File:A methodology for the identification of critical locations in infrastructures (IA amethodologyfori1094537787).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 3.77 MB, MIME type: application/pdf, 114 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

A methodology for the identification of critical locations in infrastructures   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Lemon, Douglas M.
image of artwork listed in title parameter on this page
Title
A methodology for the identification of critical locations in infrastructures
Publisher
Cambridge, Massachusetts, Massachusetts Institute of Technology
Description

The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, independent and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences, Preotecting the critical infrastructures from terrorism, human generated malevolent attack directed to maximum social disruption, present an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vunerable points. The vunerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology.


Subjects:
Language English
Publication date June 2004
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
amethodologyfori1094537787
Source
Internet Archive identifier: amethodologyfori1094537787
https://archive.org/download/amethodologyfori1094537787/history/files/amethodologyfori1094537787.pdf.%7E9%7E

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current05:01, 14 July 2020Thumbnail for version as of 05:01, 14 July 20201,275 × 1,650, 114 pages (3.77 MB) (talk | contribs)FEDLINK - United States Federal Collection amethodologyfori1094537787 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #6114)

Metadata