Environmental security, critical infrastructure and risk assessment

被引:5
|
作者
Belluck, D. A. [1 ]
Hull, R. N. [2 ]
Benjamin, S. L. [3 ]
Alcorn, J. [4 ]
Linkov, I. [5 ]
机构
[1] USDOT, FHWA, 400 7th St SW, Washington, DC 20590 USA
[2] Cantox Environm Inc., Mississauga, ON L5N 3C9, Canada
[3] USDA, Farm Serv Agcy, Washington, DC 20501 USA
[4] SAIC, Reston, VA 20190 USA
[5] INTERTOX Inc, Brookline, MA 02446 USA
关键词
D O I
10.1007/978-1-4020-5802-8_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Population growth, needed economic growth, and social pressures for improved infrastructure coupled to the need for human health and ecological protection and environmental security make systematic and transparent environmental decision-making a complex and often difficult task. Evaluating complex technical data and developing feasible risk management options requires procedural flexibility that may not be part of existing evaluative structures. Experience has demonstrated that direct transposition of risk assessment and risk management frameworks (e.g. those developed in the United States and European Union) may not work in regions whose social, legal, historical, political and economic situations are not suitable or prepared for acceptance of these methodologies. Flexible decision-making including the use and development of acceptable or unacceptable risk levels based on the critical nature of an infrastructure type, is one potential approach to assist risk managers in their decision-making. Unfortunately, the newness of the discussions on the interrelatedness of environmental security and critical infrastructure has yet to produce a unified and comprehensive treatment of the fields. As a result, this paper will describe and define these terms in order to set the stage for discussions of human health and ecological risk assessment and risk management later in the paper. This paper reviews basic concepts defined in the field of risk assessment and extends its applicability to the areas of environmental security and critical infrastructure protection.
引用
收藏
页码:3 / +
页数:6
相关论文
共 50 条
  • [21] Security Levels of Critical Infrastructure
    Stoichev, Kiril
    JOURNAL OF APPLIED SECURITY RESEARCH, 2014, 9 (03) : 328 - 337
  • [22] Challenges in Critical Infrastructure Security
    Leita, Corrado
    DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 1 - 1
  • [23] A SURVEY OF CRITICAL INFRASTRUCTURE SECURITY
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 127 - 138
  • [24] A MANUFACTURER-SPECIFIC SECURITY ASSESSMENT METHODOLOGY FOR CRITICAL INFRASTRUCTURE COMPONENTS
    Brandstetter, Thomas
    Knorr, Konstantin
    Rosenbaum, Ute
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 229 - +
  • [25] Contribution to diffusion processes application in the area of critical infrastructure security assessment
    Valis, David
    Pietrucha-Urbanik, Katarzyna
    ENGINEERING DECISIONS AND SCIENTIFIC RESEARCH IN AEROSPACE, ROBOTICS, BIOMECHANICS, MECHANICAL ENGINEERING AND MANUFACTURING, 2013, 436 : 539 - +
  • [26] CRITICAL INFRASTRUCTURE RESILIENCE ASSESSMENT AS A SOURCE OF REQUIREMENTS FOR THE SECURITY SYSTEMS DEVELOPMENT
    Panevski, Valeri
    COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES, 2024, 77 (12): : 1801 - 1807
  • [27] Environmental security and environmental management: The role of risk assessment.
    Lambert, James H.
    RISK ANALYSIS, 2006, 26 (06) : 1730 - 1732
  • [28] System Modeling and Risk Analysis using AADL for Critical Infrastructure Security
    Gezgin, Serhat
    Uras, Emel
    Eroglu, Emre
    Altay, Levent
    Bahtiyar, Serif
    Gur, Gurkan
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [29] A dynamic risk model for information technology security in a critical infrastructure environment
    Saunders, JH
    RISK-BASED DECISIONMAKING IN WATER RESOURCES X, 2003, : 23 - 39
  • [30] An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
    Kure, Halima Ibrahim
    Islam, Shareeful
    Mouratidis, Haralambos
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (18): : 15241 - 15271