8,747 research outputs found

    Incentive Regulation, Investments and Technological Change

    Get PDF
    Based on an idiosyncratic reading of the literature I propose intermediate (rather than tight or soft) regulation for balancing investment incentives with allocative efficiency and competition objectives. Intermediate regulation is compatible with incentive regulation and helps lengthening the regulatory commitment period necessary for incentives. However, such commitment for the whole time horizon of infrastructure or innovation investments is impossible. The compatibility of incentive regulation and efficient investment is thus in doubt. Incentive regulation for regular infrastructure investments therefore needs periodic updating based on rate-of-return regulation criteria. Innovative infrastructure investments may warrant regulatory holidays, which should be conditioned on strict criteria.

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
    • 

    corecore