scholarly journals Toolkit for resilience assessment of critical infrastructures to earthquake induced soil liquefaction disasters

Author(s):  
Mariantonietta Morga ◽  
Keith Jones

<p>The critical infrastructure resilience depends on several factors that go beyond the physical reliability and capacity to repair the system after a disruption. The overall critical infrastructure resilience includes aspects related to the social and economic backbone governing its capacity to deliver its service. This contribution presents a theoretical toolkit to calculate the overall resilience of critical infrastructures developed within the European project LIQUEFACT for earthquake- induced soil liquefaction disasters. The toolkit combine several aspects organized in three dimensions: organizational and management, the physical or technical system and operational capacity to deliver the service. The toolkit clearly defines also resilience aspects, such as preparedness, absorption, recovery and adaptation. For each dimension and aspect of the resilience several indicators are developed. A critical and technical explanation of each indicator is here proposed, as well a systematic methodology to combine them in the resilience toolkit. The novelty of this study is the systematic analysis of dimensions, aspects and indicators that made the proposed resilience toolkit original. The study is concluded with analyses of feasibility of the toolkit to natural disasters and applicability to localized disasters, such as earthquake-induced soil liquefaction events. Finally, the key factors of toolkit influencing a built asset model of critical infrastructures are identified.</p>

2017 ◽  
Vol 25 (3) ◽  
pp. 21-39 ◽  
Author(s):  
Luan Gao ◽  
Luning Liu ◽  
Yuqiang Feng

Prior research on ERP assimilation has primarily focused on influential factors at the organizational level. In this study, the authors attempt to extend their understanding of individual level ERP assimilation from the perspective of social network theory. They designed a multi-case study to explore the relations between ERP users' social networks and their levels of ERP assimilation based on the three dimensions of the social networks. The authors gathered data through interviews with 26 ERP users at different levels in five companies. Qualitative analysis was used to understand the effects of social networks and interactive learning. They found that users' social networks play a significant role in individual level ERP assimilation through interactive learning among users. They also found five key factors that facilitate users' assimilation of ERP knowledge: homophily (age, position and rank), tie content (instrumental and expressive ties), tie strength, external ties, and centrality.


2021 ◽  
Vol 12 (5-2021) ◽  
pp. 157-160
Author(s):  
Vladimir A. Putilov ◽  
◽  
Andrey V. Masloboev ◽  
Vitaliy V. Bystrov ◽  
◽  
...  

The unified methodological basis of information and analytical support of socio-economic security network-centric control in the region is proposed. The problem of regional security support is discussed at the level of risk-management of critical infrastructure resilience violation of the socio-economic systems. The methodology and tools for its implementation are aimed to information and analytical support of situational centers functioning in the region.


2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Harri Ruoslahti

Critical infrastructures often lack resilience and easily lose critical functionalities if hit by adverse events. Continuity management strategies for critical infrastructure operators and the networks that they form, rely also on the functionality of other interrelated networks. Disruptions in operations may affect society and for this reason, securing the operations of critical infrastructure operators is important. The technological impacts of CPS become evident to the resilience of all fields of critical infrastructure, but there is also human elements to take into account. The research question of this study is: How to enhance business continuity of critical infrastructure? This case study research uses qualitative methods collected by conducting interviews of resilience and continuity professionals who work with Finnish critical infrastructure. Resilience and continuity management are key for critical infrastructure operators. Important factors identified were identifying risks, critical activities, key personnel, creating guidelines and procedures, and open communication, which themes were recognised as important to improve resilience and manage continuity.


2021 ◽  
Vol 69 (12) ◽  
pp. 1062-1080
Author(s):  
Eva Brucherseifer ◽  
Hanno Winter ◽  
Andrea Mentges ◽  
Max Mühlhäuser ◽  
Martin Hellmann

Abstract Critical infrastructures are the backbone of our societies with increasingly complex and networked characteristics and high availability demands. This makes them vulnerable to a wide range of threats that can lead to major incidents. Resilience is a concept that describes a system’s ability to absorb and respond to disturbances, as well as to learn from the past and anticipate new threats. In this article, we apply the Digital Twin concept to the infrastructure domain to improve the system’s resilience capabilities. We conduct a comprehensive requirements analysis related to infrastructure characteristics, crisis management and resilience measures. As a result, we propose a Digital Twin Conceptual Framework for critical infrastructures. We conclude that the Digital Twin paradigm is well suited to enhance critical infrastructure resilience.


2019 ◽  
Vol XXII (1) ◽  
pp. 343-350
Author(s):  
Dimitrov N.

The author considers the maritime critical infrastructures resilience as a government responsibility for protection and service continuation and is carried out by the joint efforts of infrastructures operators, state and local institutions, and private actors shaped in a complex system. He gives reasons for the exactly type of the system based on local character of incidents and having common management and separated responsibilities.


2010 ◽  
Vol 69 (3) ◽  
pp. 173-179 ◽  
Author(s):  
Samantha Perrin ◽  
Benoît Testé

Research into the norm of internality ( Beauvois & Dubois, 1988 ) has shown that the expression of internal causal explanations is socially valued in social judgment. However, the value attributed to different types of internal explanations (e.g., efforts vs. traits) is far from homogeneous. This study used the Weiner (1979 ) tridimensional model to clarify the factors explaining the social utility attached to internal versus external explanations. Three dimensions were manipulated: locus of causality, controllability, and stability. Participants (N = 180 students) read the explanations expressed by appliants during a job interview. They then described the applicants on the French version of the revised causal dimension scale and rated their future professional success. Results indicated that internal-controllable explanations were the most valued. In addition, perceived internal and external control of explanations were significant predictors of judgments.


2017 ◽  
Vol 68 (10) ◽  
pp. 2378-2381
Author(s):  
Cristian Budacu ◽  
Mihai Constantin ◽  
Iulia Chiscop ◽  
Carmen Gabriela Stelea ◽  
Raluca Dragomir

Post-operative alveolitis is a topical issue in dental practice, which is also reflected by the etiopathogenic aspects. The conservative principle requires the maintenance of dento-periodontal units in the arch for as long as possible, but there are situations where dental extraction is required. The healing process of the post-surgical wound is complex and involves processes of gingival mucosal regeneration and bone reshaping, involving several local factors: wound size, presence of infection, alveolar vascularization, intraalveolar foreign bodies, and general factors, especially general condition, age and body reactivity. The quality, structure, maintenance, and retraction of the clot are key factors in the formation of connective tissue during the healing of the post-extraction would. At the Oral and Maxillofacial Surgery Clinic of Gala�i, during a 2-year period between January 2015 and December 30, 2016, 2780 patients that required surgery - dental extraction were consulted and diagnosed. We found that among those 2780 patients with dental extractions 105 (3.77%) had post-treatment alveolitis. No post-surgical alveolitis from the case study was complicated by osteomyelitis of the jaws or by suppurations of the superficial or deep compartments of the face. The prophylactic measures in each dental extraction, together with the correct and timely curative treatment, combined with the dentist�s competence and responsibility, can shorten the time of suffering, actively combating the risk factor and accelerating the social reintegration of the patient with post-treatment alveolitis.


2019 ◽  
Vol 11 (4) ◽  
pp. 315-328
Author(s):  
Sergey Aleksandrovich Mikhailov

This article deals with the issue of North-Eastern India, its current social and economic problems in the context of long-term demonstrations of the ethnic separatism. The main aim of the research implies systematic analysis and identification of key factors and reasons perpetuating separatism in NER as well as resource search which determines Indian strategy in solving this problem. The first part of the article is devoted to separatism peculiarities in the region which remains withdrawn and underexplored in many respects. Apart from this, the author provides a quite detailed analysis of negative mentality of the certain part of NER population which justifiably reproaches New Delhi for “discrimination” and inability to solve many problems of the region. Then the author paid the detailed attention to these problems of NER modern society (ethnic, demographic, economic, transport, social etc.) as well as measures undertaken by the Indian government for its settlement.


Author(s):  
Beth Hatt

The legacy of the social construction of race, class, and gender within the social construction of smartness and identity in US schools are synthesized utilizing meta-ethnography. The study examines ethnographies of smartness and identity while also exploring what meta-ethnography has to offer for qualitative research. The analyses demonstrate that race, class, and gender are key factors in how student identities of ability or smartness are constructed within schools. The meta-ethnography reveals a better understanding of the daily, sociocultural processes in schools that contribute to the denial of competence to students across race, class, and gender. Major themes include epistemologies of schooling, learning as the production of identity, and teacher power in shaping student identities. The results are significant in that new insights are revealed into how gender, class, and racial identities develop within the daily practices of classrooms about notions of ability.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document