Reference Hub5
Critical Infrastructure as Complex Emergent Systems

Critical Infrastructure as Complex Emergent Systems

Ted G. Lewis, Thomas J. Mackin, Rudy Darken
Copyright: © 2011 |Volume: 1 |Issue: 1 |Pages: 12
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781613506295|DOI: 10.4018/ijcwt.2011010101
Cite Article Cite Article

MLA

Lewis, Ted G., et al. "Critical Infrastructure as Complex Emergent Systems." IJCWT vol.1, no.1 2011: pp.1-12. http://doi.org/10.4018/ijcwt.2011010101

APA

Lewis, T. G., Mackin, T. J., & Darken, R. (2011). Critical Infrastructure as Complex Emergent Systems. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 1-12. http://doi.org/10.4018/ijcwt.2011010101

Chicago

Lewis, Ted G., Thomas J. Mackin, and Rudy Darken. "Critical Infrastructure as Complex Emergent Systems," International Journal of Cyber Warfare and Terrorism (IJCWT) 1, no.1: 1-12. http://doi.org/10.4018/ijcwt.2011010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The United States Department of Homeland Security (DHS) charge is to, “Build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation’s CIKR …” using an all-hazards approach. The effective implementation of this strategy hinges on understanding catastrophes and their potential effect on the functioning of infrastructure. Unfortunately, there has been no unifying theory of catastrophe to guide decision-making, preparedness, or response. In this paper, the authors present a framework based on network science and normal accident theory that can be used to guide policy decisions for homeland security. They show that exceedance probability encompasses operational definitions of risk and resilience and provides a unifying policy framework for homeland security investments. Such an approach allows one to classify hazards as ‘high’ or ‘low’ risk, according to the resiliency exponent, and guide investments toward prevention or response. This framework is applied to cyber exploits and electric power grid systems to illustrate its generality.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.