Abstract
One widely perceived yet poorly understood phenomenon in the practice of critical infrastructure protection is that of blind spots. These are certain aspects of the interrelationships among different critical infrastructure systems (CI systems) that could trigger catastrophe across CI systems but are concealed from planners, and discovered only in the aftermath of a crisis. In this paper, we discuss the sources of blind spots, and explore the feasibility of various techniques to help reveal blind spots.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blind Spot, http://en.wikipedia.org/wiki/File:Blind_spot.JPG
Fonseca, F., Camara, G., Monteiro, A.: A Framework for Measuring the Interoperability of Geo-Ontologies. Spatial Cognition and Computation 6(4), 307–329 (2001)
Garrick, J.: Perspectives on the use of risk assessment to address terrorism. Risk Analysis 22(3), 421–423 (2002)
The Naitonal Strategy for Homeland Security. The office of Homeland Security (July 2002), http://www.whitehouse.gov/homeland/book/nat_strat_hls.pdf (accesed May 30, 2008)
Frank, A.U.: Tiers of Ontology and Consistency Constraints in Geographic Information Systems. International Journal of Geographical Information Science 15(7), 667–678 (2001)
ICF Consulting. The Economic Cost of the Blackout: An issue paper on the Northeast Blackout (August 14, 2003), http://www.solarstorms.org/ICFBlackout2003.pdf (accessed May 31, 2008)
IWS. NERC Welcomes U.S.-Canada Power System Task Force Final Report. Published April 6, 2004 by the North American Electric Reliability Council (accessed May 30, 2008)
Kramer, J.: Is Abstraction the Key to Computing? Communications of the ACM 50(4), 37–42 (2007)
McNally, R.K., Lee, S.-W., Yavagal, D., Xiang, W.-N.: Learning the Critical Infrastructure Interdependencies Through an Ontology-Based Information System. Environment and Planning B: Planning and Design 34, 1103–1124 (2007)
Terner, M., Sutton, R., Hebert, B., Bailey, J., Gilbert, H., Jacqz, C.: Protecting Critical Infrastructure. GeoIntelligence (March 1, 2004), http://www.geointelmag.com/geointelligence/article/articleDetail.jsp?id=90043
Tolone, W.J., Xiang, W.-N., Raja, A., Wilson, D., Tang, Q., McWilliams, K., McNally, R.: Mining critical infrastructure information from municipality data sets: a knowledge-driven approach and its applications. In: Hilton, B.N. (ed.) Emerging Spatial Information Systems and Applications, pp. 310–325. Idea Group Publishing, Hershey (2006)
Sandoz, J.F.: Red Teaming: A means to Military Transformation. Report by the Institute for Defense Analyses, Alexandria Va, Advanced Warfighting Program (2001), http://handle.dtic.mil/100.2/ADA388176
Tversky, A., Kahneman, D.: Judgment Under Uncertainty: Heuristics an Bias: Bias in Judgments Reveal Some Heuristics of Thinking Under Uncertainty. Science 185, 1124–1131 (1974)
Turban, E., Aronson, J.E.: Decision Support Systems and Intelligent Systems. Prentice Hall, Upper Saddle River (2001)
Weeks, A.: A Delphi-Case Design Method for Model Validation in Critical Infrastructure Protection Modeling and Simulation, Masters Thesis, Dept of Geography and Earth Sciences, Univ. of North Carolina at Charlotte (May 2006)
Wing, J.: Viewpoint: Computational Thinking. CACM 49(3), 33–35 (2006)
Xiang, W.-N., Clarke, K.C.: The use of scenarios in land-use planning. Environment and Planning B: Planning and Design 30(6), 885–909 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blackwell, J., Tolone, W.J., Lee, SW., Xiang, WN., Marsh, L. (2009). An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-03552-4_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03551-7
Online ISBN: 978-3-642-03552-4
eBook Packages: Computer ScienceComputer Science (R0)