932 research outputs found

    Seeing the invisible: from imagined to virtual urban landscapes

    Get PDF
    Urban ecosystems consist of infrastructure features working together to provide services for inhabitants. Infrastructure functions akin to an ecosystem, having dynamic relationships and interdependencies. However, with age, urban infrastructure can deteriorate and stop functioning. Additional pressures on infrastructure include urbanizing populations and a changing climate that exposes vulnerabilities. To manage the urban infrastructure ecosystem in a modernizing world, urban planners need to integrate a coordinated management plan for these co-located and dependent infrastructure features. To implement such a management practice, an improved method for communicating how these infrastructure features interact is needed. This study aims to define urban infrastructure as a system, identify the systematic barriers preventing implementation of a more coordinated management model, and develop a virtual reality tool to provide visualization of the spatial system dynamics of urban infrastructure. Data was collected from a stakeholder workshop that highlighted a lack of appreciation for the system dynamics of urban infrastructure. An urban ecology VR model was created to highlight the interconnectedness of infrastructure features. VR proved to be useful for communicating spatial information to urban stakeholders about the complexities of infrastructure ecology and the interactions between infrastructure features.https://doi.org/10.1016/j.cities.2019.102559Published versio

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Security aspects of SCADA and DCS environments

    Get PDF
    Abstract SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected. Currently, these systems include in their network designs different types of Information and Communication Technology systems (such as the Internet and wireless technologies), not only to modernize operational processes but also to ensure automation and real-time control. Nonetheless, the use of these new technologies will bring new security challenges, which will have a significant impact on both the business process and home users. Therefore, the main purpose of this Chapter is to address these issues and to analyze the interdependencies of Process Control Systems with ICT systems, to discuss some security aspects and to offer some possible solutions and recommendations

    Scenario-based portfolio model for building robust and proactive strategies

    Get PDF
    In order to address major changes in the operational environment, companies can (i) define scenarios that characterize different alternatives for this environment, (ii) assign probabilities to these scenarios, (iii) evaluate the performance of strategic actions across the scenarios, and (iv) choose those actions that are expected to perform best. In this paper, we develop a portfolio model to support the selection of such strategic actions when the information about scenario probabilities is possibly incomplete and may depend on the selected actions. This model helps build a strategy that is robust in that it performs relatively well in view of all available probability information, and proactive in that it can help steer the future as reflected by the scenarios toward the desired direction. We also report a case study in which the model helped a group of Nordic, globally operating steel and engineering companies build a platform ecosystem strategy that accounts for uncertainties related to markets, politics, and technological development

    Enhanced mobile computing using cloud resources

    Get PDF
    Summary in English.Includes bibliographical references.The purpose of this research is to investigate, review and analyse the use of cloud resources for the enhancement of mobile computing. Mobile cloud computing refers to a distributed computing relationship between a resource-constrained mobile device and a remote high-capacity cloud resource. Investigation of prevailing trends has shown that this will be a key technology in the development of future mobile computing systems. This research presents a theoretical analysis framework for mobile cloud computing. This analysis framework is a structured consolidation of the salient considerations identified in recent scientific literature and commercial endeavours. The use of this framework in the analysis of various mobile application domains has elucidated several significant benefits of mobile cloud computing including increases in system performance and efficiency. Based on recent scientific literature and commercial endeavours, various implementation approaches for mobile cloud computing have been identified, categorized and analysed according to their architectural characteristics. This has resulted in a set of advantages and disadvantages for each category of system architecture. Overall, through the development and application of the new analysis framework, this work provides a consolidated review and structured critical analysis of the current research and developments in the field of mobile cloud computing

    Criticality of infrastructure networks under consideration of resilience-based maintenance strategies using the example of inland waterways

    Get PDF
    Transportation infrastructures as backbone of modern, globalized, and networked societies ensure flows of people and goods and thus sustain social and economic prosperity. Concurrently, more and more infrastructure construction assets are facing the problem of systematic obsolescence due to deficient structural conditions, maintenance backlogs, and a lack of or misallocation of resources for the construction and maintenance of infrastructure buildings. This problem construct necessitates a resilience-based maintenance strategy for the asset portfolio. In particular, inland navigation as a mode of transport features large transport volumes and few redundancies. Combined with its increasing importance due to its comparatively high environmental friendliness, a predestined, yet in the literature underrepresented research subject results. This dissertation aims to investigate essential factors of infrastructure management and thereby identify the potential for improvement in the complex construct of maintenance management and related areas. The emphasis is on enhancing the resilience of inland waterways as a complex System-of-Systems with all its interdependencies. Thus, a holistic risk and resilience assessment is essential and is underlined with the aspects infrastructure availability and business decisions (Study A, B, C and D) and stakeholder communication and risk analysis (Study E, F, G) which are addressed by seven studies published as companion articles. Study A deals with assessing the reliability of transport infrastructure networks as part of supply chains, highlighting the importance of available and thus maintained infrastructure assets for functioning supply chains. Study B aims to identify critical warning times before closures of transport infrastructure networks and therefore suggests a mixed-methods approach, making it possible to derive and evaluate critical thresholds. Study C examines the corresponding company decisions, i.e., decisions as reaction towards neglected maintenance of public transport infrastructure, which comprises risk coping strategies, examined by empirical investigations. Study D extends this problem observation by showing that companies could see incentives for outsourcing if they face a lack of access to available transport infrastructure. Hence, the study analyzes facility relocation problems in dependence on infrastructure availability. Study E heads toward stakeholder communication and risk analysis and examines the processes across stakeholders, using an approach of collaborative serious gaming, which simultaneously enhances situation awareness and communication among stakeholders. Study F provides the implementation of a systemic approach and its visualization as a GIS-based risk dashboard, shedding light on interdependencies among critical infrastructures and cascading effects. Study G closes with an examination of the evaluation of the potential of infrastructure funds. For this purpose, the study conducts an online survey to determine investors’ willingness to pay for various fund mechanisms, integrating the option of private coverage. Despite the geographic focus of the case studies on Germany, valuable insights can be gained for infrastructure management that can also apply to other countries. In addition to the case study findings, general recommendations for infrastructure owners are derived. As a result, it can be stated that it is essential that maintenance strategies have to be more resilience-based than traditional strategies, which are mainly based on fixed time intervals for maintenance. Moreover, the application of both serious gaming and GIS visualization can help to enhance situation awareness and thus the resilience of infrastructure systems. An essential finding for which this dissertation provides methodological approaches is that considering the local area’s attractiveness for business locations should receive more attention regarding investment decisions. Thereby a focus should be set on the realistic threat of relocations as response to deteriorating infrastructure conditions. Eventually, public debates should strengthen the knowledge about infrastructure and its funding, while deficits in alongside mechanisms in infrastructure funding must be encountered. Consequently, this dissertation provides insights into the potential of infrastructure management. Mainly, it offers the potential to improve the resilience of the waterway transportation system and address stakeholders accordingly

    The web-based simulation and information service for multi-hazard impact chains. Design document.

    Get PDF
    The overall objective of the PARATUS project and the platform is the co-development of a web-based simulation and information service for first and second responders and other stakeholders to evaluate the impact chains of multi-hazard events with particular emphasis on cross-border and cascading impacts. This deliverable provides a first impression of the platform and its components. A central theme in the PARATUS project is the co-development of the tools with stakeholders. The central stakeholders within the four applications case studies are therefore full project partners. They will be directly involved in the development of the platform. We foresee that the PARATUS Platform will have two major blocks: an information service that provides static information (or regularly updated information) and simulation service, which is a dynamic component where stakeholders can interactively work with the tools in the platform. The PARATUS will further make sure that documentation (e.g., software accompanying documentation) is also publicly available via the project website1 and other trusted repositories. The deliverable 4.1 was submitted to the European Commission on 31/07/2023 and is waiting for approval by the Research Executive Agency. Therefore, this current version may not represent the final version of the deliverable
    • …
    corecore