Advertisement

Critical Infrastructure Vulnerabilities: Embracing a Network Mindset

  • Tie XuEmail author
  • Anthony J. Masys
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

Critical Infrastructure has become fundamental to the functioning of our society. With the increasing interdependencies within critical infrastructure, the failure or damage of electric power grid, transportation networks, telecommunications, healthcare and water-supply systems would not only cause huge social disruption but also have significant national security implications that can cascade across borders. Developing effective protection, mitigation and recovery measures for critical infrastructures is paramount in the wake of increasing natural and human-initiated hazards, risks and threats. In the past decade, unprecedented technological advancements, rapid institutional changes and trans-boundary dependencies have changed the landscape of infrastructure systems. Critical infrastructure has now evolved into highly interconnected and interdependent networks of socio-technical systems in which different technological layers are interoperating crossing borders within the environmental, social and organizational context that drive their design, operations and development (Masys in Networks and network analysis for defence and security. Springer Publishing, 2014a, b). Understanding the nature of system interdependencies and emerging vulnerabilities can play an essential role in managing and/or reducing the probabilities and consequences of cascading failures in interdependent systems. In this light, the overall objective of this chapter is to address the knowledge gap existing in the dominant risk and disaster management theories by challenging and improving our networked mental model in order to better understand the interdependency-induced vulnerability pertaining to critical infrastructures thereby developing effective protection measures and enabling organizational resilience (Masys in Innovative thinking in risk, crisis and disaster management. Gower Publishing, UK, 2012a, Int J Disaster Prev Manage 21(3):320–335, 2012b). For policy makers, infrastructure owners/operators and researchers as target audience, this chapter will identify emerging challenges to the traditional security thinking in this field and suggest alternative approaches to risk assessment, vulnerability analysis.

Keywords

Critical infrastructure Systems Vulnerability Networks 

References

  1. Ackoff RL (1999) On passing through 80. Syst Pract Action Res 12(4):425–430CrossRefGoogle Scholar
  2. ASCE (2007) The New Orleans hurricane protection system: what went wrong and why. A report by the ASCE Hurricane Katrina external review panel. ASCE Press, RestonGoogle Scholar
  3. Barabasi A-L (2003) Linked: the new science of networks. Plume Books, CambridgeGoogle Scholar
  4. Beck U (1992) Risk society: towards a new modernity. Sage, LondonGoogle Scholar
  5. Beck U (2009) What is globalization?. Polity Press, CambridgeGoogle Scholar
  6. Beer S (1995) Designing freedom. John Wiley, ChichesterGoogle Scholar
  7. Checkland P (2001) Soft systems methodology. In: Rosenhead J, Mingers j (eds) Rational analysis for a problematic world revisited. John Wiley and Sons Ltd., West SussexGoogle Scholar
  8. Birkmann J, Cardona OD, Carreno ML, Barbat AH, Pelling M, Schneiderbauer S, Kienberger S, Keiler M, Alexander D, Zeil P, Welle T (2013) Framing vulnerability, risk and societal responses: the MOVE framework. Nat Hazards 67:193–211CrossRefGoogle Scholar
  9. Calida B, Katina P (2012) Regional industries as critical infrastructures: a tale of two modern cities. Int J Crit Infrastruct 8(1):74–90CrossRefGoogle Scholar
  10. Callon M, Law J (1995) Agency and the hybrid collectif. South Atlantic Q 94(2):481–507Google Scholar
  11. Comfort LK (2006) Cities at risk: Hurricane Katrina and the drowning of New Orleans. Urban Aff Rev 41(4):501–516CrossRefGoogle Scholar
  12. Dekker S (2011) Drift into failure: from hunting broken components to understanding complex systems. Ashgate, BurlingtonGoogle Scholar
  13. Dewar JA, Builder CH, Hix WM, Levin MH (1993) Assumption based planning: a planning tool for very uncertain times. http://www.rand.org/content/dam/rand/pubs/monograph_reports/2005/MR114.pdf
  14. DIET Report Executive Summary (2013) Available online at: http://www.nirs.org/fukushima/naiic_report.pdf. Accessed 20 Oct 2014
  15. DiSera D, Brooks T (2009) The geospatial dimensions of critical infrastructure and emergency response. Pipeline Gas J 236(9):1–4Google Scholar
  16. Dudenhoeffer D, Permann M, Manic M (2006) CIMS: a framework for infrastructure interdependency modeling and analysis. In: Proceedings of the thirty-eighth winter simulation conference, pp 478–485Google Scholar
  17. Farber D, Lakhtakia A (2009) Scenario planning and nanotechnological futures. Eur J Phys 30(4):S3–S15CrossRefGoogle Scholar
  18. Gheorghe A, Masera M, Weijnen M, De Vries L (2006) Critical infrastructures at risk: securing the European electric power system, vol 9. Springer, DordrechtCrossRefGoogle Scholar
  19. Gheorghe A, Masera M, De Vries L, Weijnen M, Kroger W (2007) Critical infrastructure: the need for international risk governance. Int J Crit Infrastruct 3(1/2):3–19CrossRefGoogle Scholar
  20. Helbing D (2013) Globally networked risks and how to respond. Nature 497:51–59CrossRefADSGoogle Scholar
  21. IAEA (2015) The Fukushima Daiichi accident: report by the director general and technical volumes. https://www.iaea.org/newscenter/news/iaea-releases-director-general%E2%80%99s-report-fukushima-daiichi-accident
  22. International Risk Governance Council (IRGC) (2006) Managing and reducing social vulnerabilities from coupled critical infrastructures. White paper No 3, Geneva, Switzerland. Available at: http://www.irgc.org/IMG/pdf/IRGC_WP_No_3_CriticalInfrastructures.pdf
  23. International Risk Governance Council (IRGC 2010) Assessing and managing emerging risks. Geneva, Switzerland, available at: http://www.irgc.org/IMG/pdf/irgcERfinal07jan_web.pdf
  24. Jackson MC (2003) Systems thinking: creative Holism for managers. Wiley, ChichesterGoogle Scholar
  25. Johnson CW (2008) Understanding failures in international safety infrastructure: a comparison of European and North American power failures. In: Proceedings of the 26th international conference on system safety, Vancouver, BC, 25–29 AugGoogle Scholar
  26. Katina P, Pinto C (2012) On critical infrastructure interdependence. In: Presented at the thirty-third national conference of the American society for engineering managementGoogle Scholar
  27. Katina P, Hester P (2013) System determination of infrastructure criticality. Int J Crit Infrastruct 9(3):211–225CrossRefGoogle Scholar
  28. Katina P, Pinto C, Bradley J, Hester P (2014) Interdependency-induced risk with applications to healthcare. Int J Crit Infrastruct Prot 7:12–26CrossRefGoogle Scholar
  29. Kauffman S (1995) At home in the Universe: the search for the laws of self organization and complexity. Oxford University Press, LondonGoogle Scholar
  30. Kroger W (2010) Emerging risks to large-scale engineered systems, white paper, October 2010. IRGC, GenevaGoogle Scholar
  31. Kroger W, Zio E (2011) Vulnerable systems. Springer Publishing, DordrechtCrossRefGoogle Scholar
  32. Latour B (1996) On actor-network theory a few clarifications. Soziale Welt 47:369–381Google Scholar
  33. Masys AJ (2010) Opening the black box of human error: revealing the complex aetiology of fratricide. VDM PublishingGoogle Scholar
  34. Masys AJ (2012a) The emergent nature of risk as a product of ‘heterogeneous engineering. A relational analysis of the oil and gas industry safety culture In: S Bennett (ed) Innovative thinking in risk, crisis and disaster management. Gower Publishing, UKGoogle Scholar
  35. Masys AJ (2012b) Black swans to grey swans—revealing the uncertainty. Int J Disaster Prev Manage 21(3):320–335CrossRefGoogle Scholar
  36. Masys AJ (2014a) Critical infrastructure and vulnerability: a relational analysis through actor network theory. In AJ Masys (ed) Networks and network analysis for defence and security. Springer PublishingGoogle Scholar
  37. Masys AJ (2014b) Dealing with complexity: thinking about networks and the comprehensive approach In: AJ Masys (ed) Networks and network analysis for defense and security. Springer PublishingGoogle Scholar
  38. Masys AJ, Ray-Bennett N, Shiroshita H, Jackson P (2014) High impact/low frequency extreme events: enabling reflection and resilience in a hyper-connected world. In: 4th international conference on building resilience. Salford Quays, United Kingdom, 8–11 Sept 2014. Procedia Econ Finan 18: 772–779Google Scholar
  39. Mendonca D, Wallace W (2006) Impacts of the 2001 World Trade Center Attack on New York City critical infrastructures. J Infrastruct Syst 12(4):260–270Google Scholar
  40. Ottino J (2003) Complex systems. AIChE J 49(2):292–299CrossRefGoogle Scholar
  41. Perrow C (1984) Normal accidents: living with high-risk technologies. Basic Books Inc, New YorkGoogle Scholar
  42. Prigogine I (1989) The philosophy of instability. Futures 21(4):396–400CrossRefMathSciNetGoogle Scholar
  43. Ray-Bennett N, Masys AJ, Shiroshita H, Jackson P (2015) Reactive to pro-active to reflective disaster responses: introducing critical reflective practices in disaster risk reduction (DRR). In: A Collins et al. (ed) Hazards, risks and disasters in society. Elsevier Publishing, APGoogle Scholar
  44. Rinaldi S, Peerenboom J, Kelly T (2001) Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25CrossRefGoogle Scholar
  45. Senge P (1990) The fifth discipline: the art and practice of the learning organization. Doubleday Currency, New YorkGoogle Scholar
  46. Sterman JD (2000) Business dynamics: systems thinking and modeling for a complex world. Boston. McGraw-HillGoogle Scholar
  47. The 9/11 Commission Report. 2004. http://www.9-11commission.gov/report/911Report.pdf
  48. Trist E (1981) The evolution of socio-techncial systems. In: Van de Ven H, Joyce WF (eds) Perspectives on organizational design and behavior. John Wiley, New YorkGoogle Scholar
  49. Van der Merwe L (2008) Scenario-based strategy in practice: a framework. Adv Dev Hum Resour 10(2):216–239CrossRefGoogle Scholar
  50. Vaughan D (1996) Challenger launch decision: risky technology, culture and deviance at NASA. University of Chicago Press, ChicagoGoogle Scholar
  51. Vespignani A (2009) Predicting the behavior of techno-social systems. Science 325 (July): 425–428Google Scholar
  52. Vespignani A (2010) The fragility of interdependency. Nature 464:984–985Google Scholar
  53. Walker JS (2004) Three mile island: a nuclear crisis in historical perspective. The University of California Press, BerkeleyGoogle Scholar
  54. Yeung HWC (2002) Economic geography: old wine in new bottles? Paper presented at the 98th Annual meeting of the Association of American Geographers, Los Angeles, CA. 19–23 Mar 2003. http://courses.nus.edu.sg/course/geoywc/publication/Yeung_AAG.pdf

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of Modern SciencesDubaiUnited Arab Emirates
  2. 2.University of LeicesterLeicesterUK

Personalised recommendations