bomb exploded over Lockerbie, Scotland, killing 259 passengers and crew, and another 11 people on the ground. Failures in a peripheral part of the airline network, Malta, compromised the security of a flight leaving from a core hub, London.

A great deal of work on the vulnerability of critical infrastructures to terrorist attacks is described elsewhere in this book. These other chapters focus on individual firms or systems, such as the electric grid, telecommunications services, and the cyber network, and ask how much their security depends on the actions of others due to the transmission of harmful effects from one agent to another (which from now on we refer to as contamination).

Type
Chapter
Information
Seeds of Disaster, Roots of Response
How Private Action Can Reduce Public Vulnerability
, pp. 258 - 276
Publisher: Cambridge University Press
Print publication year: 2006

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×