Skip to main content

Governance Vulnerability Facets

  • Chapter
  • First Online:

Part of the book series: Topics in Safety, Risk, Reliability and Quality ((TSRQ,volume 34))

Abstract

In this chapter, several models supporting the notion governance for vulnerability assessment are presented. These include structural vulnerability, operational vulnerability, managerial vulnerability, and relational vulnerability. These notions are presented in view of Quantitative Vulnerability Assessment (QVA), which is a method to diagnose vulnerability in complex systems with a focus on strategies that could be undertaken for sustained system development. Theory supporting QVA is presented as well as the general means of transportability of the application are presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Christen, P., Bohnenblust, H., Seitz, S. (1995). How to compare harm to the population with damage of the environment? A quantitative multi-attribute approach for risk analysis based on fuzzy set theory. In J. J. Mewis, H. J. Pasman, E. E. De Rademaeker (Eds.), Proceedings of the 8th international symposium (pp. 691–704). Antwerp: Elsevier Science BV.

    Google Scholar 

  • Doerig, H.-U. (2000). Operational risks in financial services: An old challenge in a new environment. London: Institut international d’etudes bancaires.

    Google Scholar 

  • Fernandez, G. W. (2009). Epistemological beliefs and teacher efficacy (Ph.D.). University of Virginia, United States, Virginia.

    Google Scholar 

  • Flood, R. L., Carson, E. R. (1993). Dealing with complexity: An introduction to the theory and application of systems science. New York: Plenum Press.

    Book  MATH  Google Scholar 

  • Gheorghe, A. V. (2004). The hidden faults: Towards a standing method to assess Switzerland’s vulnerabilities. Zurich, Switzerland: Laboratory of Safety Analysis, ETH Zurich.

    Google Scholar 

  • Gheorghe, A. V., Vamanu, D. V. (2004a). Complexity induced vulnerability. International Journal of Critical Infrastructures, 1(1), 76–84.

    Article  Google Scholar 

  • Gheorghe, A. V., Vamanu, D. V. (2004b). Towards QVA—Quantitative Vulnerability Assessment: A generic practical model. Journal of Risk Research, 7(6), 613–628.

    Article  Google Scholar 

  • Gheorghe, A. V., Vamanu, D. V. (2006). Risks in business design for critical infrastructures: the “DASHBOARD” concept. International Journal of Critical Infrastructures, 2(1), 70–82.

    Article  Google Scholar 

  • Katina, P. F. (2015a). Emerging systems theory–based pathologies for governance of complex systems. International Journal of System of Systems Engineering, 6(1/2), 144–159.

    Article  Google Scholar 

  • Katina, P. F. (2015b). Systems theory-based construct for identifying metasystem pathologies for complex system governance (Ph.D.). Old Dominion University, United States, Virginia.

    Google Scholar 

  • Katina, P. F. (2016a). Metasystem pathologies (M-Path) method: Phases and procedures. Journal of Management Development, 35(10), 1287–1301. doi:10.1108/JMD-02-2016-0024.

    Article  Google Scholar 

  • Katina, P. F. (2016b). Systems theory as a foundation for discovery of pathologies for complex system problem formulation. In A. J. Masys (Ed.), Applications of Systems Thinking and Soft Operations Research in Managing Complexity (pp. 227–267). Geneva, Switzerland: Springer International Publishing.

    Google Scholar 

  • Katina, P. F., Pinto, C. A., Bradley, J. M., Hester, P. T. (2014). Interdependency-induced risk with applications to healthcare. International Journal of Critical Infrastructure Protection, 7(1), 12–26.

    Article  Google Scholar 

  • Katina, P. F., Unal, R. (2015). Application of fuzzy sets in decision analysis for prioritising critical energy infrastructures. International Journal of Decision Sciences, Risk and Management, 6(1), 1–15.

    Article  Google Scholar 

  • Keating, C. B., Katina, P. F. (2012). Prevalence of pathologies in systems of systems. International Journal of System of Systems Engineering, 3(3/4), 243–267. doi:10.1504/IJSSE.2012.052688.

    Article  Google Scholar 

  • Kemikontoret, (1996). Administrativ SHM—revision. Stockholm: Association of Swedish Chemical Industries.

    Google Scholar 

  • Lagbo-Bergqvist, E., Lexén, R. (2000). Vägen till bättre styrning av säkerhetsarbetet i kommuner och landsting. Stockholm: Svenska kommunförbundet Landstingsförbundet.

    Google Scholar 

  • Merriam-Webster. (2006). Webster’s new explorer encyclopedic dictionary. Springfield, MA: Federal Street Press.

    Google Scholar 

  • Nilsson, J., Magnusson, S., Hallin, P., Lenntorp, B. (2001). Models for vulnerability auditing and distribution of governmental economical means at the local authority level. Lund, Sweden: LUCRAM: Lund University Centre for Risk Analysis and Management.

    Google Scholar 

  • Romeike, F., Maitz, J. (2001). Operational risk. London: CSC Financial Services EMEA.

    Google Scholar 

  • Skyttner, L. (2005). General systems theory: Problems, perspectives, practice (2nd ed.). Singapore: World Scientific Publishing Co., Pte. Ltd.

    MATH  Google Scholar 

  • Thom, R. (1975). Structural stability and morphogenesis. Reading, MA: Westview Press.

    MATH  Google Scholar 

  • Thom, R. (1983). Mathematical models of morphogenesis. (W. M. Brooks, D. Rand, Trans.). New York: Halsted Press.

    Google Scholar 

  • Troncale, L. (2013). Systems processes and pathologies: Creating an integrated framework for systems science. INCOSE International Symposium, 23(1), 1330–1353.

    Article  Google Scholar 

  • Vamanu, B. I., Gheorghe, A. V., Katina, P. F. (2016). Critical infrastructures: Risk and vulnerability assessment in transportation of dangerous goods—transportation by road and rail (Vol. 31). Cham, Switzerland: Springer International Publishing.

    Book  Google Scholar 

  • Warren, J. H. (2015). Safety culture monitoring: A management approach for assessing nuclear safety culture health performance utilizing multiple-criteria decision analysis (Ph.D.). Old Dominion University, United States, Virginia.

    Google Scholar 

  • Zeeman, E. C. (1977). Catastrophe theory: Selected papers. London: Addison-Wesley.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gheorghe, A.V., Vamanu, D.V., Katina, P.F., Pulfer, R. (2018). Governance Vulnerability Facets. In: Critical Infrastructures, Key Resources, Key Assets. Topics in Safety, Risk, Reliability and Quality, vol 34. Springer, Cham. https://doi.org/10.1007/978-3-319-69224-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69224-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69223-4

  • Online ISBN: 978-3-319-69224-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics