Catastrophe risk assessment framework of ports and industrial clusters: a case study of the Guangdong province

Author(s):  
Xinhu Cao ◽  
Jasmine Siu Lee Lam
2020 ◽  
Vol 12 (10) ◽  
pp. 4212
Author(s):  
Zhicheng Gao ◽  
Rongjin Wan ◽  
Qian Ye ◽  
Weiguo Fan ◽  
Shihui Guo ◽  
...  

Typhoons and cyclones are the most impacting and destructive natural disasters in the world. To address the shortcomings of a previous typhoon disaster risk assessment (for example, human factors were involved in determining weights by importance, and this affected the experimental results), an emergy method, which converts energy flows of different properties into the same solar energy basis for a convenient comparison, was used to assess the risk of regional typhoon disasters. Typhoon disaster-related data from 2017 were used to develop an index system including resilience, potential strength, and sensitivity which was in turn applied to assess typhoon disaster risks in Zhuhai City, Guangdong Province, China. The results showed that the spatial distribution of the typhoon disaster risks in Zhuhai significantly differed, with the highest risk in Xiangzhou district, the second highest risk in Doumen district, and the lowest risk in Jinwan district. In addition, improving the level of regional resilience can effectively reduce risks from typhoon disasters. The application of the emergy method in a typhoon disaster risk assessment may provide some theoretical support for national and regional governmental strategies for disaster prevention and reduction.


2020 ◽  
Vol 185 ◽  
pp. 105061
Author(s):  
Xinchi Chen ◽  
Dong Huang ◽  
Xiaohong Chen ◽  
Weihang Lian ◽  
Lizhong Gu ◽  
...  

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Chujiao Ma ◽  
Luis Colon ◽  
Joe Dera ◽  
Bahman Rashidi ◽  
Vaibhav Garg

Abstract Crypto agility refers to the ability of an entity to replace existing crypto primitives, algorithms, or protocols with a new alternative quickly, inexpensively, with no or acceptable risk exposure. These changes may be driven by regulatory action, advances in computing, or newly discovered vulnerabilities. Yet everyday operational needs may put crypto agility considerations on the back burner when deploying technology, designing processes, or developing products/services. Consequently, changes are often performed in an ad hoc manner. Transition from one crypto solution to another can then take a long time and expose organizations to unnecessary security risk. This paper presents a framework to analyze and evaluate the risk that results from the lack of crypto agility. The proposed framework can be used by organizations to determine an appropriate mitigation strategy commensurate with their risk tolerance. We demonstrate the application of this framework with a case study of quantum computing and related threats to cryptography in the context of TLS for Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document