Skip to main content

Critical Infrastructures, Key Resources, and Key Assets

  • Chapter
  • First Online:
Critical Infrastructures, Key Resources, Key Assets

Part of the book series: Topics in Safety, Risk, Reliability and Quality ((TSRQ,volume 34))

Abstract

This introductory chapter articulates the topics of critical infrastructure, key resources, and key assets (CIKRKA). It offers the reader a clear definition of the notions, explain their relevance and also the need to develop intelligible and robust models to diagnose and predict risks, vulnerability, resilience, fragility , and perception. This chapter reveals space, undersea, and belowground as three privileged sectors of human endeavor were critical infrastructures, resources, and assets coexist in the guise of complex systems that tend to assume a leading position in the overall, global CIKRKA system of systems. This chapter sets the stage for the remainder of the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.thefreedictionary.com/wellbeing.

  2. 2.

    More information can be found at http://www.swissre.com/.

References

  • Al-Youm, A.-M. (2013, March 27). Internet saboteur caught, says Telecom Egypt CEO. Retrieved September 15, 2016, from http://www.egyptindependent.com/news/internet-saboteur-caught-says-telecom-egypt-ceo.

  • Ansell, C., & Gash, A. (2008). Collaborative governance in theory and practice. Journal of Public Administration Research and Theory, 18(4), 543–571.

    Article  Google Scholar 

  • Ansoff, H. I. (1984). Implanting strategic management. Englewood Cliffs: Prentice-Hall.

    Google Scholar 

  • ASCE. (2009). Guiding principles for the nation’s critical infrastructure. Reston: American Society of Civil Engineers.

    Google Scholar 

  • Aven, T. (2011). On some recent definitions and analysis frameworks for risk, vulnerability, and resilience. Risk Analysis, 31(4), 515–522.

    Article  Google Scholar 

  • Baker, J. (2014, February 25). EU mulling investment in South America-Europe undersea cable. Retrieved September 15, 2016, from http://www.pcworld.com/article/2101820/eu-mulling-investment-in-south-americaeurope-undersea-cable.html.

  • Beck, U. (2006). Living in the world risk society. Economy and Society, 35(3), 329–345.

    Article  Google Scholar 

  • Becvar, D. S., & Becvar, R. J. (1999). Systems theory and family therapy: A primer (2nd ed.). Lanham, MD: University Press of America.

    MATH  Google Scholar 

  • Bennett, B. T. (2007). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel. Hoboken, NJ: Wiley.

    Book  Google Scholar 

  • Biermann, F., Betsill, M. M., Gupta, J., Kanie, N., Lebel, L., Liverman, D., et al. (2009). Earth system governance: People, places and the planet. Science and implementation plan of the earth system governance project (No. Earth System Governance Report 1, IHDP Report 20). Bonn: IHDP: The Earth System Governance Project. Retrieved from http://www.earthsystemgovernance.org/sites/default/files/publications/files/Earth-System-Governance_Science-Plan.pdf.

  • Blanchard, B. S. (2008). System engineering management. Hoboken: Wiley.

    Google Scholar 

  • Blanchard, B. S., & Fabrycky, W. J. (2006). Systems engineering and analysis (4th ed.). Upper Saddle River, NJ: Pearson—Prentice Hall.

    Google Scholar 

  • Bovaird, T. (2005). Public governance: Balancing stakeholder power in a network society. International Review of Administrative Sciences, 71(2), 217–228.

    Article  Google Scholar 

  • Brennan, N. M., & Solomon, J. (2008). Corporate governance, accountability and mechanisms of accountability: An overview. Accounting, Auditing & Accountability Journal, 21(7), 885–906.

    Article  Google Scholar 

  • Brown, D. W. (2015). 10 facts about the Internet’s undersea cables. Retrieved September 15, 2016, from http://mentalfloss.com/article/60150/10-facts-about-internets-undersea-cables.

  • Bush, B., Dauelsberg, L., LeClaire, R., Powell, D., DeLand, S., & Samsa, M. (2005). Critical infrastructure protection decision support system (CIP/DSS) Project overview. Presented at the International System Dynamics Conference, Boston, MA. Retrieved from http://www.systemdynamics.org/conferences/2005/proceed/papers/LECLA332.pdf.

  • Bush, G. W. (2003). The National strategy for the physical protection of critical infrastructures and key assests. Washington, DC: The White House. Retrieved from https://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf.

  • Calida, B. Y. (2013). System governance analysis of complex systems (Ph.D.). Old Dominion University, United States—Virginia.

    Google Scholar 

  • Calida, B. Y., & Katina, P. F. (2012). Regional industries as critical infrastructures: A tale of two modern cities. International Journal of Critical Infrastructures, 8(1), 74–90.

    Article  Google Scholar 

  • Calida, B. Y., & Katina, P. F. (2015). Modelling the 2008 financial economic crisis: Triggers, perspectives and implications from systems dynamics. International Journal of System of Systems Engineering, 6(4), 273–301.

    Article  Google Scholar 

  • Calida, B. Y., & Keating, C. B. (2014). System governance: Emergence of practical perspectives across the disciplines. In A. V. Gheorghe, M. Masera, & P. F. Katina (Eds.), Infranomics (pp. 269–296). Geneva, Switzerland: Springer International Publishing.

    Chapter  Google Scholar 

  • Casti, J. (2012). X-events: Complexity overload and the collapse of everything. New York, NY: William Morrow.

    Google Scholar 

  • Clinton, W. J. (1996). Executive order 13010: Critical infrastructure protection. Federal Register, 61(138), 37345–37350.

    Google Scholar 

  • Cohen, R. E., & Ahearn, F. L. (1980). Handbook for mental health care of disaster victims. Hutchinson: Johns Hopkins University Press.

    Google Scholar 

  • Comfort, L. K., Ko, K., & Zagorecki, A. (2005). Coordination in rapidly evolving disaster response systems: The role of information. In T. Terano, H. Kita, T. Kaneda, K. Arai, & H. Deguchi (Eds.), Agent-based simulation: From modeling methodologies to real-world applications (pp. 208–219). Tokyo: Springer Tokyo.

    Chapter  Google Scholar 

  • de Silva, E. (Ed.). (2016). National security and counterintelligence in the era of cyber espionage. Hershey, PA: IGI Global.

    Google Scholar 

  • DiSera, D., & Brooks, T. (2009). The geospatial dimensions of critical infrastructure and emergency response. Pipeline and Gas Journal, 236(9), 1–4.

    Google Scholar 

  • Dudenhoeffer, D., Permann, M. R., & Manic, M. (2006). CIMS: A framework for infrastructure interdependency modeling and analysis. In Proceedings of the 38th conference on Winter simulation (pp. 478–485). Monterey, California: Winter Simulation Conference. https://doi.org/10.1109/WSC.2006.323119.

  • Dunsire, A. (1990). Holistic governance. Public Policy and Administration, 5(1), 4–19.

    Article  Google Scholar 

  • EIA. (2008). U.S. underground natural gas storage facilities, Close of 2007. Retrieved September 16, 2016, from https://www.eia.gov/pub/oil_gas/natural_gas/analysis_publications/ngpipeline/undrgrndstor_map.html.

  • Einarsson, S., & Rausand, M. (1998). An approach to vulnerability analysis of complex industrial systems. Risk Analysis, 18(5), 535–546.

    Article  Google Scholar 

  • Eisenman, D. P., Cordasco, K. M., Asch, S., Golden, J. F., & Glik, D. (2007). Disaster planning and risk communication with vulnerable communities: Lessons from Hurricane Katrina. American Journal of Public Health, 97(Supplement_1), 109–115.

    Google Scholar 

  • Elder, K., Xirasagar, S., Miller, N., Bowen, S. A., Glover, S., & Piper, C. (2007). African Americans’ decisions not to evacuate New Orleans before Hurricane Katrina: A qualitative study. American Journal of Public Health, 97(Supplement 1), S124–S129.

    Article  Google Scholar 

  • EP. (2009). Gas and oil pipelines in Europe (No. PE 416.239 (IP/A/ITRE/NT/2009-13)). Brussels: European Parliament. Retrieved from http://www.europarl.europa.eu/document/activities/cont/201106/20110628ATT22856/20110628ATT22856EN.pdf.

  • European Council. (2004). Communication from the commission to the council and the European Parliament: Critical infrastructure protection in the fight against terrorism (pp. 1–11). Brussels, Belgium: Commission of the European Communities. Retrieved from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52004DC0702:EN:NOT.

  • Eusgeld, I., Henzi, D., & Kröger, W. (2008). Comparative evaluation of modeling and simulation techniques for interdependent critical infrastructures (p. 50). Zurich, Switzerland: ETH Zurich.

    Google Scholar 

  • Eusgeld, I., Kröger, W., Sansavini, G., Schläpfer, M., & Zio, E. (2009). The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliability Engineering & System Safety, 94(5), 954–963.

    Article  Google Scholar 

  • Fletcher, D. R. (2002). Spatial information technologies in critical infrastructure protection: A research agenda in CIP (pp. 1–8). Santa Barbara, CA: University of California. Retrieved from http://www.ncgia.ucsb.edu/ncrst/research/cip/CIPAgenda.pdf.

  • Francis, M. S. (2010). UAS uses, capabilities, grand challenges. In Encyclopedia of aerospace engineering (pp. 1–11). New York: NY: Wiley.

    Google Scholar 

  • FRG. (2009). National strategy for critical infrastructure protection (pp. 1–18). Berlin, Germany: Federal Ministry of the Interior. Retrieved from http://www.bmi.bund.de/cae/servlet/contentblob/598732/publicationFile/34423/kritis_englisch.pdf.

  • GAO. (2004). Critical infrastructure protection: Challenges and efforts to secure control systems (pp. 1–47). Washington, DC: US Government Accountability Office.

    Google Scholar 

  • Garrett, R. K., Anderson, S., Baron, N. T., & Moreland, J. D. (2011). Managing the interstitials, a system of systems framework suited for the Ballistic Missile Defense System. Systems Engineering, 14(1), 87–109.

    Article  Google Scholar 

  • Garvey, P. R. (2009). Analytical methods for risk management: A systems engineering perspective. Boca Raton: Chapman & Hall/CRC.

    MATH  Google Scholar 

  • Gheorghe, A. V. (2004). Risks, vulnerability, sustainability and governance: A new landscape for critical infrastructures. International Journal of Critical Infrastructures, 1(1), 118–124.

    Article  Google Scholar 

  • Gheorghe, A. V. (2005a). Critical infrastructures protection from [(systems) engineering] to {(system of systems) engineering}. Norfolk: ETH Zurich.

    Google Scholar 

  • Gheorghe, A. V. (Ed.). (2005b). Integrated risk and vulnerability management assisted by decision support systems: Relevance and impact on governance (Vol. 8). Dordrecht, The Netherlands: Springer.

    Google Scholar 

  • Gheorghe, A. V., & Katina, P. F. (2014). Editorial: Resiliency and engineering systems—Research trends and challenges. International Journal of Critical Infrastructures, 10(3/4), 193–199.

    Google Scholar 

  • Gheorghe, A. V., Masera, M., Weijnen, M. P. C., & De Vries, J. L. (Eds.). (2006). Critical infrastructures at risk: Securing the European electric power system (Vol. 9). Dordrecht: Springer.

    Google Scholar 

  • Gheorghe, A. V., Mock, R., & Kröger, W. (2000). Risk assessment of regional systems. Reliability Engineering and System Safety, 70(2), 141–156.

    Article  Google Scholar 

  • Gheorghe, A. V., & Yuchnovicz, D. (2015). The space infrastructure vulnerability cadastre: Orbital debris critical loads. International Journal of Disaster Risk Science, 6(4), 359–371.

    Article  Google Scholar 

  • Gibson, J. E., Scherer, W. T., & Gibson, W. F. (2007). How to do systems analysis. Hoboken, NJ: Wiley-Interscience.

    Book  Google Scholar 

  • Herzfeld, M. (2001). Anthropology: Theoretical practice in culture and society. Malden: Blackwell Publishers.

    Google Scholar 

  • Hesse, M., & Hornung, M. (2015). Space as a critical infrastructure. In K.-U. Schrogl, P. L. Hays, J. Robinson, D. Moura, & C. Giannopapa (Eds.), Handbook of space security (pp. 187–201). New York: Springer, New York.

    Google Scholar 

  • Hill, K. N. (2012). Risk quadruplet: Integrating assessments of threat, vulnerability, consequence, and perception for homeland security and homeland defense (Ph.D.). Old Dominion University, United States—Virginia.

    Google Scholar 

  • Hoffman, D. E. (2010). The dead hand: The untold story of the cold war arms race and its dangerous legacy. New York: Anchor Books.

    Google Scholar 

  • Holmgren, A., Molin, S., & Thedéen, T. (2001). Vulnerability of complex Infrastructure; power system and supporting digital communication system. Presented at the 5th International Conference on Technology, Policy, and Innovation, Utrecht, the Netherlands: LEMMA Publishers.

    Google Scholar 

  • Holton, G. A. (2004). Defining risk. Financial Analysts Journal, 60(6), 19–25.

    Article  Google Scholar 

  • Humphreys, M., Sachs, F. D., & Stiglitz, J. E. (Eds.). (2007). Escaping the resource curse. New York: Columbia University Press.

    Google Scholar 

  • INCOSE. (2011). Systems engineering handbook: A guide for system life cycle processes and activities (H. Cecilia, Ed.) (3.2 ed.). San Diego, CA: INCOSE.

    Google Scholar 

  • IRGC. (2006). White paper on managing and reducing social vulnerabilities from coupled critical infrastructures (pp. 1–68). Geneva: Switzerland.

    Google Scholar 

  • IRGC. (2007). Managing and reducing social vulnerabilities from coupled critical infrastructures (pp. 1–16). Geneva: International Risk Governance Council. Retrieved from http://www.irgc.org/IMG/pdf/IRGCinfra_site06.11.07-2.pdf.

  • Jee, C. (2016, June 30). 10 things you didn’t know about Google’s undersea internet cable. Retrieved September 15, 2016, from http://www.computerworlduk.com/galleries/infrastructure/10-top-fun-facts-about-googles-undersea-internet-cable-3619557/.

  • Jessop, B. (2003). Governance and metagovernance: On reflexivity, requisite variety, and requisite irony. In H. P. Bang (Ed.), Governance, as social and political communication (pp. 142–172). Manchester, England: Manchester University Press.

    Google Scholar 

  • Johnson, J., & Gheorghe, A. V. (2013). Antifragility analysis and measurement framework for systems of systems. International Journal of Disaster Risk Science, 4(4), 159–168.

    Article  Google Scholar 

  • Katina, P. F. (2016). Individual and societal risk (RiskIS): Beyond probability and consequence during Hurricane Katrina. In A. J. Masys (Ed.), Disaster forensics: Understanding root cause and complex causality (pp. 1–23). Geneva: Springer International Publishing.

    Google Scholar 

  • Katina, P. F., & Keating, C. B. (2015). Critical infrastructures: A perspective from systems of systems. International Journal of Critical Infrastructures, 11(4), 316–344.

    Article  Google Scholar 

  • Katina, P. F., Keating, C. B., & Gheorghe, A. V. (2016a). Cyber-physical systems: Complex system governance as an integrating construct. In H. Yang, Z. Kong, & M. D. Sarder (Eds.), Proceedings of the 2016 Industrial and Systems Engineering Research Conference. Anaheim, CA: IISE.

    Google Scholar 

  • Katina, P. F., Keating, C. B., Zio, E., & Gheorghe, A. V. (2016b). A criticality-based approach for the analysis of smart grids. Technology and Economics of Smart Grids and Sustainable Energy, 1(1), 14. doi:10.1007/s40866-016-0013-2.

    Article  Google Scholar 

  • Katina, P. F., Pinto, C. A., Bradley, J. M., & Hester, P. T. (2014). Interdependency-induced risk with applications to healthcare. International Journal of Critical Infrastructure Protection, 7(1), 12–26.

    Article  Google Scholar 

  • Katina, P. F., & Unal, R. (2015). Application of fuzzy sets in decision analysis for prioritising critical energy infrastructures. International Journal of Decision Sciences, Risk and Management, 6(1), 1–15.

    Article  Google Scholar 

  • Keating, C. B., Katina, P. F., & Bradley, J. M. (2014). Complex system governance: Concept, challenges, and emerging research. International Journal of System of Systems Engineering, 5(3), 263–288.

    Article  Google Scholar 

  • Keohane, R., & Nye, J. (1989). Power and interdependence. New York: NY: Harper Collins.

    Google Scholar 

  • Keohane, R., & Nye, J. (Eds.). (2000). Governance in a globalizing world. Washington: DC: Brookings Institution.

    Google Scholar 

  • Khatri, F. I. (1996). Optical solution propagation and control (Ph.D.). Massachusetts Institute of Technology, United States—Massachusetts.

    Google Scholar 

  • Klump, R., & Kwiatkowski, M. (2010). Distributed IP watchlist generation for intrusion detection in the electrical smart grid. In T. Moore & S. Shenoi (Eds.), Critical infrastructure protection IV (pp. 113–126). New York: Springer, Berlin Heidelberg.

    Chapter  Google Scholar 

  • Knabb, R. D., Rhome, J. R., & Brown, D. P. (2011). Tropical cyclone report Hurricane Katrina 23–30 August 2005 (pp. 1–43). Washington, DC: National Oceanic and Atmospheric Administration. Retrieved from http://www.nhc.noaa.gov/data/tcr/AL122005_Katrina.pdf.

  • Knight, F. H. (1921). Risk, uncertainty, and profit. Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co.

    Google Scholar 

  • Komljenovic, D., Gaha, M., Abdul-Nour, G., Langheit, C., & Bourgeois, M. (2016). Risks of extreme and rare events in asset management. Safety Science, 88, 129–145. doi:10.1016/j.ssci.2016.05.004.

    Article  Google Scholar 

  • Kooiman, J. (2000). Societal governance: Levels, models and orders of social-political interaction. In J. Pierre (Ed.), Debating governance: Authority, steering and democracy (pp. 138–166). Oxford, UK: Oxford University Press.

    Google Scholar 

  • Kooiman, J. (2003). Governing as governance. London: UK: SAGE Publications Ltd.

    Google Scholar 

  • Krahmann, E. (2003). Conceptualizing security governance. Cooperation and Conflict, 38(1), 5–26.

    Article  Google Scholar 

  • Kröger, W. (2008). Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering & System Safety, 93(12), 1781–1787.

    Article  Google Scholar 

  • Kröger, W., & Zio, E. (2011). Vulnerable systems. London, UK: Springer-Verlag.

    Book  Google Scholar 

  • Li, J. (2013). The visible hand: From struggling survival to viable sustainability. In Proceedings of the 56th Annual Meeting of the ISSS (pp. 1–19). San Jose, CA: International Society for the Systems Sciences. Retrieved from http://journals.isss.org/index.php/proceedings56th/article/view/1959.

  • Litovitz, A., Curtright, A., Abramzon, S., Burger, N., & Samaras, C. (2013). Estimation of regional air-quality damages from Marcellus Shale natural gas extraction in Pennsylvania. Environmental Research Letters, 8(1), 014017. doi:10.1088/1748-9326/8/1/014017.

    Article  Google Scholar 

  • Lynn, L., Heinrich, C., & Hill, C. (2000). Studying governance and public management: Challenges and prospects. Journal of Public Administration Research and Theory, 10(2), 233–261.

    Article  Google Scholar 

  • Martin-Breen, P., & Anderies, J. M. (2011). Resilience: A literature review (p. 64). New York: The Rockefeller Foundation. Retrieved from http://www.rockefellerfoundation.org/blog/resilience-literature-review.

  • Masys, A. (Ed.). (2015). Disaster management: Enabling resilience. New York, NY: Springer International Publishing.

    Google Scholar 

  • McMichael, L. D., Noble, C. R., Margraf, J. D., & Glascoe, L. G. (2009). Assessing the vulnerability of large critical infrastructure using fully-coupled blast effects modeling (p. 12). Presented at the 5th Congress on Forensics Engineering, Washington, D.C. Retrieved from https://e-reports-ext.llnl.gov/pdf/371487.pdf.

  • Mendonca, D., & Wallace, W. A. (2006). Impacts of the 2001 world trade center attack on New York City critical infrastructures. Journal of Infrastructure Systems, 12(4), 260–270.

    Article  Google Scholar 

  • Miller, G. (2015, October 29). Undersea internet cables are surprisingly vulnerable. Retrieved September 15, 2016, from https://www.wired.com/2015/10/undersea-cable-maps/.

  • Moteff, J., & Parfomak, P. (2004). Critical infrastructure and key assets: Definition and identification. Washington: DC: Congressional Research Service. Retrieved from http://www.fas.org/sgp/crs/RL32631.pdf.

  • Niemeyer, K. (2004). Simulation of critical infrastructures. Information and Security. An International Journal, 15(2), 120–143.

    Google Scholar 

  • Northrop, R. B., & Connor, A. N. (2013). Ecological sustainability: Understanding complex issues. Boca Raton, FL: CRC Press.

    Google Scholar 

  • Nozick, L. K., Turnquist, M. A., Jones, D. A., Davis, J. R., & Lawton, C. R. (2004). Assessing the performance of interdependent infrastructures and optimizing investments. In System sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 1–7). Big Island, Hawaii.

    Google Scholar 

  • NYC. (2007). A stronger, more resilient New York (pp. 106–130). New York: City of New York. Retrieved from http://www.nyc.gov/html/sirr/downloads/pdf/final_report/Ch_6_Utilities_FINAL_singles.pdf.

  • Obama, B. H. (2013). Critical infrastructure security and resilience. Washington, D.C.: The White House. Retrieved from http://www.fas.org/irp/offdocs/ppd/ppd-21.pdf.

  • Pederson, P., Dudenhoeffer, D., Hartley, S., & Permann, M. (2006). Critical infrastructure interdependency modeling: A survey of US and international research (No. INL/EXT-06-11464) (p. 125). Idaho Falls, ID: Idaho National Laboratory. Retrieved from http://www.inl.gov/technicalpublications/Documents/3489532.pdf.

  • Permann, M. R. (2007). Toward developing genetic algorithms to aid in critical infrastructure modeling. In 2007 IEEE Conference on Technologies for Homeland Security (pp. 192–197). Woburn, MA. https://doi.org/10.1109/THS.2007.370044.

  • Rahman, H. A., Marti, J. R., & Srivastava, K. (2011). Quantitative estimates of critical infrastructures’ interdependencies on the communication and information technology infrastructure. International Journal of Critical Infrastructures, 7(3), 220–242.

    Article  Google Scholar 

  • Rasmussen, J., & Batstone, R. (1989). Why do complex organisational systems fail? World Bank Environmental Working Paper, No. 20.

    Google Scholar 

  • Reason, J. (1990). Human error. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Rhodes, R. A. W. (2007). Understanding governance: Ten years on. Organization Studies, 28(8), 1243–1264.

    Article  Google Scholar 

  • Richardson, B. (1994). Socio-technical disasters: Profile and prevalence. Disaster Prevention and Management: An International Journal, 3(4), 41–69.

    Article  Google Scholar 

  • Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In Proceedings of the 37th Hawaii International Conference on System Sciences (pp. 1–8). Big Island, Hawaii. https://doi.org/10.1109/HICSS.2004.1265180.

  • Rinaldi, S. M., Peerenboom, J., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11–25.

    Article  Google Scholar 

  • Sandage, S. A. (2006). Born losers: A history of failure in America. Cambridge: Harvard University Press.

    Google Scholar 

  • Schmieer, M. (2015). Inventory of space based assets (infrastructures and services) to be classified as part of a critical infrastructure. Ispra: Institute for the Protection and Security of the Citizen, European Commission Joint Research Center.

    Google Scholar 

  • Seed, R. B., Bea, R. G., Abdelmalak, R. I., Athanasopoulos-Zekkos, A., Boutwell, G. P., Briaud, J. L., et al. (2008). New Orleans and Hurricane Katrina: Introduction, overview, and the east flank. Journal of Geotechnical and Geoenvironmental Engineering, 134, 701.

    Article  Google Scholar 

  • Setola, R. (2010). How to measure the degree of interdependencies among critical infrastructures. International Journal of System of Systems Engineering, 2(1), 38–59.

    Article  Google Scholar 

  • Sjöberg, L. (1999). Risk perception in Western Europe. Ambio, 28(6), 543–549.

    Google Scholar 

  • Skyttner, L. (2005). General systems theory: Problems, perspectives, practice (2nd ed.). Singapore: World Scientific Publishing Co., Pte. Ltd.

    MATH  Google Scholar 

  • Slovic, P., Fischhoff, B., & Lichtenstein, S. (1979). Rating the risks. Environment, 21(3), 14.

    Google Scholar 

  • Song, C. (2005). A methodological framework for vulnerability assessment for critical infrastructure systems, hierarchical holographic vulnerability assessment (HHVA) (Thesis). Zürich: ETH Zürich.

    Google Scholar 

  • Sousa-Poza, A. A., Kovacic, S., & Keating, C. B. (2008). System of systems engineering: An emerging multidiscipline. International Journal of System of Systems Engineering, 1(1/2), 1–17.

    Article  Google Scholar 

  • Starosielski, N. (2015). The undersea network. Durham: Duke University Press.

    Book  Google Scholar 

  • Sussman, J. M. (2005). Perspectives on intelligent transportation systems. New York, NY: Springer.

    Google Scholar 

  • Sweeney, J. L. (2002). The California electricity crisis. Stanford: Hoover Institution Press.

    Google Scholar 

  • Tainter, J. A. (1988). The collapse of complex societies. New York, NY: Cambridge University Press.

    Google Scholar 

  • Taleb, N. N. (2014). Antifragile: Things that gain from disorder (Reprint edition). New York: Random House Trade Paperbacks.

    Google Scholar 

  • The World Bank. (2017). World development report 2017: Governance and the law (No. 112303). Washington: DC: The World Bank. Retrieved from http://elibrary.worldbank.org/doi/book/10.1596/978-1-4648-0950-7.

  • Thissen, W. A., & Herder, P. M. (2003b). Critical infrastructures: State of the art in research and application. Boston, MA: Kluwer Academic Publishers.

    Book  MATH  Google Scholar 

  • Tokgoz, B. E., & Gheorghe, A. V. (2013). Resilience quantification and its application to a residential building subject to hurricane winds. International Journal of Disaster Risk Science, 4(3), 105–114.

    Article  Google Scholar 

  • Townsend, F. F. (2006). The federal response to Hurricane Katrina: Lessons learned. Washington, DC: US Government Printing Office.

    Google Scholar 

  • Turner, B. L., Kasperson, R. E., Matson, P. A., McCarthy, J. J., Corell, R. W., Christensen, L., et al. (2003). A framework for vulnerability analysis in sustainability science. Proceedings of the National Academy of Sciences, 100(14), 8074–8079.

    Article  Google Scholar 

  • UITP. (2014). Statistics brief: World metro figures. Brussels: L’Union Internationale des Transports Publics. Retrieved from http://www.uitp.org/sites/default/files/cck-focus-papers-files/Local_PT_in_the_EU_web%20(2).pdf.

  • US Congress. (2001). Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA PATRIOT ACT) Act of 2001 (No. 147) (p. 115 Stat. 271–402). Washington, DC: 107th Congress. Retrieved from http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/content-detail.html.

  • USDHS. (2002). Homeland Security Act of 2002 (No. Public Law 107–296) (p. 116 Stat. 2135–2321). Washington, DC: 107th Congress. Retrieved from https://www.dhs.gov/homeland-security-act-2002.

  • USDHS. (2013). NIPP 2013: Partnering for critical infrastructure security and resilience. Washington, D.C.: U.S. Dept. of Homeland Security. Retrieved from www.dhs.gov/xlibrary/assets/nipp-ssp-national-monuments-icons.pdf.

  • Vamanu, B. I., Gheorghe, A. V., & Katina, P. F. (2016). Critical infrastructures: Risk and vulnerability assessment in transportation of dangerous goods—Transportation by road and rail (Vol. 31). Cham, Switzerland: Springer International Publishing.

    Book  Google Scholar 

  • Weber, E. U., & Hsee, C. (1998). Cross-cultural differences in risk perception, but cross-cultural similarities in attitudes towards perceived risk. Management Science, 44(9), 1205–1217.

    Article  MATH  Google Scholar 

  • Weick, K. E. (1988). Enacted sensemaking in crisis situations. Journal of Management Studies, 25(4), 305–317. doi:10.1111/j.1467-6486.1988.tb00039.x.

    Article  Google Scholar 

  • Williams, S. (2016). Spies in the Congo: America’s atomic mission in World War II. New York: PublicAffairs.

    Google Scholar 

  • Willke, H. (2007). Smart governance: Governing the global knowledge society. Frankfurt, Germany: Campus Verlag GmbH.

    Google Scholar 

  • Zio, E. (2016). Critical infrastructures vulnerability and risk analysis. European Journal for Security Research, 1–18.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gheorghe, A.V., Vamanu, D.V., Katina, P.F., Pulfer, R. (2018). Critical Infrastructures, Key Resources, and Key Assets. In: Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, vol 34. Springer, Cham. https://doi.org/10.1007/978-3-319-69224-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69224-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69223-4

  • Online ISBN: 978-3-319-69224-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics