Leadership for Critical Infrastructure Protection

被引:0
|
作者
Tvaronaviciene, Manuela [1 ]
机构
[1] Vilnius Gediminas Tech Univ, Vilnius, Lithuania
关键词
CYBER SECURITY MANAGEMENT; SOCIAL NETWORKS; PECULIARITIES; SYSTEMS; AMAZON; WATER;
D O I
10.1007/978-3-030-15495-0_40
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Security of a society has become one of urgent issues in contemporary world. Too frequently we started encountering one or another form of malicious behaviour, criminal activities or terrorism. New and complex threats highlight the need for further synergies and closer cooperation at all levels. Awareness, preparedness and resilience of societies emerge as key preconditions of further secure and sustainable economic development and general well-being. A special attention in those conditions has to be paid to development of theoretically grounded approach to protection of critical infrastructure (CIP), damage or disruption of which can be immensely harmful to unprepared and therefore vulnerable institutions and society. The aim of this paper was to lay theoretical foundations for theoretically grounded approach towards research in CIP area, in order to formulate, ultimately, a roadmap of action, which, employing leadership societal stakeholders would allow to enhance awareness of society actors about the threats, for example to develop ability to recognize, prevent, and, in case of disaster, to resist to consequences of critical infrastructure infringement. Hence, enhanced resilience of society to critical infrastructure infringement is and ultimate goal of fostering of leadership for critical infrastructure protection.
引用
收藏
页码:389 / 397
页数:9
相关论文
共 50 条
  • [31] A Platform for Simulation and Analysis of Critical Infrastructure Protection
    Kuo, Li-Jung
    Fan, Chin-Feng
    Yih, Swu
    Kao, Yung-Yu
    Lin, Ching-Ting
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (02): : 145 - 153
  • [32] CRITICAL INFRASTRUCTURE PROTECTION: THREATS MINING AND ASSESSMENT
    Digioia, Giusj
    Panzieri, Stefano
    INTERNATIONAL DEFENSE AND HOMELAND SECURITY SIMULATION WORKSHOP (DHSS 2012), 2012, : 67 - 72
  • [33] Trust and Reputation Management for Critical Infrastructure Protection
    Caldeira, Filipe
    Monteiro, Edmundo
    Simoes, Paulo
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 39 - 47
  • [34] Critical networked infrastructure protection from adversaries
    Quijano, Eduardo G.
    Rios Insua, David
    Cano, Javier
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 179 : 27 - 36
  • [35] Systemic challenges for critical information infrastructure protection
    Masera, M
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 57 - 73
  • [36] On Critical Infrastructure Protection in America and Inspiration to China
    Pei Yan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (5TH), VOL III, 2009, : 61 - 67
  • [37] The Protection of Critical Infrastructure Objects - Technical Principles
    Manas, Pavel
    DURABILITY OF CRITICAL INFRASTRUCTURE, MONITORING AND TESTING, ICDCF 2016, 2017, : 239 - 248
  • [38] Multisensor system for the protection of critical infrastructure of seaport
    Kastek, Mariusz
    Dulski, Rafal
    Zyczkowski, Marek
    Szustakowski, Mieczyslaw
    Trzaskawka, Piotr
    Ciurapinski, Wieslaw
    Grelowska, Grazyna
    Gloza, Ignacy
    Milewski, Stanislaw
    Listewnik, Karol
    UNATTENDED GROUND, SEA, AND AIR SENSOR TECHNOLOGIES AND APPLICATIONS XIV, 2012, 8388
  • [39] Autonomic Critical Infrastructure Protection (ACIP) System
    Al Baalbaki, Bilal
    Al-Nashif, Youssif
    Hariri, Salim
    Kelly, Douglas
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [40] Some methodical aspects of critical infrastructure protection
    Bochkov, Alexander
    Lesnykh, Valery
    Zhigirev, Nikolai
    Lavrukhin, Yuri
    SAFETY SCIENCE, 2015, 79 : 229 - 242