Sample records for critical infrastructure interdependency

  1. Reliable Communication Models in Interdependent Critical Infrastructure Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Sangkeun; Chinthavali, Supriya; Shankar, Mallikarjun

    Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructuremore » networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.« less

  2. Hierarchical Coloured Petrinet Based Healthcare Infrastructure Interdependency Model

    NASA Astrophysics Data System (ADS)

    Nivedita, N.; Durbha, S.

    2014-11-01

    To ensure a resilient Healthcare Critical Infrastructure, understanding the vulnerabilities and analysing the interdependency on other critical infrastructures is important. To model this critical infrastructure and its dependencies, Hierarchal Coloured petri net modelling approach for simulating the vulnerability of Healthcare Critical infrastructure in a disaster situation is studied.. The model enables to analyse and understand various state changes, which occur when there is a disruption or damage to any of the Critical Infrastructure, and its cascading nature. It also enables to explore optimal paths for evacuation during the disaster. The simulation environment can be used to understand and highlight various vulnerabilities of Healthcare Critical Infrastructure during a flood disaster scenario; minimize consequences; and enable timely, efficient response.

  3. Critical Infrastructure Interdependencies Assessment

    DOE PAGES

    Petit, Frederic; Verner, Duane

    2016-11-01

    Throughout the world there is strong recognition that critical infrastructure security and resilience needs to be improved. In the United States, the National Infrastructure Protection Plan (NIPP) provides the strategic vision to guide the national effort to manage risk to the Nation’s critical infrastructure.”1 The achievement of this vision is challenged by the complexity of critical infrastructure systems and their inherent interdependencies. The update to the NIPP presents an opportunity to advance the nation’s efforts to further understand and analyze interdependencies. Such an important undertaking requires the involvement of public and private sector stakeholders and the reinforcement of existing partnershipsmore » and collaborations within the U.S. Department of Homeland Security (DHS) and other Federal agencies, including national laboratories; State, local, tribal, and territorial governments; and nongovernmental organizations.« less

  4. Modeling joint restoration strategies for interdependent infrastructure systems.

    PubMed

    Zhang, Chao; Kong, Jingjing; Simonovic, Slobodan P

    2018-01-01

    Life in the modern world depends on multiple critical services provided by infrastructure systems which are interdependent at multiple levels. To effectively respond to infrastructure failures, this paper proposes a model for developing optimal joint restoration strategy for interdependent infrastructure systems following a disruptive event. First, models for (i) describing structure of interdependent infrastructure system and (ii) their interaction process, are presented. Both models are considering the failure types, infrastructure operating rules and interdependencies among systems. Second, an optimization model for determining an optimal joint restoration strategy at infrastructure component level by minimizing the economic loss from the infrastructure failures, is proposed. The utility of the model is illustrated using a case study of electric-water systems. Results show that a small number of failed infrastructure components can trigger high level failures in interdependent systems; the optimal joint restoration strategy varies with failure occurrence time. The proposed models can help decision makers to understand the mechanisms of infrastructure interactions and search for optimal joint restoration strategy, which can significantly enhance safety of infrastructure systems.

  5. Modeling joint restoration strategies for interdependent infrastructure systems

    PubMed Central

    Simonovic, Slobodan P.

    2018-01-01

    Life in the modern world depends on multiple critical services provided by infrastructure systems which are interdependent at multiple levels. To effectively respond to infrastructure failures, this paper proposes a model for developing optimal joint restoration strategy for interdependent infrastructure systems following a disruptive event. First, models for (i) describing structure of interdependent infrastructure system and (ii) their interaction process, are presented. Both models are considering the failure types, infrastructure operating rules and interdependencies among systems. Second, an optimization model for determining an optimal joint restoration strategy at infrastructure component level by minimizing the economic loss from the infrastructure failures, is proposed. The utility of the model is illustrated using a case study of electric-water systems. Results show that a small number of failed infrastructure components can trigger high level failures in interdependent systems; the optimal joint restoration strategy varies with failure occurrence time. The proposed models can help decision makers to understand the mechanisms of infrastructure interactions and search for optimal joint restoration strategy, which can significantly enhance safety of infrastructure systems. PMID:29649300

  6. Geographic Hotspots of Critical National Infrastructure.

    PubMed

    Thacker, Scott; Barr, Stuart; Pant, Raghav; Hall, Jim W; Alderson, David

    2017-12-01

    Failure of critical national infrastructures can result in major disruptions to society and the economy. Understanding the criticality of individual assets and the geographic areas in which they are located is essential for targeting investments to reduce risks and enhance system resilience. Within this study we provide new insights into the criticality of real-life critical infrastructure networks by integrating high-resolution data on infrastructure location, connectivity, interdependence, and usage. We propose a metric of infrastructure criticality in terms of the number of users who may be directly or indirectly disrupted by the failure of physically interdependent infrastructures. Kernel density estimation is used to integrate spatially discrete criticality values associated with individual infrastructure assets, producing a continuous surface from which statistically significant infrastructure criticality hotspots are identified. We develop a comprehensive and unique national-scale demonstration for England and Wales that utilizes previously unavailable data from the energy, transport, water, waste, and digital communications sectors. The testing of 200,000 failure scenarios identifies that hotspots are typically located around the periphery of urban areas where there are large facilities upon which many users depend or where several critical infrastructures are concentrated in one location. © 2017 Society for Risk Analysis.

  7. Geospatial decision support framework for critical infrastructure interdependency assessment

    NASA Astrophysics Data System (ADS)

    Shih, Chung Yan

    Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).

  8. Stochastic Coloured Petrinet Based Healthcare Infrastructure Interdependency Model

    NASA Astrophysics Data System (ADS)

    Nukavarapu, Nivedita; Durbha, Surya

    2016-06-01

    The Healthcare Critical Infrastructure (HCI) protects all sectors of the society from hazards such as terrorism, infectious disease outbreaks, and natural disasters. HCI plays a significant role in response and recovery across all other sectors in the event of a natural or manmade disaster. However, for its continuity of operations and service delivery HCI is dependent on other interdependent Critical Infrastructures (CI) such as Communications, Electric Supply, Emergency Services, Transportation Systems, and Water Supply System. During a mass casualty due to disasters such as floods, a major challenge that arises for the HCI is to respond to the crisis in a timely manner in an uncertain and variable environment. To address this issue the HCI should be disaster prepared, by fully understanding the complexities and interdependencies that exist in a hospital, emergency department or emergency response event. Modelling and simulation of a disaster scenario with these complexities would help in training and providing an opportunity for all the stakeholders to work together in a coordinated response to a disaster. The paper would present interdependencies related to HCI based on Stochastic Coloured Petri Nets (SCPN) modelling and simulation approach, given a flood scenario as the disaster which would disrupt the infrastructure nodes. The entire model would be integrated with Geographic information based decision support system to visualize the dynamic behaviour of the interdependency of the Healthcare and related CI network in a geographically based environment.

  9. Enhancing infrastructure resilience through business continuity planning.

    PubMed

    Fisher, Ronald; Norman, Michael; Klett, Mary

    2017-01-01

    Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.

  10. Beyond bouncing back : a roundtable on critical transportation resilience

    DOT National Transportation Integrated Search

    2013-06-01

    Global transportation infrastructure today is confronted with significant vulnerabilities an aging : infrastructure; a growing concentration of populations at high-density coastal urban areas; increasing : interdependencies among the nation's phy...

  11. Simulating economic effects of disruptions in the telecommunications infrastructure.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cox, Roger Gary; Barton, Dianne Catherine; Reinert, Rhonda K.

    2004-01-01

    CommAspen is a new agent-based model for simulating the interdependent effects of market decisions and disruptions in the telecommunications infrastructure on other critical infrastructures in the U.S. economy such as banking and finance, and electric power. CommAspen extends and modifies the capabilities of Aspen-EE, an agent-based model previously developed by Sandia National Laboratories to analyze the interdependencies between the electric power system and other critical infrastructures. CommAspen has been tested on a series of scenarios in which the communications network has been disrupted, due to congestion and outages. Analysis of the scenario results indicates that communications networks simulated by themore » model behave as their counterparts do in the real world. Results also show that the model could be used to analyze the economic impact of communications congestion and outages.« less

  12. Analysis of Critical Infrastructure Dependencies and Interdependencies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Petit, Frederic; Verner, Duane; Brannegan, David

    2015-06-01

    The report begins by defining dependencies and interdependencies and exploring basic concepts of dependencies in order to facilitate a common understanding and consistent analytical approaches. Key concepts covered include; Characteristics of dependencies: upstream dependencies, internal dependencies, and downstream dependencies; Classes of dependencies: physical, cyber, geographic, and logical; and Dimensions of dependencies: operating environment, coupling and response behavior, type of failure, infrastructure characteristics, and state of operations From there, the report proposes a multi-phase roadmap to support dependency and interdependency assessment activities nationwide, identifying a range of data inputs, analysis activities, and potential products for each phase, as well as keymore » steps needed to progress from one phase to the next. The report concludes by outlining a comprehensive, iterative, and scalable framework for analyzing dependencies and interdependencies that stakeholders can integrate into existing risk and resilience assessment efforts.« less

  13. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  14. System Dynamics Approach for Critical Infrastructure and Decision Support. A Model for a Potable Water System.

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Witkowski, M.

    2005-12-01

    The Critical Infrastructure Protection / Decision Support System (CIP/DSS) project, supported by the Science and Technology Office, has been developing a risk-informed Decision Support System that provides insights for making critical infrastructure protection decisions. The system considers seventeen different Department of Homeland Security defined Critical Infrastructures (potable water system, telecommunications, public health, economics, etc.) and their primary interdependencies. These infrastructures have been modeling in one model called CIP/DSS Metropolitan Model. The modeling approach used is a system dynamics modeling approach. System dynamics modeling combines control theory and the nonlinear dynamics theory, which is defined by a set of coupled differential equations, which seeks to explain how the structure of a given system determines its behavior. In this poster we present a system dynamics model for one of the seventeen critical infrastructures, a generic metropolitan potable water system (MPWS). Three are the goals: 1) to gain a better understanding of the MPWS infrastructure; 2) to identify improvements that would help protect MPWS; and 3) to understand the consequences, interdependencies, and impacts, when perturbations occur to the system. The model represents raw water sources, the metropolitan water treatment process, storage of treated water, damage and repair to the MPWS, distribution of water, and end user demand, but does not explicitly represent the detailed network topology of an actual MPWS. The MPWS model is dependent upon inputs from the metropolitan population, energy, telecommunication, public health, and transportation models as well as the national water and transportation models. We present modeling results and sensitivity analysis indicating critical choke points, negative and positive feedback loops in the system. A general scenario is also analyzed where the potable water system responds to a generic disruption.

  15. Effects of a significant New Madrid Seismic Zone event on oil and natural gas pipelines and their cascading effects to critical infrastructures

    NASA Astrophysics Data System (ADS)

    Fields, Damon E.

    Critical Infrastructure Protection (CIP) is a construct that relates preparedness and responsiveness to natural or man-made disasters that involve vulnerable assets deemed essential for the functioning of our economy and society. Infrastructure systems (power grids, bridges, airports, etc.) are vulnerable to disastrous types of events--natural or man-made. Failures of these systems can have devastating effects on communities and entire regions. CIP relates our willingness, ability, and capability to defend, mitigate, and re-constitute those assets that succumb to disasters affecting one or more infrastructure sectors. This qualitative research utilized ethnography and employed interviews with subject matter experts (SMEs) from various fields of study regarding CIP with respect to oil and natural gas pipelines in the New Madrid Seismic Zone. The study focused on the research question: What can be done to mitigate vulnerabilities in the oil and natural gas infrastructures, along with the potential cascading effects to interdependent systems, associated with a New Madrid fault event? The researcher also analyzed National Level Exercises (NLE) and real world events, and associated After Action Reports (AAR) and Lessons Learned (LL) in order to place a holistic lens across all infrastructures and their dependencies and interdependencies. Three main themes related to the research question emerged: (a) preparedness, (b) mitigation, and (c) impacts. These themes comprised several dimensions: (a) redundancy, (b) node hardening, (c) education, (d) infrastructure damage, (e) cascading effects, (f) interdependencies, (g) exercises, and (h) earthquake readiness. As themes and dimensions are analyzed, they are considered against findings in AARs and LL from previous real world events and large scale exercise events for validation or rejection.

  16. Service Modeling Language Applied to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Baldini, Gianmarco; Fovino, Igor Nai

    The modeling of dependencies in complex infrastructure systems is still a very difficult task. Many methodologies have been proposed, but a number of challenges still remain, including the definition of the right level of abstraction, the presence of different views on the same critical infrastructure and how to adequately represent the temporal evolution of systems. We propose a modeling methodology where dependencies are described in terms of the service offered by the critical infrastructure and its components. The model provides a clear separation between services and the underlying organizational and technical elements, which may change in time. The model uses the Service Modeling Language proposed by the W3 consortium for describing critical infrastructure in terms of interdependent services nodes including constraints, behavior, information flows, relations, rules and other features. Each service node is characterized by its technological, organizational and process components. The model is then applied to a real case of an ICT system for users authentication.

  17. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  18. Reliability analysis of interdependent lattices

    NASA Astrophysics Data System (ADS)

    Limiao, Zhang; Daqing, Li; Pengju, Qin; Bowen, Fu; Yinan, Jiang; Zio, Enrico; Rui, Kang

    2016-06-01

    Network reliability analysis has drawn much attention recently due to the risks of catastrophic damage in networked infrastructures. These infrastructures are dependent on each other as a result of various interactions. However, most of the reliability analyses of these interdependent networks do not consider spatial constraints, which are found important for robustness of infrastructures including power grid and transport systems. Here we study the reliability properties of interdependent lattices with different ranges of spatial constraints. Our study shows that interdependent lattices with strong spatial constraints are more resilient than interdependent Erdös-Rényi networks. There exists an intermediate range of spatial constraints, at which the interdependent lattices have minimal resilience.

  19. A framework for linking cybersecurity metrics to the modeling of macroeconomic interdependencies.

    PubMed

    Santos, Joost R; Haimes, Yacov Y; Lian, Chenyang

    2007-10-01

    Hierarchical decision making is a multidimensional process involving management of multiple objectives (with associated metrics and tradeoffs in terms of costs, benefits, and risks), which span various levels of a large-scale system. The nation is a hierarchical system as it consists multiple classes of decisionmakers and stakeholders ranging from national policymakers to operators of specific critical infrastructure subsystems. Critical infrastructures (e.g., transportation, telecommunications, power, banking, etc.) are highly complex and interconnected. These interconnections take the form of flows of information, shared security, and physical flows of commodities, among others. In recent years, economic and infrastructure sectors have become increasingly dependent on networked information systems for efficient operations and timely delivery of products and services. In order to ensure the stability, sustainability, and operability of our critical economic and infrastructure sectors, it is imperative to understand their inherent physical and economic linkages, in addition to their cyber interdependencies. An interdependency model based on a transformation of the Leontief input-output (I-O) model can be used for modeling: (1) the steady-state economic effects triggered by a consumption shift in a given sector (or set of sectors); and (2) the resulting ripple effects to other sectors. The inoperability metric is calculated for each sector; this is achieved by converting the economic impact (typically in monetary units) into a percentage value relative to the size of the sector. Disruptive events such as terrorist attacks, natural disasters, and large-scale accidents have historically shown cascading effects on both consumption and production. Hence, a dynamic model extension is necessary to demonstrate the interplay between combined demand and supply effects. The result is a foundational framework for modeling cybersecurity scenarios for the oil and gas sector. A hypothetical case study examines a cyber attack that causes a 5-week shortfall in the crude oil supply in the Gulf Coast area.

  20. Post-disaster supply chain interdependent critical infrastructure system restoration: A review of data necessary and available for modeling

    USGS Publications Warehouse

    Ramachandran, Varun; Long, Suzanna K.; Shoberg, Thomas G.; Corns, Steven; Carlo, Hector J.

    2016-01-01

    The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national supply chain interdependent critical infrastructure systems (SCICI). These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation) is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government communities, a more streamlined approach to a real-time acquisition and integration of these data is essential.

  1. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts ofmore » a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.« less

  2. Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK

    NASA Astrophysics Data System (ADS)

    Bloomfield, Robin; Chozos, Nick; Salako, Kizito

    The UK government recently commissioned a research study to identify the state-of-the-art in Critical Infrastructure modelling and analysis, and the government/industry requirements for such tools and services. This study (Cetifs) concluded with a strategy aiming to bridge the gaps between the capabilities and requirements, which would establish interdependency analysis as a commercially viable service in the near future. This paper presents the findings of this study that was carried out by CSR, City University London, Adelard LLP, a safety/security consultancy and Cranfield University, defense academy of the UK.

  3. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence.

    PubMed

    Korkali, Mert; Veneman, Jason G; Tivnan, Brian F; Bagrow, James P; Hines, Paul D H

    2017-03-20

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a "smart" power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  4. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    NASA Astrophysics Data System (ADS)

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-03-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  5. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    PubMed Central

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-01-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained. PMID:28317835

  6. Resilience of networks formed of interdependent modular networks

    NASA Astrophysics Data System (ADS)

    Shekhtman, Louis M.; Shai, Saray; Havlin, Shlomo

    2015-12-01

    Many infrastructure networks have a modular structure and are also interdependent with other infrastructures. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results through simulations. We focus, for simplicity, on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is particularly realistic for modeling infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent only within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has previously been shown that single networks are very susceptible to the failure of the interconnected nodes (between communities) (Shai et al 2014 arXiv:1404.4748) and that attacks on these nodes are even more crippling than attacks based on betweenness (da Cunha et al 2015 arXiv:1502.00353). In our example of cities these nodes have long range links which are more likely to fail. For both treelike and looplike interdependent modular networks we find distinct regimes depending on the number of modules, m. (i) In the case where there are fewer modules with strong intraconnections, the system first separates into modules in an abrupt first-order transition and then each module undergoes a second percolation transition. (ii) When there are more modules with many interconnections between them, the system undergoes a single transition. Overall, we find that modular structure can significantly influence the type of transitions observed in interdependent networks and should be considered in attempts to make interdependent networks more resilient.

  7. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    NASA Astrophysics Data System (ADS)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling between CIS.

  8. A modeling framework for investment planning in interdependent infrastructures in multi-hazard environments.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.

    Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research & Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorists actions based on assumptions regardingmore » their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.« less

  9. Modeling the resilience of critical infrastructure: the role of network dependencies.

    PubMed

    Guidotti, Roberto; Chmielewski, Hana; Unnikrishnan, Vipin; Gardoni, Paolo; McAllister, Therese; van de Lindt, John

    2016-01-01

    Water and wastewater network, electric power network, transportation network, communication network, and information technology network are among the critical infrastructure in our communities; their disruption during and after hazard events greatly affects communities' well-being, economic security, social welfare, and public health. In addition, a disruption in one network may cause disruption to other networks and lead to their reduced functionality. This paper presents a unified theoretical methodology for the modeling of dependent/interdependent infrastructure networks and incorporates it in a six-step probabilistic procedure to assess their resilience. Both the methodology and the procedure are general, can be applied to any infrastructure network and hazard, and can model different types of dependencies between networks. As an illustration, the paper models the direct effects of seismic events on the functionality of a potable water distribution network and the cascading effects of the damage of the electric power network (EPN) on the potable water distribution network (WN). The results quantify the loss of functionality and delay in the recovery process due to dependency of the WN on the EPN. The results show the importance of capturing the dependency between networks in modeling the resilience of critical infrastructure.

  10. Modeling the resilience of critical infrastructure: the role of network dependencies

    PubMed Central

    Guidotti, Roberto; Chmielewski, Hana; Unnikrishnan, Vipin; Gardoni, Paolo; McAllister, Therese; van de Lindt, John

    2017-01-01

    Water and wastewater network, electric power network, transportation network, communication network, and information technology network are among the critical infrastructure in our communities; their disruption during and after hazard events greatly affects communities’ well-being, economic security, social welfare, and public health. In addition, a disruption in one network may cause disruption to other networks and lead to their reduced functionality. This paper presents a unified theoretical methodology for the modeling of dependent/interdependent infrastructure networks and incorporates it in a six-step probabilistic procedure to assess their resilience. Both the methodology and the procedure are general, can be applied to any infrastructure network and hazard, and can model different types of dependencies between networks. As an illustration, the paper models the direct effects of seismic events on the functionality of a potable water distribution network and the cascading effects of the damage of the electric power network (EPN) on the potable water distribution network (WN). The results quantify the loss of functionality and delay in the recovery process due to dependency of the WN on the EPN. The results show the importance of capturing the dependency between networks in modeling the resilience of critical infrastructure. PMID:28825037

  11. Location-Based Critical Infrastructure Interdependency (LBCII)

    DTIC Science & Technology

    2010-04-01

    Effective disaster management reduces devastation and cost . This section describes the processes of disaster management, including the elements of CEM...it has reasonable probability, based on the tectonic geology and the history of the region. The case highlights the usability of network- centric...of earthquake risk assessment in Cartago, Costa Rica . International Institute for Geo-Information Science and Earth Observation (ITC): Enschede

  12. Sea Level Rise Impacts On Infrastructure Vulnerability

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Mccown, A. W.; Backhaus, S.; Urban, N. M.

    2015-12-01

    Increase of global sea level is one of the potential consequences of climate change and represents a threat for the U.S.A coastal regions, which are highly populated and home of critical infrastructures. The potential danger caused by sea level rise may escalate if sea level rise is coupled with an increase in frequency and intensity of storms that may strike these regions. These coupled threats present a clear risk to population and critical infrastructure and are concerns for Federal, State, and particularly local response and recovery planners. Understanding the effect of sea level rise on the risk to critical infrastructure is crucial for long planning and for mitigating potential damages. In this work we quantify how infrastructure vulnerability to a range of storms changes due to an increase of sea level. Our study focuses on the Norfolk area of the U.S.A. We assess the direct damage of drinking water and wastewater facilities and the power sector caused by a distribution of synthetic hurricanes. In addition, our analysis estimates indirect consequences of these damages on population and economic activities accounting also for interdependencies across infrastructures. While projections unanimously indicate an increase in the rate of sea level rise, the scientific community does not agree on the size of this rate. Our risk assessment accounts for this uncertainty simulating a distribution of sea level rise for a specific climate scenario. Using our impact assessment results and assuming an increase of future hurricanes frequencies and intensities, we also estimate the expected benefits for critical infrastructure.

  13. Trust and Reputation Management for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  14. Pandemic influenza and critical infrastructure dependencies: possible impact on hospitals.

    PubMed

    Itzwerth, Ralf L; Macintyre, C Raina; Shah, Smita; Plant, Aileen J

    2006-11-20

    Hospitals will be particularly challenged when pandemic influenza spreads. Within the health sector in general, existing pandemic plans focus on health interventions to control outbreaks. The critical relationship between the health sector and other sectors is not well understood and addressed. Hospitals depend on critical infrastructure external to the organisation itself. Existing plans do not adequately consider the complexity and interdependency of systems upon which hospitals rely. The failure of one such system can trigger a failure of another, causing cascading breakdowns. Health is only one of the many systems that struggle at maximum capacity during "normal" times, as current business models operate with no or minimal "excess" staff and have become irreducible operations. This makes interconnected systems highly vulnerable to acute disruptions, such as a pandemic. Companies use continuity plans and highly regulated business continuity management to overcome process interruptions. This methodology can be applied to hospitals to minimise the impact of a pandemic.

  15. Emergent Risks In Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Dynes, Scott

    Firms cannot function successfully without managing a host of internal and external organizational and process interdependencies. Part of this involves business continuity planning, which directly aects how resilient arm and its business sector are in the face of disruptions. This paper presents the results of eld studies related to information risk management practices in the health care and retail sectors. The studies explore information risk management coordinating signals within and across rms in these sectors as well as the potential eects of cyber disruptions on the rms as stand-alone entities and as part of a critical infrastructure. The health care case study investigates the impact of the Zotob worm on the ability to deliver medical care and treatment. The retail study examines the resilience of certain elements of the food supply chain to cyber disruptions.

  16. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    DTIC Science & Technology

    2010-09-29

    Natural gas pipelines • Oil terminals; Pump stations • Electric substations • Water facilities • Wastewater facilities • Airports • Roads • Railroads... Gas /Crude Oil  Telecommunications  Water  Healthcare/Public Health Critical Infrastructure Interdependencies BUILDING STRONG® DSES-10 Regional...Preparedness Policy, Office on Resilience, National Security Council, The White House • Mr. Paul Molitor, Senior Industry Director, Smart Grid and

  17. Collapse and pull - down analysis of high voltage electricity transmission towers subjected to cyclonic wind

    NASA Astrophysics Data System (ADS)

    Ahmed, Ammar; Arthur, Craig; Edwards, Mark

    2010-06-01

    Bulk electricity transmission lines are linear assets that can be very exposed to wind effects, particularly where they traverse steep topography or open coastal terrain in cyclonic regions. Interconnected nature of the lattice type towers and conductors also, present complex vulnerabilities. These relate to the direction of wind attack to the conductors and the cascading failure mechanisms in which the failure of a single tower has cascading effects on neighbouring towers. Such behaviour is exacerbated by the finely tuned nature of tower design which serves to minimize cost and reserve strength at design wind speeds. There is a clear need to better quantify the interdependent vulnerabilities of these critical infrastructure assets in the context of the severe wind hazard. This paper presents a novel methodology developed for the Critical Infrastructure Protection Modelling and Analysis (CIPMA) capability for assessing local wind speeds and the likelihood of tower failure for a range of transmission tower and conductor types. CIPMA is a program managed by the Federal Attorney-General's Department and Geoscience Australia is leading the technical development. The methodology then involves the development of heuristically derived vulnerability models that are consistent with Australian industry experience and full-scale static tower testing results, considering isolated tower loss along with three interdependent failure mechanisms to give overall likelihoods of failure.

  18. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.

    Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less

  19. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    DOE PAGES

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; ...

    2017-03-20

    Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less

  20. Volcanic hazards at distant critical infrastructure: A method for bespoke, multi-disciplinary assessment

    NASA Astrophysics Data System (ADS)

    Odbert, H. M.; Aspinall, W.; Phillips, J.; Jenkins, S.; Wilson, T. M.; Scourse, E.; Sheldrake, T.; Tucker, P.; Nakeshree, K.; Bernardara, P.; Fish, K.

    2015-12-01

    Societies rely on critical services such as power, water, transport networks and manufacturing. Infrastructure may be sited to minimise exposure to natural hazards but not all can be avoided. The probability of long-range transport of a volcanic plume to a site is comparable to other external hazards that must be considered to satisfy safety assessments. Recent advances in numerical models of plume dispersion and stochastic modelling provide a formalized and transparent approach to probabilistic assessment of hazard distribution. To understand the risks to critical infrastructure far from volcanic sources, it is necessary to quantify their vulnerability to different hazard stressors. However, infrastructure assets (e.g. power plantsand operational facilities) are typically complex systems in themselves, with interdependent components that may differ in susceptibility to hazard impact. Usually, such complexity means that risk either cannot be estimated formally or that unsatisfactory simplifying assumptions are prerequisite to building a tractable risk model. We present a new approach to quantifying risk by bridging expertise of physical hazard modellers and infrastructure engineers. We use a joint expert judgment approach to determine hazard model inputs and constrain associated uncertainties. Model outputs are chosen on the basis of engineering or operational concerns. The procedure facilitates an interface between physical scientists, with expertise in volcanic hazards, and infrastructure engineers, with insight into vulnerability to hazards. The result is a joined-up approach to estimating risk from low-probability hazards to critical infrastructure. We describe our methodology and show preliminary results for vulnerability to volcanic hazards at a typical UK industrial facility. We discuss our findings in the context of developing bespoke assessment of hazards from distant sources in collaboration with key infrastructure stakeholders.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gali, Emmanuel; Eidenbenz, Stephan; Mniszewski, Sue

    The United States' Department of Homeland Security aims to model, simulate, and analyze critical infrastructure and their interdependencies across multiple sectors such as electric power, telecommunications, water distribution, transportation, etc. We introduce ActivitySim, an activity simulator for a population of millions of individual agents each characterized by a set of demographic attributes that is based on US census data. ActivitySim generates daily schedules for each agent that consists of a sequence of activities, such as sleeping, shopping, working etc., each being scheduled at a geographic location, such as businesses or private residences that is appropriate for the activity type andmore » for the personal situation of the agent. ActivitySim has been developed as part of a larger effort to understand the interdependencies among national infrastructure networks and their demand profiles that emerge from the different activities of individuals in baseline scenarios as well as emergency scenarios, such as hurricane evacuations. We present the scalable software engineering principles underlying ActivitySim, the socia-technical modeling paradigms that drive the activity generation, and proof-of-principle results for a scenario in the Twin Cities, MN area of 2.6 M agents.« less

  2. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    DTIC Science & Technology

    2008-04-01

    consumers and electric utilities in Arizona and Southern California. Twelve people, including five children, died as a result of the explosion. The...Modern electronics, communications, pro- tection, control and computers have allowed the physical system to be utilized fully with ever smaller... margins for error. Therefore, a relatively modest upset to the system can cause functional collapse. As the system grows in complexity and interdependence

  3. Infrastructure system restoration planning using evolutionary algorithms

    USGS Publications Warehouse

    Corns, Steven; Long, Suzanna K.; Shoberg, Thomas G.

    2016-01-01

    This paper presents an evolutionary algorithm to address restoration issues for supply chain interdependent critical infrastructure. Rapid restoration of infrastructure after a large-scale disaster is necessary to sustaining a nation's economy and security, but such long-term restoration has not been investigated as thoroughly as initial rescue and recovery efforts. A model of the Greater Saint Louis Missouri area was created and a disaster scenario simulated. An evolutionary algorithm is used to determine the order in which the bridges should be repaired based on indirect costs. Solutions were evaluated based on the reduction of indirect costs and the restoration of transportation capacity. When compared to a greedy algorithm, the evolutionary algorithm solution reduced indirect costs by approximately 12.4% by restoring automotive travel routes for workers and re-establishing the flow of commodities across the three rivers in the Saint Louis area.

  4. Evaluating the Benefits of Adaptation of Critical Infrastructures to Hydrometeorological Risks.

    PubMed

    Thacker, Scott; Kelly, Scott; Pant, Raghav; Hall, Jim W

    2018-01-01

    Infrastructure adaptation measures provide a practical way to reduce the risk from extreme hydrometeorological hazards, such as floods and windstorms. The benefit of adapting infrastructure assets is evaluated as the reduction in risk relative to the "do nothing" case. However, evaluating the full benefits of risk reduction is challenging because of the complexity of the systems, the scarcity of data, and the uncertainty of future climatic changes. We address this challenge by integrating methods from the study of climate adaptation, infrastructure systems, and complex networks. In doing so, we outline an infrastructure risk assessment that incorporates interdependence, user demands, and potential failure-related economic losses. Individual infrastructure assets are intersected with probabilistic hazard maps to calculate expected annual damages. Protection measure costs are integrated to calculate risk reduction and associated discounted benefits, which are used to explore the business case for investment in adaptation. A demonstration of the methodology is provided for flood protection of major electricity substations in England and Wales. We conclude that the ongoing adaptation program for major electricity assets is highly cost beneficial. © 2017 Society for Risk Analysis.

  5. Interdependent Network Recovery Games.

    PubMed

    Smith, Andrew M; González, Andrés D; Dueñas-Osorio, Leonardo; D'Souza, Raissa M

    2017-10-30

    Recovery of interdependent infrastructure networks in the presence of catastrophic failure is crucial to the economy and welfare of society. Recently, centralized methods have been developed to address optimal resource allocation in postdisaster recovery scenarios of interdependent infrastructure systems that minimize total cost. In real-world systems, however, multiple independent, possibly noncooperative, utility network controllers are responsible for making recovery decisions, resulting in suboptimal decentralized processes. With the goal of minimizing recovery cost, a best-case decentralized model allows controllers to develop a full recovery plan and negotiate until all parties are satisfied (an equilibrium is reached). Such a model is computationally intensive for planning and negotiating, and time is a crucial resource in postdisaster recovery scenarios. Furthermore, in this work, we prove this best-case decentralized negotiation process could continue indefinitely under certain conditions. Accounting for network controllers' urgency in repairing their system, we propose an ad hoc sequential game-theoretic model of interdependent infrastructure network recovery represented as a discrete time noncooperative game between network controllers that is guaranteed to converge to an equilibrium. We further reduce the computation time needed to find a solution by applying a best-response heuristic and prove bounds on ε-Nash equilibrium, where ε depends on problem inputs. We compare best-case and ad hoc models on an empirical interdependent infrastructure network in the presence of simulated earthquakes to demonstrate the extent of the tradeoff between optimality and computational efficiency. Our method provides a foundation for modeling sociotechnical systems in a way that mirrors restoration processes in practice. © 2017 Society for Risk Analysis.

  6. Infrastructure resiliency : a risk-based framework

    DOT National Transportation Integrated Search

    2013-06-26

    We are living in a world of escalating risks. Globalization and spiraling infrastructure interdependencies have created complex and interlinked systems that generate many benefits but also significant risks. High-impact disruptions whether caused...

  7. Percolation and Reinforcement on Complex Networks

    NASA Astrophysics Data System (ADS)

    Yuan, Xin

    Complex networks appear in almost every aspect of our daily life and are widely studied in the fields of physics, mathematics, finance, biology and computer science. This work utilizes percolation theory in statistical physics to explore the percolation properties of complex networks and develops a reinforcement scheme on improving network resilience. This dissertation covers two major parts of my Ph.D. research on complex networks: i) probe--in the context of both traditional percolation and k-core percolation--the resilience of complex networks with tunable degree distributions or directed dependency links under random, localized or targeted attacks; ii) develop and propose a reinforcement scheme to eradicate catastrophic collapses that occur very often in interdependent networks. We first use generating function and probabilistic methods to obtain analytical solutions to percolation properties of interest, such as the giant component size and the critical occupation probability. We study uncorrelated random networks with Poisson, bi-Poisson, power-law, and Kronecker-delta degree distributions and construct those networks which are based on the configuration model. The computer simulation results show remarkable agreement with theoretical predictions. We discover an increase of network robustness as the degree distribution broadens and a decrease of network robustness as directed dependency links come into play under random attacks. We also find that targeted attacks exert the biggest damage to the structure of both single and interdependent networks in k-core percolation. To strengthen the resilience of interdependent networks, we develop and propose a reinforcement strategy and obtain the critical amount of reinforced nodes analytically for interdependent Erdḧs-Renyi networks and numerically for scale-free and for random regular networks. Our mechanism leads to improvement of network stability of the West U.S. power grid. This dissertation provides us with a deeper understanding of the effects of structural features on network stability and fresher insights into designing resilient interdependent infrastructure networks.

  8. Positioning infrastructure and technologies for low-carbon urbanization

    NASA Astrophysics Data System (ADS)

    Chester, Mikhail V.; Sperling, Josh; Stokes, Eleanor; Allenby, Braden; Kockelman, Kara; Kennedy, Christopher; Baker, Lawrence A.; Keirstead, James; Hendrickson, Chris T.

    2014-10-01

    The expected urbanization of the planet in the coming century coupled with aging infrastructure in developed regions, increasing complexity of man-made systems, and pressing climate change impacts have created opportunities for reassessing the role of infrastructure and technologies in cities and how they contribute to greenhouse gas (GHG) emissions. Modern urbanization is predicated on complex, increasingly coupled infrastructure systems, and energy use continues to be largely met from fossil fuels. Until energy infrastructures evolve away from carbon-based fuels, GHG emissions are critically tied to the urbanization process. Further complicating the challenge of decoupling urban growth from GHG emissions are lock-in effects and interdependencies. This paper synthesizes state-of-the-art thinking for transportation, fuels, buildings, water, electricity, and waste systems and finds that GHG emissions assessments tend to view these systems as static and isolated from social and institutional systems. Despite significant understanding of methods and technologies for reducing infrastructure-related GHG emissions, physical, institutional, and cultural constraints continue to work against us, pointing to knowledge gaps that must be addressed. This paper identifies three challenge themes to improve our understanding of the role of infrastructure and technologies in urbanization processes and position these increasingly complex systems for low-carbon growth. The challenges emphasize how we can reimagine the role of infrastructure in the future and how people, institutions, and ecological systems interface with infrastructure.

  9. Cascading Failures and Recovery in Networks of Networks

    NASA Astrophysics Data System (ADS)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  10. Enhancing the Resilience of Interdependent Critical Infrastructure Systems Using a Common Computational Framework

    NASA Astrophysics Data System (ADS)

    Little, J. C.; Filz, G. M.

    2016-12-01

    As modern societies become more complex, critical interdependent infrastructure systems become more likely to fail under stress unless they are designed and implemented to be resilient. Hurricane Katrina clearly demonstrated the catastrophic and as yet unpredictable consequences of such failures. Resilient infrastructure systems maintain the flow of goods and services in the face of a broad range of natural and manmade hazards. In this presentation, we illustrate a generic computational framework to facilitate high-level decision-making about how to invest scarce resources most effectively to enhance resilience in coastal protection, transportation, and the economy of a region. Coastal Louisiana, our study area, has experienced the catastrophic effects of several land-falling hurricanes in recent years. In this project, we implement and further refine three process models (a coastal protection model, a transportation model, and an economic model) for the coastal Louisiana region. We upscale essential mechanistic features of the three detailed process models to the systems level and integrate the three reduced-order systems models in a modular fashion. We also evaluate the proposed approach in annual workshops with input from stakeholders. Based on stakeholder inputs, we derive a suite of goals, targets, and indicators for evaluating resilience at the systems level, and assess and enhance resilience using several deterministic scenarios. The unifying framework will be able to accommodate the different spatial and temporal scales that are appropriate for each model. We combine our generic computational framework, which encompasses the entire system of systems, with the targets, and indicators needed to systematically meet our chosen resilience goals. We will start with targets that focus on technical and economic systems, but future work will ensure that targets and indicators are extended to other dimensions of resilience including those in the environmental and social systems. The overall model can be used to optimize decision making in a probabilistic risk-based framework.

  11. Resilience and Robustness in Long-Term Planning of the National Energy and Transportation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ibanez, Eduardo; Lavrenz, Steven; Gkritza, Konstantina

    2016-01-01

    The most significant energy consuming infrastructures and the greatest contributors to greenhouse gases for any developed nation today are electric and freight/passenger transportation systems. Technological alternatives for producing, transporting and converting energy for electric and transportation systems are numerous. Addressing costs, sustainability and resilience of electric and transportation needs requires long-term assessment since these capital-intensive infrastructures take years to build with lifetimes approaching a century. Yet, the advent of electrically driven transportation, including cars, trucks and trains, creates potential interdependencies between the two infrastructures that may be both problematic and beneficial. We are developing modelling capability to perform long-term electricmore » and transportation infrastructure design at a national level, accounting for their interdependencies. The approach combines network flow modelling with a multi-objective solution method. We describe and compare it to the state of the art in energy planning models. An example is presented to illustrate important features of this new approach.« less

  12. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.

  13. 78 FR 69104 - Second Allocation, Waivers, and Alternative Requirements for Grantees Receiving Community...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... analyses of risks to infrastructure sectors from climate change and other hazards, such as the Northeast... interdependencies within and across communities and infrastructure sectors; changes to climate and development... biodiversity, and conserve natural resources in the face of a changing climate . . .'' h. HUD Review of Covered...

  14. Engineering Infrastructures: Problems of Safety and Security in the Russian Federation

    NASA Astrophysics Data System (ADS)

    Makhutov, Nikolay A.; Reznikov, Dmitry O.; Petrov, Vitaly P.

    Modern society cannot exist without stable and reliable engineering infrastructures (EI), whose operation is vital for any national economy. These infrastructures include energy, transportation, water and gas supply systems, telecommunication and cyber systems, etc. Their performance is commensurate with storing and processing huge amounts of information, energy and hazardous substances. Ageing infrastructures are deteriorating — with operating conditions declining from normal to emergency and catastrophic. The complexity of engineering infrastructures and their interdependence with other technical systems makes them vulnerable to emergency situations triggered by natural and manmade catastrophes or terrorist attacks.

  15. Percolation in multiplex networks with overlap.

    PubMed

    Cellai, Davide; López, Eduardo; Zhou, Jie; Gleeson, James P; Bianconi, Ginestra

    2013-11-01

    From transportation networks to complex infrastructures, and to social and communication networks, a large variety of systems can be described in terms of multiplexes formed by a set of nodes interacting through different networks (layers). Multiplexes may display an increased fragility with respect to the single layers that constitute them. However, so far the overlap of the links in different layers has been mostly neglected, despite the fact that it is an ubiquitous phenomenon in most multiplexes. Here, we show that the overlap among layers can improve the robustness of interdependent multiplex systems and change the critical behavior of the percolation phase transition in a complex way.

  16. Volcanic ash impacts on critical infrastructure

    NASA Astrophysics Data System (ADS)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water supply managers include: monitoring turbidity levels in raw water intakes, and if necessary increasing chlorination to compensate for higher turbidity; managing water demand; and communicating monitoring results with the public to allay fears of contamination. Ash can cause major damage to wastewater disposal systems. Ash deposited onto impervious surfaces such as roads and car parks is very easily washed into storm drains, where it can form intractable masses and lead to long-term flooding problems. It can also enter wastewater treatment plants (WWTPs), both through sewer lines and by direct fallout. Damage to modern WWTPs can run into millions of dollars. Ash falls reduce visibility creating hazards for ground transportation. Dry ash is also readily remobilised by vehicle traffic and wind, and dry and wet ash deposits will reduce traction on paved surfaces, including airport runways. Ash cleanup from road and airports is commonly necessary, but the large volumes make it logistically challenging. Vehicles are vulnerable to ash; it will clog filters and brake systems and abrade moving parts within engines. Lastly, modern telecommunications networks appear to be relatively resilient to volcanic ash fall. Signal attenuation and interference during ash falls has not been reported in eruptions over the past 20 years, with the exception of interference from ash plume-generated lightning. However, some telecommunications equipment is vulnerable to airborne ash, in particular heating, ventilation and air-conditioning (HVAC) systems which may become blocked from ash ingestion leading to overheating. This summary of volcanic ash impacts on critical infrastructure provides insight into the relative vulnerability of infrastructure under a range of different ashfall scenarios. Identifying and quantifying these impacts is an essential step in building resilience within these critical systems. We have attempted to consider interdependencies between sectors in a holistic way using systems thinking. As modern society becomes increasingly complex and interdependent this approach is likely to become increasingly necessary.

  17. Eradicating catastrophic collapse in interdependent networks via reinforced nodes

    PubMed Central

    Yuan, Xin; Hu, Yanqing; Havlin, Shlomo

    2017-01-01

    In interdependent networks, it is usually assumed, based on percolation theory, that nodes become nonfunctional if they lose connection to the network giant component. However, in reality, some nodes, equipped with alternative resources, together with their connected neighbors can still be functioning after disconnected from the giant component. Here, we propose and study a generalized percolation model that introduces a fraction of reinforced nodes in the interdependent networks that can function and support their neighborhood. We analyze, both analytically and via simulations, the order parameter—the functioning component—comprising both the giant component and smaller components that include at least one reinforced node. Remarkably, it is found that, for interdependent networks, we need to reinforce only a small fraction of nodes to prevent abrupt catastrophic collapses. Moreover, we find that the universal upper bound of this fraction is 0.1756 for two interdependent Erdős–Rényi (ER) networks: regular random (RR) networks and scale-free (SF) networks with large average degrees. We also generalize our theory to interdependent networks of networks (NONs). These findings might yield insight for designing resilient interdependent infrastructure networks. PMID:28289204

  18. Network Interdependency Modeling for Risk Assessment on Built Infrastructure Systems

    DTIC Science & Technology

    2013-10-01

    does begin to address infrastructure decay as a source of risk comes from the Department of Homeland Security (DHS). In 2009, the DHS Science and...network of connected edges and nodes. The National Research Council (2005) reported that the study of networks as a science and applications of...principles from this science are still in its early stages. As modern infrastructures have become more interlinked, knowledge of an infrastructure’s network

  19. Interdependence and dynamics of essential services in an extensive risk context: a case study in Montserrat, West Indies

    NASA Astrophysics Data System (ADS)

    Sword-Daniels, V. L.; Rossetto, T.; Wilson, T. M.; Sargeant, S.

    2015-05-01

    The essential services that support urban living are complex and interdependent, and their disruption in disasters directly affects society. Yet there are few empirical studies to inform our understanding of the vulnerabilities and resilience of complex infrastructure systems in disasters. This research takes a systems thinking approach to explore the dynamic behaviour of a network of essential services, in the presence and absence of volcanic ashfall hazards in Montserrat, West Indies. Adopting a case study methodology and qualitative methods to gather empirical data, we centre the study on the healthcare system and its interconnected network of essential services. We identify different types of relationship between sectors and develop a new interdependence classification system for analysis. Relationships are further categorised by hazard conditions, for use in extensive risk contexts. During heightened volcanic activity, relationships between systems transform in both number and type: connections increase across the network by 41%, and adapt to increase cooperation and information sharing. Interconnections add capacities to the network, increasing the resilience of prioritised sectors. This in-depth and context-specific approach provides a new methodology for studying the dynamics of infrastructure interdependence in an extensive risk context, and can be adapted for use in other hazard contexts.

  20. Interdependence and dynamics of essential services in an extensive risk context: a case study in Montserrat, West Indies

    NASA Astrophysics Data System (ADS)

    Sword-Daniels, V. L.; Rossetto, T.; Wilson, T. M.; Sargeant, S.

    2015-02-01

    The essential services that support urban living are complex and interdependent, and their disruption in disasters directly affects society. Yet there are few empirical studies to inform our understanding of the vulnerabilities and resilience of complex infrastructure systems in disasters. This research takes a systems thinking approach to explore the dynamic behaviour of a network of essential services, in the presence and absence of volcanic ashfall hazards in Montserrat, West Indies. Adopting a case study methodology and qualitative methods to gather empirical data we centre the study on the healthcare system and its interconnected network of essential services. We identify different types of relationship between sectors and develop a new interdependence classification system for analysis. Relationships are further categorised by hazard condition, for use in extensive risk contexts. During heightened volcanic activity, relationships between systems transform in both number and type: connections increase across the network by 41%, and adapt to increase cooperation and information sharing. Interconnections add capacities to the network, increasing the resilience of prioritised sectors. This in-depth and context-specific approach provides a new methodology for studying the dynamics of infrastructure interdependence in an extensive risk context, and can be adapted for use in other hazard contexts.

  1. Vulnerability of network of networks

    NASA Astrophysics Data System (ADS)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  2. Resource allocation in road infrastructure using ANP priorities with ZOGP formulation-A case study

    NASA Astrophysics Data System (ADS)

    Alias, Suriana; Adna, Norfarziah; Soid, Siti Khuzaimah; Kardri, Mahani

    2013-09-01

    Road Infrastructure (RI) project evaluation and selection is concern with the allocation of scarce organizational resources. In this paper, it is suggest an improved RI project selection methodology which reflects interdependencies among evaluation criteria and candidate projects. Fuzzy Delphi Method (FDM) is use to evoking expert group opinion and also to determine a degree of interdependences relationship between the alternative projects. In order to provide a systematic approach to set priorities among multi-criteria and trade-off among objectives, Analytic Network Process (ANP) is suggested to be applied prior to Zero-One Goal Programming (ZOGP) formulation. Specifically, this paper demonstrated how to combined FDM and ANP with ZOGP through a real-world RI empirical example on an ongoing decision-making project in Johor, Malaysia.

  3. Interdependencies and Risks at the Nexus of Energy, Water, and Land Systems

    NASA Astrophysics Data System (ADS)

    Geernaert, G. L.

    2016-12-01

    During recent years, the federal agencies have rallied around efforts to understand and predict the interdependencies involving various combinations of energy infrastructure and supply, water supply and quality, and land use that combines agriculture and food production. The US Department of Energy has, in particular, focused on the energy-water nexus, with specific goals to understand the degree of interdependence that leads to multi-sector risk and, in the worst case, the precursors that can lead to cascading failure. Determining thresholds for system interdependence, evaluating the impact of drought on systems, and planning for robust mitigation options to avert future risks, are among DOE's highest research priorities. In this presentation, the DOE program plan and its rationale will be described; and the DOE plan will be placed in context of broader efforts across the federal government.

  4. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    NASA Astrophysics Data System (ADS)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an organization to adapt to conditions. Each strategy must adapt to specific conditions. Where uncertainties important, resilience is probably the most appropriate. Where conditions are stable, and where future projections are generally fair, anticipating works better, although it should be used judiciously (Fiksel, 2003). Anticipation strategies immobilize specific or tangible resources and, can eventually be costly in the long-term. On the other hand, resilient systems and organizations are those that quickly acquire information about their environments, quickly change their behaviour and their structures, even if the circumstances are chaotic. They communicate easily and openly, and largely mobilize networks of expertise and support (Perrow, 1999). We conducted qualitative research to assess different variables that positively affect the organizational resilience in the management of critical infrastructure. We preferred a methodology allowing us to retain the complexity of the phenomenon, not affecting the nature of the system studied. Our methodology allows us to create pragmatic theoretical concepts (grounded theory) (Glaser and Strauss, 1967). Our main concern is not to separate the phenomenon studied in its context. This methodology allows us to better understand the coordination between the organizations network infrastructure essential by a process of "sweeping-in" (Dewey, 1938). After conducting a literature review of various concepts of our research (Comfort, L. K., 2002; Lagadec and Michel-Kerjan, 2004; Perrow, 1999; Weick and Sutcliffe, 2001; and more) we have conducted numerous interviews and distributed a questionnaire to highlight significant indicators. For the first part of this research, we targeted the transportation critical infrastructure of Montreal area because it is crucial and also this infrastructure includes public, parapublic and private organisations. The first results of this research demonstrate the contribution of different structural and functional factors that influence the intraorganizational resilience and interorganizational resilience for the transportation sector of Montreal.

  5. Assessing the risk posed by natural hazards to infrastructures

    NASA Astrophysics Data System (ADS)

    Eidsvig, Unni; Kristensen, Krister; Vidar Vangelsten, Bjørn

    2015-04-01

    The modern society is increasingly dependent on infrastructures to maintain its function, and disruption in one of the infrastructure systems may have severe consequences. The Norwegian municipalities have, according to legislation, a duty to carry out a risk and vulnerability analysis and plan and prepare for emergencies in a short- and long term perspective. Vulnerability analysis of the infrastructures and their interdependencies is an important part of this analysis. This paper proposes a model for assessing the risk posed by natural hazards to infrastructures. The model prescribes a three level analysis with increasing level of detail, moving from qualitative to quantitative analysis. This paper focuses on the second level, which consists of a semi-quantitative analysis. The purpose of this analysis is to perform a screening of the scenarios of natural hazards threatening the infrastructures identified in the level 1 analysis and investigate the need for further analyses, i.e. level 3 quantitative analyses. The proposed level 2 analysis considers the frequency of the natural hazard, different aspects of vulnerability including the physical vulnerability of the infrastructure itself and the societal dependency on the infrastructure. An indicator-based approach is applied, ranking the indicators on a relative scale. The proposed indicators characterize the robustness of the infrastructure, the importance of the infrastructure as well as interdependencies between society and infrastructure affecting the potential for cascading effects. Each indicator is ranked on a 1-5 scale based on pre-defined ranking criteria. The aggregated risk estimate is a combination of the semi-quantitative vulnerability indicators, as well as quantitative estimates of the frequency of the natural hazard and the number of users of the infrastructure. Case studies for two Norwegian municipalities are presented, where risk to primary road, water supply and power network threatened by storm and landslide is assessed. The application examples show that the proposed model provides a useful tool for screening of undesirable events, with the ultimate goal to reduce the societal vulnerability.

  6. Unraveling the complexities of disaster management: a framework for critical social infrastructure to promote population health and resilience.

    PubMed

    O'Sullivan, Tracey L; Kuziemsky, Craig E; Toal-Sullivan, Darene; Corneil, Wayne

    2013-09-01

    Complexity is a useful frame of reference for disaster management and understanding population health. An important means to unraveling the complexities of disaster management is to recognize the interdependencies between health care and broader social systems and how they intersect to promote health and resilience before, during and after a crisis. While recent literature has expanded our understanding of the complexity of disasters at the macro level, few studies have examined empirically how dynamic elements of critical social infrastructure at the micro level influence community capacity. The purpose of this study was to explore empirically the complexity of disasters, to determine levers for action where interventions can be used to facilitate collaborative action and promote health among high risk populations. A second purpose was to build a framework for critical social infrastructure and develop a model to identify potential points of intervention to promote population health and resilience. A community-based participatory research design was used in nine focus group consultations (n = 143) held in five communities in Canada, between October 2010 and March 2011, using the Structured Interview Matrix facilitation technique. The findings underscore the importance of interconnectedness of hard and soft systems at the micro level, with culture providing the backdrop for the social fabric of each community. Open coding drawing upon the tenets of complexity theory was used to develop four core themes that provide structure for the framework that evolved; they relate to dynamic context, situational awareness and connectedness, flexible planning, and collaboration, which are needed to foster adaptive responses to disasters. Seven action recommendations are presented, to promote community resilience and population health. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Reconfiguring practice: the interdependence of experimental procedure and computing infrastructure in distributed earthquake engineering.

    PubMed

    De La Flor, Grace; Ojaghi, Mobin; Martínez, Ignacio Lamata; Jirotka, Marina; Williams, Martin S; Blakeborough, Anthony

    2010-09-13

    When transitioning local laboratory practices into distributed environments, the interdependent relationship between experimental procedure and the technologies used to execute experiments becomes highly visible and a focal point for system requirements. We present an analysis of ways in which this reciprocal relationship is reconfiguring laboratory practices in earthquake engineering as a new computing infrastructure is embedded within three laboratories in order to facilitate the execution of shared experiments across geographically distributed sites. The system has been developed as part of the UK Network for Earthquake Engineering Simulation e-Research project, which links together three earthquake engineering laboratories at the universities of Bristol, Cambridge and Oxford. We consider the ways in which researchers have successfully adapted their local laboratory practices through the modification of experimental procedure so that they may meet the challenges of coordinating distributed earthquake experiments.

  8. Resilient Control Systems Practical Metrics Basis for Defining Mission Impact

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig G. Rieger

    "Resilience” describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish “proper operation” and “impact.” A notional chemical processing plant is the use case for demonstrating how the system integritymore » metrics can be applied to establish performance, and« less

  9. "SWING": A European project for a new application of an ionospheric network

    NASA Astrophysics Data System (ADS)

    Zolesi, B.; Bianchi, C.; Meloni, A.; Baskaradas, J. A.; Belehaki, A.; Altadill, D.; Dalle Mese, E.

    2016-05-01

    The SWING (Short Wave critical Infrastructure Network based on a new Generation high survival radio communication system) is a European project aimed at studying a high survival high-frequency (HF) radio network to link European Critical Infrastructures (ECIs). This system is thought to replace broadband internet communication, maintaining the minimum flux of essential information for the ECIs management and control, in case of wide-scale threats, including terrorist attacks, able to put out of order internet links over the Mediterranean region. SWING is designed to evaluate the threat and increase the security awareness, as well as the level of protection, of analogous and/or interdependent ECIs. In order to meet these goals, SWING was finalized to recognize how and when the internet communication fails and to develop the standard software and hardware tools necessary for implementing communication protocols suited for a reliable and interoperable short-wave (SW) or high-frequency (HF) radio network backup. The internet broadband description and internet failure recognition were taken into consideration in the project but are not treated in this paper. It has been assessed that in case of complete failure of the internet broadband communication fundamental information for the management and control of ECIs over the Mediterranean region can be maintained with a HF network, even in case of moderate ionospheric perturbations.

  10. Redundant Design in Interdependent Networks

    PubMed Central

    2016-01-01

    Modern infrastructure networks are often coupled together and thus could be modeled as interdependent networks. Overload and interdependent effect make interdependent networks more fragile when suffering from attacks. Existing research has primarily concentrated on the cascading failure process of interdependent networks without load, or the robustness of isolated network with load. Only limited research has been done on the cascading failure process caused by overload in interdependent networks. Redundant design is a primary approach to enhance the reliability and robustness of the system. In this paper, we propose two redundant methods, node back-up and dependency redundancy, and the experiment results indicate that two measures are effective and costless. Two detailed models about redundant design are introduced based on the non-linear load-capacity model. Based on the attributes and historical failure distribution of nodes, we introduce three static selecting strategies-Random-based, Degree-based, Initial load-based and a dynamic strategy-HFD (historical failure distribution) to identify which nodes could have a back-up with priority. In addition, we consider the cost and efficiency of different redundant proportions to determine the best proportion with maximal enhancement and minimal cost. Experiments on interdependent networks demonstrate that the combination of HFD and dependency redundancy is an effective and preferred measure to implement redundant design on interdependent networks. The results suggest that the redundant design proposed in this paper can permit construction of highly robust interactive networked systems. PMID:27764174

  11. Military Review: The Professional Journal of the U.S. Army. Volume 88, Number 2, March-April 2008

    DTIC Science & Technology

    2008-04-01

    assembly and fabrication, maintenance. Najaf Hotels and tourism infrastructure and services. Karbala Hotels and tourism infrastructure and services...Lucius Clay (right), deputy military gover - nor of Germany after World War II, talks with General Dwight D. Eisenhower during the Potsdam Conference...intervening forces cannot reform gover - nance, economics, and security independently of one another. these functions are interdependent. Iraq

  12. The food-energy-water nexus and urban complexity

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, Patricia; McPhearson, Timon; Davidson, Debra J.

    2017-04-01

    While tackling interdependencies among food, energy, and water security is promising, three fundamental challenges to effective operationalization need addressing: the feasibility of science-policy integration, cross-scale inequalities, and path-dependencies in infrastructure and socio-institutional practices.

  13. A network-based framework for assessing infrastructure resilience: a case study of the London metro system.

    PubMed

    Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas

    2016-05-01

    Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).

  14. The Emerging Interdependence of the Electric Power Grid & Information and Communication Technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taft, Jeffrey D.; Becker-Dippmann, Angela S.

    2015-08-01

    This paper examines the implications of emerging interdependencies between the electric power grid and Information and Communication Technology (ICT). Over the past two decades, electricity and ICT infrastructure have become increasingly interdependent, driven by a combination of factors including advances in sensor, network and software technologies and progress in their deployment, the need to provide increasing levels of wide-area situational awareness regarding grid conditions, and the promise of enhanced operational efficiencies. Grid operators’ ability to utilize new and closer-to-real-time data generated by sensors throughout the system is providing early returns, particularly with respect to management of the transmission system formore » purposes of reliability, coordination, congestion management, and integration of variable electricity resources such as wind generation.« less

  15. A stochastic multi-agent optimization model for energy infrastructure planning under uncertainty and competition.

    DOT National Transportation Integrated Search

    2017-07-04

    This paper presents a stochastic multi-agent optimization model that supports energy infrastruc- : ture planning under uncertainty. The interdependence between dierent decision entities in the : system is captured in an energy supply chain network, w...

  16. Surety of the nation`s critical infrastructures: The challenge restructuring poses to the telecommunications sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cox, R.; Drennen, T.E.; Gilliom, L.

    1998-04-01

    The telecommunications sector plays a pivotal role in the system of increasingly connected and interdependent networks that make up national infrastructure. An assessment of the probable structure and function of the bit-moving industry in the twenty-first century must include issues associated with the surety of telecommunications. The term surety, as used here, means confidence in the acceptable behavior of a system in both intended and unintended circumstances. This paper outlines various engineering approaches to surety in systems, generally, and in the telecommunications infrastructure, specifically. It uses the experience and expectations of the telecommunications system of the US as an examplemore » of the global challenges. The paper examines the principal factors underlying the change to more distributed systems in this sector, assesses surety issues associated with these changes, and suggests several possible strategies for mitigation. It also studies the ramifications of what could happen if this sector became a target for those seeking to compromise a nation`s security and economic well being. Experts in this area generally agree that the U. S. telecommunications sector will eventually respond in a way that meets market demands for surety. Questions remain open, however, about confidence in the telecommunications sector and the nation`s infrastructure during unintended circumstances--such as those posed by information warfare or by cascading software failures. Resolution of these questions is complicated by the lack of clear accountability of the private and the public sectors for the surety of telecommunications.« less

  17. Regional Interdependence in Adaptation to Sea Level Rise and Coastal Flooding

    NASA Astrophysics Data System (ADS)

    Stacey, M. T.; Lubell, M.; Hummel, M.; Wang, R. Q.; Barnard, P.; Erikson, L. H.; Herdman, L.; Pozdnukhov, A.; Sheehan, M.

    2017-12-01

    Projections of sea level rise may differ in the pace of change, but there is clear consensus that coastal communities will be facing more frequent and severe flooding events in the coming century. As communities adapt to future conditions, infrastructure systems will be developed, modified and abandoned, with important consequences for services and resilience. Whether action or inaction is pursued, the decisions made by an individual community regarding a single infrastructure system have implications that extend spatially and temporally due to geographic and infrastructure system interactions. At the same time, there are a number of barriers to collective or coordinated action that inhibit regional solutions. This interplay between local actions and regional responses is one of the great challenges facing decision-makers grappling with both local and regional climate-change adaptation. In this talk, I present case studies of the San Francisco Bay Area that examine how shoreline infrastructure, transporation sytems and decision-making networks interact to define the regional response to local actions and the local response to regional actions. I will characterize the barriers that exist to regional solutions, and characterize three types of interdependence that may motivate decision-makers to overcome those barriers. Using these examples, I will discuss the importance of interdisciplinary analyses that integrate the natural sciences, engineering and the social science to climate change adaptation more generally.

  18. Integrating Infrastructures in the United States: Experience and Prospects

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilbanks, Thomas

    Infrastructure integration has been limited in the United States because infrastructure management responsibilities are fragmented by divisions between sectors and between the public and the private sector, but some changes are under way. Stimulated by a number of extreme events in recent decades, data and modeling capabilities for simulating infrastructure interdependencies have been developed and applied, and infrastructure integration in some cities has been encouraged by such foci as emergency preparedness and “green infrastructure” strategies. Integrative strategies have been explored for energy and water resource systems, in some cases related to other sectors as well. In summary, infrastructure integration inmore » the United States is occurring from the ground up, due in many cases to climate change impacts and risks. A number of examples of successes, supported by broad coalitions of interested parties (with evident sociopolitical payoffs), suggest that integration will increase through time.« less

  19. Risk-based input-output analysis of influenza epidemic consequences on interdependent workforce sectors.

    PubMed

    Santos, Joost R; May, Larissa; Haimar, Amine El

    2013-09-01

    Outbreaks of contagious diseases underscore the ever-looming threat of new epidemics. Compared to other disasters that inflict physical damage to infrastructure systems, epidemics can have more devastating and prolonged impacts on the population. This article investigates the interdependent economic and productivity risks resulting from epidemic-induced workforce absenteeism. In particular, we develop a dynamic input-output model capable of generating sector-disaggregated economic losses based on different magnitudes of workforce disruptions. An ex post analysis of the 2009 H1N1 pandemic in the national capital region (NCR) reveals the distribution of consequences across different economic sectors. Consequences are categorized into two metrics: (i) economic loss, which measures the magnitude of monetary losses incurred in each sector, and (ii) inoperability, which measures the normalized monetary losses incurred in each sector relative to the total economic output of that sector. For a simulated mild pandemic scenario in NCR, two distinct rankings are generated using the economic loss and inoperability metrics. Results indicate that the majority of the critical sectors ranked according to the economic loss metric comprise of sectors that contribute the most to the NCR's gross domestic product (e.g., federal government enterprises). In contrast, the majority of the critical sectors generated by the inoperability metric include sectors that are involved with epidemic management (e.g., hospitals). Hence, prioritizing sectors for recovery necessitates consideration of the balance between economic loss, inoperability, and other objectives. Although applied specifically to the NCR, the proposed methodology can be customized for other regions. © 2012 Society for Risk Analysis.

  20. Risk-Based Input-Output Analysis of Influenza Epidemic Consequences on Interdependent Workforce Sectors

    PubMed Central

    Santos, Joost R.; May, Larissa; Haimar, Amine El

    2013-01-01

    Outbreaks of contagious diseases underscore the ever-looming threat of new epidemics. Compared to other disasters that inflict physical damage to infrastructure systems, epidemics can have more devastating and prolonged impacts on the population. This paper investigates the interdependent economic and productivity risks resulting from epidemic-induced workforce absenteeism. In particular, we develop a dynamic input-output model capable of generating sector-disaggregated economic losses based on different magnitudes of workforce disruptions. An ex post analysis of the 2009 H1N1 pandemic in the National Capital Region (NCR) reveals the distribution of consequences across different economic sectors. Consequences are categorized into two metrics: (i) economic loss, which measures the magnitude of monetary losses incurred in each sector, and (ii) inoperability, which measures the normalized monetary losses incurred in each sector relative to the total economic output of that sector. For a simulated mild pandemic scenario in NCR, two distinct rankings are generated using the economic loss and inoperability metrics. Results indicate that the majority of the critical sectors ranked according to the economic loss metric comprise of sectors that contribute the most to the NCR's gross domestic product (e.g., federal government enterprises). In contrast, the majority of the critical sectors generated by the inoperability metric include sectors that are involved with epidemic management (e.g., hospitals). Hence, prioritizing sectors for recovery necessitates consideration of the balance between economic loss, inoperability, and other objectives. Although applied specifically to the NCR region, the proposed methodology can be customized for other regions. PMID:23278756

  1. Human initiated cascading failures in societal infrastructures.

    PubMed

    Barrett, Chris; Channakeshava, Karthik; Huang, Fei; Kim, Junwhan; Marathe, Achla; Marathe, Madhav V; Pei, Guanhong; Saha, Sudip; Subbiah, Balaaji S P; Vullikanti, Anil Kumar S

    2012-01-01

    In this paper, we conduct a systematic study of human-initiated cascading failures in three critical inter-dependent societal infrastructures due to behavioral adaptations in response to a crisis. We focus on three closely coupled socio-technical networks here: (i) cellular and mesh networks, (ii) transportation networks and (iii) mobile call networks. In crises, changes in individual behaviors lead to altered travel, activity and calling patterns, which influence the transport network and the loads on wireless networks. The interaction between these systems and their co-evolution poses significant technical challenges for representing and reasoning about these systems. In contrast to system dynamics models for studying these interacting infrastructures, we develop interaction-based models in which individuals and infrastructure elements are represented in detail and are placed in a common geographic coordinate system. Using the detailed representation, we study the impact of a chemical plume that has been released in a densely populated urban region. Authorities order evacuation of the affected area, and this leads to individual behavioral adaptation wherein individuals drop their scheduled activities and drive to home or pre-specified evacuation shelters as appropriate. They also revise their calling behavior to communicate and coordinate among family members. These two behavioral adaptations cause flash-congestion in the urban transport network and the wireless network. The problem is exacerbated with a few, already occurring, road closures. We analyze how extended periods of unanticipated road congestion can result in failure of infrastructures, starting with the servicing base stations in the congested area. A sensitivity analysis on the compliance rate of evacuees shows non-intuitive effect on the spatial distribution of people and on the loading of the base stations. For example, an evacuation compliance rate of 70% results in higher number of overloaded base stations than the evacuation compliance rate of 90%.

  2. Human Initiated Cascading Failures in Societal Infrastructures

    PubMed Central

    Barrett, Chris; Channakeshava, Karthik; Huang, Fei; Kim, Junwhan; Marathe, Achla; Marathe, Madhav V.; Pei, Guanhong; Saha, Sudip; Subbiah, Balaaji S. P.; Vullikanti, Anil Kumar S.

    2012-01-01

    In this paper, we conduct a systematic study of human-initiated cascading failures in three critical inter-dependent societal infrastructures due to behavioral adaptations in response to a crisis. We focus on three closely coupled socio-technical networks here: (i) cellular and mesh networks, (ii) transportation networks and (iii) mobile call networks. In crises, changes in individual behaviors lead to altered travel, activity and calling patterns, which influence the transport network and the loads on wireless networks. The interaction between these systems and their co-evolution poses significant technical challenges for representing and reasoning about these systems. In contrast to system dynamics models for studying these interacting infrastructures, we develop interaction-based models in which individuals and infrastructure elements are represented in detail and are placed in a common geographic coordinate system. Using the detailed representation, we study the impact of a chemical plume that has been released in a densely populated urban region. Authorities order evacuation of the affected area, and this leads to individual behavioral adaptation wherein individuals drop their scheduled activities and drive to home or pre-specified evacuation shelters as appropriate. They also revise their calling behavior to communicate and coordinate among family members. These two behavioral adaptations cause flash-congestion in the urban transport network and the wireless network. The problem is exacerbated with a few, already occurring, road closures. We analyze how extended periods of unanticipated road congestion can result in failure of infrastructures, starting with the servicing base stations in the congested area. A sensitivity analysis on the compliance rate of evacuees shows non-intuitive effect on the spatial distribution of people and on the loading of the base stations. For example, an evacuation compliance rate of 70% results in higher number of overloaded base stations than the evacuation compliance rate of 90%. PMID:23118847

  3. A multifactorial obesity model developed from nationwide public health exposome data and modern computational analyses.

    PubMed

    Gittner, LisaAnn S; Kilbourne, Barbara J; Vadapalli, Ravi; Khan, Hafiz M K; Langston, Michael A

    Obesity is both multifactorial and multimodal, making it difficult to identify, unravel and distinguish causative and contributing factors. The lack of a clear model of aetiology hampers the design and evaluation of interventions to prevent and reduce obesity. Using modern graph-theoretical algorithms, we are able to coalesce and analyse thousands of inter-dependent variables and interpret their putative relationships to obesity. Our modelling is different from traditional approaches; we make no a priori assumptions about the population, and model instead based on the actual characteristics of a population. Paracliques, noise-resistant collections of highly-correlated variables, are differentially distilled from data taken over counties associated with low versus high obesity rates. Factor analysis is then applied and a model is developed. Latent variables concentrated around social deprivation, community infrastructure and climate, and especially heat stress were connected to obesity. Infrastructure, environment and community organisation differed in counties with low versus high obesity rates. Clear connections of community infrastructure with obesity in our results lead us to conclude that community level interventions are critical. This effort suggests that it might be useful to study and plan interventions around community organisation and structure, rather than just the individual, to combat the nation's obesity epidemic. Copyright © 2017 Asia Oceania Association for the Study of Obesity. Published by Elsevier Ltd. All rights reserved.

  4. Information Infrastructure: Organisational Capability for Online Information Provision.

    ERIC Educational Resources Information Center

    Klobas, Jane E.

    This paper identifies aspects of information flow that are affected by online provision of internal information. Reference is made to four case studies of Western Australian government agencies' steps toward becoming Internet information providers, and to the lessons learned from their experiences. Three key interdependent elements of…

  5. Operational resilience: concepts, design and analysis

    NASA Astrophysics Data System (ADS)

    Ganin, Alexander A.; Massaro, Emanuele; Gutfraind, Alexander; Steen, Nicolas; Keisler, Jeffrey M.; Kott, Alexander; Mangoubi, Rami; Linkov, Igor

    2016-01-01

    Building resilience into today’s complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that capture and implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information, and social domains. It evaluates the critical functionality, defined as a performance function of time set by the stakeholders. Critical functionality is a source of valuable information, such as the integrated system resilience over a time interval, and its robustness. The paper demonstrates the formulation on two classes of models: 1) multi-level directed acyclic graphs, and 2) interdependent coupled networks. For both models synthetic case studies are used to explore trends. For the first class, the approach is also applied to the Linux operating system. Results indicate that desired resilience and robustness levels are achievable by trading off different design parameters, such as redundancy, node recovery time, and backup supply available. The nonlinear relationship between network parameters and resilience levels confirms the utility of the proposed approach, which is of benefit to analysts and designers of complex systems and networks.

  6. Operational resilience: concepts, design and analysis

    PubMed Central

    Ganin, Alexander A.; Massaro, Emanuele; Gutfraind, Alexander; Steen, Nicolas; Keisler, Jeffrey M.; Kott, Alexander; Mangoubi, Rami; Linkov, Igor

    2016-01-01

    Building resilience into today’s complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that capture and implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information, and social domains. It evaluates the critical functionality, defined as a performance function of time set by the stakeholders. Critical functionality is a source of valuable information, such as the integrated system resilience over a time interval, and its robustness. The paper demonstrates the formulation on two classes of models: 1) multi-level directed acyclic graphs, and 2) interdependent coupled networks. For both models synthetic case studies are used to explore trends. For the first class, the approach is also applied to the Linux operating system. Results indicate that desired resilience and robustness levels are achievable by trading off different design parameters, such as redundancy, node recovery time, and backup supply available. The nonlinear relationship between network parameters and resilience levels confirms the utility of the proposed approach, which is of benefit to analysts and designers of complex systems and networks. PMID:26782180

  7. Operational resilience: concepts, design and analysis.

    PubMed

    Ganin, Alexander A; Massaro, Emanuele; Gutfraind, Alexander; Steen, Nicolas; Keisler, Jeffrey M; Kott, Alexander; Mangoubi, Rami; Linkov, Igor

    2016-01-19

    Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that capture and implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information, and social domains. It evaluates the critical functionality, defined as a performance function of time set by the stakeholders. Critical functionality is a source of valuable information, such as the integrated system resilience over a time interval, and its robustness. The paper demonstrates the formulation on two classes of models: 1) multi-level directed acyclic graphs, and 2) interdependent coupled networks. For both models synthetic case studies are used to explore trends. For the first class, the approach is also applied to the Linux operating system. Results indicate that desired resilience and robustness levels are achievable by trading off different design parameters, such as redundancy, node recovery time, and backup supply available. The nonlinear relationship between network parameters and resilience levels confirms the utility of the proposed approach, which is of benefit to analysts and designers of complex systems and networks.

  8. Modeling interdependencies between business and communication processes in hospitals.

    PubMed

    Brigl, Birgit; Wendt, Thomas; Winter, Alfred

    2003-01-01

    The optimization and redesign of business processes in hospitals is an important challenge for the hospital information management who has to design and implement a suitable HIS architecture. Nevertheless, there are no tools available specializing in modeling information-driven business processes and the consequences on the communication between information processing, tools. Therefore, we will present an approach which facilitates the representation and analysis of business processes and resulting communication processes between application components and their interdependencies. This approach aims not only to visualize those processes, but to also to evaluate if there are weaknesses concerning the information processing infrastructure which hinder the smooth implementation of the business processes.

  9. Mr. Vetro, a Collective Simulation Cyberlearning Infrastructure for Science Education

    ERIC Educational Resources Information Center

    Ioannidou, Andri; Repenning, Alexander

    2010-01-01

    The comprehension of interdependent complex systems, which is part of state and national standards, is an enormous challenge for learners. In traditional physiology teaching materials, which structure the human body into decoupled subsystems (e.g., respiratory and cardiovascular) isolated in separate chapters, there is a ubiquitous absence of…

  10. The interconnected and cross-border nature of risks posed by infectious diseases

    PubMed Central

    Suk, Jonathan E.; Van Cangh, Thomas; Beauté, Julien; Bartels, Cornelius; Tsolova, Svetla; Pharris, Anastasia; Ciotti, Massimo; Semenza, Jan C.

    2014-01-01

    Infectious diseases can constitute public health emergencies of international concern when a pathogen arises, acquires new characteristics, or is deliberately released, leading to the potential for loss of human lives as well as societal disruption. A wide range of risk drivers are now known to lead to and/or exacerbate the emergence and spread of infectious disease, including global trade and travel, the overuse of antibiotics, intensive agriculture, climate change, high population densities, and inadequate infrastructures, such as water treatment facilities. Where multiple risk drivers interact, the potential impact of a disease outbreak is amplified. The varying temporal and geographic frequency with which infectious disease events occur adds yet another layer of complexity to the issue. Mitigating the emergence and spread of infectious disease necessitates mapping and prioritising the interdependencies between public health and other sectors. Conversely, during an international public health emergency, significant disruption occurs not only to healthcare systems but also to a potentially wide range of sectors, including trade, tourism, energy, civil protection, transport, agriculture, and so on. At the same time, dealing with a disease outbreak may require a range of critical sectors for support. There is a need to move beyond narrow models of risk to better account for the interdependencies between health and other sectors so as to be able to better mitigate and respond to the risks posed by emerging infectious disease. PMID:25308818

  11. Strategic preparedness for recovery from catastrophic risks to communities and infrastructure systems of systems.

    PubMed

    Haimes, Yacov Y

    2012-11-01

    Natural and human-induced disasters affect organizations in myriad ways because of the inherent interconnectedness and interdependencies among human, cyber, and physical infrastructures, but more importantly, because organizations depend on the effectiveness of people and on the leadership they provide to the organizations they serve and represent. These human-organizational-cyber-physical infrastructure entities are termed systems of systems. Given the multiple perspectives that characterize them, they cannot be modeled effectively with a single model. The focus of this article is: (i) the centrality of the states of a system in modeling; (ii) the efficacious role of shared states in modeling systems of systems, in identification, and in the meta-modeling of systems of systems; and (iii) the contributions of the above to strategic preparedness, response to, and recovery from catastrophic risk to such systems. Strategic preparedness connotes a decision-making process and its associated actions. These must be: implemented in advance of a natural or human-induced disaster, aimed at reducing consequences (e.g., recovery time, community suffering, and cost), and/or controlling their likelihood to a level considered acceptable (through the decisionmakers' implicit and explicit acceptance of various risks and tradeoffs). The inoperability input-output model (IIM), which is grounded on Leontief's input/output model, has enabled the modeling of interdependent subsystems. Two separate modeling structures are introduced. These are: phantom system models (PSM), where shared states constitute the essence of modeling coupled systems; and the IIM, where interdependencies among sectors of the economy are manifested by the Leontief matrix of technological coefficients. This article demonstrates the potential contributions of these two models to each other, and thus to more informative modeling of systems of systems schema. The contributions of shared states to this modeling and to systems identification are presented with case studies. © 2012 Society for Risk Analysis.

  12. Interdependency Assessment of Coupled Natural Gas and Power Systems in Energy Market

    NASA Astrophysics Data System (ADS)

    Yang, Hongzhao; Qiu, Jing; Zhang, Sanhua; Lai, Mingyong; Dong, Zhao Yang

    2015-12-01

    Owing to the technological development of natural gas exploration and the increasing penetration of gas-fired power generation, gas and power systems inevitably interact with each other from both physical and economic points of view. In order to effectively assess the two systems' interdependency, this paper proposes a systematic modeling framework and constructs simulation platforms for coupled gas and power systems in an energy market environment. By applying the proposed approach to the Australian national electricity market (NEM) and gas market, the impacts of six types of market and system factors are quantitatively analyzed, including power transmission limits, gas pipeline contingencies, gas pipeline flow constraints, carbon emission constraints, power load variations, and non-electric gas load variations. The important interdependency and infrastructure weakness for the two systems are well studied and identified. Our work provides a quantitative basis for grid operators and policy makers to support and guide operation and investment decisions for electric power and natural gas industries.

  13. The Particle Physics Data Grid. Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Livny, Miron

    2002-08-16

    The main objective of the Particle Physics Data Grid (PPDG) project has been to implement and evaluate distributed (Grid-enabled) data access and management technology for current and future particle and nuclear physics experiments. The specific goals of PPDG have been to design, implement, and deploy a Grid-based software infrastructure capable of supporting the data generation, processing and analysis needs common to the physics experiments represented by the participants, and to adapt experiment-specific software to operate in the Grid environment and to exploit this infrastructure. To accomplish these goals, the PPDG focused on the implementation and deployment of several critical services:more » reliable and efficient file replication service, high-speed data transfer services, multisite file caching and staging service, and reliable and recoverable job management services. The focus of the activity was the job management services and the interplay between these services and distributed data access in a Grid environment. Software was developed to study the interaction between HENP applications and distributed data storage fabric. One key conclusion was the need for a reliable and recoverable tool for managing large collections of interdependent jobs. An attached document provides an overview of the current status of the Directed Acyclic Graph Manager (DAGMan) with its main features and capabilities.« less

  14. New developments in social interdependence theory.

    PubMed

    Johnson, David W; Johnson, Roger T

    2005-11-01

    Social interdependence theory is a classic example of the interaction of theory, research, and practice. The premise of the theory is the way that goals are structured determines how individuals interact, which in turn creates outcomes. Since its formulation nearly 60 years ago, social interdependence theory has been modified, extended, and refined on the basis of the increasing knowledge about, and application of, the theory. Researchers have conducted over 750 research studies on the relative merits of cooperative, competitive, and individualistic efforts and the conditions under which each is appropriate. Social interdependence theory has been widely applied, especially in education and business. These applications have resulted in revisions of the theory and the generation of considerable new research. The authors critically analyze the new developments resulting from extensive research on, and wide-scale applications of, social interdependence theory.

  15. Energy-Water Nexus Knowledge Discovery Framework

    NASA Astrophysics Data System (ADS)

    Bhaduri, B. L.; Foster, I.; Chandola, V.; Chen, B.; Sanyal, J.; Allen, M.; McManamay, R.

    2017-12-01

    As demand for energy grows, the energy sector is experiencing increasing competition for water. With increasing population and changing environmental, socioeconomic scenarios, new technology and investment decisions must be made for optimized and sustainable energy-water resource management. This requires novel scientific insights into the complex interdependencies of energy-water infrastructures across multiple space and time scales. An integrated data driven modeling, analysis, and visualization capability is needed to understand, design, and develop efficient local and regional practices for the energy-water infrastructure components that can be guided with strategic (federal) policy decisions to ensure national energy resilience. To meet this need of the energy-water nexus (EWN) community, an Energy-Water Knowledge Discovery Framework (EWN-KDF) is being proposed to accomplish two objectives: Development of a robust data management and geovisual analytics platform that provides access to disparate and distributed physiographic, critical infrastructure, and socioeconomic data, along with emergent ad-hoc sensor data to provide a powerful toolkit of analysis algorithms and compute resources to empower user-guided data analysis and inquiries; and Demonstration of knowledge generation with selected illustrative use cases for the implications of climate variability for coupled land-water-energy systems through the application of state-of-the art data integration, analysis, and synthesis. Oak Ridge National Laboratory (ORNL), in partnership with Argonne National Laboratory (ANL) and researchers affiliated with the Center for International Earth Science Information Partnership (CIESIN) at Columbia University and State University of New York-Buffalo (SUNY), propose to develop this Energy-Water Knowledge Discovery Framework to generate new, critical insights regarding the complex dynamics of the EWN and its interactions with climate variability and change. An overarching objective of this project is to integrate impacts, adaptation, and vulnerability (IAV) science with emerging data science to meet the data analysis needs of the U.S. Department of Energy and partner federal agencies with respect to the EWN.

  16. Chaotic evolution of prisoner's dilemma game with volunteering on interdependent networks

    NASA Astrophysics Data System (ADS)

    Luo, Chao; Zhang, Xiaolin; Zheng, YuanJie

    2017-06-01

    In this article, the evolution of prisoner's dilemma game with volunteering on interdependent networks is investigated. Different from the traditional two-strategy game, voluntary participation as an additional strategy is involved in repeated game, that can introduce more complex evolutionary dynamics. And, interdependent networks provide a more generalized network architecture to study the intricate variability of dynamics. We have showed that voluntary participation could effectively promote the density of co-operation, that is also greatly affected by interdependent strength between two coupled networks. We further discussed the influence of interdependent strength on the densities of different strategies and found that an intermediate interdependence would play a bigger role on the evolution of dynamics. Subsequently, the critical values of the defection temptation for phase transitions under different conditions have been studied. Moreover, the global oscillations induced by the circle of dominance of three strategies on interdependent networks have been quantitatively investigated. Counter-intuitively, the oscillations of strategy densities are not periodic or stochastic, but have rich dynamical behaviors. By means of various analysis tools, we have demonstrated the global oscillations of strategy densities possessed chaotic characteristics.

  17. 78 FR 66038 - Critical Infrastructure Partnership Advisory Council (CIPAC); Correction.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... DEPARTMENT OF HOMELAND SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC... Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting on November 5, 2013. The... Murphy, Critical Infrastructure Partnership Advisory Council Alternate Designated Federal Officer...

  18. 77 FR 32656 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0008] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Federal Officer, Critical Infrastructure Partnership Advisory Council, Sector Outreach and Programs...

  19. 77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0009] Critical Infrastructure Partnership... the Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal... CONTACT: Larry May, Designated Federal Officer, Critical Infrastructure Partnership Advisory Council...

  20. Assessing HITECH Implementation and Lessons: 5 Years Later.

    PubMed

    Gold, Marsha; McLAUGHLIN, Catherine

    2016-09-01

    The expansive goals of the Health Information Technology for Economic and Clinical Health (HITECH) Act required the simultaneous development of a complex and interdependent infrastructure and a wide range of relationships, generating points of vulnerability. While federal legislation can be a powerful stimulus for change, its effectiveness also depends on its ability to accommodate state and local policies and private health care markets. Ambitious goals require support over a long time horizon, which can be challenging to maintain. The future of health information technology (health IT) support nationally is likely to depend on the ability of the technology to satisfy its users that its functionalities address the interests policymakers and other stakeholders have in using technology to promote better care, improved outcomes, and reduced costs. The Health Information Technology for Economic and Clinical Health (HITECH) Act set ambitious goals for developing electronic health information as one tool to reform health care delivery and improve health outcomes. With HITECH's grant funding now mostly exhausted but statutory authority for standards remaining, this article looks back at HITECH's experience in the first 5 years to assess its implementation, remaining challenges, and lessons learned. This review derives from a global assessment of the HITECH Act. Earlier, we examined the logic of HITECH and identified interdependencies critical to its ultimate success. In this article, we build on that framework to review what has and has not been accomplished in building the infrastructure authorized by HITECH since it was enacted. The review incorporates quantitative and qualitative evidence of progress from the global assessment and from the evaluations funded by the Office of the National Coordinator for Health Information Technology (ONC) of individual programs authorized by the HITECH Act. Our review of the evidence provides a mixed picture. Despite HITECH's challenging demands, its complex programs were implemented, and important changes sought by the act are now in place. Electronic health records (EHRs) now exist in some form in most professional practices and hospitals eligible for HITECH incentive payments, more information is being shared electronically, and the focus of attention has shifted from adoption of EHRs toward more fundamental issues associated with using health information technology (health IT) to improve health care delivery and outcomes. In some areas, HITECH's achievements to date have fallen short of the hopes of its proponents as it has proven challenging to move meaningful use beyond the initial low bar set by Meaningful Use Stage 1. EHR products vary in their ability to support more advanced functionalities, such as patient engagement and population-based care management. Many barriers to interoperability persist, limiting electronic communication across a diverse set of largely private providers and care settings. Achieving the expansive goals of HITECH required the simultaneous development of a complex and interdependent infrastructure and a wide range of relationships, some better positioned to move forward than others. To date, it has proven easier to get providers to adopt EHRs, perhaps in response to financial incentives to do so, than to develop a robust infrastructure that allows the information in EHRs to be used effectively and shared not only within clinical practices but also across providers. Effective exchange of data is necessary to drive the kinds of delivery and payment reforms sought nationwide. © 2016 Milbank Memorial Fund.

  1. Assessing HITECH Implementation and Lessons: 5 Years Later

    PubMed Central

    McLAUGHLIN, CATHERINE

    2016-01-01

    Policy Points: The expansive goals of the Health Information Technology for Economic and Clinical Health (HITECH) Act required the simultaneous development of a complex and interdependent infrastructure and a wide range of relationships, generating points of vulnerability.While federal legislation can be a powerful stimulus for change, its effectiveness also depends on its ability to accommodate state and local policies and private health care markets.Ambitious goals require support over a long time horizon, which can be challenging to maintain. The future of health information technology (health IT) support nationally is likely to depend on the ability of the technology to satisfy its users that its functionalities address the interests policymakers and other stakeholders have in using technology to promote better care, improved outcomes, and reduced costs. Context The Health Information Technology for Economic and Clinical Health (HITECH) Act set ambitious goals for developing electronic health information as one tool to reform health care delivery and improve health outcomes. With HITECH's grant funding now mostly exhausted but statutory authority for standards remaining, this article looks back at HITECH's experience in the first 5 years to assess its implementation, remaining challenges, and lessons learned. Methods This review derives from a global assessment of the HITECH Act. Earlier, we examined the logic of HITECH and identified interdependencies critical to its ultimate success. In this article, we build on that framework to review what has and has not been accomplished in building the infrastructure authorized by HITECH since it was enacted. The review incorporates quantitative and qualitative evidence of progress from the global assessment and from the evaluations funded by the Office of the National Coordinator for Health Information Technology (ONC) of individual programs authorized by the HITECH Act. Findings Our review of the evidence provides a mixed picture. Despite HITECH's challenging demands, its complex programs were implemented, and important changes sought by the act are now in place. Electronic health records (EHRs) now exist in some form in most professional practices and hospitals eligible for HITECH incentive payments, more information is being shared electronically, and the focus of attention has shifted from adoption of EHRs toward more fundamental issues associated with using health information technology (health IT) to improve health care delivery and outcomes. In some areas, HITECH's achievements to date have fallen short of the hopes of its proponents as it has proven challenging to move meaningful use beyond the initial low bar set by Meaningful Use Stage 1. EHR products vary in their ability to support more advanced functionalities, such as patient engagement and population‐based care management. Many barriers to interoperability persist, limiting electronic communication across a diverse set of largely private providers and care settings. Conclusions Achieving the expansive goals of HITECH required the simultaneous development of a complex and interdependent infrastructure and a wide range of relationships, some better positioned to move forward than others. To date, it has proven easier to get providers to adopt EHRs, perhaps in response to financial incentives to do so, than to develop a robust infrastructure that allows the information in EHRs to be used effectively and shared not only within clinical practices but also across providers. Effective exchange of data is necessary to drive the kinds of delivery and payment reforms sought nationwide. PMID:27620687

  2. Cascading of Fluctuations in Interdependent Energy Infrastructures. Gas-Grid Coupling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chertkov, Michael; Lebedev, Vladimir; Backhaus, Scott N.

    2014-09-05

    The revolution of hydraulic fracturing has dramatically increased the supply and lowered the cost of natural gas in the United States driving an expansion of natural gas-fired generation capacity in many electrical grids. Unrelated to the natural gas expansion, lower capital costs and renewable portfolio standards are driving an expansion of intermittent renewable generation capacity such as wind and photovoltaic generation. These two changes may potentially combine to create new threats to the reliability of these interdependent energy infrastructures. Natural gas-fired generators are often used to balance the fluctuating output of wind generation. However, the time-varying output of these generatorsmore » results in time-varying natural gas burn rates that impact the pressure in interstate transmission pipelines. Fluctuating pressure impacts the reliability of natural gas deliveries to those same generators and the safety of pipeline operations. We adopt a partial differential equation model of natural gas pipelines and use this model to explore the effect of intermittent wind generation on the fluctuations of pressure in natural gas pipelines. The mean square pressure fluctuations are found to grow linearly in time with points of maximum deviation occurring at the locations of flow reversals.« less

  3. 78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2103-0050] Critical Infrastructure Partnership... management; Notice of an open Federal Advisory Committee Meeting. SUMMARY: The Critical Infrastructure... involving critical infrastructure security and resiliency. Off-topic questions or comments will not be...

  4. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Part IV The President Proclamation 8607--Critical Infrastructure Protection Month, 2010..., 2010 Critical Infrastructure Protection Month, 2010 By the President of the United States of America A Proclamation During Critical Infrastructure Protection Month, we highlight the vast network of systems and...

  5. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  6. Space Station Freedom crew training

    NASA Technical Reports Server (NTRS)

    Bobko, K. J.; Gibson, E. G.; Maroney, S. A.; Muccio, J. D.

    1990-01-01

    The nature of the Space Station Freedom Program presents an array of new and enhanced challenges which need to be addressed en route to developing an effective and affordable infrastructure for crew training. Such an infrastructure is essential for the safety and success of the program. The three major challenges that affect crew training are the long lifetime of the program (thirty years), the interdependence of successive increments, and the participation of the three International Partners (Canada, European Space Agency, and Japan) and a myriad of experimenters. This paper addresses these major challenges as they drive the development of a crew training capability and the actual conduct of crew training.

  7. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...

  8. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...

  9. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...

  10. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...

  11. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...

  12. 18 CFR 388.112 - Requests for privileged treatment and Critical Energy Infrastructure Information (CEII) treatment...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... of exemption from disclosure under FOIA, including critical energy infrastructure information (CEII...

  13. 18 CFR 388.112 - Requests for privileged treatment and Critical Energy Infrastructure Information (CEII) treatment...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... of exemption from disclosure under FOIA, including critical energy infrastructure information (CEII...

  14. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    NASA Astrophysics Data System (ADS)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    The research project "Integrated System for Transport Infrastructure surveillance and Monitoring by Electromagnetic Sensing" (ISTIMES), was approved in the 7th Framework Programme, in the Joint Call ICT and Security and started on 1st July 2009. The purpose of ISTIMES project is to design, assess and promote an ICT-based system, exploiting distributed and local sensors, for non-destructive electromagnetic monitoring in order to achieve the critical transport infrastructures more reliable and safe. The transportation sector's components are susceptible to the consequences of natural disasters and can also be attractive as terrorist targets. The sector's size, its physically dispersed and decentralized nature, the many public and private entities involved in its operations, the critical importance of cost considerations, and the inherent requirement of convenient accessibility to its services by all users - make the transportation particularly vulnerable to security and safety threats. As well known, the surface transportation system consists of interconnected infrastructures including highways, transit systems, railroads, airports, waterways, pipelines and ports, and the vehicles, aircraft, and vessels that operate along these networks. Thus, interdependencies exist between transportation and nearly every other sector of the economy and the effective operation of this system is essential to the European economic productivity; therefore, transportation sector protection is of paramount importance since threats to it may impact other industries that rely on it. The system exploits an open network architecture that can accommodate a wide range of sensors, static and mobile, and can be easily scaled up to allow the integration of additional sensors and interfacing with other networks. It relies on heterogeneous state-of-the-art electromagnetic sensors, enabling a self-organizing, self-healing, ad-hoc networking of terrestrial sensors, supported by specific satellite measurements. The integration of electromagnetic technologies with new ICT information and telecommunications systems enables remotely controlled monitoring and surveillance and real time data imaging of the critical transport infrastructures. Thus, the proposal will concern also with the development of tools for handling, analysing and processing large data volume (Information Fusion) and then providing information and performing behaviour prediction in a quick, easy and intuitive way (Situation Awareness). The proposal is based on several independent non-invasive imaging technologies based on electromagnetic sensing. Sensor cross validation, synergy and new data fusion and correlation schemes will permit a multi-method, multi-resolution and multi-scale electromagnetic detection and monitoring of surface and subsurface changes of the infrastructure. According to GMES and European Spatial Data Infrastructure (ESDI) initiatives, the system will adopt open architectures and will make efforts to achieve full interoperability. The system will be tested on two very challenging test beds such as: a highway-bridge and a railway tunnel. The system will be based on clear end-user requirements, coming from representative end-users and technological choices will be based on a long term cost-benefit analysis. Then, a dissemination plan was included into the project to encourage a wide range of public institutions and private companies to evaluate and adopt our approach for real-time control and distributed monitoring also in the more general framework of critical and civil infrastructure management and protection. Finally, an exploitation plan will develop for the commercialization of any derived technology, software, or monitoring concepts. ISTIMES project is carried out by an international partnership formed by nine partners coming from seven countries: Tecnologie per le Osservazioni della Terra (TeRN), Elsag Datamat (ED) and Dipartimento della Protezione Civile (DPC) from Italy, Eidgenoessische Materialpruefungs-und Forschungsanstalt (EMPA) from Switzerland, Laboratoire Central des Ponts et Chaussées (LCPC) from France, Lund University (ULUND) from Sweden, Tel Aviv University (TAU) from Israel, Territorial Data Elaboration (TDE) from Romania and Norsk Elektro Optikk (NEO) from Norway.

  15. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  16. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  17. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  18. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  19. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  20. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  1. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  2. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  3. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  4. 3 CFR 13636 - Executive Order 13636 of February 12, 2013. Improving Critical Infrastructure Cybersecurity

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow... resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages...

  5. Reliability analysis in interdependent smart grid systems

    NASA Astrophysics Data System (ADS)

    Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng; Hu, Zhaolong

    2018-06-01

    Complex network theory is a useful way to study many real complex systems. In this paper, a reliability analysis model based on complex network theory is introduced in interdependent smart grid systems. In this paper, we focus on understanding the structure of smart grid systems and studying the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent smart grid systems. We propose a practical model for interdependent smart grid systems using complex theory. Besides, based on percolation theory, we also study the effect of cascading failures effect and reveal detailed mathematical analysis of failure propagation in such systems. We analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent smart grid systems. Our simulation results also show that there exists a threshold for the proportion of faulty nodes, beyond which the smart grid systems collapse. Also we determine the critical values for different system parameters. In this way, the reliability analysis model based on complex network theory can be effectively utilized for anti-attack and protection purposes in interdependent smart grid systems.

  6. 76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0028] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  7. 76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0112] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  8. 76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0038] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  9. 78 FR 16861 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0077] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council (CIPAC) in a Federal...

  10. 75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-12

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0062] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, Department of Homeland Security, 245...

  11. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  12. The Identification of Filters and Interdependencies for Effective Resource Allocation: Coupling the Mitigation of Natural Hazards to Economic Development.

    NASA Astrophysics Data System (ADS)

    Agar, S. M.; Kunreuther, H.

    2005-12-01

    Policy formulation for the mitigation and management of risks posed by natural hazards requires that governments confront difficult decisions for resource allocation and be able to justify their spending. Governments also need to recognize when spending offers little improvement and the circumstances in which relatively small amounts of spending can make substantial differences. Because natural hazards can have detrimental impacts on local and regional economies, patterns of economic development can also be affected by spending decisions for disaster mitigation. This paper argues that by mapping interdependencies among physical, social and economic factors, governments can improve resource allocation to mitigate the risks of natural hazards while improving economic development on local and regional scales. Case studies of natural hazards in Turkey have been used to explore specific "filters" that act to modify short- and long-term outcomes. Pre-event filters can prevent an event from becoming a natural disaster or change a routine event into a disaster. Post-event filters affect both short and long-term recovery and development. Some filters cannot be easily modified by spending (e.g., rural-urban migration) but others (e.g., land-use practices) provide realistic spending targets. Net social benefits derived from spending, however, will also depend on the ways by which filters are linked, or so-called "interdependencies". A single weak link in an interdependent system, such as a power grid, can trigger a cascade of failures. Similarly, weak links in social and commercial networks can send waves of disruption through communities. Conversely, by understanding the positive impacts of interdependencies, spending can be targeted to maximize net social benefits while mitigating risks and improving economic development. Detailed information on public spending was not available for this study but case studies illustrate how networks of interdependent filters can modify social benefits and costs. For example, spending after the 1992 Erzincan earthquake targeted local businesses but limited alternative employment, labor losses and diminished local markets all contributed to economic stagnation. Spending after the 1995 Dinar earthquake provided rent subsidies, supporting a major exodus from the town. Consequently many local people were excluded from reconstruction decisions and benefits offered by reconstruction funds. After the 1999 Marmara earthquakes, a 3-year economic decline in Yalova illustrates the vulnerability of local economic stability to weak regulation enforcement by a few agents. A resource allocation framework indicates that government-community relations, lack of economic diversification, beliefs, and compensation are weak links for effective spending. Stronger positive benefits could be achieved through spending to target land-use regulation enforcement, labor losses, time-critical needs of small businesses, and infrastructure. While the impacts of the Marmara earthquakes were devastating, strong commercial networks and international interests helped to re-establish the regional economy. Interdependencies may have helped to drive a recovery. Smaller events in eastern Turkey, however, can wipe out entire communities and can have long-lasting impacts on economic development. These differences may accelerate rural to urban migration and perpetuate regional economic divergence in the country. 1: Research performed in the Wharton MBA Program, Univ. of Pennsylvania.

  13. Water Development, Allocation, and Institutions: A Role for Integrated Tools

    NASA Astrophysics Data System (ADS)

    Ward, F. A.

    2008-12-01

    Many parts of the world suffer from inadequate water infrastructure, inefficient water allocation, and weak water institutions. Each of these three challenges compounds the burdens imposed by inadequacies associated with the other two. Weak water infrastructure makes it hard to allocate water efficiently and undermines tracking of water rights and use, which blocks effective functioning of water institutions. Inefficient water allocation makes it harder to secure resources to develop new water infrastructure. Poorly developed water institutions undermine the security of water rights, which damages incentives to develop water infrastructure or use water efficiently. This paper reports on the development of a prototype basin scale economic optimization, in which existing water supplies are allocated more efficiently in the short run to provide resources for more efficient long-run water infrastructure development. Preliminary results provide the basis for designing water administrative proposals, building effective water infrastructure, increasing farm income, and meeting transboundary delivery commitments. The application is to the Kabul River Basin in Afghanistan, where food security has been compromised by a history of drought, war, damaged irrigation infrastructure, lack of reservoir storage, inefficient water allocation, and weak water institutions. Results illustrate increases in economic efficiency achievable when development programs simultaneously address interdependencies in water allocation, development, and institutions.

  14. 77 FR 19300 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...

  15. Energy-Water Nexus Knowledge Discovery Framework, Experts’ Meeting Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhaduri, Budhendra L.; Simon, AJ; Allen, Melissa R.

    Energy and water generation and delivery systems are inherently interconnected. With worldwide demandfor energy growing, the energy sector is experiencing increasing competition for water. With increasingpopulation and changing environmental, socioeconomic, and demographic scenarios, new technology andinvestment decisions must be made for optimized and sustainable energy-water resource management. These decisions require novel scientific insights into the complex interdependencies of energy-water infrastructures across multiple space and time scales.

  16. A systems framework for national assessment of climate risks to infrastructure.

    PubMed

    Dawson, Richard J; Thompson, David; Johns, Daniel; Wood, Ruth; Darch, Geoff; Chapman, Lee; Hughes, Paul N; Watson, Geoff V R; Paulson, Kevin; Bell, Sarah; Gosling, Simon N; Powrie, William; Hall, Jim W

    2018-06-13

    Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment.This article is part of the theme issue 'Advances in risk assessment for climate change adaptation policy'. © 2018 The Authors.

  17. A systems framework for national assessment of climate risks to infrastructure

    NASA Astrophysics Data System (ADS)

    Dawson, Richard J.; Thompson, David; Johns, Daniel; Wood, Ruth; Darch, Geoff; Chapman, Lee; Hughes, Paul N.; Watson, Geoff V. R.; Paulson, Kevin; Bell, Sarah; Gosling, Simon N.; Powrie, William; Hall, Jim W.

    2018-06-01

    Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue `Advances in risk assessment for climate change adaptation policy'.

  18. A systems framework for national assessment of climate risks to infrastructure

    PubMed Central

    Thompson, David; Johns, Daniel; Darch, Geoff; Paulson, Kevin

    2018-01-01

    Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue ‘Advances in risk assessment for climate change adaptation policy’. PMID:29712793

  19. 77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... Infrastructure Partnership Advisory Council. [FR Doc. 2012-23666 Filed 9-25-12; 8:45 am] BILLING CODE 9910-9P-P ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0051] Critical Infrastructure Partnership... meeting. SUMMARY: The Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting will be...

  20. The role of intergenerational similarity and parenting in adolescent self-criticism: An actor-partner interdependence model.

    PubMed

    Bleys, Dries; Soenens, Bart; Boone, Liesbet; Claes, Stephan; Vliegen, Nicole; Luyten, Patrick

    2016-06-01

    Research investigating the development of adolescent self-criticism has typically focused on the role of either parental self-criticism or parenting. This study used an actor-partner interdependence model to examine an integrated theoretical model in which achievement-oriented psychological control has an intervening role in the relation between parental and adolescent self-criticism. Additionally, the relative contribution of both parents and the moderating role of adolescent gender were examined. Participants were 284 adolescents (M = 14 years, range = 12-16 years) and their parents (M = 46 years, range = 32-63 years). Results showed that only maternal self-criticism was directly related to adolescent self-criticism. However, both parents' achievement-oriented psychological control had an intervening role in the relation between parent and adolescent self-criticism in both boys and girls. Moreover, one parent's achievement-oriented psychological control was not predicted by the self-criticism of the other parent. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  1. What’s My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    DTIC Science & Technology

    2012-03-01

    lacking. Dr. Bellavita makes an important point that “the initial difference between critical infrastructure and plain vanilla infrastructure seems to...more definitive description of “critical” would help to improve understanding of what infrastructure is critical and help to segregate “ vanilla ” or

  2. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    NASA Astrophysics Data System (ADS)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  3. A Multi-Scale Energy Food Systems Modeling Framework For Climate Adaptation

    NASA Astrophysics Data System (ADS)

    Siddiqui, S.; Bakker, C.; Zaitchik, B. F.; Hobbs, B. F.; Broaddus, E.; Neff, R.; Haskett, J.; Parker, C.

    2016-12-01

    Our goal is to understand coupled system dynamics across scales in a manner that allows us to quantify the sensitivity of critical human outcomes (nutritional satisfaction, household economic well-being) to development strategies and to climate or market induced shocks in sub-Saharan Africa. We adopt both bottom-up and top-down multi-scale modeling approaches focusing our efforts on food, energy, water (FEW) dynamics to define, parameterize, and evaluate modeled processes nationally as well as across climate zones and communities. Our framework comprises three complementary modeling techniques spanning local, sub-national and national scales to capture interdependencies between sectors, across time scales, and on multiple levels of geographic aggregation. At the center is a multi-player micro-economic (MME) partial equilibrium model for the production, consumption, storage, and transportation of food, energy, and fuels, which is the focus of this presentation. We show why such models can be very useful for linking and integrating across time and spatial scales, as well as a wide variety of models including an agent-based model applied to rural villages and larger population centers, an optimization-based electricity infrastructure model at a regional scale, and a computable general equilibrium model, which is applied to understand FEW resources and economic patterns at national scale. The MME is based on aggregating individual optimization problems for relevant players in an energy, electricity, or food market and captures important food supply chain components of trade and food distribution accounting for infrastructure and geography. Second, our model considers food access and utilization by modeling food waste and disaggregating consumption by income and age. Third, the model is set up to evaluate the effects of seasonality and system shocks on supply, demand, infrastructure, and transportation in both energy and food.

  4. Adapting Agricultural Water Use to Climate Change in a Post-Soviet Context: Challenges and Opportunities in Southeast Kazakhstan.

    PubMed

    Barrett, Tristam; Feola, Giuseppe; Khusnitdinova, Marina; Krylova, Viktoria

    2017-01-01

    The convergence of climate change and post-Soviet socio-economic and institutional transformations has been underexplored so far, as have the consequences of such convergence on crop agriculture in Central Asia. This paper provides a place-based analysis of constraints and opportunities for adaptation to climate change, with a specific focus on water use, in two districts in southeast Kazakhstan. Data were collected by 2 multi-stakeholder participatory workshops, 21 semi-structured in-depth interviews, and secondary statistical data. The present-day agricultural system is characterised by enduring Soviet-era management structures, but without state inputs that previously sustained agricultural productivity. Low margins of profitability on many privatised farms mean that attempts to implement integrated water management have produced water users associations unable to maintain and upgrade a deteriorating irrigation infrastructure. Although actors engage in tactical adaptation measures, necessary structural adaptation of the irrigation system remains difficult without significant public or private investments. Market-based water management models have been translated ambiguously to this region, which fails to encourage efficient water use and hinders adaptation to water stress. In addition, a mutual interdependence of informal networks and formal institutions characterises both state governance and everyday life in Kazakhstan. Such interdependence simultaneously facilitates operational and tactical adaptation, but hinders structural adaptation, as informal networks exist as a parallel system that achieves substantive outcomes while perpetuating the inertia and incapacity of the state bureaucracy. This article has relevance for critical understanding of integrated water management in practice and adaptation to climate change in post-Soviet institutional settings more broadly.

  5. Measuring adaptive capacity of urban wastewater infrastructure - Change impact and change propagation.

    PubMed

    Spiller, Marc

    2017-12-01

    The ability of urban wastewater systems to adapt and transform as a response to change is an integral part of sustainable development. This requires technology and infrastructure that can be adapted to new operational challenges. In this study the adaptive capacity of urban wastewater systems is evaluated by assessing the interdependencies between system components. In interdependent and therefore tightly coupled systems, changes to one systems component will require alteration elsewhere in the system, therefore impairing the capacity of these systems to be changed. The aim of this paper is to develop a methodology to evaluate the adaptive capacity of urban wastewater systems by assessing how change drivers and innovation affect existing wastewater technology and infrastructure. The methodology comprises 7 steps and applies a change impact table and a design structure matrix that are completed by experts during workshops. Change impact tables quantify where change drivers, such as energy neutrality and resource recovery, require innovation in a system. The design structure matrix is a tool to quantify "emerging changes" that are a result of the innovation. The method is applied for the change driver of energy neutrality and shown for two innovations: a decentralised upflow anaerobic sludge blanket reactor followed by an anammox process and a conventional activated sludge treatment with enhanced chemical precipitation and high temperature-high pressure hydrolysis. The results show that the energy neutrality of wastewater systems can be address by either innovation in the decentralised or centralised treatment. The quantification of the emerging changes for both innovations indicates that the decentralised treatment is more disruptive, or in other words, the system needs to undergo more adaptation. It is concluded that the change impact and change propagation method can be used to characterise and quantify the technological or infrastructural transformations. In addition, it provides insight into the stakeholders affected by change. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, Julia A.; Wallace, Kelly E.; Kudo, Terence Y.

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  7. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.

  8. Factors driving collaboration in natural resource conflict management: Evidence from Romania.

    PubMed

    Hossu, Constantina Alina; Ioja, Ioan Cristian; Susskind, Lawrence E; Badiu, Denisa L; Hersperger, Anna M

    2018-02-03

    A critical challenge in natural resource management is to bring all stakeholders together to negotiate solutions to critical problems. However, various collaborative approaches to heading off conflicts and resolving natural resource management disputes have been used. What drives these efforts, however, still needs further research. Our study provides a systematic look at the drivers likely to initiate collaborative problem-solving efforts in four cases in Romania. We use Emerson's et al. (2012) framework for collaborative governance and multi-value qualitative comparative analysis (mvQCA) to analyze cases involving endangered species, restrictions on forest harvest, conflicts associated with infrastructure development projects, and disputes over the management of environmentally sensitive areas. Our findings contribute to the already existing collaborative governance literature indicating which of the four factors: uncertainty, interdependence, consequential incentives, and leadership, in which combination, are necessary and sufficient to spur collaborative resource management efforts. Our results showed that in Romania the initiation of collaboration is best explained by positive consequential incentives (i.e., financial opportunities) which has determined leaders to take initiative. This study provides additional information for the complicated process of natural resource management which is often overriding collaboration by investigating what enables and constrains collaborative efforts in a country where natural resources were managed and used according to the principles of central planning.

  9. SOF/Convention Force Light Footprint Interdependence in Asia and Beyond

    DTIC Science & Technology

    2013-04-01

    risk for food and waterborne illness.47 In many of these isolated rural areas, farming of crops is barely at a subsistence level, and livestock...mostly sheep and goats, compete for food with people. After thirty years of warfare, most modern infrastructure and many traditional institutions...These water sources are often of questionable quality, with animal and human waste run-off contaminating many of them. Men work farm fields to

  10. Solving Operational Models of Interdependent Infrastructure Systems

    DTIC Science & Technology

    2014-12-01

    resilience, getting the biggest “reduction in bang ” for their buck. The most important part of those modeling efforts is the formulation of a mathematical...about the requirements of each system to the model of the other system through shared data. This type of algorithm simulates the dynamic...than just another big project. I found a true interest and excitement working with you both and consider you both the highest caliber faculty I have

  11. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  12. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  13. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  14. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  15. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0032] Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council (CIPAC) charter renewal. SUMMARY: The Department of Homeland Security... and Outreach Division, Office of Infrastructure Protection, National Protection and Programs...

  16. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0080] Critical Infrastructure Partnership..., Section Chief Partnership Programs, Partnership and Outreach Division, Office of Infrastructure Protection... Outreach Division, Office of Infrastructure Protection, National Protection and Programs Directorate...

  17. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    NASA Astrophysics Data System (ADS)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the physical-chemical process by means the event (e.g., a pyroclastic flow) can interact and damage a critical infrastructure asset (e.g., a pipe). Each event can be characterized by several modi (e.g., impact load, heating, burying) that can cause damages to the asset. Hence, the damage is linked to the modus and not directly to the event. The advantage of using the "modus" approach is to allow reducing the number of interactions (natural hazard/Critical infrastructure assets) to be addressed. All different events exert their impact on infrastructures by means of a limited number of different modus. This allows adapting existing vulnerability or fragility laws to events that have not been studied yet, and for which these laws are not available.

  18. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  19. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  20. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  1. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  2. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  3. 76 FR 18743 - Commission Information Collection Activities (FERC-603); Comment Request; Extension

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-05

    ... FERC-603 ``Critical Energy Infrastructure Information'' (OMB No. 1902-0197) is used by the Commission to implement procedures for gaining access to critical energy infrastructure information (CEII) that... information about ``existing or proposed critical infrastructure that (i) relates to the production...

  4. 76 FR 81956 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... through the Secretary of Homeland Security with advice on the security of the critical infrastructure... critical infrastructure as directed by the President. At this meeting, the committee will receive work from... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0117] National Infrastructure Advisory...

  5. 76 FR 36137 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-21

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0034] National Infrastructure Advisory...

  6. Critical infrastructure protection.

    PubMed

    Deitz, Kim M

    2012-01-01

    Current government policies for protecting the nation's critical infrastructure are described in this article which focuses on hospital disaster planning and incident management and the significant role of Security in infrastructure protection

  7. A Federal Response: The President's Critical Infrastructure Protection Board.

    ERIC Educational Resources Information Center

    Schmidt, Howard

    2002-01-01

    Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughlin, Gary L.

    The International, Homeland, and Nuclear Security (IHNS) Program Management Unit (PMU) oversees a broad portfolio of Sandia’s programs in areas ranging from global nuclear security to critical asset protection. We use science and technology, innovative research, and global engagement to counter threats, reduce dangers, and respond to disasters. The PMU draws on the skills of scientists and engineers from across Sandia. Our programs focus on protecting US government installations, safeguarding nuclear weapons and materials, facilitating nonproliferation activities, securing infrastructures, countering chemical and biological dangers, and reducing the risk of terrorist threats. We conduct research in risk and threat analysis, monitoringmore » and detection, decontamination and recovery, and situational awareness. We develop technologies for verifying arms control agreements, neutralizing dangerous materials, detecting intruders, and strengthening resiliency. Our programs use Sandia’s High-Performance Computing resources for predictive modeling and simulation of interdependent systems, for modeling dynamic threats and forecasting adaptive behavior, and for enabling decision support and processing large cyber data streams. In this report, we highlight four advanced computation projects that illustrate the breadth of the IHNS mission space.« less

  9. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...

  10. The Influence of State Policies on Critical Infrastructure Resilience: An Approach for Analyzing Transportation and Capital Investment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wall, Thomas; Trail, Jessica; Gevondyan, Erna

    During times of crisis, communities and regions rely heavily on critical infrastructure systems to support their emergency management response and recovery activities. Therefore, the resilience of critical infrastructure systems to crises is a pivotal factor to a community’s overall resilience. Critical infrastructure resilience can be influenced by many factors, including State policies – which are not always uniform in their structure or application across the United States – were identified by the U.S. Department of Homeland Security as an area of particular interest with respect to their the influence on the resilience of critical infrastructure systems. This study focuses onmore » developing an analytical methodology to assess links between policy and resilience, and applies that methodology to critical infrastructure in the Transportation Systems Sector. Specifically, this study seeks to identify potentially influential linkages between State transportation capital funding policies and the resilience of bridges located on roadways that are under the management of public agencies. This study yielded notable methodological outcomes, including the general capability of the analytical methodology to yield – in the case of some States – significant results connecting State policies with critical infrastructure resilience, with the suggestion that further refinement of the methodology may be beneficial.« less

  11. Emerging interdependence between stock values during financial crashes.

    PubMed

    Rocchi, Jacopo; Tsui, Enoch Yan Lok; Saad, David

    2017-01-01

    To identify emerging interdependencies between traded stocks we investigate the behavior of the stocks of FTSE 100 companies in the period 2000-2015, by looking at daily stock values. Exploiting the power of information theoretical measures to extract direct influences between multiple time series, we compute the information flow across stock values to identify several different regimes. While small information flows is detected in most of the period, a dramatically different situation occurs in the proximity of global financial crises, where stock values exhibit strong and substantial interdependence for a prolonged period. This behavior is consistent with what one would generally expect from a complex system near criticality in physical systems, showing the long lasting effects of crashes on stock markets.

  12. Emerging interdependence between stock values during financial crashes

    PubMed Central

    Tsui, Enoch Yan Lok; Saad, David

    2017-01-01

    To identify emerging interdependencies between traded stocks we investigate the behavior of the stocks of FTSE 100 companies in the period 2000-2015, by looking at daily stock values. Exploiting the power of information theoretical measures to extract direct influences between multiple time series, we compute the information flow across stock values to identify several different regimes. While small information flows is detected in most of the period, a dramatically different situation occurs in the proximity of global financial crises, where stock values exhibit strong and substantial interdependence for a prolonged period. This behavior is consistent with what one would generally expect from a complex system near criticality in physical systems, showing the long lasting effects of crashes on stock markets. PMID:28542278

  13. Nucleotide Interdependency in Transcription Factor Binding Sites in the Drosophila Genome.

    PubMed

    Dresch, Jacqueline M; Zellers, Rowan G; Bork, Daniel K; Drewell, Robert A

    2016-01-01

    A long-standing objective in modern biology is to characterize the molecular components that drive the development of an organism. At the heart of eukaryotic development lies gene regulation. On the molecular level, much of the research in this field has focused on the binding of transcription factors (TFs) to regulatory regions in the genome known as cis-regulatory modules (CRMs). However, relatively little is known about the sequence-specific binding preferences of many TFs, especially with respect to the possible interdependencies between the nucleotides that make up binding sites. A particular limitation of many existing algorithms that aim to predict binding site sequences is that they do not allow for dependencies between nonadjacent nucleotides. In this study, we use a recently developed computational algorithm, MARZ, to compare binding site sequences using 32 distinct models in a systematic and unbiased approach to explore nucleotide dependencies within binding sites for 15 distinct TFs known to be critical to Drosophila development. Our results indicate that many of these proteins have varying levels of nucleotide interdependencies within their DNA recognition sequences, and that, in some cases, models that account for these dependencies greatly outperform traditional models that are used to predict binding sites. We also directly compare the ability of different models to identify the known KRUPPEL TF binding sites in CRMs and demonstrate that a more complex model that accounts for nucleotide interdependencies performs better when compared with simple models. This ability to identify TFs with critical nucleotide interdependencies in their binding sites will lead to a deeper understanding of how these molecular characteristics contribute to the architecture of CRMs and the precise regulation of transcription during organismal development.

  14. Nucleotide Interdependency in Transcription Factor Binding Sites in the Drosophila Genome

    PubMed Central

    Dresch, Jacqueline M.; Zellers, Rowan G.; Bork, Daniel K.; Drewell, Robert A.

    2016-01-01

    A long-standing objective in modern biology is to characterize the molecular components that drive the development of an organism. At the heart of eukaryotic development lies gene regulation. On the molecular level, much of the research in this field has focused on the binding of transcription factors (TFs) to regulatory regions in the genome known as cis-regulatory modules (CRMs). However, relatively little is known about the sequence-specific binding preferences of many TFs, especially with respect to the possible interdependencies between the nucleotides that make up binding sites. A particular limitation of many existing algorithms that aim to predict binding site sequences is that they do not allow for dependencies between nonadjacent nucleotides. In this study, we use a recently developed computational algorithm, MARZ, to compare binding site sequences using 32 distinct models in a systematic and unbiased approach to explore nucleotide dependencies within binding sites for 15 distinct TFs known to be critical to Drosophila development. Our results indicate that many of these proteins have varying levels of nucleotide interdependencies within their DNA recognition sequences, and that, in some cases, models that account for these dependencies greatly outperform traditional models that are used to predict binding sites. We also directly compare the ability of different models to identify the known KRUPPEL TF binding sites in CRMs and demonstrate that a more complex model that accounts for nucleotide interdependencies performs better when compared with simple models. This ability to identify TFs with critical nucleotide interdependencies in their binding sites will lead to a deeper understanding of how these molecular characteristics contribute to the architecture of CRMs and the precise regulation of transcription during organismal development. PMID:27330274

  15. 75 FR 81284 - National Protection and Programs Directorate; National Infrastructure Advisory Council Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Directorate; National Infrastructure Advisory Council Meeting AGENCY: National Protection and Programs...

  16. Community resiliency as a measure of collective health status: perspectives from rural communities.

    PubMed

    Kulig, Judith C; Edge, Dana; Joyce, Brenda

    2008-12-01

    Community resiliency is a theoretical framework useful for describing the process used by communities to address adversity. A mixed-method 2-year case study was conducted to gather information about community resiliency in 2 rural communities. This article focuses on the themes generated from qualitative interviews with 55 members of these communities. The participants viewed community as a place of interdependence and interaction. The majority saw community resiliency as the ability to address challenges. Characteristics included physical and social infrastructure, population characteristics, conceptual characteristics, and problem-solving processes. Barriers included negative individual attitudes and lack of infrastructure in rural communities. Nurses could play a key role in enhancing the resiliency of rural communities by developing and implementing programs based on the Community Resiliency Model, which was supported in this study.

  17. 77 FR 64818 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0033] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the [[Page 64819

  18. 3 CFR 8607 - Proclamation 8607 of November 30, 2010. Critical Infrastructure Protection Month, 2010

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., which will make our physical and cyber infrastructure more resilient. Working together, we can raise... Infrastructure Protection Month, 2010 8607 Proclamation 8607 Presidential Documents Proclamations Proclamation 8607 of November 30, 2010 Proc. 8607 Critical Infrastructure Protection Month, 2010By the President of...

  19. The Impact of Process Capability on Service Reliability for Critical Infrastructure Providers

    ERIC Educational Resources Information Center

    Houston, Clemith J., Jr.

    2013-01-01

    This study investigated the relationship between organizational processes that have been identified as promoting resiliency and their impact on service reliability within the scope of critical infrastructure providers. The importance of critical infrastructure to the nation is evident from the body of research and is supported by instances where…

  20. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    NASA Astrophysics Data System (ADS)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  1. Critical infrastructure protection : significant challenges in developing national capabilities

    DOT National Transportation Integrated Search

    2001-04-01

    To address the concerns about protecting the nation's critical computer-dependent infrastructure, this General Accounting Office (GOA) report describes the progress of the National Infrastructure Protection Center (NIPC) in (1) developing national ca...

  2. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  3. Learning for Maximum Impact: Four Critical but Overlooked Ideas

    ERIC Educational Resources Information Center

    Roberson, Sam

    2017-01-01

    Thinking and learning are corresponding and interdependent processes in every classroom. To improve learning, teachers must be open to new ideas, particularly ideas that locate conditions for maximum learning. This paper presents four overlooked but critical ideas that identify a common area, a GAP experience within which maximum learning is…

  4. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  5. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  6. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  7. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  8. Risk prediction of Critical Infrastructures against extreme natural hazards: local and regional scale analysis

    NASA Astrophysics Data System (ADS)

    Rosato, Vittorio; Hounjet, Micheline; Burzel, Andreas; Di Pietro, Antonio; Tofani, Alberto; Pollino, Maurizio; Giovinazzi, Sonia

    2016-04-01

    Natural hazard events can induce severe impacts on the built environment; they can hit wide and densely populated areas, where there is a large number of (inter)dependent technological systems whose damages could cause the failure or malfunctioning of further different services, spreading the impacts on wider geographical areas. The EU project CIPRNet (Critical Infrastructures Preparedness and Resilience Research Network) is realizing an unprecedented Decision Support System (DSS) which enables to operationally perform risk prediction on Critical Infrastructures (CI) by predicting the occurrence of natural events (from long term weather to short nowcast predictions, correlating intrinsic vulnerabilities of CI elements with the different events' manifestation strengths, and analysing the resulting Damage Scenario. The Damage Scenario is then transformed into an Impact Scenario, where punctual CI element damages are transformed into micro (local area) or meso (regional) scale Services Outages. At the smaller scale, the DSS simulates detailed city models (where CI dependencies are explicitly accounted for) that are of important input for crisis management organizations whereas, at the regional scale by using approximate System-of-Systems model describing systemic interactions, the focus is on raising awareness. The DSS has allowed to develop a novel simulation framework for predicting earthquakes shake maps originating from a given seismic event, considering the shock wave propagation in inhomogeneous media and the subsequent produced damages by estimating building vulnerabilities on the basis of a phenomenological model [1, 2]. Moreover, in presence of areas containing river basins, when abundant precipitations are expected, the DSS solves the hydrodynamic 1D/2D models of the river basins for predicting the flux runoff and the corresponding flood dynamics. This calculation allows the estimation of the Damage Scenario and triggers the evaluation of the Impact Scenario. The regional output of cascading effects can be used as an input model for more detailed analyses within urban areas for instance. The DSS weights the overall expected Crisis Scenario by also considering, through an appropriate Consequences Analysis, the number of citizens affected by the Service(s) outages, the expected economic losses of the major industrial activities hit by the unavailability of relevant Services (electricity, water, telecommunications etc.) and the influence of outages of the availability of Public Services (hospitals, schools, public offices etc.) [1] S.Giovinazzi, S. Lagomarsino: A macroseismic method for the vulnerability assessment of buildings. 13th World Conference on Earthquake Engineering, Vancouver, BC, Canada (2004) [2] S. Lagomarsino, S.Giovinazzi: Macroseismic and mechanical models for the vulnerability and damage assessment of current buildings. Bull Earthquake Eng., 4:415-443 (2006)

  9. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    NASA Astrophysics Data System (ADS)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step. The criterial evaluation is used as a ranking system in order to establish the priorities for the detailed risk assessment. This criterial analysis stage is necessary because the total number of installations and sections on a site can be quite large. As not all installations and sections on a site contribute significantly to the risk of a major accident occurring, it is not efficient to include all installations and sections in the detailed risk assessment, which can be time and resource consuming. The selected installations are then taken into consideration in the detailed risk assessment, which is the third step of the systematic risk assessment methodology. Following this step, conclusions can be drawn related to the overall risk characteristics of the site. The proposed methodology can as such be successfully applied to the assessment of risk related to critical infrastructure elements falling under the energy sector of Critical Infrastructure, mainly the sub-sectors oil and gas. Key words: Systematic risk assessment, criterial analysis, energy sector critical infrastructure elements

  10. IP Infrastructure Geolocation

    DTIC Science & Technology

    2015-03-01

    unlimited 13. ABSTRACT (maximum 200 words) Physical network maps are important to critical infrastructure defense and planning. Current state-of...the-art network infrastructure geolocation relies on Domain Name System (DNS) inferences. However, not only is using the DNS relatively inaccurate for...INTENTIONALLY LEFT BLANK iv ABSTRACT Physical network maps are important to critical infrastructure defense and planning. Cur- rent state-of-the-art

  11. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    ERIC Educational Resources Information Center

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  12. Hybrid Tasks: Promoting Statistical Thinking and Critical Thinking through the Same Mathematical Activities

    ERIC Educational Resources Information Center

    Aizikovitsh-Udi, Einav; Clarke, David; Kuntze, Sebastian

    2014-01-01

    Even though statistical thinking and critical thinking appear to have strong links from a theoretical point of view, empirical research into the intersections and potential interrelatedness of these aspects of competence is scarce. Our research suggests that thinking skills in both areas may be interdependent. Given this interconnection, it should…

  13. "I Owe It to My Group Members…who Critically Commented on My Conducting"--Cooperative Learning in Choral Conducting Education

    ERIC Educational Resources Information Center

    Varvarigou, Maria

    2016-01-01

    This article explores cooperative learning in choral conducting education. The five characteristics of cooperative learning identified by Adams and Hamm ((1996). "Cooperative learning: Critical thinking and collaboration across the curriculum" (2nd ed.). Springfield, IL: Charles Thomas Publishers): positive interdependence; face-to-face…

  14. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  15. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  16. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  17. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  18. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  19. Rethinking culture and self-construal: China as a middle land.

    PubMed

    Li, Han Z; Zhang, Zhi; Bhatt, Gira; Yum, Young-Ok

    2006-10-01

    Amid criticisms of current paper-and-pencil type questionnaires measuring self-construal across cultural groups, the authors used a graphic representation scale to examine whether Anglo Canadians (N = 220) were more independent than Mainland Chinese (N = 196) and Indians (N = 212) in construing their relationships with closest family member, family members, closest friend, friends, (other) relatives, colleagues, and neighbors. Data generated 5 intriguing findings: (a) Chinese were more interdependent than Canadians but less so than Indians, indicating that Chinese culture has become more individualistic. (b) Canadians were more independent than Chinese in 6 relationship dimensions but were as interdependent as Chinese in self-closest-friend connectedness, somewhat contradicting 1 assumption of theories of independent-interdependent self-construal and individualism-collectivism (I-C). (c) Canadians were more independent than Indians in all relationship dimensions, supporting theories of independent-interdependent self-construal and I-C. (d) Chinese were as interdependent as Indians in self-closest-family-member, self-close-family-members, and self-relatives connectedness but more independent than Indians in the other categories of self-other relationships. (e) Participants' age did not have strong correlations with variables measuring self-construal in any sample, indicating that a person's attachment style may not change greatly over a lifespan. The authors discussed theoretical and methodological implications.

  20. Assessing the Climate Resilience of Transport Infrastructure Investments in Tanzania

    NASA Astrophysics Data System (ADS)

    Hall, J. W.; Pant, R.; Koks, E.; Thacker, S.; Russell, T.

    2017-12-01

    Whilst there is an urgent need for infrastructure investment in developing countries, there is a risk that poorly planned and built infrastructure will introduce new vulnerabilities. As climate change increases the magnitudes and frequency of natural hazard events, incidence of disruptive infrastructure failures are likely to become more frequent. Therefore, it is important that infrastructure planning and investment is underpinned by climate risk assessment that can inform adaptation planning. Tanzania's rapid economic growth is placing considerable strain on the country's transportation infrastructure (roads, railways, shipping and aviation); especially at the port of Dar es Salaam and its linking transport corridors. A growing number of natural hazard events, in particular flooding, are impacting the reliability of this already over-used network. Here we report on new methodology to analyse vulnerabilities and risks due to failures of key locations in the intermodal transport network of Tanzania, including strategic connectivity to neighboring countries. To perform the national-scale risk analysis we will utilize a system-of-systems methodology. The main components of this general risk assessment, when applied to transportation systems, include: (1) Assembling data on: spatially coherent extreme hazards and intermodal transportation networks; (2) Intersecting hazards with transport network models to initiate failure conditions that trigger failure propagation across interdependent networks; (3) Quantifying failure outcomes in terms of social impacts (customers/passengers disrupted) and/or macroeconomic consequences (across multiple sectors); and (4) Simulating, testing and collecting multiple failure scenarios to perform an exhaustive risk assessment in terms of probabilities and consequences. The methodology is being used to pinpoint vulnerability and reduce climate risks to transport infrastructure investments.

  1. The Role of Model Fidelity in Understanding the Food-Energy-Water Nexus at the Asset Level

    NASA Astrophysics Data System (ADS)

    Tidwell, V. C.; Lowry, T. S.; Behery, S.; Macknick, J.; Yang, Y. C. E.

    2017-12-01

    An improved understanding of the food-energy-water nexus at the asset level (e.g., power plant, irrigation ditch, water utility) is necessary for the efficient management and operations of connected infrastructure systems. Interdependencies potentially influencing the operations of a particular asset can be numerous. For example, operations of energy and agricultural assets depend on the delivery of water, which in turn depend on the physical hydrology, river/reservoir operations, water rights, the networked water infrastructure and other factors. A critical challenge becomes identification of those linkages central to the analysis of the system. Toward this need, a case study was conducted centered on the San Juan River basin, a major tributary to the Colorado River. A unique opportunity was afforded by the availability of two sets of coupled models built on the same simulation platform but formulated at distinctly different fidelities. Comparative analysis was driven by statistically downscaled climate data from three global climate models (emission scenario RCP 8.5) and planned growth in regional water demand. Precipitation was partitioned between evaporation, runoff and recharge using the Variable Infiltration Capacity (VIC) hydrologic model. Priority administration of small-scale water use of upland tributary flows was simulated using Colorado's StateMod model. Mainstem operations of the San Juan River, including releases from Navajo Reservoir, were subsequently modeled using RiverWare to estimate impacts on water deliveries, environmental flows and interbasin transfers out to the year 2100. Models differ in the spatial resolution, disaggregation of water use, infrastructure operations and representation of system dynamics. Comparisons drawn between this suite of coupled models provides insight into the value of model fidelity relative to assessing asset vulnerability to a range of uncertain growth and climate futures. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.

  2. Complex Networks and Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Setola, Roberto; de Porcellinis, Stefano

    The term “Critical Infrastructures” indicates all those technological infrastructures such as: electric grids, telecommunication networks, railways, healthcare systems, financial circuits, etc. that are more and more relevant for the welfare of our countries. Each one of these infrastructures is a complex, highly non-linear, geographically dispersed cluster of systems, that interact with their human owners, operators, users and with the other infrastructures. Their augmented relevance and the actual political and technological scenarios, which have increased their exposition to accidental failure and deliberate attacks, demand for different and innovative protection strategies (generally indicate as CIP - Critical Infrastructure Protection). To this end it is mandatory to understand the mechanisms that regulate the dynamic of these infrastructures. In this framework, an interesting approach is those provided by the complex networks. In this paper we illustrate some results achieved considering structural and functional properties of the corresponding topological networks both when each infrastructure is assumed as an autonomous system and when we take into account also the dependencies existing among the different infrastructures.

  3. Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System.

    PubMed

    Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun

    2017-01-17

    This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions. © 2017 Society for Risk Analysis.

  4. Whistleblowing and organizational ethics.

    PubMed

    Ray, Susan L

    2006-07-01

    The purpose of this article is to discuss an external whistleblowing event that occurred after all internal whistleblowing through the hierarchy of the organization had failed. It is argued that an organization that does not support those that whistle blow because of violation of professional standards is indicative of a failure of organizational ethics. Several ways to build an ethics infrastructure that could reduce the need to resort to external whistleblowing are discussed. A relational ethics approach is presented as a way to eliminate the negative consequences of whistleblowing by fostering an interdependent moral community to address ethical concerns.

  5. Going Global and Getting Graphic: Critical Multicultural Citizenship Education in an Afterschool Program for Immigrant and Refugee Girls

    ERIC Educational Resources Information Center

    Park, Jie Y.

    2016-01-01

    This qualitative case study reports on the experiences of six recent-arrival immigrant and refugee girls as they participated in an afterschool program designed to promote critical multicultural citizenship through graphic novels. Analysis of discourse data revealed how the girls explored the interdependence among nation-states and wrestled with…

  6. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...

  7. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...

  8. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... of America, it is hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical... cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety...

  9. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  10. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  11. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  12. Development of a Suite of Analytical Tools for Energy and Water Infrastructure Knowledge Discovery

    NASA Astrophysics Data System (ADS)

    Morton, A.; Piburn, J.; Stewart, R.; Chandola, V.

    2017-12-01

    Energy and water generation and delivery systems are inherently interconnected. With demand for energy growing, the energy sector is experiencing increasing competition for water. With increasing population and changing environmental, socioeconomic, and demographic scenarios, new technology and investment decisions must be made for optimized and sustainable energy-water resource management. This also requires novel scientific insights into the complex interdependencies of energy-water infrastructures across multiple space and time scales. To address this need, we've developed a suite of analytical tools to support an integrated data driven modeling, analysis, and visualization capability for understanding, designing, and developing efficient local and regional practices related to the energy-water nexus. This work reviews the analytical capabilities available along with a series of case studies designed to demonstrate the potential of these tools for illuminating energy-water nexus solutions and supporting strategic (federal) policy decisions.

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less

  14. Hybrid phase transition into an absorbing state: Percolation and avalanches

    NASA Astrophysics Data System (ADS)

    Lee, Deokjae; Choi, S.; Stippinger, M.; Kertész, J.; Kahng, B.

    2016-04-01

    Interdependent networks are more fragile under random attacks than simplex networks, because interlayer dependencies lead to cascading failures and finally to a sudden collapse. This is a hybrid phase transition (HPT), meaning that at the transition point the order parameter has a jump but there are also critical phenomena related to it. Here we study these phenomena on the Erdős-Rényi and the two-dimensional interdependent networks and show that the hybrid percolation transition exhibits two kinds of critical behaviors: divergence of the fluctuations of the order parameter and power-law size distribution of finite avalanches at a transition point. At the transition point global or "infinite" avalanches occur, while the finite ones have a power law size distribution; thus the avalanche statistics also has the nature of a HPT. The exponent βm of the order parameter is 1 /2 under general conditions, while the value of the exponent γm characterizing the fluctuations of the order parameter depends on the system. The critical behavior of the finite avalanches can be described by another set of exponents, βa and γa. These two critical behaviors are coupled by a scaling law: 1 -βm=γa .

  15. 48 CFR 3002.101 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information: (1) Protected Critical Infrastructure Information (PCII) as set out in the Critical Infrastructure Information Act of 2002 (Title II, Subtitle B, of the Homeland Security Act, Pub. L. 107-296, 196...

  16. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  17. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  18. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  20. Resilient Military Systems and the Advanced Cyber Threat

    DTIC Science & Technology

    2013-01-01

    systems; intelligence, surveillance, and reconnaissance systems; logistics and human resource systems; and mobile as well as fixed- infrastructure ...significant portions of military and critical infrastructure : power generation, communications, fuel and transportation, emergency services, financial...vulnerabilities in the domestic power grid and critical infrastructure systems.4,5 DoD, and the United States, is extremely reliant on the

  1. Critical Infrastructure Protection- Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bofman, Ryan K.

    Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Bale, J; Moran, K

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attackmore » chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4) the refinement of the DECIDe--the Determinants Effecting Critical Infrastructure Decisions--analytical framework to make the factors and dynamics identified by the study more ''usable'' in future efforts to assess terrorist intentions to target chemical-related infrastructure.« less

  3. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  4. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  5. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  6. Optimal expansion of a drinking water infrastructure system with respect to carbon footprint, cost-effectiveness and water demand.

    PubMed

    Chang, Ni-Bin; Qi, Cheng; Yang, Y Jeffrey

    2012-11-15

    Urban water infrastructure expansion requires careful long-term planning to reduce the risk from climate change during periods of both economic boom and recession. As part of the adaptation management strategies, capacity expansion in concert with other management alternatives responding to the population dynamics, ecological conservation, and water management policies should be systematically examined to balance the water supply and demand temporally and spatially with different scales. To mitigate the climate change impact, this practical implementation often requires a multiobjective decision analysis that introduces economic efficiencies and carbon-footprint matrices simultaneously. The optimal expansion strategies for a typical water infrastructure system in South Florida demonstrate the essence of the new philosophy. Within our case study, the multiobjective modeling framework uniquely features an integrated evaluation of transboundary surface and groundwater resources and quantitatively assesses the interdependencies among drinking water supply, wastewater reuse, and irrigation water permit transfer as the management options expand throughout varying dimensions. With the aid of a multistage planning methodology over the partitioned time horizon, such a systems analysis has resulted in a full-scale screening and sequencing of multiple competing objectives across a suite of management strategies. These strategies that prioritize 20 options provide a possible expansion schedule over the next 20 years that improve water infrastructure resilience and at low life-cycle costs. The proposed method is transformative to other applications of similar water infrastructure systems elsewhere in the world. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  8. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  9. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  10. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  11. An Analysis of the Bilateral Relations Between Qatar and Japan: Case Studies on Energy, Culture and Diplomacy

    NASA Astrophysics Data System (ADS)

    Al Subaey, Maha Khalid

    Energy is considered as an important pillar in the establishment of international relations where it plays a heavy role in shaping the relations. In the light of this, an analysis of the Qatar-Japan relations will be studied through the case study of energy security along with the culture and diplomacy spectrum. The research aims to assess the bilateral relationship in terms of the projects and the Liquefied Natural Gas (LNG) trade and the further development in the energy sector. This will take into consideration the growing interdependence in the projects in different sectors: infrastructure, trade and cultural projects. Also, the direct involvement of the Qatari and Japanese societies in the relationship. The LNG trade along with view on the joint ventures and other types of contracts would be adopted to elaborate over the energy cooperation. The energy plays a significant role in the relationship and classifying it as an economically driven. Further more, the bilateral relationship is classified as complex interdependence approach' that was supported by the theory of soft power.

  12. The Department of Energy Nuclear Criticality Safety Program

    NASA Astrophysics Data System (ADS)

    Felty, James R.

    2005-05-01

    This paper broadly covers key events and activities from which the Department of Energy Nuclear Criticality Safety Program (NCSP) evolved. The NCSP maintains fundamental infrastructure that supports operational criticality safety programs. This infrastructure includes continued development and maintenance of key calculational tools, differential and integral data measurements, benchmark compilation, development of training resources, hands-on training, and web-based systems to enhance information preservation and dissemination. The NCSP was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 97-2, Criticality Safety, and evolved from a predecessor program, the Nuclear Criticality Predictability Program, that was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 93-2, The Need for Critical Experiment Capability. This paper also discusses the role Dr. Sol Pearlstein played in helping the Department of Energy lay the foundation for a robust and enduring criticality safety infrastructure.

  13. The Conservation Nexus: Valuing Interdependent Water and Energy Savings in Phoenix, Arizona

    NASA Astrophysics Data System (ADS)

    Chester, M.; Bartos, M.

    2013-12-01

    Energy and water resources are intrinsically linked, yet they are managed separately--even in the water-scarce American southwest. This study develops a spatially-explicit model of water-energy interdependencies in Arizona, and assesses the potential for co-beneficial conservation programs. Arizona consumes 2.8% of its water demand for thermoelectric power and 8% of its electricity demand for water infrastructure--roughly twice the national average. The interdependent benefits of investments in 7 conservation strategies are assessed. Deployment of irrigation retrofits and new reclaimed water facilities dominate potential water savings, while residential and commercial HVAC improvements dominate energy savings. Water conservation policies have the potential to reduce statewide electricity demand by 1.0-2.9%, satisfying 5-14% of mandated energy-efficiency goals. Likewise, adoption of energy-efficiency measures and renewable generation portfolios can reduce non-agricultural water demand by 2.0-2.6%. These co-benefits of conservation investments are typically not included in conservation plans or benefit-cost analyses. Residential water conservation measures produce significant water and energy savings, but are generally not cost-effective at current water prices. An evaluation of the true cost of water in Arizona would allow future water and energy savings to be compared objectively, and would help policymakers allocate scarce resources to the highest-value conservation measures. Water Transfers between Water Cycle Components in Arizona in 2008 Cumulative embedded energy in water cycle components in Arizona in 2008

  14. Cybersecurity Information Sharing Between Public Private Sector Agencies

    DTIC Science & Technology

    2015-03-01

    Recognizing the lack of scholarly literature on PPPs and protecting CI from all hazards , including cyber-related threats, Nathan Busch and Austen...referred to as SLTT), and the owners and operators in charge of critical infrastructure, to manage risks and increase resiliency against all hazards .74 PPD...and hazards to critical infrastructure security and resilience, and called for an updated National Infrastructure Protection Plan (NIPP).76 Despite

  15. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  16. Identity Verification Systems as a Critical Infrastructure

    DTIC Science & Technology

    2012-03-01

    COVERED Master’s Thesis 4 . TITLE AND SUBTITLE Identity Verification Systems as a Critical Infrastructure 5. FUNDING NUMBERS 6. AUTHOR(S...43 3. Cybercrime .........................................................................................45 4 ...24 Figure 3. Uses of Fictitious or Stolen Identity ................................................................30 Figure 4

  17. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less

  18. 18 CFR 5.29 - Other provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... member of the public. (c) Requests for privileged or Critical Energy Infrastructure Information treatment of pre-filing submission. If a potential Applicant requests privileged or critical energy infrastructure information treatment of any information submitted to the Commission during pre-filing...

  19. 18 CFR 5.29 - Other provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... member of the public. (c) Requests for privileged or Critical Energy Infrastructure Information treatment of pre-filing submission. If a potential Applicant requests privileged or critical energy infrastructure information treatment of any information submitted to the Commission during pre-filing...

  20. An operational-oriented approach to the assessment of low probability seismic ground motions for critical infrastructures

    NASA Astrophysics Data System (ADS)

    Garcia-Fernandez, Mariano; Assatourians, Karen; Jimenez, Maria-Jose

    2018-01-01

    Extreme natural hazard events have the potential to cause significant disruption to critical infrastructure (CI) networks. Among them, earthquakes represent a major threat as sudden-onset events with limited, if any, capability of forecast, and high damage potential. In recent years, the increased exposure of interdependent systems has heightened concern, motivating the need for a framework for the management of these increased hazards. The seismic performance level and resilience of existing non-nuclear CIs can be analyzed by identifying the ground motion input values leading to failure of selected key elements. Main interest focuses on the ground motions exceeding the original design values, which should correspond to low probability occurrence. A seismic hazard methodology has been specifically developed to consider low-probability ground motions affecting elongated CI networks. The approach is based on Monte Carlo simulation, which allows for building long-duration synthetic earthquake catalogs to derive low-probability amplitudes. This approach does not affect the mean hazard values and allows obtaining a representation of maximum amplitudes that follow a general extreme-value distribution. This facilitates the analysis of the occurrence of extremes, i.e., very low probability of exceedance from unlikely combinations, for the development of, e.g., stress tests, among other applications. Following this methodology, extreme ground-motion scenarios have been developed for selected combinations of modeling inputs including seismic activity models (source model and magnitude-recurrence relationship), ground motion prediction equations (GMPE), hazard levels, and fractiles of extreme ground motion. The different results provide an overview of the effects of different hazard modeling inputs on the generated extreme motion hazard scenarios. This approach to seismic hazard is at the core of the risk analysis procedure developed and applied to European CI transport networks within the framework of the European-funded INFRARISK project. Such an operational seismic hazard framework can be used to provide insight in a timely manner to make informed risk management or regulating further decisions on the required level of detail or on the adoption of measures, the cost of which can be balanced against the benefits of the measures in question.

  1. We Are A Region! A Report for the New York Metropolitan Transportation Council Long Range Plan: Critical Issues-Critical Choices, A Mobility Plan for the New York Region Through the Year 2015 [Draft

    DOT National Transportation Integrated Search

    1995-12-01

    This report is an attempt to demonstrate the mutual interdependence of the NYMTC region. What ties it together? How does diversity contribute to it as a region? This report seeks to answer these questions. A second objective is to use this report to ...

  2. Low carbon technology performance vs infrastructure vulnerability: analysis through the local and global properties space.

    PubMed

    Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K

    2014-11-04

    Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.

  3. Special Issue: Troubled Family Interactions and Group Intervention.

    ERIC Educational Resources Information Center

    West, John D.; Kirby, Jonell, Eds.

    1981-01-01

    Examines the view that individual pathologies and problems are manifestations of family dysfunctions. The interdependence of family members is the critical element in the family group therapy process. Intervention involves the disruption of the dynamic balance maintained by the family system. (RC)

  4. Critical Infrastructure: The National Asset Database

    DTIC Science & Technology

    2007-07-16

    Infrastructure: The National Asset Database 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e...upon which federal resources, including infrastructure protection grants , are allocated. According to DHS, both of those assumptions are wrong. DHS...assets that it has determined are critical to the nation. Also, while the National Asset Database has been used to support federal grant -making

  5. A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires

    DTIC Science & Technology

    2014-05-01

    provide a tool for NRC to help the Canadian industry to develop extreme fire protection materials and technologies for critical infrastructures. Future...supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in...in oil refinery and chemical industry facilities. The only available standard in North America that addresses the transportation infrastructure is

  6. Method or Madness: Federal Oversight Structures for Critical Infrastructure Protection

    DTIC Science & Technology

    2007-12-01

    to dramatically reduce their operating costs and completely revamp their business models. In fact, many companies no longer have the capacity or...increasing reliance on private sector companies in many critical infrastructure segments, government agencies have been reluctant to try innovative...as it is applied to infrastructure services, is effectively limited to “economic growth and the free flow of commerce.”15 The collection of essays

  7. Continuity of operations/continuity of government for state-level transportation organizations : brief.

    DOT National Transportation Integrated Search

    2011-09-01

    As a result of a federal requirement, all non-federal entities that own or operate critical : infrastructure are required to develop Continuity of Operations/Continuity of Government : (COOP/COG) Plans. Transportation is a critical infrastructure com...

  8. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  9. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  10. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  11. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  12. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  13. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Executive Order \\1\\ to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  14. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  15. Critical Infrastructure Rebuild Prioritization using Simulation Optimization

    DTIC Science & Technology

    2007-03-01

    23 Figure 2.9 Production by temperature and production made from a crude oil (EIA.com)24 Figure 2.10 Natural gas industry... Oil infrastructure physical layer ...................................................................... 45 Figure 3.6 Natural gas infrastructure...information layer.......................................................... 55 Figure 3.11 Oil infrastructure information layer

  16. LANL: Weapons Infrastructure Briefing to Naval Reactors, July 18, 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chadwick, Frances

    Presentation slides address: The Laboratory infrastructure supports hundreds of high hazard, complex operations daily; LANL’s unique science and engineering infrastructure is critical to delivering on our mission; LANL FY17 Budget & Workforce; Direct-Funded Infrastructure Accounts; LANL Org Chart; Weapons Infrastructure Program Office; The Laboratory’s infrastructure relies on both Direct and Indirect funding; NA-50’s Operating, Maintenance & Recapitalization funding is critical to the execution of the mission; Los Alamos is currently executing several concurrent Line Item projects; Maintenance @ LANL; NA-50 is helping us to address D&D needs; We are executing a CHAMP Pilot Project at LANL; G2 = Main Toolmore » for Program Management; MDI: Future Investments are centered on facilities with a high Mission Dependency Index; Los Alamos hosted first “Deep Dive” in November 2016; Safety, Infrastructure & Operations is one of the most important programs at LANL, and is foundational for our mission success.« less

  17. Critical Transition in Critical Zone of Intensively Managed Landscapes

    NASA Astrophysics Data System (ADS)

    Kumar, P.

    2017-12-01

    Intensification of industrial agriculture has resulted in severe unintended global impacts, including degradation of arable land and eutrophication of receiving water bodies. Modern agricultural practices rely on significant direct and indirect human energy inputs, which have created imbalances between increased rates of biogeochemical processes related to production and background rates of natural processes. These imbalances have cascaded through the deep inter-dependencies between carbon, soil, water, nutrient and ecological processes, resulting in a critical transition of the Critical Zone and creating emergent dynamics and evolutionary trajectories. Understanding of these novel organization and function of the Critical Zone is vital for developing sustainable agricultural practices.

  18. Geography, Culture, History, Politics of Latin America. Revised.

    ERIC Educational Resources Information Center

    Dangle, James; Esler, Jon

    This curriculum guide provides activities to help students understand Latin America. A foundation for analyzing the interdependence of world nations develops critical thinking, and problem solving skills. Activities emphasize research, reading, writing, and speaking skills. Detailed lesson plans and accompanying reproducible student handouts are…

  19. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Collection Request, Protected Critical Infrastructure Information (PCII) Stakeholder Survey. DHS previously... homeland security duties. This survey is designed to gather information from PCII Officers that can be used...

  20. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  1. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  2. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  3. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  4. The national strategy for the physical protection of critical infrastructures and key assets

    DOT National Transportation Integrated Search

    2003-02-01

    This document defines the road ahead for a core mission area identified in the President's National Strategy for Homeland Security-reducing the Nation's vulnerability to acts of terrorism by protecting our critical infrastructures and key assets from...

  5. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208 Section 800.208 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS...

  6. 78 FR 54454 - Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-04

    ... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...

  7. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  8. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    NASA Astrophysics Data System (ADS)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  9. 75 FR 61160 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-04

    ... systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as.... Deliberation: Optimization of Resources for Mitigating Infrastructure Disruptions VII. Discussion of Potential...

  10. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  11. 78 FR 25254 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...

  12. Cyber Vulnerabilities Within Critical Infrastructure: The Flaws of Industrial Control Systems in the Oil and Gas Industry

    NASA Astrophysics Data System (ADS)

    Alpi, Danielle Marie

    The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.

  13. Fuzzy architecture assessment for critical infrastructure resilience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Muller, George

    2012-12-01

    This paper presents an approach for the selection of alternative architectures in a connected infrastructure system to increase resilience of the overall infrastructure system. The paper begins with a description of resilience and critical infrastructure, then summarizes existing approaches to resilience, and presents a fuzzy-rule based method of selecting among alternative infrastructure architectures. This methodology includes considerations which are most important when deciding on an approach to resilience. The paper concludes with a proposed approach which builds on existing resilience architecting methods by integrating key system aspects using fuzzy memberships and fuzzy rule sets. This novel approach aids the systemsmore » architect in considering resilience for the evaluation of architectures for adoption into the final system architecture.« less

  14. Interdependence of endomembrane trafficking and actin dynamics during polarized growth of Arabidopsis pollen tubes

    USDA-ARS?s Scientific Manuscript database

    During polarized growth of pollen tubes, endomembrane trafficking and actin polymerization are two critical processes that establish membrane/wall homeostasis and maintain growth polarity. Fine-tuned interactions between these two processes are therefore necessary but poorly understood. To better un...

  15. A Structure for Pedagogical Art Criticism.

    ERIC Educational Resources Information Center

    Anderson, Tom

    1988-01-01

    Develops method for incorporating the intuitive and affective with intellectual and analytic components for understanding works of art. States that the premises for such a systematization include both Arnheim's claim that two basic interdependent procedures of intelligent cognition are intuition and intellect (1986); and Harry Broudy's (1972)…

  16. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Düssel, Patrick; Gehl, Christian; Laskov, Pavel; Bußer, Jens-Uwe; Störmann, Christof; Kästner, Jan

    With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.

  17. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ..., National Protection and Programs Directorate, Office of Infrastructure Protection (IP), will submit the... manner.'' DHS designated IP to lead these efforts. Given that the vast majority of the Nation's critical infrastructure and key resources in most sectors are privately owned or controlled, IP's success in achieving the...

  18. A probabilistic and adaptive approach to modeling performance of pavement infrastructure

    DOT National Transportation Integrated Search

    2007-08-01

    Accurate prediction of pavement performance is critical to pavement management agencies. Reliable and accurate predictions of pavement infrastructure performance can save significant amounts of money for pavement infrastructure management agencies th...

  19. 75 FR 39266 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... infrastructure sectors and their information systems. Pursuant to 41 CFR 102-3.150(b), this notice was published... Critical Infrastructure Resilience Goals VI. Working Group Status: Optimization of Resources for Mitigating...

  20. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .

  1. GPS disruptions : efforts to assess risks to critical infrastructure and coordinate agency actions should be enhanced.

    DOT National Transportation Integrated Search

    2013-11-01

    To assess the risks and potential effects from disruptions in the Global : Positioning System (GPS) on critical infrastructure, the Department of Homeland : Security (DHS) published the GPS National Risk Estimate (NRE) in 2012. In : doing so, DHS con...

  2. 75 FR 54915 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Sensory System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Sensory System for Critical Infrastructure Defect Recognition, Visualization and... Critical Infrastructure Defect Recognition, Visualization and Failure Prediction ('Sensory System'') has...

  3. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION § 29.1 Purpose and scope. (a) Purpose of this Part. This Part implements sections 211 through 215... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  4. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  5. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  6. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  7. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  8. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  9. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  10. 3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...

  11. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  12. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  13. Information Security: A Difficult Balance

    ERIC Educational Resources Information Center

    Rose, Linwood H.

    2004-01-01

    Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…

  14. Report: EPA Needs to Better Implement Plan for Protecting Critical Infrastructure and Key Resources Used to Respond to Terrorist Attacks and Disasters

    EPA Pesticide Factsheets

    Report #2006-P-00022, April 26, 2006. Assignment of formal authority and more accountability is required to ensure the initiatives in the Critical Infrastructure and Key Resources Protection Plan are accomplished in a timely manner.

  15. 78 FR 13024 - Developing a Framework To Improve Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... review to develop a framework to reduce cyber risks to critical infrastructure \\1\\ (the ``Cybersecurity... processes that align policy, business, and technological approaches to address cyber risks. \\1\\ For the... cyber activity. Such activity is increasing and its consequences can range from theft through disruption...

  16. Developing measurement indices to enhance protection and resilience of critical infrastructure and key resources.

    PubMed

    Fisher, Ronald E; Norman, Michael

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  17. A Model for the Departmental Quality Management Infrastructure Within an Academic Health System.

    PubMed

    Mathews, Simon C; Demski, Renee; Hooper, Jody E; Biddison, Lee Daugherty; Berry, Stephen A; Petty, Brent G; Chen, Allen R; Hill, Peter M; Miller, Marlene R; Witter, Frank R; Allen, Lisa; Wick, Elizabeth C; Stierer, Tracey S; Paine, Lori; Puttgen, Hans A; Tamargo, Rafael J; Pronovost, Peter J

    2017-05-01

    As quality improvement and patient safety come to play a larger role in health care, academic medical centers and health systems are poised to take a leadership role in addressing these issues. Academic medical centers can leverage their large integrated footprint and have the ability to innovate in this field. However, a robust quality management infrastructure is needed to support these efforts. In this context, quality and safety are often described at the executive level and at the unit level. Yet, the role of individual departments, which are often the dominant functional unit within a hospital, in realizing health system quality and safety goals has not been addressed. Developing a departmental quality management infrastructure is challenging because departments are diverse in composition, size, resources, and needs.In this article, the authors describe the model of departmental quality management infrastructure that has been implemented at the Johns Hopkins Hospital. This model leverages the fractal approach, linking departments horizontally to support peer and organizational learning and connecting departments vertically to support accountability to the hospital, health system, and board of trustees. This model also provides both structure and flexibility to meet individual departmental needs, recognizing that independence and interdependence are needed for large academic medical centers. The authors describe the structure, function, and support system for this model as well as the practical and essential steps for its implementation. They also provide examples of its early success.

  18. The Ties That Bind: Effective Racial/Ethnic Minority Communities as Models of Peaceful Coexistence.

    ERIC Educational Resources Information Center

    Steward, Robbie J.

    Although counseling literature addresses within-group diversity among racial/ethnic groups in this country, seldom do studies examine the interpersonal dynamics within communities where minorities have fostered interdependence, cooperation, and acceptance of diversity among themselves. This paper presents an overview of some critical factors which…

  19. Higher Education Co-operation and Western Dominance of Knowledge Creation and Flows in Third World Countries.

    ERIC Educational Resources Information Center

    Selvaratnam, Viswanathan

    1988-01-01

    Third World adoption of the Western university and the accompanying Eurocentric system of information flow is criticized as sometimes being counterproductive and alien to developing nations. The potential for a self-reliant, interdependent higher education system among Third World countries is discussed. (MSE)

  20. Internationalizing an Interior Design Course: A Model for Global FCS Curricula

    ERIC Educational Resources Information Center

    Charlson, Julie; Vouchilas, Gus

    2010-01-01

    Accreditation for Family and Consumer Sciences and for Interior Design programs includes standards to globalize education of undergraduate students. An integrative approach to planning curriculum relates the concept of global interdependence to the development of critical thinking skills for student decision-making. This was addressed in modifying…

  1. Women and Evolution, Part II: Subsistence and Social Organization Among Early Hominids

    ERIC Educational Resources Information Center

    Zihlman, Adrienne L.

    1978-01-01

    The earliest human females, previously ignored in evolutionary reconstructions, are interpreted as playing a critical role in the success of the species. It is suggested that prehistoric males and females were interdependent, both in sharing food and cooperating in nurturing the young. (Author/KR)

  2. Improving the Human Condition: A Curricular Response to Critical Realities.

    ERIC Educational Resources Information Center

    Jelinek, James John, Ed.

    The handbook examines issues facing the increasingly interdependent world and suggests areas of knowledge which educators must consider as they develop and implement curriculum to help students deal effectively with the future. The document contains eight articles. The first article identifies problems facing society as rapid change, economic…

  3. Comments on the Problems of Specification and Interdependence in a Set of Learning Equations

    ERIC Educational Resources Information Center

    Swan, Craig

    1978-01-01

    Criticizes a discussion of the reformation of post-TUCE learning equations by John Soper, which were presented in an earlier issue (see EJ 152 358). Claims that the author's manipulations from one equation to another essentially repackaged the same information. (Author/DB)

  4. Renewing the Boundless Resource.

    ERIC Educational Resources Information Center

    Cleveland, Harlan

    A lecture on the critical issues of the 1970s from the vantage point of changing attitudes was presented at the 1979 annual meeting of the American Association of State Colleges and Universities. The review summarizes how the public's basic attitudes toward government, world interdependence, technology, and economic equity, for example, changed…

  5. 2010 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP) Risk Reduction and Mitigation in the Defense Industrial Base

    DTIC Science & Technology

    2010-04-28

    Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL

  6. Infrastructure management : Project A : developing a framework for prioritizing infrastructure improvements on critical freight corridors; Project B : developing a market based framework for freight infrastructure management.

    DOT National Transportation Integrated Search

    2012-12-01

    Fully operational highways are necessary for efficient freight movements by the trucking industry. Yet, the combination of limited funding and aging infrastructure creates a grim scenario for states, which are dependent upon the economic benefits of ...

  7. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.

    2015-03-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa as one of the Pacific Islands are prone to climatic hazards that will likely increase in coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase in such events. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructures were developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Evan cyclone recovery needs document. On the other hand, criticality and capacity to repair data were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested rankings from most vulnerable to least vulnerable sectors are the transportation sector, the power sector, the water supply sector and the sewerage system.

  8. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.

    2015-06-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.

  9. A novel critical infrastructure resilience assessment approach using dynamic Bayesian networks

    NASA Astrophysics Data System (ADS)

    Cai, Baoping; Xie, Min; Liu, Yonghong; Liu, Yiliu; Ji, Renjie; Feng, Qiang

    2017-10-01

    The word resilience originally originates from the Latin word "resiliere", which means to "bounce back". The concept has been used in various fields, such as ecology, economics, psychology, and society, with different definitions. In the field of critical infrastructure, although some resilience metrics are proposed, they are totally different from each other, which are determined by the performances of the objects of evaluation. Here we bridge the gap by developing a universal critical infrastructure resilience metric from the perspective of reliability engineering. A dynamic Bayesian networks-based assessment approach is proposed to calculate the resilience value. A series, parallel and voting system is used to demonstrate the application of the developed resilience metric and assessment approach.

  10. Attenuation of Storm Surge Flooding By Wetlands in the Chesapeake Bay: An Integrated Geospatial Framework Evaluating Impacts to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.

    2014-12-01

    Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.

  11. Risk Assessment Methodology for Water utilities (RAM-W) : the foundation for emergency response planning.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Danneels, Jeffrey John

    2005-03-01

    Concerns about acts of terrorism against critical infrastructures have been on the rise for several years. Critical infrastructures are those physical structures and information systems (including cyber) essential to the minimum operations of the economy and government. The President's Commission on Critical Infrastructure Protection (PCCIP) probed the security of the nation's critical infrastructures. The PCCIP determined the water infrastructure is highly vulnerable to a range of potential attacks. In October 1997, the PCCIP proposed a public/private partnership between the federal government and private industry to improve the protection of the nation's critical infrastructures. In early 2000, the EPA partnered withmore » the Awwa Research Foundation (AwwaRF) and Sandia National Laboratories to create the Risk Assessment Methodology for Water Utilities (RAM-W{trademark}). Soon thereafter, they initiated an effort to create a template and minimum requirements for water utility Emergency Response Plans (ERP). All public water utilities in the US serving populations greater than 3,300 are required to undertaken both a vulnerability assessment and the development of an emergency response plan. This paper explains the initial steps of RAM-W{trademark} and then demonstrates how the security risk assessment is fundamental to the ERP. During the development of RAM-W{trademark}, Sandia performed several security risk assessments at large metropolitan water utilities. As part of the scope of that effort, ERPs at each utility were reviewed to determine how well they addressed significant vulnerabilities uncovered during the risk assessment. The ERP will contain responses to other events as well (e.g. natural disasters) but should address all major findings in the security risk assessment.« less

  12. Time evolving multi-city dependencies and robustness tradeoffs for risk-based portfolios of conservation, transfers, and cooperative water supply infrastructure development pathways

    NASA Astrophysics Data System (ADS)

    Trindade, B. C.; Reed, P. M.; Zeff, H. B.; Characklis, G. W.

    2016-12-01

    Water scarcity in historically water-rich regions such as the southeastern United States is becoming a more prevalent concern. It has been shown that cooperative short-term planning that relies on conservation and transfers of existing supplies amongst communities can be used by water utilities to mitigate the effects of water scarcity in the near future. However, in the longer term, infrastructure expansion is likely to be necessary to address imbalances between growing water demands and the available supply capacity. This study seeks to better diagnose and avoid candidate modes for system failure. Although it is becoming more common for water utilities to evaluate the robustness of their water supply, defined as the insensitivity of their systems to errors in deeply uncertain projections or assumptions, defining robustness is particularly challenging in multi-stakeholder regional contexts for decisions that encompass short management actions and long-term infrastructure planning. Planning and management decisions are highly interdependent and strongly shape how a region's infrastructure itself evolves. This research advances the concept of system robustness by making it evolve over time rather than static, so that it is applicable to an adaptive system and therefore more suited for use for combined short and long-term planning efforts. The test case for this research is the Research Triangle area of North Carolina, where the cities of Raleigh, Durham, Cary and Chapel Hill are experiencing rapid population growth and increasing concerns over drought. This study is facilitating their engagement in cooperative and robust regional water portfolio planning. The insights from this work have general merit for regions where adjacent municipalities can benefit from improving cooperative infrastructure investments and more efficient resource management strategies.

  13. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  14. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  15. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  16. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  17. PROTECTING THE NATION'S CRITICAL INFRASTRUCTURE: THE VULNERABILITY OF U.S. WATER SUPPLY SYSTEMS

    EPA Science Inventory

    Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vu...

  18. How Critical Is Critical Infrastructure?

    DTIC Science & Technology

    2015-09-01

    electrical power, telecommunications, transportation, petroleum liquid , or natural gas as shown in Figure 34 from the National Infrastructure Protection...Natural Gas Segment  Food and Agriculture Sector  Government facilities Sector  Healthcare and Public Health Sector  Information Technology...514 religious meeting places, 127 gas 69 “Current United States GDP,” 2015, http

  19. Interdependence of Inhibitor Recognition in HIV-1 Protease

    PubMed Central

    2017-01-01

    Molecular recognition is a highly interdependent process. Subsite couplings within the active site of proteases are most often revealed through conditional amino acid preferences in substrate recognition. However, the potential effect of these couplings on inhibition and thus inhibitor design is largely unexplored. The present study examines the interdependency of subsites in HIV-1 protease using a focused library of protease inhibitors, to aid in future inhibitor design. Previously a series of darunavir (DRV) analogs was designed to systematically probe the S1′ and S2′ subsites. Co-crystal structures of these analogs with HIV-1 protease provide the ideal opportunity to probe subsite interdependency. All-atom molecular dynamics simulations starting from these structures were performed and systematically analyzed in terms of atomic fluctuations, intermolecular interactions, and water structure. These analyses reveal that the S1′ subsite highly influences other subsites: the extension of the hydrophobic P1′ moiety results in 1) reduced van der Waals contacts in the P2′ subsite, 2) more variability in the hydrogen bond frequencies with catalytic residues and the flap water, and 3) changes in the occupancy of conserved water sites both proximal and distal to the active site. In addition, one of the monomers in this homodimeric enzyme has atomic fluctuations more highly correlated with DRV than the other monomer. These relationships intricately link the HIV-1 protease subsites and are critical to understanding molecular recognition and inhibitor binding. More broadly, the interdependency of subsite recognition within an active site requires consideration in the selection of chemical moieties in drug design; this strategy is in contrast to what is traditionally done with independent optimization of chemical moieties of an inhibitor. PMID:28358514

  20. Interdependence of Inhibitor Recognition in HIV-1 Protease.

    PubMed

    Paulsen, Janet L; Leidner, Florian; Ragland, Debra A; Kurt Yilmaz, Nese; Schiffer, Celia A

    2017-05-09

    Molecular recognition is a highly interdependent process. Subsite couplings within the active site of proteases are most often revealed through conditional amino acid preferences in substrate recognition. However, the potential effect of these couplings on inhibition and thus inhibitor design is largely unexplored. The present study examines the interdependency of subsites in HIV-1 protease using a focused library of protease inhibitors, to aid in future inhibitor design. Previously a series of darunavir (DRV) analogs was designed to systematically probe the S1' and S2' subsites. Co-crystal structures of these analogs with HIV-1 protease provide the ideal opportunity to probe subsite interdependency. All-atom molecular dynamics simulations starting from these structures were performed and systematically analyzed in terms of atomic fluctuations, intermolecular interactions, and water structure. These analyses reveal that the S1' subsite highly influences other subsites: the extension of the hydrophobic P1' moiety results in 1) reduced van der Waals contacts in the P2' subsite, 2) more variability in the hydrogen bond frequencies with catalytic residues and the flap water, and 3) changes in the occupancy of conserved water sites both proximal and distal to the active site. In addition, one of the monomers in this homodimeric enzyme has atomic fluctuations more highly correlated with DRV than the other monomer. These relationships intricately link the HIV-1 protease subsites and are critical to understanding molecular recognition and inhibitor binding. More broadly, the interdependency of subsite recognition within an active site requires consideration in the selection of chemical moieties in drug design; this strategy is in contrast to what is traditionally done with independent optimization of chemical moieties of an inhibitor.

  1. Eco-logical : an ecosystem approach to developing transportation infrastructure projects in a changing environment

    DOT National Transportation Integrated Search

    2009-09-13

    The development of infrastructure facilities can negatively impact critical habitat and essential ecosystems. There are a variety of techniques available to avoid, minimize, and mitigate negative impacts of existing infrastructure as well as future i...

  2. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    .... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...

  3. Technologies for Protection and Resistance Enhancement of Critical Infrastructures againstExtreme Fire

    DTIC Science & Technology

    2014-05-01

    in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ...extreme fire protection of critical infrastructures. Résumé …..... Le présent rapport fournit de l’information qui pourrait aider à élaborer des...démarches nationales pour une atténuation du risque émergeant des conditions d’incendie extrêmes pour les infrastructures essentielles (IE). Les résultats

  4. Drugs, Labels and (p)ill-Fitting Boxes: ADHD and Children Who Are Hard to Teach

    ERIC Educational Resources Information Center

    Graham, Linda J.

    2008-01-01

    In offering a critical review of the problem we call "ADHD" (Attention Deficit Hyperactivity Disorder), this paper progresses in three stages. The first two parts feature the dominant voices emanating from the literature in medicine and psychology which, when juxtaposed, highlight an interdependency between these otherwise competing…

  5. Implementing a Redesign Strategy: Lessons from Educational Change.

    ERIC Educational Resources Information Center

    Basom, Richard E., Jr.; Crandall, David P.

    The effective implementation of school redesign, based on a social systems approach, is discussed in this paper. A basic assumption is that the interdependence of system elements has implications for a complex change process. Seven barriers to redesign and five critical issues for successful redesign strategy are presented. Seven linear steps for…

  6. Guest Commentary: Global Environmental Education: A Complex Web of Reactions and Repercussions.

    ERIC Educational Resources Information Center

    Stapp, William B.; Mann, Lori

    1985-01-01

    Argues that interdependence among all living systems on earth is a necessary element in solving environmental problems, stressing similarities among international political systems and cultures. The ultimate challenge of environmental education is to bring individuals of all ages to critical understanding of the oneness of the earth. (DH)

  7. The Mindful Worker. Learning and Working into the 21st Century. The Mindful Workforce Portfolio.

    ERIC Educational Resources Information Center

    Miles, Curtis

    This textbook contains information and activities designed to help college students develop the following generalized competencies that are critical to job success and satisfaction in the 21st century: learns; thinks reflectively; manages time; manages stress; sets goals; solves problems; demonstrates interdependence; thinks systematically; solves…

  8. More than Motivation: The Combined Effects of Critical Motivational Variables on Middle School Mathematics Achievement

    ERIC Educational Resources Information Center

    Middleton, James A.

    2013-01-01

    The role of mathematical interest, identity, utility, self-efficacy, and effort was examined as a set of interdependent factors leading to students' mathematics achievement. A structural equations model, testing a hypothesized structure of motivation variables and their impact on middle school mathematics achievement was developed utilizing the…

  9. Liberatory Teaching and Radical Stylistics: Gap-Filling, Framing and Inferencing in an Advanced Composition Course.

    ERIC Educational Resources Information Center

    Stacey, David

    This paper discusses the dynamics of Paulo Freire's "true perception" and the importance of language awareness, and even style, to that "interdependence" which makes possible the perception and transformation of reality. Freire calls for a critical intervention to transform reality, and because this intervention simultaneously…

  10. A Case Study of Multimethod Evaluation of Complex School Mental Health Promotion and Prevention: The Mindmatters Evaluation Suite

    ERIC Educational Resources Information Center

    Rowling, Louise; Mason, Jo

    2005-01-01

    There are a number of challenges and debates surrounding the implementation of mental health interventions in schools. These include recognising the complexity of influencing factors and the interdependency of key components; the critical importance of monitoring school-based implementation in particular contexts; employing multimethod evaluation…

  11. Efficient Software Systems for Cardio Surgical Departments

    NASA Astrophysics Data System (ADS)

    Fountoukis, S. G.; Diomidous, M. J.

    2009-08-01

    Herein, the design implementation and deployment of an object oriented software system, suitable for the monitoring of cardio surgical departments, is investigated. Distributed design architectures are applied and the implemented software system can be deployed on distributed infrastructures. The software is flexible and adaptable to any cardio surgical environment regardless of the department resources used. The system exploits the relations and the interdependency of the successive bed positions that the patients occupy at the different health care units during their stay in a cardio surgical department, to determine bed availabilities and to perform patient scheduling and instant rescheduling whenever necessary. It also aims to successful monitoring of the workings of the cardio surgical departments in an efficient manner.

  12. Integrating Cost Engineering and Project Management in a Junior Engineering Economics Course and a Senior Capstone Project Design Course

    ERIC Educational Resources Information Center

    Tickles, Virginia C.; Li, Yadong; Walters, Wilbur L.

    2013-01-01

    Much criticism exists concerning a lack of focus on real-world problem-solving in the science, technology, engineering and mathematics (STEM) infrastructures. Many of these critics say that current educational infrastructures are incapable in preparing future scientists and engineers to solve the complex and multidisciplinary problems this society…

  13. Aging Water Infrastructure Research Program Innovation & Research for the 21st Century

    EPA Science Inventory

    The U.S. infrastructure is critical for providing essential services: protect public health and the environment and support and sustain our economy. Significant investment in water infrastructure: over 16,000 WWTPs serving 190 million people; about 54,000 community water syste...

  14. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ...), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... Forrest DHS/NPPD/IP/PCII, [email protected] . SUPPLEMENTARY INFORMATION: The PCII Program was... administered by DHS/ NPPD/IP/IICD. The PCII Program is responsible for ensuring compliance with the Regulation...

  15. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Infrastructure Protection (IP) will submit the following Information Collection Request to the Office of... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP, Attn: Emily R... PCII Program is administered by IP's Infrastructure Information Collection Division (IICD). The PCII...

  16. The GEOSS User Requirement Registry (URR): A Cross-Cutting Service-Oriented Infrastructure Linking Science, Society and GEOSS

    NASA Astrophysics Data System (ADS)

    Plag, H.-P.; Foley, G.; Jules-Plag, S.; Ondich, G.; Kaufman, J.

    2012-04-01

    The Group on Earth Observations (GEO) is implementing the Global Earth Observation System of Systems (GEOSS) as a user-driven service infrastructure responding to the needs of users in nine interdependent Societal Benefit Areas (SBAs) of Earth observations (EOs). GEOSS applies an interdisciplinary scientific approach integrating observations, research, and knowledge in these SBAs in order to enable scientific interpretation of the collected observations and the extraction of actionable information. Using EOs to actually produce these societal benefits means getting the data and information to users, i.e., decision-makers. Thus, GEO needs to know what the users need and how they would use the information. The GEOSS User Requirements Registry (URR) is developed as a service-oriented infrastructure enabling a wide range of users, including science and technology (S&T) users, to express their needs in terms of EOs and to understand the benefits of GEOSS for their fields. S&T communities need to be involved in both the development and the use of GEOSS, and the development of the URR accounts for the special needs of these communities. The GEOSS Common Infrastructure (GCI) at the core of GEOSS includes system-oriented registries enabling users to discover, access, and use EOs and derived products and services available through GEOSS. In addition, the user-oriented URR is a place for the collection, sharing, and analysis of user needs and EO requirements, and it provides means for an efficient dialog between users and providers. The URR is a community-based infrastructure for the publishing, viewing, and analyzing of user-need related information. The data model of the URR has a core of seven relations for User Types, Applications, Requirements, Research Needs, Infrastructure Needs, Technology Needs, and Capacity Building Needs. The URR also includes a Lexicon, a number of controlled vocabularies, and

  17. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  18. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  19. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  20. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  1. Operation and planning of coordinated natural gas and electricity infrastructures

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaping

    Natural gas is becoming rapidly the optimal choice for fueling new generating units in electric power system driven by abundant natural gas supplies and environmental regulations that are expected to cause coal-fired generation retirements. The growing reliance on natural gas as a dominant fuel for electricity generation throughout North America has brought the interaction between the natural gas and power grids into sharp focus. The primary concern and motivation of this research is to address the emerging interdependency issues faced by the electric power and natural gas industry. This thesis provides a comprehensive analysis of the interactions between the two systems regarding the short-term operation and long-term infrastructure planning. Natural gas and renewable energy appear complementary in many respects regarding fuel price and availability, environmental impact, resource distribution and dispatchability. In addition, demand response has also held the promise of making a significant contribution to enhance system operations by providing incentives to customers for a more flat load profile. We investigated the coordination between natural gas-fired generation and prevailing nontraditional resources including renewable energy, demand response so as to provide economical options for optimizing the short-term scheduling with the intense natural gas delivery constraints. As the amount and dispatch of gas-fired generation increases, the long-term interdependency issue is whether there is adequate pipeline capacity to provide sufficient gas to natural gas-fired generation during the entire planning horizon while it is widely used outside the power sector. This thesis developed a co-optimization planning model by incorporating the natural gas transportation system into the multi-year resource and transmission system planning problem. This consideration would provide a more comprehensive decision for the investment and accurate assessment for system adequacy and reliability. With the growing reliance on natural gas and widespread utilization of highly efficient combined heat and power (CHP), it is also questionable that whether the independent design of infrastructures can meet potential challenges of future energy supply. To address this issue, this thesis proposed an optimization framework for a sustainable multiple energy system expansion planning based on an energy hub model while considering the energy efficiency, emission and reliability performance. In addition, we introduced the probabilistic reliability evaluation and flow network analysis into the multiple energy system design in order to obtain an optimal and reliable network topology.

  2. Transforming Our Cities: High-Performance Green Infrastructure (WERF Report INFR1R11)

    EPA Science Inventory

    The objective of this project is to demonstrate that the highly distributed real-time control (DRTC) technologies for green infrastructure being developed by the research team can play a critical role in transforming our nation’s urban infrastructure. These technologies include a...

  3. Application of the API/NPRA SVA methodology to transportation security issues.

    PubMed

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  5. MISSION: Mission and Safety Critical Support Environment. Executive overview

    NASA Technical Reports Server (NTRS)

    Mckay, Charles; Atkinson, Colin

    1992-01-01

    For mission and safety critical systems it is necessary to: improve definition, evolution and sustenance techniques; lower development and maintenance costs; support safe, timely and affordable system modifications; and support fault tolerance and survivability. The goal of the MISSION project is to lay the foundation for a new generation of integrated systems software providing a unified infrastructure for mission and safety critical applications and systems. This will involve the definition of a common, modular target architecture and a supporting infrastructure.

  6. Fully integrated automated security surveillance system: managing a changing world through managed technology and product applications

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Brown, Todd

    2012-06-01

    Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.

  7. Employing Replay Connectors for SIEM Operator Education

    DTIC Science & Technology

    2013-09-01

    BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CORR Correlation Optimized Retention and Retrieval CII Critical Information Infrastructure GLBA...vast distances is now quicker and easier with the advancement in mobile computing devices and more ubiquitous connectivity and bandwidth. As a result...breakdown of the Critical Information Infrastructure (CII) is one of the core risks facing the international economy. The World Economic Forum

  8. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  9. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ...), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... forwarded to DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mail Stop 0602, Arlington,VA 20598-0602. Emailed.../IP PCII Program to assess state and local programs, their compliance with PCII rules and requirements...

  10. "These People Are Never Going to Stop Labeling Me": Educational Experiences of African American Male Students Labeled with Learning Disabilities

    ERIC Educational Resources Information Center

    Banks, Joy

    2017-01-01

    This investigation employs Disability Critical Race Studies as a theoretical framework to determine the interdependence of racism and ableism in school settings. African American male students with learning disabilities are queried about their interpretations of special education placement and labeling while attempting to secure educational…

  11. Environmental Education: A Natural Way to Nurture Children's Development and Learning

    ERIC Educational Resources Information Center

    Torquati, Julia

    2010-01-01

    Experiences in the natural world help children understand life cycles and seasons, make prediction and become aware of the interdependence between plants, animals, and elements like rain and sun. Early childhood is a critical time to support children's connections to the natural world because young children are naturally curious and there is so…

  12. The United States and the British Commonwealth in Korea, 1950-53: A Critical Study of the Origins of Joint Publication 3-16, Multinational Operations

    DTIC Science & Technology

    2013-12-13

    common Anglo - Saxon heritage with the United States. Furthermore, Canada and the United States shared national borders and interdependent economies...sought and received French military assistance through an alliance during the American War for Independence. The United States joined the Anglo -French...

  13. Food Security Framings within the UK and the Integration of Local Food Systems

    ERIC Educational Resources Information Center

    Kirwan, James; Maye, Damian

    2013-01-01

    This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…

  14. Effective Middle School Teacher Teams: A Ternary Model of Interdependency Rather than a Catch Phrase

    ERIC Educational Resources Information Center

    Main, Katherine

    2012-01-01

    The introduction of middle schooling in Australia has brought about changes to the working conditions of many teachers including finding themselves in teacher teams. The formation of such teams has been identified as critical to Australian middle school reform with teacher teams underpinning several of the fundamental components of a middle school…

  15. Preparing Students for Global Citizenship in the Twenty-First Century: Integrating Social Justice through Global Literature

    ERIC Educational Resources Information Center

    Martin, Leisa A.; Smolen, Lynn Atkinson; Oswald, Ruth A.; Milam, Jennifer L.

    2012-01-01

    In our complex, interdependent world, it is critical that educators prepare students for global citizenship. One way to develop students' awareness and understanding of the world is through global literature. Through exposure to this type of literature, students gain multiple perspectives and learn about the social, political, and moral conditions…

  16. 44 CFR 201.7 - Tribal Mitigation Plans.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of existing and future buildings, infrastructure, and critical facilities located in the identified... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. (iii...

  17. Inductive Double-Contingency Analysis of UO2 Powder Bulk Blending Operations at a Commercial Fuel Plant (U)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skiles, S. K.

    1994-12-22

    An inductive double-contingency analysis (DCA) method developed by the criticality safety function at the Savannah River Site, was applied in Criticality Safety Evaluations (CSEs) of five major plant process systems at the Westinghouse Electric Corporation`s Commercial Nuclear Fuel Manufacturing Plant in Columbia, South Carolina (WEC-Cola.). The method emphasizes a thorough evaluation of the controls intended to provide barriers against criticality for postulated initiating events, and has been demonstrated effective at identifying common mode failure potential and interdependence among multiple controls. A description of the method and an example of its application is provided.

  18. Estimating the Propagation of Interdependent Cascading Outages with Multi-Type Branching Processes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Junjian; Ju, Wenyun; Sun, Kai

    In this paper, the multi-type branching process is applied to describe the statistics and interdependencies of line outages, the load shed, and isolated buses. The offspring mean matrix of the multi-type branching process is estimated by the Expectation Maximization (EM) algorithm and can quantify the extent of outage propagation. The joint distribution of two types of outages is estimated by the multi-type branching process via the Lagrange-Good inversion. The proposed model is tested with data generated by the AC OPA cascading simulations on the IEEE 118-bus system. The largest eigenvalues of the offspring mean matrix indicate that the system ismore » closer to criticality when considering the interdependence of different types of outages. Compared with empirically estimating the joint distribution of the total outages, good estimate is obtained by using the multitype branching process with a much smaller number of cascades, thus greatly improving the efficiency. It is shown that the multitype branching process can effectively predict the distribution of the load shed and isolated buses and their conditional largest possible total outages even when there are no data of them.« less

  19. Dyadic effects of attitude toward aging on psychological well-being of older Malaysian couples: an actor-partner interdependence model.

    PubMed

    Momtaz, Yadollah Abolfathi; Hamid, Tengku Aizan; Masud, Jariah; Haron, Sharifah Azizah; Ibrahim, Rahimah

    2013-01-01

    There is a growing body of literature indicating that attitudes toward aging significantly affect older adults' psychological well-being. However, there is a paucity of scientific investigations examining the role of older adults' attitudes toward aging on their spouses' psychological well-being. Therefore, the present study aimed to examine the dyadic effects of attitude toward aging on the psychological well-being of older couples. Data for the present study, consisting of 300 couples aged 50 years and older, were drawn from a community-based survey entitled "Poverty among Elderly Women: Case Study of Amanah Ikhtiar" conducted in Peninsular Malaysia. An actor-partner interdependence model using AMOS version 20 (Europress Software, Cheshire, UK) was used to analyze the dyadic data. The mean ages of the husbands and wives in this sample were 60.37 years (±6.55) and 56.33 years (±5.32), respectively. Interdependence analyses revealed significant association between older adults' attitudes toward aging and the attitudes of their spouses (intraclass correlation =0.59; P<0.001), and similar interdependence was found for psychological well-being (intraclass correlation =0.57; P<0.001). The findings from AMOS revealed that the proposed model fits the data (CMIN/degrees of freedom =3.23; goodness-of-fit index =0.90; confirmatory fit index =0.91; root mean square error of approximation =0.08). Results of the actor-partner independence model indicated that older adults' psychological well-being is significantly predicted by their spouses' attitudes toward aging, both among older men (critical ratio =2.92; P<0.01) and women (critical ratio =2.70; P<0.01). Husbands' and wives' own reports of their attitudes toward aging were significantly correlated with their own and their spouses' psychological well-being. The findings from this study supported the proposed Spousal Attitude-Well-Being Model, where older adults' attitudes toward aging significantly affected their own and their spouses' psychological well-being. The theoretical and practical implications of the findings are discussed.

  20. Dyadic effects of attitude toward aging on psychological well-being of older Malaysian couples: an actor–partner interdependence model

    PubMed Central

    Momtaz, Yadollah Abolfathi; Hamid, Tengku Aizan; Masud, Jariah; Haron, Sharifah Azizah; Ibrahim, Rahimah

    2013-01-01

    Background There is a growing body of literature indicating that attitudes toward aging significantly affect older adults’ psychological well-being. However, there is a paucity of scientific investigations examining the role of older adults’ attitudes toward aging on their spouses’ psychological well-being. Therefore, the present study aimed to examine the dyadic effects of attitude toward aging on the psychological well-being of older couples. Methods Data for the present study, consisting of 300 couples aged 50 years and older, were drawn from a community-based survey entitled “Poverty among Elderly Women: Case Study of Amanah Ikhtiar” conducted in Peninsular Malaysia. An actor–partner interdependence model using AMOS version 20 (Europress Software, Cheshire, UK) was used to analyze the dyadic data. Results The mean ages of the husbands and wives in this sample were 60.37 years (±6.55) and 56.33 years (±5.32), respectively. Interdependence analyses revealed significant association between older adults’ attitudes toward aging and the attitudes of their spouses (intraclass correlation =0.59; P<0.001), and similar interdependence was found for psychological well-being (intraclass correlation =0.57; P<0.001). The findings from AMOS revealed that the proposed model fits the data (CMIN/degrees of freedom =3.23; goodness-of-fit index =0.90; confirmatory fit index =0.91; root mean square error of approximation =0.08). Results of the actor–partner independence model indicated that older adults’ psychological well-being is significantly predicted by their spouses’ attitudes toward aging, both among older men (critical ratio =2.92; P<0.01) and women (critical ratio =2.70; P<0.01). Husbands’ and wives’ own reports of their attitudes toward aging were significantly correlated with their own and their spouses’ psychological well-being. Conclusion The findings from this study supported the proposed Spousal Attitude–Well-Being Model, where older adults’ attitudes toward aging significantly affected their own and their spouses’ psychological well-being. The theoretical and practical implications of the findings are discussed. PMID:24174873

  1. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2006-04-18

    initially approved. The current review process for such purchases, implemented under authority of the Exon- Florio provision of the Defense Production Act (50...legislative proposals “broaden” coverage of Exon- Florio to include the purchase of assets associated with critical infrastructure. As currently written...Exon- Florio covers persons engaged in interstate commerce. While this covers a broad range of “persons,” extending beyond those that might be part

  2. Resilience and legislation: Will IT security legislation boost critical infrastructure resilience in Germany?

    PubMed

    Kaschner, Holger; Jordan, Tim

    The German government is seeking to enhance the resilience of critical national infrastructures via its new IT Security Law. This paper analyses the content of the law, as well as the limitations and constraints arising from the conflicting interests of affected stakeholders. The paper also offers solutions to help the IT Security Law fulfil its potential despite the constraints.

  3. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits over the traditional design methodology of repeating requirements analysis and system design.

  4. 44 CFR 201.7 - Tribal Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... buildings, infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate... particular emphasis on new and existing buildings and infrastructure. (iii) An action plan describing how the...

  5. Saving America's School Infrastructure. Research in Education Fiscal Policy and Practice.

    ERIC Educational Resources Information Center

    Crampton, Faith E., Ed.; Thompson, David C., Ed.

    This book addresses funding for school facilities. Contents of section 1, "Overview and Scope of the Problem," are: (1) "Unmet School Infrastructure Funding Need as a Critical Educational Capacity Issue: Setting the Context" (Faith E. Crampton); (2) "Financing School Infrastructure Needs: An Overview across the 50 States" (Catherine C. Sielke);…

  6. National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency

    ERIC Educational Resources Information Center

    US Department of Homeland Security, 2009

    2009-01-01

    The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…

  7. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  8. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  9. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  10. Evaluating the performance of free-formed surface parts using an analytic network process

    NASA Astrophysics Data System (ADS)

    Qian, Xueming; Ma, Yanqiao; Liang, Dezhi

    2018-03-01

    To successfully design parts with a free-formed surface, the critical issue of how to evaluate and select a favourable evaluation strategy before design is raised. The evaluation of free-formed surface parts is a multiple criteria decision-making (MCDM) problem that requires the consideration of a large number of interdependent factors. The analytic network process (ANP) is a relatively new MCDM method that can systematically deal with all kinds of dependences. In this paper, the factors, which come from the life-cycle and influence the design of free-formed surface parts, are proposed. After analysing the interdependence among these factors, a Hybrid ANP (HANP) structure for evaluating the part’s curved surface is constructed. Then, a HANP evaluation of an impeller is presented to illustrate the application of the proposed method.

  11. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  12. 77 FR 24594 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... framework for the identification and protection of ``Critical Cyber Assets'' to support the reliable... documentation of Critical Cyber Assets associated with ``Critical Assets'' that support the reliable operation... ``Critical Cyber Assets'' that are associated with ``Critical Assets'' to support the reliable operation of...

  13. Operations Research Support for Critical Infrastructure Resilience in the Province of British Columbia

    DTIC Science & Technology

    2012-10-01

    support for various aspects of CI resilience in BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently... Paralympic Winter Games (V2010). Under this project, DRDC provided critical infrastructure (CI) support to two groups: the Integrated Security Unit (ISU...BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently, for the development of Emergency Management

  14. Impact of Underwater Explosions on Concrete Bridge Foundations

    DTIC Science & Technology

    2016-06-01

    www.theconstructioncivil.org/ [16] M. Aggour, A. Hachichi and M. Mayer, “Nondestructive evaluation of timber bridge piles,” in Proceedings of a Session a Structure Congress...detonation must be executed a safe distance from any critical infrastructure to ensure the survivability of the structure . This thesis implements...be executed a safe distance from any critical infrastructure to ensure the survivability of the structure . This thesis implements the Dynamic System

  15. A Roadmap for Recovery/Decontamination Plan for Critical Infrastructure after CBRN Event Involving Drinking Water Utilities: Scoping Study

    DTIC Science & Technology

    2014-05-01

    A Roadmap for Recovery/Decontamination Plan for Critical Infrastructure after CBRN Event Involving Drinking Water Utilities: Scoping Study... Drinking Water Utilities was supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre...after CBRN Event Involving Drinking Water Utilities Scoping Study Prepared by: Vladimir Blinov Konstantin Volchek Emergencies Science and

  16. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    services by implementing a disaster recovery plan to restore an organization’s critical business functions. (DRII 2004). ISO 27001 An information...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security

  17. Critical Infrastructure Protection: How to Assess and Provide Remedy to Vulnerabilities in Telecom Hotels

    DTIC Science & Technology

    2006-09-01

    Telecommunications and Information Administration Telecom Telecommunications Telco Telecommunications Company VBIED Vehicle Borne Improvised Explosive... effect the damage to one system or sector would have on another. These concentrations of the sector’s key assets are becoming attractive targets even...critical U.S. infrastructures, such as the nation’s telephone system . Companies make it easier to control their networks from remote locations to save

  18. Campus Diversity and Perspective-Changing: Students Describe the Impact of Their Interactions with Diverse Peers and Viewpoints

    ERIC Educational Resources Information Center

    Talmadge, Rosemary A.

    2014-01-01

    Preparing students to become effective citizens in an increasingly interdependent world is one of today's most critical challenges. Effective global citizens need to be able to do more than imagine themselves in another's position, a common definition of perspective-taking. To bridge current divides of culture, religion, and nationality, they also…

  19. "Coming to a 'Place' near You?" The Politics and Possibilities of a Critical Pedagogy of Place-Based Education

    ERIC Educational Resources Information Center

    McInerney, Peter; Smyth, John; Down, Barry

    2011-01-01

    It may seem something of a paradox that in a globalised age where notions of interdependence, interconnectedness and common destinies abound, the "local", with its diversity of cultures, languages, histories and geographies, continues to exercise a powerful grip on the human imagination. The ties that bind us have global connections but…

  20. Reconsidering "Ubuntu": On the Educational Potential of a Particular Ethic of Care

    ERIC Educational Resources Information Center

    Waghid, Yusef; Smeyers, Paul

    2012-01-01

    In this article we argue that "ubuntu" (human interdependence) is not some form of essentialist notion that unfolds in exactly the same way as some critics of "ubuntu" might want to suggest. Rather, we offer a philosophical position that (re)considers the situation of the self in relation to others. The article starts from the general issues at…

  1. From Post-Productionism to Reflexive Governance: Contested Transitions in Securing More Sustainable Food Futures

    ERIC Educational Resources Information Center

    Marsden, Terry

    2013-01-01

    The paper critically assesses the more turbulent period in agri-food since 2007- by applying a transitions perspective to a range of empirical data collected from key private and public stakeholders in the UK during that period. It argues that increased volatility and a series of interdependent landscape pressures on the dominant agri-food regime…

  2. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    House - 08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Managing Critical Infrastructures C.I.M. Suite

    ScienceCinema

    Dudenhoeffer, Donald

    2018-05-23

    See how a new software package developed by INL researchers could help protect infrastructure during natural disasters, terrorist attacks and electrical outages. For more information about INL research, visit http://www.facebook.com/idahonationallaboratory.

  4. Public Health Emergency Operations Center - A critical component of mass gatherings management infrastructure.

    PubMed

    Elachola, Habidah; Al-Tawfiq, Jaffar A; Turkestani, Abdulhafiz; Memish, Ziad A

    2016-08-31

    Mass gatherings (MG) are characterized by the influx of large numbers of people with the need to have infrastructural changes to support these gatherings. Thus, Public Health Emergency Operations Center (PHEOC) is critical management infrastructure for both the delivery of public health functions and for mounting adequate response during emergencies. The recognition of the importance of PHEOC at the leadership and political level is foundational for the success of any public health intervention during MG. The ability of the PHEOC to effectively function depends on appropriate design and infrastructure, staffing and command structure, and plans and procedures developed prior to the event. Multi-ministerial or jurisdictional coordination will be required and PHEOC should be positioned with such authorities. This paper outlines the essential concepts, elements, design, and operational aspects of PHEOC during MG.

  5. Geovisualization applications to examine and explore high-density and hierarchical critical infrastructure data

    NASA Astrophysics Data System (ADS)

    Edsall, Robert; Hembree, Harvey

    2018-05-01

    The geospatial research and development team in the National and Homeland Security Division at Idaho National Laboratory was tasked with providing tools to derive insight from the substantial amount of data currently available - and continuously being produced - associated with the critical infrastructure of the US. This effort is in support of the Department of Homeland Security, whose mission includes the protection of this infrastructure and the enhancement of its resilience to hazards, both natural and human. We present geovisual-analytics-based approaches for analysis of vulnerabilities and resilience of critical infrastructure, designed so that decision makers, analysts, and infrastructure owners and managers can manage risk, prepare for hazards, and direct resources before and after an incident that might result in an interruption in service. Our designs are based on iterative discussions with DHS leadership and analysts, who in turn will use these tools to explore and communicate data in partnership with utility providers, law enforcement, and emergency response and recovery organizations, among others. In most cases these partners desire summaries of large amounts of data, but increasingly, our users seek the additional capability of focusing on, for example, a specific infrastructure sector, a particular geographic region, or time period, or of examining data in a variety of generalization or aggregation levels. These needs align well with tenets of in-formation-visualization design; in this paper, selected applications among those that we have designed are described and positioned within geovisualization, geovisual analytical, and information visualization frameworks.

  6. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    ERIC Educational Resources Information Center

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  7. Science of Security Lablet - Scalability and Usability

    DTIC Science & Technology

    2014-12-16

    mobile computing [19]. However, the high-level infrastructure design and our own implementation (both described throughout this paper) can easily...critical and infrastructural systems demands high levels of sophistication in the technical aspects of cybersecurity, software and hardware design...Forget, S. Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang. "Security Behavior Observatory: Infrastructure for Long-term

  8. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to... the identification and documentation of Critical Cyber Assets associated with Critical Assets that... Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets...

  9. Building Stronger State Partnerships with the US Department of Energy (Energy Assurance)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mike Keogh

    2011-09-30

    From 2007 until 2011, the National Association of Regulatory Utility Commissioners (NARUC) engaged in a partnership with the National Energy Technology Lab (NETL) to improve State-Federal coordination on electricity policy and energy assurance issues. This project allowed State Public Utility Commissioners and their staffs to engage on the most cutting-edge level in the arenas of energy assurance and electricity policy. Four tasks were outlined in the Statement of Performance Objectives: Task 1 - Training for Commissions on Critical Infrastructure Topics; Task 2 - Analyze and Implement Recommendations on Energy Assurance Issues; Task 3 - Ongoing liaison activities & outreach tomore » build stronger networks between federal agencies and state regulators; and Task 4 - Additional Activities. Although four tasks were prescribed, in practice these tasks were carried out under two major activity areas: the critical infrastructure and energy assurance partnership with the US Department of Energy's Infrastructure Security and Emergency Response office, and the National Council on Electricity Policy, a collaborative which since 1994 has brought together State and Federal policymakers to address the most pressing issues facing the grid from restructuring to smart grid implementation. On Critical Infrastructure protection, this cooperative agreement helped State officials yield several important advances. The lead role on NARUC's side was played by our Committee on Critical Infrastructure Protection. Key lessons learned in this arena include the following: (1) Tabletops and exercises work - They improve the capacity of policymakers and their industry counterparts to face the most challenging energy emergencies, and thereby equip these actors with the capacity to face everything up to that point as well. (2) Information sharing is critical - Connecting people who need information with people who have information is a key success factor. However, exposure of critical infrastructure information to bad actors also creates new vulnerabilities. (3) Tensions exist between the transparency-driven basis of regulatory activity and the information-protection requirements of asset protection. (4) Coordination between states is a key success factor - Because comparatively little federal authority exists over electricity and other energy infrastructure, the interstate nature of these energy grids defy centralized command and control governance. Patchwork responses are a risk when addressed at a state-by-state level. Coordination is the key to ensuring consistent response to shared threats. In Electricity Policy, the National Council on Electricity Policy continued to make important strides forward. Coordinated electricity policy among States remains the best surrogate for an absent national electricity policy. In every area from energy efficiency to clean coal, State policies are driving the country's electricity policy, and regional responses to climate change, infrastructure planning, market operation, and new technology deployment depend on a forum for bringing the States together.« less

  10. Development of a public health nursing data infrastructure.

    PubMed

    Monsen, Karen A; Bekemeier, Betty; P Newhouse, Robin; Scutchfield, F Douglas

    2012-01-01

    An invited group of national public health nursing (PHN) scholars, practitioners, policymakers, and other stakeholders met in October 2010 identifying a critical need for a national PHN data infrastructure to support PHN research. This article summarizes the strengths, limitations, and gaps specific to PHN data and proposes a research agenda for development of a PHN data infrastructure. Future implications are suggested, such as issues related to the development of the proposed PHN data infrastructure and future research possibilities enabled by the infrastructure. Such a data infrastructure has potential to improve accountability and measurement, to demonstrate the value of PHN services, and to improve population health. © 2012 Wiley Periodicals, Inc.

  11. Acoustic emission safety monitoring of intermodal transportation infrastructure.

    DOT National Transportation Integrated Search

    2015-09-01

    Safety and integrity of the national transportation infrastructure are of paramount importance and highway bridges are critical components of the highway system network. This network provides an immense contribution to the industry productivity and e...

  12. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... Advisors email the form to the individual who then emails back the completed form, minus their date and... official who nominated the applicant and by the Assistant Secretary for Infrastructure Protection. Upon...

  13. A risk assessment methodology for critical transportation infrastructure.

    DOT National Transportation Integrated Search

    2002-01-01

    Infrastructure protection typifies a problem of risk assessment and management in a large-scale system. This study offers a methodological framework to identify, prioritize, assess, and manage risks. It includes the following major considerations: (1...

  14. 75 FR 29336 - North American Electric Reliability Corporation; Notice of Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-25

    ... (VSL) assignments for Version 1 of the Critical Infrastructure Protection (CIP) Reliability Standards... Infrastructure Protection Reliability Standards, 130 FERC ] 61,211 at PP 23, 28, 31-33 (2010) (March 18 CIP VSL...

  15. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  16. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  17. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  18. Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs)

    NASA Astrophysics Data System (ADS)

    Hatfield, M. C.; Webley, P.; Saiet, E., II

    2014-12-01

    Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs) Numerous scientific and logistical applications exist in Alaska and other arctic regions requiring analysis of expansive, remote areas in the near infrared (NIR) and thermal infrared (TIR) bands. These include characterization of wild land fire plumes and volcanic ejecta, detailed mapping of lava flows, and inspection of lengthy segments of critical infrastructure, such as the Alaska pipeline and railroad system. Obtaining timely, repeatable, calibrated measurements of these extensive features and infrastructure networks requires localized, taskable assets such as UAVs. The Alaska Center for Unmanned Aircraft Systems Integration (ACUASI) provides practical solutions to these problem sets by pairing various IR sensors with a combination of fixed-wing and multi-rotor air vehicles. Fixed-wing assets, such as the Insitu ScanEagle, offer long reach and extended duration capabilities to quickly access remote locations and provide enduring surveillance of the target of interest. Rotary-wing assets, such as the Aeryon Scout or the ACUASI-built Ptarmigan hexcopter, provide a precision capability for detailed horizontal mapping or vertical stratification of atmospheric phenomena. When included with other ground capabilities, we will show how they can assist in decision support and hazard assessment as well as giving those in emergency management a new ability to increase knowledge of the event at hand while reducing the risk to all involved. Here, in this presentation, we illustrate how UAV's can provide the ideal tool to map and analyze the hazardous events and critical infrastructure under extreme environmental conditions.

  19. Long Term Perspective On Interstellar Flight

    NASA Astrophysics Data System (ADS)

    Millis, M. G.

    2017-12-01

    The process and interim findings of a broad interstellar flight assessment is presented. In contrast to precursor mission studies, this assessment takes a longer view and also considers factors that have been underrepresented in prior studies. The goal is to chart a conceptual roadmap for interstellar flight development that takes all the factors into account and ultimately identifies which research options, today, might have the greatest overall impact on future progress. Three envisioned flight eras are examined, the "era of precursors," the "era of infrastructure," and the "unforeseeable future." Several influential factors have typically been missing from prior studies that will now be assessed; a) the impact of different, often implicit, motivations, b) the interdependency of infrastructure with vehicle design, c) the pace of different developments, and d) the enormous energy required for any interstellar mission. Regarding motivations for example, if the driving motivation is to launch soon, then the emphasis is on existing technologies. In contrast, if the motivation is the survival of humanity, then the emphasis would be on 'world ships.' Infrastructure considerations are included in a broader system-level context. Future infrastructure will support multiple in-space activities, not just one mission-vehicle development. Though it may be too difficult to successfully assess, the study will attempt to compare the rates of different developments, such as the pace of Earth-based astronomy, miniaturization, artificial intelligence, infrastructure development, transhumanism, and others. For example, what new information could be acquired after 30 years of further advances in astronomy compared to a space probe with current technology and a 30 year flight time? The final factor of the study is to assess the pace and risks of the enormous energy levels required for interstellar flight. To compare disparate methods, a set of 'meta measures' will be defined and calculated for all the different approaches. For example, rather than comparing performance in terms of rocket specific impulse or sail reflectivity, more general measures like mass, energy, power, time, and efficiency will be used.

  20. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    NASA Astrophysics Data System (ADS)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  1. Modelling a critical infrastructure-driven spatial database for proactive disaster management: A developing country context

    PubMed Central

    Baloye, David O.

    2016-01-01

    The understanding and institutionalisation of the seamless link between urban critical infrastructure and disaster management has greatly helped the developed world to establish effective disaster management processes. However, this link is conspicuously missing in developing countries, where disaster management has been more reactive than proactive. The consequence of this is typified in poor response time and uncoordinated ways in which disasters and emergency situations are handled. As is the case with many Nigerian cities, the challenges of urban development in the city of Abeokuta have limited the effectiveness of disaster and emergency first responders and managers. Using geospatial techniques, the study attempted to design and deploy a spatial database running a web-based information system to track the characteristics and distribution of critical infrastructure for effective use during disaster and emergencies, with the purpose of proactively improving disaster and emergency management processes in Abeokuta.

  2. Forewarning of Failure in Complex Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J

    2011-01-01

    As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain is failure in critical equipment. A second is aging bridges. We discuss the workings of such amore » system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less

  3. A Virtual Environment for Resilient Infrastructure Modeling and Design

    DTIC Science & Technology

    2015-09-01

    Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help

  4. DoD Cybersecurity Discipline Implementation Plan

    DTIC Science & Technology

    2016-02-01

    provided email services are disabled for commercial mobile devices. N/A Commanders and Supervisors must ensure all servers and network infrastructure ... infrastructure physically and logically. All of these protections come from security measures that are already required. This line of effort supports...networks and critical infrastructure . These threats and risks have been recognized by DoD for several years, and the Department has responded with

  5. Cyber Compendium, Professional Continuing Education Course Papers. Volume 2, Issue 1, Spring 2015

    DTIC Science & Technology

    2015-01-01

    250,000 mobile devices.23 Cutting just 20% of this infrastructure would translate to a potential savings of over $7 Billion per year. Air...BYOD device extends beyond the device itself. There is the supporting infrastructure such as the Mobile Application Store (MAS), which provides access...96 Prioritizing Cyber Capabilities: to Protect U.S. Critical Infrastructure

  6. An autonomous structural health monitoring system for Waiau interchange.

    DOT National Transportation Integrated Search

    2013-03-01

    Bridge infrastructure is a critical element of the transportation system which makes maintaining its safety and : performance vital to a healthy society. However, the civil infrastructure systems in the United States are decaying : at an accelerated ...

  7. Safety impacts of bicycle infrastructure: A critical review.

    PubMed

    DiGioia, Jonathan; Watkins, Kari Edison; Xu, Yanzhi; Rodgers, Michael; Guensler, Randall

    2017-06-01

    This paper takes a critical look at the present state of bicycle infrastructure treatment safety research, highlighting data needs. Safety literature relating to 22 bicycle treatments is examined, including findings, study methodologies, and data sources used in the studies. Some preliminary conclusions related to research efficacy are drawn from the available data and findings in the research. While the current body of bicycle safety literature points toward some defensible conclusions regarding the safety and effectiveness of certain bicycle treatments, such as bike lanes and removal of on-street parking, the vast majority treatments are still in need of rigorous research. Fundamental questions arise regarding appropriate exposure measures, crash measures, and crash data sources. This research will aid transportation departments with regard to decisions about bicycle infrastructure and guide future research efforts toward understanding safety impacts of bicycle infrastructure. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.

  8. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Supriya; Shankar, Mallikarjun

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less

  9. Investing in soils as an infrastructure to maintain and enhance food water and carbon services

    NASA Astrophysics Data System (ADS)

    Davies, Jessica

    2017-04-01

    Soils are a life support system for global society and our planet. In addition to providing the vast majority of our food; soils regulate water quality and quantity reducing the risk of floods, droughts and pollution; and as the largest store of carbon in the earth system they are critical to climate change. By providing these multiple essential services, soils act a natural form of infrastructure that is critical to supporting both rural and urban communities and economies. Can natural infrastructure and natural capital concepts be used to motivate and enable investment and regulation of soils for purposes such as soil carbon sequestration? What scientific knowledge and tools would we need to support soil infrastructure decision making - in policy arenas and elsewhere? This poster will present progress from a new research project supported by the UK research council (EP/N030532/1) that addresses these questions.

  10. Collaborate and share: an experimental study of the effects of task and reward interdependencies in online games.

    PubMed

    Choi, Boreum; Lee, Inseong; Choi, Dongseong; Kim, Jinwoo

    2007-08-01

    Today millions of players interact with one another in online games, especially massively multiplayer online role-playing games (MMORPGs). These games promote interaction among players by offering interdependency features, but to date few studies have asked what interdependency design factors of MMORPGs make them fun for players, produce experiences of flow, or enhance player performance. In this study, we focused on two game design features: task and reward interdependency. We conducted a controlled experiment that compared the interaction effects of low and high task-interdependency conditions and low and high reward-interdependency conditions on three dependent variables: fun, flow, and performance. We found that in a low task-interdependency condition, players had more fun, experienced higher levels of flow, and perceived better performance when a low reward-interdependency condition also obtained. In contrast, in a high task-interdependency condition, all of these measures were higher when a high reward-interdependency condition also obtained.

  11. Private Sector Investment in Pakistani Agriculture: The Role of Infrastructural Investment

    DTIC Science & Technology

    1999-01-01

    private sector will be expected to play the major role in providing capital to the agricultural sector, with the government’s remaining involvement being largely one of furnishing basic infrastructure. The critical question of course is how willing is the private sector to commit capital to agricultural activities in this new policy environment? Has the private sector responded in the past to the increases in profitability provided by an expansion in infrastructure? If so, what types of infrastructure are most conducive in

  12. A new vision of the post-NIST civil infrastructure program: the challenges of next-generation construction materials and processes

    NASA Astrophysics Data System (ADS)

    Wu, H. Felix; Wan, Yan

    2014-03-01

    Our nation's infrastructural systems are crumbling. The deteriorating process grows over time. The physical aging of these vital facilities and the remediation of their current critical state pose a key societal challenge to the United States. Current sensing technologies, while well developed in controlled laboratory environments, have not yet yielded tools for producing real-time, in-situ data that are adequately comprehensible for infrastructure decision-makers. The need for advanced sensing technologies is national because every municipality and state in the nation faces infrastructure management challenges. The need is critical because portions of infrastructure are reaching the end of their life-spans and there are few cost-effective means to monitor infrastructure integrity and to prioritize the renovation and replacement of infrastructure elements. New advanced sensing technologies that produce cost-effective inspection and real-time monitoring data, and that can also help or aid in meaningful interpretation of the acquired data, therefore will enhance the safety in regard to the public on structural integrity by issuing timely and accurate alert data for effective maintenance to avoid disasters happening. New advanced sensing technologies also allow more informed management of infrastructural investments by avoiding premature replacement of infrastructure and identifying those structures in need of immediate action to prevent from catastrophic failure. Infrastructure management requires that once a structural defect is detected, an economical and efficient repair be made. Advancing the technologies of repairing infrastructure elements in contact with water, road salt, and subjected to thermal changes requires innovative research to significantly extend the service life of repairs, lower the costs of repairs, and provide repair technologies that are suitable for a wide range of conditions. All these new technologies will provide increased lifetimes, security, and safety of elements of critical infrastructure for the Nation's already deteriorating civil infrastructure. It is envisioned that the Nation should look far beyond: not only should we efficiently and effectively address current problems of the aging infrastructure, but we must also further develop next-generation construction materials and processes for new construction. To accomplish this ambitious goal, we must include process efficiency that will help select the most reliable and cost-effective materials in construction processes; performance and cost will be the prime consideration for selections construction materials based on life-cycle cost and materials performance; energy efficiency will drive reduced energy consumption from current levels by 50 % per unit of output; and environmental responsiveness will achieve net-zero waste from construction materials and its constituents. Should it be successfully implemented, we will transform the current 21st century infrastructure systems to enable the vital functioning of society and improve competitiveness of the economy to ensure that our quality of life remains high.

  13. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  14. Generalized model for k -core percolation and interdependent networks

    NASA Astrophysics Data System (ADS)

    Panduranga, Nagendra K.; Gao, Jianxi; Yuan, Xin; Stanley, H. Eugene; Havlin, Shlomo

    2017-09-01

    Cascading failures in complex systems have been studied extensively using two different models: k -core percolation and interdependent networks. We combine the two models into a general model, solve it analytically, and validate our theoretical results through extensive simulations. We also study the complete phase diagram of the percolation transition as we tune the average local k -core threshold and the coupling between networks. We find that the phase diagram of the combined processes is very rich and includes novel features that do not appear in the models studying each of the processes separately. For example, the phase diagram consists of first- and second-order transition regions separated by two tricritical lines that merge and enclose a two-stage transition region. In the two-stage transition, the size of the giant component undergoes a first-order jump at a certain occupation probability followed by a continuous second-order transition at a lower occupation probability. Furthermore, at certain fixed interdependencies, the percolation transition changes from first-order → second-order → two-stage → first-order as the k -core threshold is increased. The analytic equations describing the phase boundaries of the two-stage transition region are set up, and the critical exponents for each type of transition are derived analytically.

  15. Developing a concept of social-ecological-technological systems to characterize resilience of urban areas and infrastructure to extreme events

    NASA Astrophysics Data System (ADS)

    Chester, M.; Grimm, N. B.; Redman, C.; Miller, T.; McPherson, T.; Munoz-Erickson, T.; Chandler, D. G.

    2015-12-01

    Climate change is widely considered one of the greatest challenges to global sustainability, with extreme events being the most immediate way that people experience this phenomenon. Urban areas are particularly vulnerable to these events given their location, concentration of people, and increasingly complex and interdependent infrastructure. We are developing a conceptual framework for urban social-ecological-technological systems (SETS) that will allow researchers and practitioners to assess how infrastructure can be resilient, provide ecosystem services, improve social well being, and exploit new technologies in ways that benefit urban populations. The framework integrates the three domains of social and equity issues, environmental quality and protection, and technical/engineering aspects, to form a concept of infrastructure that occurs at the intersection of the domains. Examples show how the more common socioecological systems and socially sensitive engineering approaches that fail to incorporate the third dimension may elevate vulnerability to climate-related disaster. The SETS conceptual framework bridges currently siloed social science, environmental science, and engineering approaches to significantly advance research into the structure, function, and emergent properties of SETS. Extreme events like heat waves in Phoenix; coastal and urban flooding in the wake of superstorm Sandy and following hurricanes in Miami, FL; drought in Mexico; and urban flooding in Baltimore, Portland, San Juan PR, Syracuse, and Valdivia, Chile provide examples of the impacts of and vulnerability to extreme events that demand a new approach. The infrastructure of the future must be resilient, leverage ecosystem services, improve social well being, and exploit new technologies in ways that benefit all segments of urban populations and are appropriate to the particular urban contexts. These contexts are defined not only by the biophysical environment but also by culture and institutions of each place. We apply the SETS conceptual framework to nine western hemisphere cities in diverse settings, presenting hypotheses about the relative efficacy of strategies for resilient SETS infrastructure in cities contrasting in event type, biophysical setting, and cultural and institutional contexts.

  16. System Dynamics Model to develop resilience management strategies for lifelines exposed to natural hazards

    NASA Astrophysics Data System (ADS)

    Pagano, Alessandro; Pluchinotta, Irene; Giordano, Raffaele; Vurro, Michele

    2016-04-01

    Resilience has recently become a key concept, and a crucial paradigm in the analysis of the impacts of natural disasters, mainly concerning Lifeline Systems (LS). Indeed, the traditional risk management approaches require a precise knowledge of all potential hazards and a full understanding of the interconnections among different infrastructures, based on past events and trends analysis. Nevertheless, due to the inner complexity of LS, their interconnectedness and the dynamic context in which they operate (i.e. technology, economy and society), it is difficult to gain a complete comprehension of the processes influencing vulnerabilities and threats. Therefore, resilience thinking addresses the complexities of large integrated systems and the uncertainty of future threats, emphasizing the absorbing, adapting and responsive behavior of the system. Resilience thinking approaches are focused on the capability of the system to deal with the unforeseeable. The increasing awareness of the role played by LS, has led governmental agencies and institutions to develop resilience management strategies. Risk prone areas, such as cities, are highly dependent on infrastructures providing essential services that support societal functions, safety, economic prosperity and quality of life. Among the LS, drinking water supply is critical for supporting citizens during emergency and recovery, since a disruption could have a range of serious societal impacts. A very well-known method to assess LS resilience is the TOSE approach. The most interesting feature of this approach is the integration of four dimensions: Technical, Organizational, Social and Economic. Such issues are all concurrent to the resilience level of an infrastructural system, and should be therefore quantitatively assessed. Several researches underlined that the lack of integration among the different dimensions, composing the resilience concept, may contribute to a mismanagement of LS in case of natural disasters. Moving in such direction, System Dynamics Modeling (SDM) is a suitable operative approach. The SDM allows taking into account all resilience dimensions in an integrated and dynamic way. Furthermore, it allows to combine predictive and learning functionality through feedback mechanisms, and to foster active involvement of stakeholders in the modelling process. The present paper show some results of ongoing research activities. The main aim of the work is to describe using SDM, the relationships and interdependencies between drinking water supply infrastructures and societies in building the resilience of urban communities in case of natural disasters. Reflections are carried out on the comparison between two major earthquakes in Italy: L'Aquila in 2009 and Emilia Romagna in 2012. The model aims at defining a quantitative tool to assess the evolution of resilience of drinking water supply system. Specifically, it has been used to evaluate the impact of actions and strategies for resilience improvement on the dynamic evolution of the system, thus suggesting the most suitable ones.

  17. A GIS Inventory of Critical Coastal Infrastructure Land Use in Caribbean Island Small Island Developing States: Classification and Criteria Methodology

    NASA Astrophysics Data System (ADS)

    D'aversa, N.; Becker, A.; Bove, G.

    2017-12-01

    Caribbean Small Island Developing States (SIDS) face significant natural hazard risks, as demonstrated by recent Hurricanes Jose, Irma, and Maria. Scientists project storms to become more intense and sea level rise to increase over the next century. As a result, the Inter-American Development Bank projections suggest that Caribbean nations could face climate-related losses in excess of $22 billion annually by 2050. Critical infrastructure that supports island economies, such as airports, seaports, cruise ports, and energy facilities, are typically located in the coastal zone with high exposure to natural hazards. Despite the increasing danger from climate driven natural hazards in coastal zones in the region, there is very little data available to identify how much land and associated infrastructure is at risk. This work focuses on the criteria and data standards developed for this new region-wide GIS database, which will then be used to formulate a risk assessment. Results will be integrated into a single, comprehensive source for data of lands identified as critical coastal infrastructure and used to address such questions as: How much of the Caribbean SIDS infrastructure lands are at risk from sea level rise? How might demand for such lands change in the future, based on historical trends? Answers to these questions will help decision makers understand how to prioritize resilience investment decisions in the coming decades.

  18. Increasing impacts of climate extremes on critical infrastructures in Europe

    NASA Astrophysics Data System (ADS)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  19. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross-learning and cross-comparison of, for example rural and urban areas, and different scales. Correspondingly, scale-specific resilience indicators and metrics will be developed to tailor methods to specific needs according to the scale of assessment (micro/local and macro/regional) and to the type of infrastructure. The traditional indicators normally used in structural analysis are not sufficient to understand how events happening on the networks can have cascading consequences. Moreover, effects have multidimensional (technical, economic, organizational and human), multiscale (micro and macro) and temporal characteristics (short- to long-term incidence). These considerations will guide to different activities: 1) computation of classic structural analysis indicators on the case studies in order to obtain an identity of the transport infrastructure and; 2) development of a set of new measures of resilience. To mitigate natural hazard risk a large amount of protection measures of different typology have been constructed following inhomogeneous reliability standards. The focus of this case study will be on resilience issues and decision making in the context of a large scale sectorial approach focused on transport infrastructure network.

  20. Geriatric infrastructure, BRAC, and ecosystem service markets? End-of-life decisions for dams, roads, and offshore platforms (Invited)

    NASA Astrophysics Data System (ADS)

    Doyle, M. W.

    2010-12-01

    US infrastructure expanded dramatically in the mid-20th century, and now includes more than 79,000 dams, 15,000 miles of levees, 3.7 million miles of roads, 600,000 miles of sewer pipe, 500,000 onshore oil wells, and over 4,000 offshore oil platforms. Many structures have been in place for 50 years or more, and an increasing portion of national infrastructure is approaching or exceeding its originally intended design life. Bringing national infrastructure to acceptable levels would cost nearly 10% of the US annual GDP. Decommissioning infrastructure can decrease public spending and increase public safety while facilitating economic expansion and ecological restoration. While most infrastructure remains critical to the national economy, a substantial amount is obsolete or declining in importance. Over 11,000 dams are abandoned, and of nearly 400,000 miles of road on its lands, the U.S. Forest Service considers one-fourth non-essential and often non-functional. Removing obsolete infrastructure allows greater focus and funding on maintaining or improving infrastructure most critical to society. Moreover, a concerted program of infrastructure decommissioning promises significant long-term cost savings, and is a necessary step before more substantial, systematic changes are possible, like those needed to address the new energy sources and shifting climate. One key challenge for infrastructure reform is how to prioritize and implement such a widespread and politically-charged series of decisions. Two approaches are proposed for different scales. For small, private infrastructure, emerging state and federal ecosystem service markets can provide an economic impetus to push infrastructure removal. Ecosystem market mechanisms may also be most effective at identifying those projects with the greatest ecological bang for the buck. Examples where this approach has proved successful include dam removal for stream mitigation under the Clean Water Act, and levee decommissioning on the Missouri and Iowa Rivers for wildlife conservation areas. Programs that link offshore oil platform decommissioning to marine conservation areas are also notable examples of creative linkages between infrastructure and conservation efforts. For federal infrastructure, the forthcoming Water Resources Development Act (WRDA) should include a BRAC-like program. Faced with a number of aging military bases, the Department of Defense (DOD) began identifying installations it would rather close than maintain or modernize. Overcoming political hurdles was accomplished via the Base Realignment and Closure Commission (BRAC), a bi-partisan commission that buffered politicians by creating a slate of closures for Congress and the President to approve or scuttle in toto. From 1988-2005, BRACs closed > 125 military installations, saving > $50 billion. DOD advocated BRAC because it increased efficiency by focusing funding on those bases central to DODs mission, and removed base funding decisions from political influence. Regardless of the approach, society must develop approaches from which to base difficult end-of-life decisions for infrastructure. In most cases, removing obsolete infrastructure can allow focus on infrastructure that remains critical to society.

  1. How Do People Think About Interdependence? A Multidimensional Model of Subjective Outcome Interdependence.

    PubMed

    Gerpott, Fabiola H; Balliet, Daniel; Columbus, Simon; Molho, Catherine; de Vries, Reinout E

    2017-09-04

    Interdependence is a fundamental characteristic of social interactions. Interdependence Theory states that 6 dimensions describe differences between social situations. Here we examine if these 6 dimensions describe how people think about their interdependence with others in a situation. We find that people (in situ and ex situ) can reliably differentiate situations according to 5, but not 6, dimensions of interdependence: (a) mutual dependence, (b) power, (c) conflict, (d) future interdependence, and (e) information certainty. This model offers a unique framework for understanding how people think about social situations compared to another recent model of situation construal (DIAMONDS). Furthermore, we examine factors that are theorized to shape perceptions of interdependence, such as situational cues (e.g., nonverbal behavior) and personality (e.g., HEXACO and Social Value Orientation). We also study the implications of subjective interdependence for emotions and cooperative behavior during social interactions. This model of subjective interdependence explains substantial variation in the emotions people experience in situations (i.e., happiness, sadness, anger, and disgust), and explains 24% of the variance in cooperation, above and beyond the DIAMONDS model. Throughout these studies, we develop and validate a multidimensional measure of subjective outcome interdependence that can be used in diverse situations and relationships-the Situational Interdependence Scale (SIS). We discuss how this model of interdependence can be used to better understand how people think about social situations encountered in close relationships, organizations, and society. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.

    PubMed

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-05-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3-22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit-cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks.

  3. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks

    PubMed Central

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-01-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3–22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit–cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks. PMID:27293781

  4. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2004-09-02

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP now administers the grants programs. 30According to the guidance, threat assessment determines the relative likelihood of a known potential...information on critical infrastructure assets. The Office of State and Local Government Coordination and Preparedness (OSLGCP) administers two grant

  5. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2005-02-04

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP). The OSLGCP now administers the grants programs. 37 According to the guidance, threat assessment determines the relative likelihood of a...Preparedness (OSLGCP) administers two grant programs that give states the opportunity to identify critical infrastructure assets: the State Homeland Security

  6. The National Plan for Research and Development In Support of Critical Infrastructure Protection

    DTIC Science & Technology

    2004-01-01

    vulnerabilities and highlight areas for improvement. As part of this effort, CIP &CP has cre- ated a research and development agenda aimed at improving...Infrastructure Protection Research and Development Plan 13 LONG-TERM DIRECTION PROVIDED BY THE CIP R&D PLAN The creation of a national critical...Research and Development Plan 20 Mapping to Other National R&D Plans The many R&D plans outside the direct context of CIP underway within DHS, other

  7. Impacts of climate change and variability on transportation systems and infrastructure : Gulf Coast study, phase I

    DOT National Transportation Integrated Search

    2008-03-01

    Climate affects the design, construction, safety, operations, and maintenance of transportation : infrastructure and systems. The prospect of a changing climate raises critical questions : regarding how alterations in temperature, precipitation, stor...

  8. Intercity passenger rail : Congress faces critical decisions in developing a national policy

    DOT National Transportation Integrated Search

    2002-04-11

    This document is the statement of JayEtta Z. Hecker, Director, Physical Infrastructure. Testimony before the Subcommittee on Railroads, Committee on Transportation and Infrastructure, House of Representatives on the future of intercity passenger rail...

  9. Engineering healthcare as a service system.

    PubMed

    Tien, James M; Goldschmidt-Clermont, Pascal J

    2010-01-01

    Engineering has and will continue to have a critical impact on healthcare; the application of technology-based techniques to biological problems can be defined to be technobiology applications. This paper is primarily focused on applying the technobiology approach of systems engineering to the development of a healthcare service system that is both integrated and adaptive. In general, healthcare services are carried out with knowledge-intensive agents or components which work together as providers and consumers to create or co-produce value. Indeed, the engineering design of a healthcare system must recognize the fact that it is actually a complex integration of human-centered activities that is increasingly dependent on information technology and knowledge. Like any service system, healthcare can be considered to be a combination or recombination of three essential components - people (characterized by behaviors, values, knowledge, etc.), processes (characterized by collaboration, customization, etc.) and products (characterized by software, hardware, infrastructures, etc.). Thus, a healthcare system is an integrated and adaptive set of people, processes and products. It is, in essence, a system of systems which objectives are to enhance its efficiency (leading to greater interdependency) and effectiveness (leading to improved health). Integration occurs over the physical, temporal, organizational and functional dimensions, while adaptation occurs over the monitoring, feedback, cybernetic and learning dimensions. In sum, such service systems as healthcare are indeed complex, especially due to the uncertainties associated with the human-centered aspects of these systems. Moreover, the system complexities can only be dealt with methods that enhance system integration and adaptation.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ehlen, Mark Andrew; Vugrin, Eric D.; Warren, Drake E.

    In recent years, the nation has recognized that critical infrastructure protection should consider not only the prevention of disruptive events, but also the processes that infrastructure systems undergo to maintain functionality following disruptions. This more comprehensive approach has been termed critical infrastructure resilience (CIR). Given the occurrence of a particular disruptive event, the resilience of a system to that event is the system's ability to efficiently reduce both the magnitude and duration of the deviation from targeted system performance levels. Sandia National Laboratories (Sandia) has developed a comprehensive resilience assessment framework for evaluating the resilience of infrastructure and economic systems.more » The framework includes a quantitative methodology that measures resilience costs that result from a disruption to infrastructure function. The framework also includes a qualitative analysis methodology that assesses system characteristics that affect resilience in order to provide insight and direction for potential improvements to resilience. This paper describes the resilience assessment framework. This paper further demonstrates the utility of the assessment framework through application to a hypothetical scenario involving the disruption of a petrochemical supply chain by a hurricane.« less

  11. Infrastructure for Big Data in the Intensive Care Unit.

    PubMed

    Zelechower, Javier; Astudillo, José; Traversaro, Francisco; Redelico, Francisco; Luna, Daniel; Quiros, Fernan; San Roman, Eduardo; Risk, Marcelo

    2017-01-01

    The Big Data paradigm can be applied in intensive care unit, in order to improve the treatment of the patients, with the aim of customized decisions. This poster is about the infrastructure necessary to built a Big Data system for the ICU. Together with the infrastructure, the conformation of a multidisciplinary team is essential to develop Big Data to use in critical care medicine.

  12. Stochastic Hybrid Systems Modeling and Middleware-enabled DDDAS for Next-generation US Air Force Systems

    DTIC Science & Technology

    2017-03-30

    experimental evaluations for hosting DDDAS-like applications in public cloud infrastructures . Finally, we report on ongoing work towards using the DDDAS...developed and their experimental evaluations for hosting DDDAS-like applications in public cloud infrastructures . Finally, we report on ongoing work towards...Dynamic resource management, model learning, simulation-based optimizations, cloud infrastructures for DDDAS applications. I. INTRODUCTION Critical cyber

  13. Innovative Decentralized Decision-Making Enabling Capability on Mobile Edge Devices

    DTIC Science & Technology

    2015-09-01

    feasibility of adapting mobile device infrastructure into a future tactical cloud ecosystem. F. SCOPE The scope of this research is focused on the...critical to mobility : wireless infrastructure , the mobile device itself, and mobile applications” (Office of the Department of Defense Chief Information... Infrastructure to a Cost Effective and Platform Agnostic Environment; 3) Collaborate with DOD and Industry Partners to Develop a Classified Mobile Device

  14. Scalable collaborative risk management technology for complex critical systems

    NASA Technical Reports Server (NTRS)

    Campbell, Scott; Torgerson, Leigh; Burleigh, Scott; Feather, Martin S.; Kiper, James D.

    2004-01-01

    We describe here our project and plans to develop methods, software tools, and infrastructure tools to address challenges relating to geographically distributed software development. Specifically, this work is creating an infrastructure that supports applications working over distributed geographical and organizational domains and is using this infrastructure to develop a tool that supports project development using risk management and analysis techniques where the participants are not collocated.

  15. Sustainable infrastructure system modeling under uncertainties and dynamics

    NASA Astrophysics Data System (ADS)

    Huang, Yongxi

    Infrastructure systems support human activities in transportation, communication, water use, and energy supply. The dissertation research focuses on critical transportation infrastructure and renewable energy infrastructure systems. The goal of the research efforts is to improve the sustainability of the infrastructure systems, with an emphasis on economic viability, system reliability and robustness, and environmental impacts. The research efforts in critical transportation infrastructure concern the development of strategic robust resource allocation strategies in an uncertain decision-making environment, considering both uncertain service availability and accessibility. The study explores the performances of different modeling approaches (i.e., deterministic, stochastic programming, and robust optimization) to reflect various risk preferences. The models are evaluated in a case study of Singapore and results demonstrate that stochastic modeling methods in general offers more robust allocation strategies compared to deterministic approaches in achieving high coverage to critical infrastructures under risks. This general modeling framework can be applied to other emergency service applications, such as, locating medical emergency services. The development of renewable energy infrastructure system development aims to answer the following key research questions: (1) is the renewable energy an economically viable solution? (2) what are the energy distribution and infrastructure system requirements to support such energy supply systems in hedging against potential risks? (3) how does the energy system adapt the dynamics from evolving technology and societal needs in the transition into a renewable energy based society? The study of Renewable Energy System Planning with Risk Management incorporates risk management into its strategic planning of the supply chains. The physical design and operational management are integrated as a whole in seeking mitigations against the potential risks caused by feedstock seasonality and demand uncertainty. Facility spatiality, time variation of feedstock yields, and demand uncertainty are integrated into a two-stage stochastic programming (SP) framework. In the study of Transitional Energy System Modeling under Uncertainty, a multistage stochastic dynamic programming is established to optimize the process of building and operating fuel production facilities during the transition. Dynamics due to the evolving technologies and societal changes and uncertainty due to demand fluctuations are the major issues to be addressed.

  16. Integrated Mission Simulation (IMSim): Multiphase Initialization Design with Late Joiners, Rejoiners and Federation Save & Restore

    NASA Technical Reports Server (NTRS)

    Dexter, Daniel E.; Varesic, Tony E.

    2015-01-01

    This document describes the design of the Integrated Mission Simulation (IMSim) federate multiphase initialization process. The main goal of multiphase initialization is to allow for data interdependencies during the federate initialization process. IMSim uses the High Level Architecture (HLA) IEEE 1516 [1] to provide the communication and coordination between the distributed parts of the simulation. They are implemented using the Runtime Infrastructure (RTI) from Pitch Technologies AB. This document assumes a basic understanding of IEEE 1516 HLA, and C++ programming. In addition, there are several subtle points in working with IEEE 1516 and the Pitch RTI that need to be understood, which are covered in Appendix A. Please note the C++ code samples shown in this document are for the IEEE 1516-2000 standard.

  17. Interdependence and organizational citizenship behavior: exploring the mediating effect of group cohesion in multilevel analysis.

    PubMed

    Chen, Chun-Hsi Vivian; Tang, Ya-Yun; Wang, Shih-Jon

    2009-12-01

    The authors investigated the mechanism of group cohesion in the relationship between (a) task interdependence and goal interdependence and (b) individuals' organizational citizenship behavior (OCB). The authors adopted a multilevel perspective to facilitate understanding of the complex relations among variables. They collected data from 53 supervisors and 270 employees from R&D departments in Taiwan. The authors found that group cohesion fully mediated the effects of task interdependence and goal interdependence on employees' OCB. In addition, task interdependence had a greater effect on group cohesion than did goal interdependence. The authors discuss implications and suggestions for future research.

  18. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  19. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  20. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  1. Nitrogen dioxide sequestration using demolished concrete and its potential application in transportation infrastructure development : final report.

    DOT National Transportation Integrated Search

    2016-04-01

    Achieving environmental sustainability of the US transportation infrastructure via more environmentally sound construction is not a trivial task. Our : proposal, which addresses this critical area, is aiming at transforming concrete, the material of ...

  2. IEEE TRANSACTIONS ON CYBERNETICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig R. RIeger; David H. Scheidt; William D. Smart

    2014-11-01

    MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures

  3. Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes.

    PubMed

    Gao, Jianxi; Buldyrev, S V; Havlin, S; Stanley, H E

    2012-06-01

    Many real-world networks interact with and depend upon other networks. We develop an analytical framework for studying a network formed by n fully interdependent randomly connected networks, each composed of the same number of nodes N. The dependency links connecting nodes from different networks establish a unique one-to-one correspondence between the nodes of one network and the nodes of the other network. We study the dynamics of the cascades of failures in such a network of networks (NON) caused by a random initial attack on one of the networks, after which a fraction p of its nodes survives. We find for the fully interdependent loopless NON that the final state of the NON does not depend on the dynamics of the cascades but is determined by a uniquely defined mutual giant component of the NON, which generalizes both the giant component of regular percolation of a single network (n=1) and the recently studied case of the mutual giant component of two interdependent networks (n=2). We also find that the mutual giant component does not depend on the topology of the NON and express it in terms of generating functions of the degree distributions of the network. Our results show that, for any n≥2 there exists a critical p=p(c)>0 below which the mutual giant component abruptly collapses from a finite nonzero value for p≥p(c) to zero for p2, a RR NON is stable for any n with p(c)<1). This results arises from the critical role played by singly connected nodes which exist in an ER NON and enhance the cascading failures, but do not exist in a RR NON.

  4. 7 CFR 624.8 - Assistance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... important infrastructure components are threatened; (iv) When reviewing paragraphs (c)(3)(i) through (iii... containing federally designated critical habitat where the species or the critical habitat could be...

  5. 7 CFR 624.8 - Assistance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... important infrastructure components are threatened; (iv) When reviewing paragraphs (c)(3)(i) through (iii... containing federally designated critical habitat where the species or the critical habitat could be...

  6. Strategies for 96-hour critical infrastructure compliance.

    PubMed

    Storbakken, Steven H; Kendall, Shannon; Lackey, Connie

    2009-01-01

    Organizations that stand the best chance at survival following a disaster do so because they can depend on the sharing of resources and mutual ideologies, the authors claim, pointing out that when it comes to strategizing for 96-hour critical infrastructure compliance, it is important to keep at the forefront not only the idea of collaborative planning from within the organization--involving security and safety, clinical, facilities and administrative staffs--but also includes collaborative planning with the local and regional businesses surrounding the organization.

  7. A review of interdependence of sustainable building

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ju, Chuanjing; Ning, Yan, E-mail: cqningyan@gmail.com; Pan, Wei

    2016-01-15

    ABSTRACT: Despite the worldwide promotion of the sustainable building (SB) approach, its associated interdependence has seldom been explored. This knowledge gap is significant given the paradigm shift of regarding SBs as complex socio-technical systems embedded with multifaceted interdependence. The aim of this paper is to examine the interdependence of SB through a literature review. The literature review was guided by a framework comprising three dimensions of SB systems, i.e., building performance, methodology and stakeholders, on their theoretical grounds ranged from reductionism to holism. In order to articulate the integration of the three dimensions, this paper examined zero carbon building asmore » a specific case of SB. The findings contribute an innovative approach to examining the interdependence of SB, and should guide the development of strategies for managing the trade-offs in delivering SBs. - Highlights: • Performance scope of sustainable building triggers interdependence. • Material flow from cradle to cradle causes interdependence. • Interdependence occurs between the building and their context. • Interdependence exists in stakeholders' participation.« less

  8. In the land of the free, interdependent action undermines motivation.

    PubMed

    Hamedani, Maryam G; Markus, Hazel Rose; Fu, Alyssa S

    2013-02-01

    Today's most pressing social challenges require people to recognize their shared fate and work together--to think and act interdependently. In the three studies reported here, we found that appeals for increased interdependence may undermine the very motivation they seek to inspire. We examined the hypothesis that invoking interdependent action undermines motivation for chronically independent European Americans but not for bicultural Asian Americans who are both chronically independent and chronically interdependent. Studies 1 and 2 demonstrated that priming interdependent rather than independent action undermined European Americans' motivation to perform challenging mental and physical tasks. Study 3 showed that framing an appeal for environmental sustainability in terms of interdependent rather than independent action led to decreased motivation and resource allocation among European Americans. Motivation was not undermined for Asian Americans, which reveals how behavior is divergently shaped, in the land of the free, by foundational sociocultural schemas of independence and interdependence. This research has the novel implication that it may be necessary to invoke independent behaviors in order to successfully motivate interdependence.

  9. The Pandemic Pendulum: A Critical Analysis of Federal and State Preparedness for a Pandemic Event

    DTIC Science & Technology

    2009-03-01

    of employee illness and absenteeism , coupled with the closely meshed and interdependent systems of trade and commerce.18 WHO also proclaimed it...outbreak of Ebola, a naturally occurring pathogen with no known cure .20 The manifestation of Pandemic Influenza in Indonesia and Ebola in Congo are but...event of significant and sustained absenteeism ? (Transportation) Does the state anticipate need for supplementation of local government

  10. Enhancing Critical Thinking Skills for Army Leaders Using Blended-Learning Methods

    DTIC Science & Technology

    2013-01-01

    delivering, and evaluating leader education and those who develop and implement distributed learning courses that incorporate group collaboration on topics...Circumstances Numerous studies comparing outcomes of collocated and virtual groups show that collocated groups perform better on interdependent tasks, such as...in class or “cold call” on students to answer questions. Third, using small (rather than large) groups for interactive activities can alleviate free

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  12. Notes on critical care-review of seminal management and leadership papers in the United Kingdom.

    PubMed

    Coombs, Maureen

    2009-06-01

    Review of recent critical care provision reveals substantial changes in clinical unit operating, and policy drivers influencing international critical care delivery. Practitioners who have worked in healthcare environments over this time, will have witnessed substantial shifts in healthcare policy, changes in professional body guidance and greater service evaluation have impacted on critical care management and leadership. This paper offers a personal perspective on seminal management and leadership papers published in the critical care literature over the past decade. Presenting a range of national and international work that utilise diverse approaches, ten key papers are highlighted that have impacted in the United Kingdom setting. Through this, the influence of the modernisation agenda, the increasing significance of outcome studies, and the need for flexible, interdependent practice emerges. A key message to surface from this paper is the need for all in critical care to engage with, and understand the wider implications of management and leadership change for critical care delivery.

  13. Operational models of infrastructure resilience.

    PubMed

    Alderson, David L; Brown, Gerald G; Carlyle, W Matthew

    2015-04-01

    We propose a definition of infrastructure resilience that is tied to the operation (or function) of an infrastructure as a system of interacting components and that can be objectively evaluated using quantitative models. Specifically, for any particular system, we use quantitative models of system operation to represent the decisions of an infrastructure operator who guides the behavior of the system as a whole, even in the presence of disruptions. Modeling infrastructure operation in this way makes it possible to systematically evaluate the consequences associated with the loss of infrastructure components, and leads to a precise notion of "operational resilience" that facilitates model verification, validation, and reproducible results. Using a simple example of a notional infrastructure, we demonstrate how to use these models for (1) assessing the operational resilience of an infrastructure system, (2) identifying critical vulnerabilities that threaten its continued function, and (3) advising policymakers on investments to improve resilience. © 2014 Society for Risk Analysis.

  14. Mapping Water Resources, Allocation and Consumption in the Mills River Basin

    NASA Astrophysics Data System (ADS)

    Hodes, J.; Jeuland, M. A.; Barros, A. P.

    2014-12-01

    Mountain basins and the headwaters of river basins along the foothills of major mountain ranges are undergoing rapid environmental change due to urban development, land acquisition by investors, population increase, and climate change. Classical water infrastructure in these regions is primarily designed to meet human water demand associated with agriculture, tourism, and economic development. Often overlooked and ignored is the fundamental interdependence of human water demand, ecosystem water demand, water rights and allocation, and water supply. A truly sustainable system for water resources takes into account ecosystem demand along with human infrastructure and economic demand, as well as the feedbacks that exist between them. Allocation policies need to take into account basin resilience that is the amount of stress the system can handle under varying future scenarios. Changes in stress on the system can be anthropogenic in the form of population increase, land use change, economic development, or may be natural in the form of climate change and decrease in water supply due to changes in precipitation. Mapping the water rights, supply, and demands within the basin can help determine the resiliency and sustainability of the basin. Here, we present a coupled natural human system project based in the French Broad River Basin, in the Southern Appalachians. In the first phase of the project, we are developing and implementing a coupled hydro-economics modeling framework in the Mills River Basin (MRB), a tributary of the French Broad. The Mills River Basin was selected as the core basin for implementing a sustainable system of water allocation that is adaptive and reflects the interdependence of water dependent sectors. The headwaters of the Mills River are in the foothills of the Appalachians, and are currently under substantial land use land cover (LULC) change pressure for agricultural purposes. In this regard, the MRB is representative of similar headwater basins in regions of complex terrain undergoing similar pressures such as the Andes and Himalayas. First results of the project including a quantitative organigram mapping water availability, water consumption, and the relationships among water stakeholders within the basin will be presented.

  15. Pressure to cooperate: is positive reward interdependence really needed in cooperative learning?

    PubMed

    Buchs, Céline; Gilles, Ingrid; Dutrévis, Marion; Butera, Fabrizio

    2011-03-01

    BACKGROUND. Despite extensive research on cooperative learning, the debate regarding whether or not its effectiveness depends on positive reward interdependence has not yet found clear evidence. AIMS. We tested the hypothesis that positive reward interdependence, as compared to reward independence, enhances cooperative learning only if learners work on a 'routine task'; if the learners work on a 'true group task', positive reward interdependence induces the same level of learning as reward independence. SAMPLE. The study involved 62 psychology students during regular workshops. METHOD. Students worked on two psychology texts in cooperative dyads for three sessions. The type of task was manipulated through resource interdependence: students worked on either identical (routine task) or complementary (true group task) information. Students expected to be assessed with a Multiple Choice Test (MCT) on the two texts. The MCT assessment type was introduced according to two reward interdependence conditions, either individual (reward independence) or common (positive reward interdependence). A follow-up individual test took place 4 weeks after the third session of dyadic work to examine individual learning. RESULTS. The predicted interaction between the two types of interdependence was significant, indicating that students learned more with positive reward interdependence than with reward independence when they worked on identical information (routine task), whereas students who worked on complementary information (group task) learned the same with or without reward interdependence. CONCLUSIONS. This experiment sheds light on the conditions under which positive reward interdependence enhances cooperative learning, and suggests that creating a real group task allows to avoid the need for positive reward interdependence. © 2010 The British Psychological Society.

  16. Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations

    NASA Astrophysics Data System (ADS)

    Görbil, Gökçe; Gelenbe, Erol

    The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.

  17. 77 FR 62521 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-15

    ... oral comments after the presentation of the report from the Regional Resilience Working Group. We... a presentation from the NIAC Regional Resilience Working Group documenting their work to date on the Regional Resilience Study, which includes the role and impact of critical infrastructure on regional...

  18. 44 CFR 201.4 - Standard State Mitigation Plans.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... State owned or operated buildings, infrastructure, and critical facilities located in the identified... vulnerable to damage and loss associated with hazard events. State owned or operated critical facilities...

  19. 44 CFR 201.4 - Standard State Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... State owned or operated buildings, infrastructure, and critical facilities located in the identified... vulnerable to damage and loss associated with hazard events. State owned or operated critical facilities...

  20. Sugar for the brain: the role of glucose in physiological and pathological brain function

    PubMed Central

    Mergenthaler, Philipp; Lindauer, Ute; Dienel, Gerald A.; Meisel, Andreas

    2013-01-01

    The mammalian brain depends upon glucose as its main source of energy, and tight regulation of glucose metabolism is critical for brain physiology. Consistent with its critical role for physiological brain function, disruption of normal glucose metabolism as well as its interdependence with cell death pathways forms the pathophysiological basis for many brain disorders. Here, we review recent advances in understanding how glucose metabolism sustains basic brain physiology. We aim at synthesizing these findings to form a comprehensive picture of the cooperation required between different systems and cell types, and the specific breakdowns in this cooperation which lead to disease. PMID:23968694

  1. Maintaining Enterprise Resiliency via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)

    DTIC Science & Technology

    2016-04-01

    infrastructure . The work is motivated by the fact that today’s clouds are very static, uniform, and predictable, allowing attackers who identify a...vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. Our goal is to integrate into...clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud’s infrastructure . Our work is

  2. The Role of GIS and Data Librarians in Cyber-infrastructure Support and Governance

    NASA Astrophysics Data System (ADS)

    Branch, B. D.

    2012-12-01

    A governance road-map for cyber-infrastructure in the geosciences will include an intentional librarian core capable of technical skills that include GIS and open source support for data curation that involves all aspects of data life cycle management. Per Executive Order 12906 and other policy; spatial data, literacy, and curation are critical cyber-infrastructure needs in the near future. A formal earth science and space informatics librarian may be an outcome of such development. From e-science to e-research, STEM pipelines need librarians as critical data intermediaries in technical assistance and collaboration efforts with scientists' data and outreach needs. Future training concerns should advocate trans-disciplinary data science and policy skills that will be necessary for data management support and procurement.

  3. Challenges for the Protection of Critical ICT-Based Financial Infrastructures

    NASA Astrophysics Data System (ADS)

    Hämmerli, Bernhard M.; Arendt, Henning H.

    A workshop was held in Frankfurt during September 24-25, 2007, in order to initiate a dialogue between financial industry (FI) stakeholders and Europe’s top-level research community. The workshop focused on identifying research and development challenges for the protection of critical ICT-based financial infrastructures for the next 5 years: “Protection of Massively Distributed Critical Financial Services” and “Trust in New Value Added Business Chains”. The outcome of the workshop contributed to the development of the research agenda from the perspectives of three working groups. A number of project ideas were spawned based on the workshop, including a coordination actions project entitled PARSIFAL, which this paper will focus on.

  4. Managing critical materials with a technology-specific stocks and flows model.

    PubMed

    Busch, Jonathan; Steinberger, Julia K; Dawson, David A; Purnell, Phil; Roelich, Katy

    2014-01-21

    The transition to low carbon infrastructure systems required to meet climate change mitigation targets will involve an unprecedented roll-out of technologies reliant upon materials not previously widespread in infrastructure. Many of these materials (including lithium and rare earth metals) are at risk of supply disruption. To ensure the future sustainability and resilience of infrastructure, circular economy policies must be crafted to manage these critical materials effectively. These policies can only be effective if supported by an understanding of the material demands of infrastructure transition and what reuse and recycling options are possible given the future availability of end-of-life stocks. This Article presents a novel, enhanced stocks and flows model for the dynamic assessment of material demands resulting from infrastructure transitions. By including a hierarchical, nested description of infrastructure technologies, their components, and the materials they contain, this model can be used to quantify the effectiveness of recovery at both a technology remanufacturing and reuse level and a material recycling level. The model's potential is demonstrated on a case study on the roll-out of electric vehicles in the UK forecast by UK Department of Energy and Climate Change scenarios. The results suggest policy action should be taken to ensure Li-ion battery recycling infrastructure is in place by 2025 and NdFeB motor magnets should be designed for reuse. This could result in a reduction in primary demand for lithium of 40% and neodymium of 70%.

  5. Managing Critical Materials with a Technology-Specific Stocks and Flows Model

    PubMed Central

    2013-01-01

    The transition to low carbon infrastructure systems required to meet climate change mitigation targets will involve an unprecedented roll-out of technologies reliant upon materials not previously widespread in infrastructure. Many of these materials (including lithium and rare earth metals) are at risk of supply disruption. To ensure the future sustainability and resilience of infrastructure, circular economy policies must be crafted to manage these critical materials effectively. These policies can only be effective if supported by an understanding of the material demands of infrastructure transition and what reuse and recycling options are possible given the future availability of end-of-life stocks. This Article presents a novel, enhanced stocks and flows model for the dynamic assessment of material demands resulting from infrastructure transitions. By including a hierarchical, nested description of infrastructure technologies, their components, and the materials they contain, this model can be used to quantify the effectiveness of recovery at both a technology remanufacturing and reuse level and a material recycling level. The model’s potential is demonstrated on a case study on the roll-out of electric vehicles in the UK forecast by UK Department of Energy and Climate Change scenarios. The results suggest policy action should be taken to ensure Li-ion battery recycling infrastructure is in place by 2025 and NdFeB motor magnets should be designed for reuse. This could result in a reduction in primary demand for lithium of 40% and neodymium of 70%. PMID:24328245

  6. Building green infrastructure via citizen participation - a six-year study in the Shepherd Creek

    EPA Science Inventory

    Green infrastructure at the parcel scale provides critical ecosystem goods and services when these services (such as flood mitigation) must be provided locally. Here we report on an approach that encourages suburban landowners to mitigate impervious surfaces on their properties t...

  7. U.S. National Cyberstrategy and Critical Infrastructure: The Protection Mandate and Its Execution

    DTIC Science & Technology

    2013-09-01

    revising this thesis, and balancing the coordination needed for: (1) Piano; (2) Soccer /Baseball; (3) Cubmaster Cub Scout Pack-135; (4) Hospitality...disease and pest response; and provides nutritional assistance. Provides the financial infrastructure of the nation. This sector consists of commercial

  8. Lifelong Learning: Workforce Development and Economic Success.

    ERIC Educational Resources Information Center

    Lee, Alice

    Lifelong learning through a strong, policy-supported information technology (IT) infrastructure is critical to the success of Asia Pacific Economic Cooperation (APEC) member economies. There is a great need to upgrade the quality of skills within the workforce, and there have been unprecedented investments in infrastructure and advanced…

  9. Managing Mission-Critical Infrastructure

    ERIC Educational Resources Information Center

    Breeding, Marshall

    2012-01-01

    In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…

  10. Development of a remote sensing network for time-sensitive detection of fine scale damage to transportation infrastructure : [final report].

    DOT National Transportation Integrated Search

    2015-09-23

    This research project aimed to develop a remote sensing system capable of rapidly identifying fine-scale damage to critical transportation infrastructure following hazard events. Such a system must be pre-planned for rapid deployment, automate proces...

  11. 3 CFR 8910 - Proclamation 8910 of November 30, 2012. Critical Infrastructure Protection and Resilience Month...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... also its vulnerabilities to emerging threats. Cyber incidents can have devastating consequences on both... against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between government and the private sector, and protecting the privacy...

  12. Tracking housing recovery in Sea Bright, NJ and the relationship to infrastructure renewal.

    DOT National Transportation Integrated Search

    2017-03-01

    Understanding how a community is recovering from a disaster is critical to being able to make investments in transportation infrastructure. This project is a follow up study to a 2014 study that looked at the recovery process in Sea Bright, New Jerse...

  13. Turning Words Into Action: Confronting Acquisition Challenges

    DTIC Science & Technology

    2016-08-01

    interdependencies to programs with simple, severable components, open architectures , and more distributed participation.” Transitions between full­time and...companies would be out of business . Sure, the Air Force makes more than just smart­ phones, but most electronics companies offer many models and devices...continue to change their way of thinking. With a conscious and critical awareness of how we do busi­ ness, why we do business as we do, and most important

  14. Cascading failures with local load redistribution in interdependent Watts-Strogatz networks

    NASA Astrophysics Data System (ADS)

    Hong, Chen; Zhang, Jun; Du, Wen-Bo; Sallan, Jose Maria; Lordan, Oriol

    2016-05-01

    Cascading failures of loads in isolated networks have been studied extensively over the last decade. Since 2010, such research has extended to interdependent networks. In this paper, we study cascading failures with local load redistribution in interdependent Watts-Strogatz (WS) networks. The effects of rewiring probability and coupling strength on the resilience of interdependent WS networks have been extensively investigated. It has been found that, for small values of the tolerance parameter, interdependent networks are more vulnerable as rewiring probability increases. For larger values of the tolerance parameter, the robustness of interdependent networks firstly decreases and then increases as rewiring probability increases. Coupling strength has a different impact on robustness. For low values of coupling strength, the resilience of interdependent networks decreases with the increment of the coupling strength until it reaches a certain threshold value. For values of coupling strength above this threshold, the opposite effect is observed. Our results are helpful to understand and design resilient interdependent networks.

  15. Robust-yet-fragile nature of interdependent networks

    NASA Astrophysics Data System (ADS)

    Tan, Fei; Xia, Yongxiang; Wei, Zhi

    2015-05-01

    Interdependent networks have been shown to be extremely vulnerable based on the percolation model. Parshani et al. [Europhys. Lett. 92, 68002 (2010), 10.1209/0295-5075/92/68002] further indicated that the more intersimilar networks are, the more robust they are to random failures. When traffic load is considered, how do the coupling patterns impact cascading failures in interdependent networks? This question has been largely unexplored until now. In this paper, we address this question by investigating the robustness of interdependent Erdös-Rényi random graphs and Barabási-Albert scale-free networks under either random failures or intentional attacks. It is found that interdependent Erdös-Rényi random graphs are robust yet fragile under either random failures or intentional attacks. Interdependent Barabási-Albert scale-free networks, however, are only robust yet fragile under random failures but fragile under intentional attacks. We further analyze the interdependent communication network and power grid and achieve similar results. These results advance our understanding of how interdependency shapes network robustness.

  16. New concept of critical infrastructure strengthening

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gazizov, Talgat R.; Orlov, Pavel E.; Zabolotsky, Alexander M.

    2016-06-08

    Strengthening of critical infrastructure is considered. Modal reservation of electronics is proposed as a new concept of the strengthening. The concept combines a widely used cold backup and a recently proposed modal filtration. It makes electronics reliable as well as protected against electromagnetic interference, especially the ultra-wide band pulses. New printed circuit board structure is suggested for implementation of the proposed concept. Results of simulation in time and frequency domains are presented for the suggested structures. Considerable attenuation of dangerous excitations shows that the new concept and structure are promising.

  17. Testbeds for Assessing Critical Scenarios in Power Control Systems

    NASA Astrophysics Data System (ADS)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  18. Top Cyber: Developing the Top One Percent to Defeat the Advanced Persistent Threat

    DTIC Science & Technology

    2014-02-13

    Critical Infrastructure.” V3-CO-UK, 7 May 2013. http://www.v3.co.uk/v3-uk/news/2266397/us- government-chinese- hackers -have-the-skills-to-take-down...it is a source of great risk; and, for hackers , it is the super-highway to a target-rich environment. For the U.S. Government (USG), cyberspace is...worldwide. Ultimately, for all its benefits, the Internet presents an “Achilles’ Heel” in the defense of the nation’s Critical Infrastructure and Key

  19. Critical Foundations: Protecting America’s Infrastructures. The Report of the President’s Commission on Critical Infrastructure Protection.

    DTIC Science & Technology

    1997-10-13

    in Tokyo and bombings of the subway system in Paris, mass transit remains open and vulnerable to terrorist acts. Millions of miles of pipelines carry...Outside of "" C Risk Management Plan . Creates a Competitive Advantage , Not Considered Industry’s "• Protects Brand/ Franchise Responsibility- I ssue of...the out- set, the Commission considered expanding the scope of this sector to include food , health care and the nation’s work force as additional

  20. Water and Power Systems Co-optimization under a High Performance Computing Framework

    NASA Astrophysics Data System (ADS)

    Xuan, Y.; Arumugam, S.; DeCarolis, J.; Mahinthakumar, K.

    2016-12-01

    Water and energy systems optimizations are traditionally being treated as two separate processes, despite their intrinsic interconnections (e.g., water is used for hydropower generation, and thermoelectric cooling requires a large amount of water withdrawal). Given the challenges of urbanization, technology uncertainty and resource constraints, and the imminent threat of climate change, a cyberinfrastructure is needed to facilitate and expedite research into the complex management of these two systems. To address these issues, we developed a High Performance Computing (HPC) framework for stochastic co-optimization of water and energy resources to inform water allocation and electricity demand. The project aims to improve conjunctive management of water and power systems under climate change by incorporating improved ensemble forecast models of streamflow and power demand. First, by downscaling and spatio-temporally disaggregating multimodel climate forecasts from General Circulation Models (GCMs), temperature and precipitation forecasts are obtained and input into multi-reservoir and power systems models. Extended from Optimus (Optimization Methods for Universal Simulators), the framework drives the multi-reservoir model and power system model, Temoa (Tools for Energy Model Optimization and Analysis), and uses Particle Swarm Optimization (PSO) algorithm to solve high dimensional stochastic problems. The utility of climate forecasts on the cost of water and power systems operations is assessed and quantified based on different forecast scenarios (i.e., no-forecast, multimodel forecast and perfect forecast). Analysis of risk management actions and renewable energy deployments will be investigated for the Catawba River basin, an area with adequate hydroclimate predicting skill and a critical basin with 11 reservoirs that supplies water and generates power for both North and South Carolina. Further research using this scalable decision supporting framework will provide understanding and elucidate the intricate and interdependent relationship between water and energy systems and enhance the security of these two critical public infrastructures.

  1. Beach and dune building processes: Linking nearshore to backshore and events to decades

    NASA Astrophysics Data System (ADS)

    Ruggiero, P.; Cohn, N.; Hacker, S.; Moore, L. J.; Duran Vinent, O.; de Vries, S.

    2016-12-01

    Due to the wide range of complex processes in the active coastal zone, individual studies have tended to focus on specific time scales (e.g., event-scale erosion) and/or specific morphological units, (e.g., the nearshore bar zone). As a result, the wet and dry portions of the beach have typically been studied independently. In nature, however, the nearshore and the backshore are highly interdependent and understanding the linkages between these units is critical to characterizing coastal evolution. For example, during periods of intense storm conditions (e.g., major El Niños on the U.S. West Coast), elevated water levels and large waves commonly lead to the scarping, or even destruction, of wind formed dunes. Given that dunes act as a form of green infrastructure and are a major asset to the coastal zone, it is critical to be able to forecast backshore evolution. Existing models for backshore recovery, however, are typically based on local historical trends rather than a mechanistic understanding including onshore sediment transport, dune growth, and the role of ecomorphodynamic feedbacks. Therefore, most likely as a result of the historical academic separation of wave and wind driven processes, geomorphology and ecology, and short- and long-term processes, our understanding of beach and dune building is still in its infancy. Here we describe SEDEX2, the Sandbar-aEolian-Dune EXchange Experiment, a comprehensive summer 2016 field campaign in which measurements of waves, currents, wind, dune ecology, subaqueous and aeolian sediment transport, and subsequent morphological changes were collected along the Long Beach Peninsula, WA. The data collected during the six-week experiment are contextualized by nearly two decades of focused research on the seasonal-centennial scale evolution of this rapidly prograding system. The findings of this study, actively bridging across disciplines, morphometric units, and temporal scales are informing conceptual and numerical models of beach-dune interaction and helping to improve management of vital backshore resources.

  2. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  3. Examining Positive and Negative Interdependence in an Elementary School CSCL Setting

    ERIC Educational Resources Information Center

    Hartmann, Christian; Olsen, Jennifer K.; Brand, Charleen; Aleven, Vincent; Rummel, Nikol

    2017-01-01

    Social interdependence is a key concept in CSCL research. However, investigations of students' positive and negative interdependence during collaborative activities have often relied on self-report, rather than dialogue analysis. Bringing together politeness and social interdependence theory, we assessed "dialogue indicators" of positive…

  4. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  5. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  6. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  7. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  8. Modeling integrated water user decisions in intermittent supply systems

    NASA Astrophysics Data System (ADS)

    Rosenberg, David E.; Tarawneh, Tarek; Abdel-Khaleq, Rania; Lund, Jay R.

    2007-07-01

    We apply systems analysis to estimate household water use in an intermittent supply system considering numerous interdependent water user behaviors. Some 39 household actions include conservation; improving local storage or water quality; and accessing sources having variable costs, availabilities, reliabilities, and qualities. A stochastic optimization program with recourse decisions identifies the infrastructure investments and short-term coping actions a customer can adopt to cost-effectively respond to a probability distribution of piped water availability. Monte Carlo simulations show effects for a population of customers. Model calibration reproduces the distribution of billed residential water use in Amman, Jordan. Parametric analyses suggest economic and demand responses to increased availability and alternative pricing. It also suggests potential market penetration for conservation actions, associated water savings, and subsidies to entice further adoption. We discuss new insights to size, target, and finance conservation.

  9. A socioecological approach to improving mammography rates in a tribal community.

    PubMed

    English, Kevin C; Fairbanks, Jo; Finster, Carolyn E; Rafelito, Alvin; Luna, Jolene; Kennedy, Marianna

    2008-06-01

    This article highlights the processes and intermediate outcomes of a pilot project to increase mammography rates of women in an American Indian tribe in New Mexico. Using a socioecological framework and principles of community-based participatory research, a community coalition was able to (a) bolster local infrastructure to increase access to mammography services; (b) build public health knowledge and skills among tribal health providers; (c) identify community-specific knowledge, attitudes, and beliefs related to breast cancer; (d) establish interdependent partnerships among community health programs and between the tribe and outside organizations; and (e) adopt local policy initiatives to bolster tribal cancer control. These findings demonstrate the value of targeting a combination of individual, community, and environmental factors, which affect community breast cancer screening rates and incorporating cultural strengths and resources into all facets of a tribal health promotion intervention.

  10. INNOVATION AND RESEARCH FOR WATER INFRASTRUCTURE FOR THE 21ST CENTURY RESEARCH PLAN

    EPA Science Inventory

    This plan has been developed to provide the Office of Research and Development (ORD) with a guide for implementing a research program that addresses high priority needs of the Nation relating to its drinking water and wastewater infrastructure. By identifying these critical need...

  11. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP.../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to... Technical Assistance Program (CAPTAP) is offered jointly by the NPPD/IP and the Federal Emergency Management...

  12. Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective

    ERIC Educational Resources Information Center

    Lytras, Miltiadis, Ed.; Naeve, Ambjorn, Ed.

    2005-01-01

    In the context of Knowledge Society, the convergence of knowledge and learning management is a critical milestone. "Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective" provides state-of-the art knowledge through a balanced theoretical and technological discussion. The semantic web perspective…

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.

    Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.

  14. Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    talent. Examples include: * Detection of surveillance activities; * Stand-off detection of chemical, biological, nuclear, radiation and explosive ...Manager Guardian DARPA Overview Mr. Roger Gibbs DARPA LLNL Technologies in Support of Infrastructure Mr. Don Prosnitz LLNL Protection Sandia National...FP Antiterrorism/Force Protection CBRNE Chemical Biological Radiological Nuclear Explosive CERT Commuter Emergency Response Team CIA Central

  15. Community-level climate change vulnerability research: trends, progress, and future directions

    NASA Astrophysics Data System (ADS)

    McDowell, Graham; Ford, James; Jones, Julie

    2016-03-01

    This study systematically identifies, characterizes, and critically evaluates community-level climate change vulnerability assessments published over the last 25 years (n = 274). We find that while the field has advanced considerably in terms of conceptual framing and methodological approaches, key shortcomings remain in how vulnerability is being studied at the community-level. We argue that vulnerability research needs to more critically engage with the following: methods for evaluating future vulnerability, the relevance of vulnerability research for decision-making, interdependencies between social and ecological systems, attention to researcher / subject power dynamics, critical interpretation of key terms, and consideration of the potentially positive opportunities presented by a changing climate. Addressing these research needs is necessary for generating knowledge that supports climate-affected communities in navigating the challenges and opportunities ahead.

  16. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    DTIC Science & Technology

    2014-09-01

    power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video

  17. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roach, Dennis Patrick; Jauregui, David Villegas; Daumueller, Andrew Nicholas

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old andmore » classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New Mexico State University with the expertise at Sandia National Laboratories in the emerging field of SHM.« less

  18. Optimization of robustness of interdependent network controllability by redundant design

    PubMed Central

    2018-01-01

    Controllability of complex networks has been a hot topic in recent years. Real networks regarded as interdependent networks are always coupled together by multiple networks. The cascading process of interdependent networks including interdependent failure and overload failure will destroy the robustness of controllability for the whole network. Therefore, the optimization of the robustness of interdependent network controllability is of great importance in the research area of complex networks. In this paper, based on the model of interdependent networks constructed first, we determine the cascading process under different proportions of node attacks. Then, the structural controllability of interdependent networks is measured by the minimum driver nodes. Furthermore, we propose a parameter which can be obtained by the structure and minimum driver set of interdependent networks under different proportions of node attacks and analyze the robustness for interdependent network controllability. Finally, we optimize the robustness of interdependent network controllability by redundant design including node backup and redundancy edge backup and improve the redundant design by proposing different strategies according to their cost. Comparative strategies of redundant design are conducted to find the best strategy. Results shows that node backup and redundancy edge backup can indeed decrease those nodes suffering from failure and improve the robustness of controllability. Considering the cost of redundant design, we should choose BBS (betweenness-based strategy) or DBS (degree based strategy) for node backup and HDF(high degree first) for redundancy edge backup. Above all, our proposed strategies are feasible and effective at improving the robustness of interdependent network controllability. PMID:29438426

  19. Defining, Describing, and Categorizing Public Health Infrastructure Priorities for Tropical Cyclone, Flood, Storm, Tornado, and Tsunami-Related Disasters.

    PubMed

    Ryan, Benjamin J; Franklin, Richard C; Burkle, Frederick M; Watt, Kerrianne; Aitken, Peter; Smith, Erin C; Leggat, Peter

    2016-08-01

    The study aim was to undertake a qualitative research literature review to analyze available databases to define, describe, and categorize public health infrastructure (PHI) priorities for tropical cyclone, flood, storm, tornado, and tsunami-related disasters. Five electronic publication databases were searched to define, describe, or categorize PHI and discuss tropical cyclone, flood, storm, tornado, and tsunami-related disasters and their impact on PHI. The data were analyzed through aggregation of individual articles to create an overall data description. The data were grouped into PHI themes, which were then prioritized on the basis of degree of interdependency. Sixty-seven relevant articles were identified. PHI was categorized into 13 themes with a total of 158 descriptors. The highest priority PHI identified was workforce. This was followed by water, sanitation, equipment, communication, physical structure, power, governance, prevention, supplies, service, transport, and surveillance. This review identified workforce as the most important of the 13 thematic areas related to PHI and disasters. If its functionality fails, workforce has the greatest impact on the performance of health services. If addressed post-disaster, the remaining forms of PHI will then be progressively addressed. These findings are a step toward providing an evidence base to inform PHI priorities in the disaster setting. (Disaster Med Public Health Preparedness. 2016;10:598-610).

  20. Coordinated Scheduling for Interdependent Electric Power and Natural Gas Infrastructures

    DOE PAGES

    Zlotnik, Anatoly; Roald, Line; Backhaus, Scott; ...

    2016-03-24

    The extensive installation of gas-fired power plants in many parts of the world has led electric systems to depend heavily on reliable gas supplies. The use of gas-fired generators for peak load and reserve provision causes high intraday variability in withdrawals from high-pressure gas transmission systems. Such variability can lead to gas price fluctuations and supply disruptions that affect electric generator dispatch, electricity prices, and threaten the security of power systems and gas pipelines. These infrastructures function on vastly different spatio-temporal scales, which prevents current practices for separate operations and market clearing from being coordinated. Here in this article, wemore » apply new techniques for control of dynamic gas flows on pipeline networks to examine day-ahead scheduling of electric generator dispatch and gas compressor operation for different levels of integration, spanning from separate forecasting, and simulation to combined optimal control. We formulate multiple coordination scenarios and develop tractable physically accurate computational implementations. These scenarios are compared using an integrated model of test networks for power and gas systems with 24 nodes and 24 pipes, respectively, which are coupled through gas-fired generators. The analysis quantifies the economic efficiency and security benefits of gas-electric coordination and dynamic gas system operation.« less

Top