共查询到20条相似文献,搜索用时 15 毫秒
1.
Decision analysis and risk models for land development affecting infrastructure systems 总被引:1,自引:0,他引:1
Coordination and layering of models to identify risks in complex systems such as large-scale infrastructure of energy, water, and transportation is of current interest across application domains. Such infrastructures are increasingly vulnerable to adjacent commercial and residential land development. Land development can compromise the performance of essential infrastructure systems and increase the costs of maintaining or increasing performance. A risk-informed approach to this topic would be useful to avoid surprise, regret, and the need for costly remedies. This article develops a layering and coordination of models for risk management of land development affecting infrastructure systems. The layers are: system identification, expert elicitation, predictive modeling, comparison of investment alternatives, and implications of current decisions for future options. The modeling layers share a focus on observable factors that most contribute to volatility of land development and land use. The relevant data and expert evidence include current and forecasted growth in population and employment, conservation and preservation rules, land topography and geometries, real estate assessments, market and economic conditions, and other factors. The approach integrates to a decision framework of strategic considerations based on assessing risk, cost, and opportunity in order to prioritize needs and potential remedies that mitigate impacts of land development to the infrastructure systems. The approach is demonstrated for a 5,700-mile multimodal transportation system adjacent to 60,000 tracts of potential land development. 相似文献
2.
《Risk analysis》2018,38(2):226-241
Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system‐based for high‐consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward‐looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high‐consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. 相似文献
3.
This article presents an asset‐level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast‐resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life‐cycle cost considering a 10‐year service period. 相似文献
4.
Mark D. Abkowitz 《Risk analysis》2011,31(7):1133-1140
Over the past decade, terrorism risk has become a prominent consideration in protecting the well‐being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all‐hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man‐made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event‐based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. 相似文献
5.
长三角地区节能减排演化情景分析及预测 总被引:2,自引:0,他引:2
以长三角地区经济发展为基础,综合考虑该地区能源环境现状。基于节能减排动态演化模型,结合情景分析法对长三角地区2015年经济产值、能源消耗及污染排放进行预测,并分析2009~2015年经济产值、能源消耗及污染排放演化情况。旨在为未来长三角地区实施节能减排策略,实现可持续发展提供理论依据。 相似文献
6.
Health Risks of Energy Systems 总被引:1,自引:0,他引:1
Wolfram Krewitt Fintan Hurley Alfred Trukenmüller Rainer Friedrich 《Risk analysis》1998,18(4):377-383
Health risks from fossil, renewable and nuclear reference energy systems are estimated following a detailed impact pathway approach. Using a set of appropriate air quality models and exposure-effect functions derived from the recent epidemiological literature, a methodological framework for risk assessment has been established and consistently applied across the different energy systems, including the analysis of consequences from a major nuclear accident. A wide range of health impacts resulting from increased air pollution and ionizing radiation is quantified, and the transferability of results derived from specific power plants to a more general context is discussed. 相似文献
7.
多重不确定环境下基于证据理论的NIS安全风险评估模型 总被引:1,自引:0,他引:1
以证据理论为基础,构造一种能够适应多重不确定环境的网络信息系统安全风险评估模型。在模型中建立安全风险评估指标体系并对指标权重进行量化;重新定义基本概率赋值函数,以适应安全风险评估过程中证据的不确定性描述;实现证据一致性检验并确定调整方法,从而进一步降低评估过程中专家经验的不确定性;最后,通过实证分析验证该模型的正确性和有效性。 相似文献
8.
我国管理科学与工程学科的发展是国家全局性科学技术发展战略的重要组成部分,能够在相关重大发展领域提供关键助力,因而需要在宏观层面上探索具有问题导向属性,并且能够充分反映时代特性和国家实际需求的管理科学与工程学科发展战略。鉴于此,以厘清该学科界定与研究意义为基础,结合相关调研结果,探索了我国管理科学与工程学科“十四五”发展战略的保障政策,以期为我国“十四五”规划多个关键战略方向的重大需求提供管理支撑和量化参考,同时助力国家自然科学基金委员会全面深化科学基金改革。 相似文献
9.
10.
The consequences that climate change could have on infrastructure systems are potentially severe but highly uncertain. This should make risk analysis a natural framework for climate adaptation in infrastructure systems. However, many aspects of climate change, such as weak background knowledge and societal controversy, make it an emerging risk where traditional approaches for risk assessment and management cannot be confidently employed. A number of research developments aimed at addressing these issues have emerged in recent years, such as the development of probabilistic climate projections, climate services, and robust decision frameworks. However, additional research is needed to improve the suitability of these methods for infrastructure planning. In this perspective, we outline some of the challenges in addressing climate change risks to infrastructure and summarize new developments aimed at meeting these challenges. We end by highlighting needs for future research, many of which could be well‐served by expertise within the risk analysis community. 相似文献
11.
《Risk analysis》2018,38(1):134-150
Infrastructure adaptation measures provide a practical way to reduce the risk from extreme hydrometeorological hazards, such as floods and windstorms. The benefit of adapting infrastructure assets is evaluated as the reduction in risk relative to the “do nothing” case. However, evaluating the full benefits of risk reduction is challenging because of the complexity of the systems, the scarcity of data, and the uncertainty of future climatic changes. We address this challenge by integrating methods from the study of climate adaptation, infrastructure systems, and complex networks. In doing so, we outline an infrastructure risk assessment that incorporates interdependence, user demands, and potential failure‐related economic losses. Individual infrastructure assets are intersected with probabilistic hazard maps to calculate expected annual damages. Protection measure costs are integrated to calculate risk reduction and associated discounted benefits, which are used to explore the business case for investment in adaptation. A demonstration of the methodology is provided for flood protection of major electricity substations in England and Wales. We conclude that the ongoing adaptation program for major electricity assets is highly cost beneficial. 相似文献
12.
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. 相似文献
13.
《Risk analysis》2018,38(1):84-98
The emergence of the complexity characterizing our systems of systems (SoS) requires a reevaluation of the way we model, assess, manage, communicate, and analyze the risk thereto. Current models for risk analysis of emergent complex SoS are insufficient because too often they rely on the same risk functions and models used for single systems. These models commonly fail to incorporate the complexity derived from the networks of interdependencies and interconnectedness (I–I) characterizing SoS. There is a need to reevaluate currently practiced risk analysis to respond to this reality by examining, and thus comprehending, what makes emergent SoS complex. The key to evaluating the risk to SoS lies in understanding the genesis of characterizing I–I of systems manifested through shared states and other essential entities within and among the systems that constitute SoS. The term “essential entities” includes shared decisions, resources, functions, policies, decisionmakers, stakeholders, organizational setups, and others. This undertaking can be accomplished by building on state‐space theory, which is fundamental to systems engineering and process control. This article presents a theoretical and analytical framework for modeling the risk to SoS with two case studies performed with the MITRE Corporation and demonstrates the pivotal contributions made by shared states and other essential entities to modeling and analysis of the risk to complex SoS. A third case study highlights the multifarious representations of SoS, which require harmonizing the risk analysis process currently applied to single systems when applied to complex SoS. 相似文献
14.
Daniel J. Andrews Timothy L. Eddy Kelsey S. Hollenback Shravan Sreekumar Davis C. Loose Cody A. Pennetti Thomas L. Polmateer James C. Haug Lessie I. Oliver-Clark Joi Y. Williams Mark C. Manasco Steven Smith James H. Lambert 《Risk analysis》2023,43(4):820-837
Real-time tracking of tool and equipment inventories is a critical function of many organizations and sectors. For prisons and correctional facilities, tracking and monitoring of assets such as cookware, hardware, keys, janitorial equipment, vocational/technical specialty tools, etc., is essential for safety, security, trust, efficiency, education, etc. The performance of automated systems for this purpose can be diminished by a variety of emergent and future sociotechnical factors alone and in combination. This article introduces a methodology for contractor evaluation and selection in acquisition of innovative asset management systems, with an emphasis on evolving system requirements under uncertainty. The methodology features a scenario-based preferences analysis of emergent and future conditions that are disruptive to the performance of the asset-control system. The conditions are across technologies, operating environments, regulations, workforce behaviors, offender behaviors, prices and markets, organizations, cyber threats, etc. The methodology addresses the influence and interaction of the conditions to disrupt system priorities. Examples include: (i) infectious disease disrupting priorities among requirements and (ii) radio-frequency identification (RFID) and wireless-technology innovations disrupting priorities among stakeholders. The combinations of conditions that most and least matter for the system acquisition are characterized. The methodology constitutes a risk register for monitoring sources of risk to project performance, schedule, and cost throughout the system lifecycle. The results will be of interest to both practitioners and scholars engaged in systems acquisition as the pandemic interacts with other factors to affect risk, uncertainty, and resilience of organizational missions and operations. 相似文献
15.
This article examines two possible strategies for financing post-disaster infrastructure rehabilitation in developing and transition countries: relying on ex ante financing instruments (including insurance, catastrophe bonds, and other risk-transfer instruments) and ex post borrowing or credit. Insurance and other ex ante instruments will increase a country's stability, especially if the government authorities have a difficult time borrowing or otherwise raising funds after a major disaster; however, these instruments have an opportunity cost and can reduce the country's economic growth potential. The cost-benefit tradeoff is therefore one between economic growth through infrastructure investment and added solvency and stability for the economy. This article develops a model to illustrate this tradeoff. The model, which views the infrastructure of a developing or transition country as a nondiversifiable portfolio that generates returns, can provide a basis for evaluating alternative financing options depending on the country's objectives in terms of growth, solvency, and stability. 相似文献
16.
In recent years, there have been growing concerns regarding risks in federal information technology (IT) supply chains in the United States that protect cyber infrastructure. A critical need faced by decisionmakers is to prioritize investment in security mitigations to maximally reduce risks in IT supply chains. We extend existing stochastic expected budgeted maximum multiple coverage models that identify “good” solutions on average that may be unacceptable in certain circumstances. We propose three alternative models that consider different robustness methods that hedge against worst‐case risks, including models that maximize the worst‐case coverage, minimize the worst‐case regret, and maximize the average coverage in the worst cases (conditional value at risk). We illustrate the solutions to the robust methods with a case study and discuss the insights their solutions provide into mitigation selection compared to an expected‐value maximizer. Our study provides valuable tools and insights for decisionmakers with different risk attitudes to manage cybersecurity risks under uncertainty. 相似文献
17.
鉴于出口国时常出现天然气出口供应安全问题,进口国因基础设施滞后引发的天然气供需矛盾,考虑出口供应安全、基础设施与需求量三者之间的相互影响,文章构建了进出口两国之间的动态博弈模型。运用最优控制等理论,求得了双方的均衡策略及效用。结果表明,天然气出口价格越高,使得进口国的天然气销售价格越高及其对基础设施投入越少;出口国为保障出口供应安全付出的努力与天然气出口价格之间呈倒“U”型关系;与天然气寡头竞争市场相比,出口垄断市场的天然气出口价格、出口供应安全、基础设施存量以及出口国效用更高,进口国效用更低;在寡头竞争市场,与合作方式相比,两国在议价下的天然气出口价格、出口供应安全、基础设施存量以及出口国效用更高,进口国效用更低。 相似文献
18.
关键基础设施及其安全管理 总被引:2,自引:0,他引:2
关键基础设施(CI)系统是复杂的、高度相互依存的、网络化的社会-技术系统,一旦系统被中断或者被破坏,将会对国民健康、国土安全、经济稳定以及政府的正常运转等产生重大的影响.主要研究关键基础设施及其安全管理过程中的若干问题,对CI的特点进行了分析和总结,建立了网络化CI系统的体系结构,并利用视图模型来描述系统,同时还给出了灾难处理的一般过程.最后,进一步探讨了如何使用系统工程的方法来分析和模拟网络化CI系统的运行方式、潜在的薄弱环节以及改进这些薄弱环节的实施方法. 相似文献
19.
企业集团并购的能量效率最优战略 总被引:6,自引:1,他引:6
本文引用动物捕食的最优方法的观点,分析了企业集团并购的能量效率最优问题,提出了最优战略。首先,本文给出了模型的基本假设;接着,分别建立起并购上、下游企业的最优战略模型,并且给出了提高能量效率的充分条件;最后,建立起横向兼并模型,也给出了提高能量效率的充分条件,并且举例说明了如何进行决策。本文的结论可以应用到中国企业集团并购实践中。 相似文献
20.
International airports are complex sociotechnical systems that have an intrinsic potential to develop safety and security disruptions. In the absence of appropriate defenses, and when the potential for disruption is neglected, organizational crises can occur and jeopardize aviation services. This investigation examines the ways in which modern international airports can be “authors of their own misfortune” by adopting practices, attitudes, and behaviors that could increase their overall level of vulnerability. A sociotechnical perspective, the macroergonomic approach, is applied in this research to detect the potential organizational determinants of vulnerability in airport operations. Qualitative data nurture the case study on international airports produced by the present research. Findings from this study highlight that systemic weaknesses frequently reside in areas at the intersection of physical, organizational, and social spaces. Specific pathways of vulnerability can be drawn across these areas, involving the following systemic layers: individual, task, tools and technology, environment, and organization. This investigation expands the existing literature on the dynamics that characterize crisis incubation in multiorganization, multistakeholder systems such as international airports and provides practical recommendations for airport managers to improve their capabilities to early detect symptoms of organizational vulnerability. 相似文献