2011
DOI: 10.1504/ijcis.2011.038958
|View full text |Cite
|
Sign up to set email alerts
|

An impact-based approach for the analysis of cascading effects in critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 1 publication
0
11
0
Order By: Relevance
“…Various researchers and practitioners have come up with a list of the so-called critical infrastructure considering a variety of factors such as social services, economy and security issues. For example, the EU Directive report of 2008 [30] defines critical infrastructure as "those assets, systems or parts thereof that are essential for the maintenance of vital social functions, health, security, safety, economic and social welfare of people, whose destruction or malfunctioning would have as a direct consequence a significant impact on population, as a result of a loss of service of these functions". In the United States, the Department of Homeland Security lists sixteen critical infrastructure sectors whose assets, systems and networks, whether physical or virtual, are considered as vital to the security, national economic security, national public health or safety or any combination thereof.…”
Section: Concepts Terminology and Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Various researchers and practitioners have come up with a list of the so-called critical infrastructure considering a variety of factors such as social services, economy and security issues. For example, the EU Directive report of 2008 [30] defines critical infrastructure as "those assets, systems or parts thereof that are essential for the maintenance of vital social functions, health, security, safety, economic and social welfare of people, whose destruction or malfunctioning would have as a direct consequence a significant impact on population, as a result of a loss of service of these functions". In the United States, the Department of Homeland Security lists sixteen critical infrastructure sectors whose assets, systems and networks, whether physical or virtual, are considered as vital to the security, national economic security, national public health or safety or any combination thereof.…”
Section: Concepts Terminology and Literaturementioning
confidence: 99%
“…Furthermore, the official announcement of MWA (http://gisonline.mwa.co.th/GIS1125/index-desktop.php) shows numerous instances of intermittent water supply for operational and maintenance purposes, which carry the risk of floodwater intrusion into the water supply system (e.g., in September 2016, there were 1472 cases of this nature; in October 2016, there were 873 cases; in November 2016, there were 987 cases, etc.). Figure 14 depicts the locations of leakages in relation to flood-prone areas, and Figure 15 depicts the locations of leakages in relation to potential Escherichia coli concentrations in the floodwater (see also [30]). These two figures were obtained from the results of the 1D-2D model simulations.…”
Section: Assessment Of Impacts On Water Supply Servicesmentioning
confidence: 99%
“…An alternative methodological approach is suggested by Guikema (2009) based on statistical learning theory. Franchina et al (2011) proposed an impact-based approach to model the cascading effects. Based on probabilistic elicitation approaches and expert judgments, Chang et al (2014) characterized infrastructure vulnerability and community resilience focusing on infrastructure interdependencies.…”
Section: Empirical Approachesmentioning
confidence: 99%
“…This is inherent to all the empirical risk approaches -empirical risk-based approaches analyse dependencies based on previous incidents (historical incident or disaster data) coupled with expert opinion to identify alternative measures that minimise the dependency risk (e.g., Franchina et al, 2011;Utne et al, 2011). It is unlikely for a single critical infrastructure owner or operator to have access to real data about other CIs.…”
Section: Limitationsmentioning
confidence: 99%