Skip to main content

An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5508))

Abstract

One widely perceived yet poorly understood phenomenon in the practice of critical infrastructure protection is that of blind spots. These are certain aspects of the interrelationships among different critical infrastructure systems (CI systems) that could trigger catastrophe across CI systems but are concealed from planners, and discovered only in the aftermath of a crisis. In this paper, we discuss the sources of blind spots, and explore the feasibility of various techniques to help reveal blind spots.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blind Spot, http://en.wikipedia.org/wiki/File:Blind_spot.JPG

  2. Fonseca, F., Camara, G., Monteiro, A.: A Framework for Measuring the Interoperability of Geo-Ontologies. Spatial Cognition and Computation 6(4), 307–329 (2001)

    Google Scholar 

  3. Garrick, J.: Perspectives on the use of risk assessment to address terrorism. Risk Analysis 22(3), 421–423 (2002)

    Article  Google Scholar 

  4. The Naitonal Strategy for Homeland Security. The office of Homeland Security (July 2002), http://www.whitehouse.gov/homeland/book/nat_strat_hls.pdf (accesed May 30, 2008)

  5. Frank, A.U.: Tiers of Ontology and Consistency Constraints in Geographic Information Systems. International Journal of Geographical Information Science 15(7), 667–678 (2001)

    Article  Google Scholar 

  6. ICF Consulting. The Economic Cost of the Blackout: An issue paper on the Northeast Blackout (August 14, 2003), http://www.solarstorms.org/ICFBlackout2003.pdf (accessed May 31, 2008)

  7. IWS. NERC Welcomes U.S.-Canada Power System Task Force Final Report. Published April 6, 2004 by the North American Electric Reliability Council (accessed May 30, 2008)

    Google Scholar 

  8. Kramer, J.: Is Abstraction the Key to Computing? Communications of the ACM 50(4), 37–42 (2007)

    Article  Google Scholar 

  9. McNally, R.K., Lee, S.-W., Yavagal, D., Xiang, W.-N.: Learning the Critical Infrastructure Interdependencies Through an Ontology-Based Information System. Environment and Planning B: Planning and Design 34, 1103–1124 (2007)

    Article  Google Scholar 

  10. Terner, M., Sutton, R., Hebert, B., Bailey, J., Gilbert, H., Jacqz, C.: Protecting Critical Infrastructure. GeoIntelligence (March 1, 2004), http://www.geointelmag.com/geointelligence/article/articleDetail.jsp?id=90043

  11. Tolone, W.J., Xiang, W.-N., Raja, A., Wilson, D., Tang, Q., McWilliams, K., McNally, R.: Mining critical infrastructure information from municipality data sets: a knowledge-driven approach and its applications. In: Hilton, B.N. (ed.) Emerging Spatial Information Systems and Applications, pp. 310–325. Idea Group Publishing, Hershey (2006)

    Google Scholar 

  12. Sandoz, J.F.: Red Teaming: A means to Military Transformation. Report by the Institute for Defense Analyses, Alexandria Va, Advanced Warfighting Program (2001), http://handle.dtic.mil/100.2/ADA388176

  13. Tversky, A., Kahneman, D.: Judgment Under Uncertainty: Heuristics an Bias: Bias in Judgments Reveal Some Heuristics of Thinking Under Uncertainty. Science 185, 1124–1131 (1974)

    Article  Google Scholar 

  14. Turban, E., Aronson, J.E.: Decision Support Systems and Intelligent Systems. Prentice Hall, Upper Saddle River (2001)

    Google Scholar 

  15. Weeks, A.: A Delphi-Case Design Method for Model Validation in Critical Infrastructure Protection Modeling and Simulation, Masters Thesis, Dept of Geography and Earth Sciences, Univ. of North Carolina at Charlotte (May 2006)

    Google Scholar 

  16. Wing, J.: Viewpoint: Computational Thinking. CACM 49(3), 33–35 (2006)

    Article  Google Scholar 

  17. Xiang, W.-N., Clarke, K.C.: The use of scenarios in land-use planning. Environment and Planning B: Planning and Design 30(6), 885–909 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blackwell, J., Tolone, W.J., Lee, SW., Xiang, WN., Marsh, L. (2009). An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03552-4_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03551-7

  • Online ISBN: 978-3-642-03552-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics