Assessing the Attractiveness of Urban Uses Against Terrorist Attacks Using the RANCOM-PIV Method

Document Type : Original Article

Authors

1 Department of Architecture, Science and Research Branch, Islamic Azad University, Tehran, Iran

2 Assistant Professor, Department of Architecture, Faculty of Civil Engineering, Architecture and Art, Islamic Azad University, Science and Research Branch, Tehran, Iran.

3 Professor, Department of Architecture, Faculty of Civil Engineering, Architecture and Art, Islamic Azad University, Science and Research Branch, Tehran, Iran.

Abstract
Extended Abstract
Introduction
Terrorist attacks, which are one of the most dangerous security challenges in the contemporary world, have painful effects on society and social, political, and economic structures. Over the past two decades, terrorist attacks with religious and political motives have been increasing (Budo et al., 2019; Koehler, 2016). This phenomenon has spread a sense of insecurity and anxiety among different countries and societies; therefore, analyzing the vulnerability caused by these attacks seems necessary. The scientific study of terrorism and counterterrorism has witnessed explosive growth today, with a large number of studies addressing the threat of terrorism and examining how to mitigate such threats (Bakshi & Pinkler, 2018; Dessler, 2002), predict (Campedella et al., 2021; Dessler, 2002; Python et al., 2021), and describe (Jaspersen & Montibler, 2020). Although counterterrorism efforts have led to improved technologies, more resilient targets, and increased security personnel, terrorists continue to seek to identify vulnerabilities in existing systems and infrastructure, a fact that reflects the adaptive nature of terrorists, which has motivated much work using game theory to study strategic interactions between defenders and adversaries (Hunt & Zhang, 2024).
Although this breadth of research history demonstrates a highly advanced understanding of how and why terrorism occurs, there are key gaps in the place and time of emergence of the terrorism threat; therefore, the important issue of the present research is to what extent each urban use is attractive to terrorist attacks. Ranking and assessing the attractiveness of each use plays a significant role in identifying vulnerabilities and calculating the resilience of cities against terrorist threats; because in terrorist threats, especially bombing operations, in addition to the attacked use itself, adjacent uses within the explosion radius are also affected, and in practice, it increases vulnerability and reduces resilience in this area and can be a very influential indicator.Considering the above issues, this article seeks to answer the following questions:
What indicators are effective in determining the target points of terrorist attacks?
hat incentives and barriers exist in the path of planning and carrying out terrorist attacks in urban environments?
What scenarios can be implemented to reduce the impact of terrorist attacks in urban environments?
How practical are scenarios in reducing threats?
Research Methodology
The present study is classified as applied-developmental research in terms of research type and descriptive-analytical research in terms of research nature. The research method employed in this study is a descriptive-analytical approach. First, using library and internet resources, the history of terrorist attacks was examined, along with their impact on various urban uses. Next, the effective indicators for evaluating the attractiveness of urban uses in the context of terrorist attacks were identified. Then, the types of uses and micro-uses were extracted from different sources. By designing a questionnaire, the scores for each indicator were obtained based on the opinions of experts. Then, using the RANCOM multi-criteria decision-making method, the weight and importance of each indicator were obtained. Finally, using the PIV decision-making method, the attractiveness of each micro-use was ranked.
Result and discussion
Calculating the weight of indicators for evaluating the attractiveness of urban uses against terrorist attacks
The RANCOM decision-making method was employed to determine the weights of the indicators. In this regard, the results obtained from the questionnaires were first analyzed using SPSS software. Then, the priority of the weights was determined, which is the first stage of the RANCOM method, and a pairwise comparison matrix was subsequently formed. The collective weight of the criteria was then calculated, and finally, the final weight of each indicator was obtained.
According to the elite community of this research, the damage and casualties index has the highest weight, because, based on the behavior of terrorists, they try to attack applications that cause the most damage and casualties in order to create more fear and panic in society. The threat history index is ranked second and weighs 0.267. The population density index is ranked next, with a weight of 0.2, and finally, the two indicators of secondary damage and continuity of essential services are ranked.
Calculating the rank and weight of micro-user attractiveness using the PIV method
In this stage of the research, the nature of the criteria was first determined. Then, using the results obtained from the analysis of the questionnaires in SPSS software with a reliability of 96%, a decision-making matrix was formed based on the PIV method, which included five indicators and 65 micro-users. Next, the matrix was normalized, and using the results of the RANCOM decision-making method, in which the weights of each indicator were obtained, the weighting of the normalized decision-making matrix was performed. Then, the distance criterion and the collective value of the distance were calculated. Finally, the weight and rank of each micro-user were determined, and the results are presented in Table 6.
Conclusion
Based on the results obtained from the urban commercial centers of the market, wholesale is ranked first in terms of attractiveness to users for terrorist attacks, the main reason being the large population during this holiday. In addition to commercial shops, this center now includes many other areas such as cinemas, game centers, etc., which, if carried out by a terrorist attack, would cause a lot of human casualties and create much panic in the city. In second place, the micro-utilization of airports with a score of 0.158 are ranked second due to population density and the importance of their services, followed by military command centers in third place, oil and gas infrastructure in fourth, border control centers in fifth, and port facilities in sixth. Religious sites, hospitals, military and law enforcement headquarters, and courts and prosecutors’ offices are ranked in the subsequent positions. These findings are consistent with the data from the GTD database in 2024.

Keywords

Subjects


  1. Al Amosh, H., Khatib, S. F., & Ananzeh, H. (2024). Terrorist attacks and environmental social and governance performance: Evidence from cross‐country panel data. Corporate Social Responsibility and Environmental Management, 31(1), 210-223. https://doi.org/10.1002/csr.2563
  2. Asal, V., & Rethemeyer, R. K. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. The Journal of Politics, 70(2), 437-449.
  3. Bakshi, N., & Pinker, E. (2018). Public warnings in counterterrorism operations: Managing the “Cry-Wolf” effect when facing a strategic adversary. Operations Research, 66(4), 977-993. https://doi.org/10.1287/opre.2018.1721
  4. Bitarafan, M., Hosseini, K. A., & Zolfani, S. H. (2023). Identification and assessment of man-made threats to cities using integrated Grey BWM-Grey MARCOS method. Decision Making: Applications in Management and Engineering, 6(2), 581-599. https://doi.org/10.31181/dmame622023747
  5. Bitarafan, M., Hosseini, S. B., Abazarlou, S., & Mahmoudzadeh, A. (2015). Selecting the optimal composition of architectural forms from the perspective of civil defense using AHP and IHWP methods. Architectural Engineering and Design Management, 11(2), 137-148. https://doi.org/10.1080/17452007.2013.802982
  6. Bondü, R., & Beier, S. (2015). Two of a kind? Differences and similarities of attacks in schools and in institutes of higher education. Journal of Interpersonal Violence, 30(2), 253-271. https://doi.org/1177/0886260514533156
  7. Bondü, R., Tampe, L., & Menke, K. (2019). Gemeinsamkeiten und Unterschiede von Amokläufen an Bildungseinrichtungen und islamistisch motivierten terroristischen Taten in westlichen Ländern 1999-2017. RPsych Rechtspsychologie, 5(2), 143-159.
  8. Campedelli, G. M., Bartulovic, M., & Carley, K. M. (2021). Learning future terrorist targets through temporal meta-graphs. Scientific reports, 11(1), 8533. https://doi.org/10.1038/s41598-021-87709-7
  9. Campedelli, G. M., Cruickshank, I., & Carley, K. M. (2023). Multi-modal networks reveal patterns of operational similarity of terrorist organizations. Terrorism and political violence, 35(5), 1065-1084. https://doi.org/1080/09546553.2021.2003785
  10. Deisler, P. F. (2002). A perspective: Risk analysis as a tool for reducing the risks of terrorism. Risk Analysis, 22(3), 405-413.  https://doi.org/10.1111/0272-4332.00050
  11. Eftekhari, M., Hatamnia, A., & Bitarafan, M. (2012). Evaluating prefabrication level of shelters using hierarchical analysis method (AHP). American Journal of Advanced Scientific Research (AJASR), 1(2).
  12. Firhi, D., & Zohairi, S. (2008). Terrorism; definition, history, and existing approaches in analyzing the phenomenon of terrorism. Policy. Journal of the Faculty of Law and Political Science, 38(3), 145-165. [in Persian]
  13. Gambetta, D., & Hertog, S. (2018). Engineers of jihad: The curious connection between violent extremism and education. Princeton University Press.
  14. Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviors of lone‐actor terrorists. Journal of forensic sciences, 59(2), 425-435. https://doi.org/10.1111/1556-4029.12312
  15. Global Terrorism Database (GTD). (2024). Available at: https://www.start.umd.edu/research-projects/global-terrorism-database-gtd
  16. Hasheminasab, H., Hashemkhani Zolfani, S., Bitarafan, M., Chatterjee, P., & Abhaji Ezabadi, A. (2019). The role of façade materials in blast-resistant buildings: an evaluation based on fuzzy Delphi and fuzzy EDAS. Algorithms, 12(6), 119. https://doi.org/10.3390/a12060119
  17. Hosseini, S. T., Lale Arefi, S., Bitarafan, M., Abazarlou, S., & Zavadskas, E. K. (2016). Evaluation types of exterior walls to reconstruct Iran earthquake areas (Ahar Heris Varzeqan) by using AHP and fuzzy methods. International Journal of Strategic Property Management, 20(3), 328-340. https://doi.org/10.3846/1648715X.2016.1190794
  18. Hunt, K., & Zhuang, J. (2024). A review of attacker-defender games: Current state and paths forward. European Journal of Operational Research, 313(2), 401-417. https://doi.org/10.1016/j.ejor.2023.04.009
  19. Hunt, K., Behlendorf, B., Wang, S., Mukherjee, S., & Zhuang, J. (2024). Near-repeat terrorism: Identifying and analyzing the spatiotemporal attack patterns of major terrorist organizations. Expert Systems with Applications, 249, 123712. https://doi.org/10.1016/j.eswa.2024.123712
  20. Jaspersen, J. G., & Montibeller, G. (2020). On the learning patterns and adaptive behavior of terrorist organizations. European Journal of Operational Research, 282(1), 221-234. https://doi.org/10.1016/j.ejor.2019.09.011
  21. Keeney, G. L., & Von Winterfeldt, D. (2010). Identifying and structuring the objectives of terrorists. Risk Analysis: An International Journal, 30(12), 1803-1816. https://doi.org/1111/j.1539-6924.2010.01472.x.
  22. Khan, N. Z., Ansari, T. S. A., Siddiquee, A. N., & Khan, Z. A. (2019). Selection of E-learning websites using a novel Proximity Indexed Value (PIV) MCDM method. Journal of Computers in Education, 6, 241-256.
  23. Koehler, D. (2016). Right-wing extremism and terrorism in Europe: Current developments and issues for the future. July 18. Prism, 6.
  24. Mohseni, R. (2011). Recognition and analysis of the phenomenon of terrorism. Political Studies, 3(12), 199-220. [in Persian]
  25. Mufazzal, S., & Muzakkir, S. M. (2018). A new multi-criterion decision making (MCDM) method based on proximity indexed value for minimizing rank reversals. Computers & Industrial Engineering, 119, 427-438.
  26. Nakhaei, J., Bitarafan, M., & Lale Arefi, S. (2015). Choosing the best urban tunnels as safe space in crisis using AHP method: a case study in Iran. Journal of Architecture and Urbanism, 39(2), 149-160. https://doi.org/10.3846/20297955.2015.1056439
  27. Nakhaei, J., Bitarafan, M., Lale Arefi, S., & Kapliński, O. (2016). Model for rapid assessment of vulnerability of office buildings to blast using SWARA and SMART methods (a case study of swiss re tower). Journal of Civil Engineering and Management, 22(6), 831-843. https://doi.org/10.3846/13923730.2016.1189457
  28. Nigam, M., Barthwal, A., Avikal, S., & Ram, M. (2024). An integrated BWM and PIV approach for vendor selection methodology for predictive maintenance 4.0 in chemical fertilizer industry. International Journal of System Assurance Engineering and Management.
  29. Python, A., Bender, A., Nandi, A. K., Hancock, P. A., Arambepola, R., Brandsch, J., & Lucas, T. C. (2021). Predicting non-state terrorism worldwide. Science advances, 7(31), eabg4778.
  30. Raigar, J., Sharma, V. S., Srivastava, S., Chand, R., & Singh, J. (2020). A decision support system for the selection of an additive manufacturing process using a new hybrid MCDM technique. Sādhanā, 45, 1-14.
  31. Rani, P., Mishra, A. R., Alrasheedi, A. F., Xie, B., & DWIVEDI, R. (2023). Evaluating the Sustainable Human Resource Management in Manufacturing Firms Using Single-Valued Neutrosophic Distance Measure-Based RANCOM-AROMAN Model. https://doi.org/10.20944/preprints202309.1698.v1
  32. Shipman, A., Majumdar, A., Boyce, N., & Lovreglio, R. (2024). Movement behaviour of pedestrians in knife-based terrorist attacks: An experimental approach. Transportation Research Part C: Emerging Technologies, 166, 104790. https://doi.org/10.1016/j.trc.2024.104790
  33. Siebert, Johannes Ulrich, and Detlof Von Winterfeldt. “Comparative analysis of terrorists’ objectives hierarchies.” Decision Analysis 17, no. 2 (2020): 97-114. https://doi.org/10.1287/deca.2019.0400
  34. Stewart, M. G., Thöns, S., & Beck, A. T. (2023). Assessment of risk reduction strategies for terrorist attacks on structures. Structural Safety, 104, 102353. https://doi.org/10.1016/j.strusafe.2023.102381
  35. Tutun, S., Khasawneh, M. T., & Zhuang, J. (2017). New framework that uses patterns and relations to understand terrorist behaviors. Expert Systems with Applications, 78, 358-375. https://doi.org/10.1016/j.eswa.2017.02.029
  36. Völker, T. (2024). How terrorist attacks distort public debates: a comparative study of right-wing and Islamist extremism. Journal of European Public Policy, 31(11), 3487-3514. https://doi.org/10.1080/13501763.2023.2269194
  37. Vossekuil, B. (2002). The final report and findings of the Safe School Initiative: Implications for the prevention of school attacks in the United States. Diane Publishing.
  38. Wadoud, A. A., Galahom, A. A., & Abdel-Rahman, M. A. (2024). A proposed design for security system for nuclear waste warehouses against terrorists attack. Nuclear Engineering and Design, 427, 113437. https://doi.org/10.1016/j.nucengdes.2024.113437
  39. Więckowski, J., Kizielewicz, B., & Sałabun, W. (2024a). A multi-dimensional sensitivity analysis approach for evaluating the robustness of renewable energy sources in European countries. Journal of Cleaner Production, 469, 143225. https://doi.org/10.1016/j.jclepro.2024.143225
  40. Więckowski, J., Kizielewicz, B., Shekhovtsov, A., & Sałabun, W. (2023). RANCOM: A novel approach to identifying criteria relevance based on inaccuracy expert judgments. Engineering Applications of Artificial Intelligence, 122, 106114.41. https://doi.org/10.1016/j.engappai.2023.106114Get rights and content
  41. Więckowski, J., Wątróbski, J., & Sałabun, W. (2024b). Inaccuracies in expert judgment: Comparative analysis of RANCOM and AHP methods in housing location selection problem. IEEE Access. https://doi.org/1109/ACCESS.2024.3443451
  42. Zarei, H. (2007). Mezan Legal Quarterly, New Series, Issues 2 & 1, pp. 165-179. [in Persian]
  43. Zolfani, S. H., Esfahani, M. H., Bitarafan, M., Zavadskas, E. K., & Arefi, S. L. (2013). Developing a new hybrid MCDM method for selection of the optimal alternative of mechanical longitudinal ventilation of tunnel pollutants during automobile accidents. Transport, 28(1), 89-96. https://doi.org/10.3846/16484142.2013.782567