Critical Infrastructures: The Operational Environment in Cases of Severe Disruption
Abstract
:1. Introduction
2. Critical Infrastructure as the Foundation of Normality and Security
2.1. Producing the Mundane
2.2. Criticality of Infrastructures
2.3. Interdependencies
2.4. Systemic Resilience
3. Methodology
4. Critical Infrastructure in the Face of Severe Disruptions
4.1. Disruption Requires an Innovative Search for Resources and Competencies
“This isn’t only for the police, but it is for multiple authorities. Even if there was a crime committed and that belongs in police jurisdiction there is still stuff that concerns public health, social services and what not. This would require all sorts of arrangements. I mean, this whole [city district] would be uninhabitable. And public health services, one hospital cannot cope with all these patients. This would require a collaborative effort from several authorities to get people to some habitable place.”
“112 [emergency number] will probably be congested just by the relevant phone calls, as there will be so many of them. And then the capacity, I have to get back to the fact that there is no such resource that if in real life an area of this size was badly polluted that there would be any chance to have a system to treat the patients. […] Of course, there are antidotes for the poison, but how quickly can they be taken into use, well, I suspect it won’t be very quick.”
“In these situations, there’s a need to make big decisions very rapidly. Prohibition of water use, closing water taps, moving people, full mandatory evacuation at some point … well, I wouldn’t want to be the one making these decisions.”
4.2. Shared Situational Awareness and Collaborative Sense-Making Are a Necessity
“It would be absolutely essential that we could make the right conclusions. After the right conclusions have been made, it is a different story what happens then. But the point is how to reach the [conclusions], you will most definitely need information from other actors. […] Once we have formed the right situation picture and awareness only then can action proceed and the right measures be taken. Before that it is quite unclear.”
“This comes down to the fact of how well the cooperation between the healthcare, the police and the rescue has been built, so that a situation picture can be formed. Environmental health [department], water utility, all these [actors].”
“And then, how can this be identified as regional or local. So, how do different provinces and hospital districts talk to each other? So, the formation of a kind of nationwide picture of this, on top of everything.”
“This is an important question. We have been thinking about this a lot in our organization. Should an authority that is generally responsible for leadership in the situation be sharing its own situation picture or an overall shared situation picture? If it shares its own picture, other actors may not understand anything about it. [...] When every sector has their own language (and mode of action) that others do not understand. It would be good to get them into understandable language and to all the important actors. But it really requires that you are in touch with each other and talk about what the situation actually is. If one authority, let’s say rescue, tries to make a situation picture of its own, then it goes down the drain.”
“If we are now thinking about the health side of things, for example. When in a situation described by the scenario, the patient is brought in, so he trusts that information will not be revealed, but that health issues are kept secret. There may be a big threshold to give out information.”
“And what really interferes with much of the cooperation, even between authorities, are these privacy protections; they cannot share information about people with each other. It is a continuous problem, especially in major accidents. Help does not reach those in need because of these information security challenges.”
4.3. Threats against the Cyber Domain Have Increasingly Serious Repercussions in Urban Environments
“There was recently this one case where a boiler had supposedly been hacked. But in reality the case was that the boiler was directly connected to the Internet, and when it was online, a malware that scanned only IoTs with vulnerabilities, got access to the boiler and started a denial-of-service attack on the other side of the world. And as the boiler is not designed for that, it crashed. So, there needs to be no direct cyber influence on the boiler, but it can still be involved with something else inadvertently. And the big problem is that when the number of devices online is growing so damn fast, and no manufacturer of refrigerators has probably done any software before, they are bound to repeat the mistakes made by IT experts a long time ago. So the quality of the software can go back to the beginning of the 1990s and all the same basic problems will return. Then we have a terrible pile of crappy devices. And, as a result of these enormous amounts of devices, the attack potential will become huge. Denial-of-service attacks can be made with a large number of inefficient devices.”
4.4. Potential Terrorist Target
“As a citizen, I think that this would cause such horror. When there is no clear cause [of illnesses and deaths] known, then that is the most horrible situation. And the doubt of whether I can count on the authorities to tell me the truth. One starts to doubt everything. [...] Then the rumors break out that this is terrorism or what is it?”
“Yes, this is a really tricky case, even though one could identify the toxic substance, but to identify the cause to be able to do something about it. But the reason behind it will also impact what is to be done, what to prepare for and what places to protect.”
“The nasty thing when dealing with human beings is that if they don’t get caught, then they can continue. In that sense, the cause does not disappear before that person has been found.”
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- UN (United Nations). World Urbanization Prospects: The 2018 Revision, Key Facts. 2018. Available online: https://population.un.org/wup/Publications/Files/WUP2018-KeyFacts.pdf (accessed on 10 November 2018).
- Riffat, S.; Powell, R.; Aydin, D. Future cities and environmental sustainability. Future Cities Environ. 2016, 2, 1–23. [Google Scholar] [CrossRef]
- Palei, T. Assessing the Impact of Infrastructure on Economic Growth and Global Competitiveness. Procedia Econ. Finance 2015, 23, 168–175. [Google Scholar] [CrossRef]
- Bell, S. Engineers, Society, and Sustainability. In Synthesis Lectures on Engineers, Technology, and Society; Morgan & Claypool Publishers: San Rafael, CA, USA, 2011; ISBN 978-1-6084-5790-8. [Google Scholar]
- National Research Council. Sustainable Critical Infrastructure Systems: A Framework for Meeting 21st Century Imperatives; National Academies Press: Washington, DC, USA, 2009; ISBN 978-0-309-13792-8. [Google Scholar]
- Hay, A.H.; Willibald, S. Making Resilience Accessible. Access: An Enabler of Community Resilience. Southern Harbour. 2017. Available online: https://www.southernharbour.net/assets/docs/SH_Access%20WhitePaper_2017_0307%C6%92.pdf (accessed on 14 January 2019).
- Hay, A. Surviving catastrophic events: Stimulating community resilience. In Infrastructure Risk and Resilience: Transportation; IET: Stevenage, UK, 2013; pp. 41–46. [Google Scholar]
- Helbing, D. Globally networked risks and how to respond. Nature 2013, 497, 51–59. [Google Scholar] [CrossRef] [PubMed]
- Petersen, L.; Fallou, L.; Reilly, P.; Serafinelli, E. Public expectations of critical infrastructure operators in times of crisis. Sustain. Resil. Infrastruct. 2018. [Google Scholar] [CrossRef]
- Lay, E.; Branlat, M. Noticing Brittleness, Designing for Resilience. In Becoming Resilient: Resilience Engineering in Practice; Nemeth, C.P., Hollnagel, E., Eds.; Ashgate: Farnham, UK, 2014; Volume 2, pp. 139–155. ISBN 9781472425164. [Google Scholar]
- Brassett, J.; Vaughan-Williams, N. Security and the performative politics of resilience: Critical infrastructure protection and humanitarian emergency preparedness. Secur. Dialogue 2015, 46, 32–50. [Google Scholar] [CrossRef]
- Berkes, F.; Ross, H. Community Resilience: Toward and Integrated Approach. Soc. Nat. Resour. 2013, 26, 5–20. [Google Scholar] [CrossRef]
- Saunders, W.S.A.; Becker, J.S. A discussion of resilience and sustainability: Land use planning recovery from the Canterbury earthquake sequence, New Zealand. Int. J. Disaster Risk Reduct. 2015, 14, 73–81. [Google Scholar] [CrossRef]
- Coward, M. Between us in the City: Materiality, Subjectivity, and Community in the Era of Global Urbanization. Environ. Plan. D Soc. Space 2012, 30, 468–481. [Google Scholar] [CrossRef]
- Koppel, T. Lights Out: A Cyberattack, a Nation Unprepared, Surviving the Aftermath; Crown Publishers: New York, NY, USA, 2015; ISBN 978-0-553-41996-2. [Google Scholar]
- Smelser, N.J. The Faces of Terrorism. Social and Psychological Dimensions; Princeton University Press: Princeton, NJ, USA, 2007; ISBN 978-0-691-13308-9. [Google Scholar]
- Coaffee, J. Terrorism, Risk and the Global City. Towards Urban Resilience; Ashgate: Farnham, UK, 2009; ISBN 978-0-7546-9046-7. [Google Scholar]
- Kachali, H.; Storsjö, I.; Haavisto, I.; Kovács, G. Inter-sectoral preparedness and mitigation for networked risks and cascading effects. Int. J. Disaster Risk Reduct. 2018, 30, 281–291. [Google Scholar] [CrossRef]
- Pescaroli, G. Perceptions of cascading risk and interconnected failures in emergency planning: Implications for operational resilience and policy making. Int. J. Disaster Risk Reduct. 2018, 30, 269–280. [Google Scholar] [CrossRef]
- Pescaroli, G.; Nones, M.; Galbusera, L.; Alexander, D. Understanding and mitigating cascading crises in the global interconnected system. Int. J. Disaster Risk Reduct. 2018, 30, 159–163. [Google Scholar] [CrossRef]
- Chang, S.E.; McDaniels, T.; Fox, J.; Dhariwal, R.; Longstaff, H. Toward Disaster-Resilient Cities: Characterizing Resilience of Infrastructure Systems with Expert Judgments. Risk Anal. 2014, 34, 416–434. [Google Scholar] [CrossRef] [PubMed]
- Luiijf, E.; Klaver, M. Insufficient situational awareness about critical infrastructures by emergency management. In Proceedings of the NATIO Symposium on C31 for Crisis, Emergency and Consequence Management, Bucharest, Romania, 11–12 May 2009; pp. 1–10. [Google Scholar]
- Boin, A.; McConnell, A. Preparing for Critical Infrastructure Breakdowns. J. Conting. Crisis Manag. 2007, 15, 50–59. [Google Scholar] [CrossRef]
- Edwards, P.N.; Jackson, S.J.; Bowker, G.C.; Williams, R. Introduction: An Agenda for Infrastructure Studies. J. Assoc. Inf. Syst. 2009, 10, 364–374. [Google Scholar] [CrossRef]
- Shove, E.; Watson, M.T.; Spurling, N. Conceptualising connections: Energy demand, infrastructures and social practices. Eur. J. Soc. Theory 2015, 18, 274–287. [Google Scholar] [CrossRef]
- Hand, M.; Shove, E.; Southerton, D. Explaining Showering: A Discussion of the Material, Conventional, and Temporal Dimensions of Practice. Sociol. Res. Online 2005, 10. [Google Scholar] [CrossRef]
- Langdon, M.; Gillott, M.; Rodrigues, L.; Parry, T. The case for internalising externalities in a sustainable rail asset base. Infrastruct. Asset Manag. 2016, 3, 97–105. [Google Scholar] [CrossRef]
- Ramaswamy, V.; Ozcan, K. The Co-creation Paradigm; Stanford University Press: Redwood City, CA, USA, 2014; ISBN 978-0-8047-9075-8. [Google Scholar]
- Graham, S.; McFarlane, C. Infrastructural Lives: Urban Infrastructure in Context; Routledge: Oxon, UK, 2015; ISBN 978-1-315-77509-8. [Google Scholar]
- Trentmann, F. Disruption is normal: Blackouts, Breakdowns and the Elasticity of Everyday Life. In Time, Consumption and Everyday Life. Practice, Materiality and Culture; Shove, E., Trentmann, F., Wilk, R., Eds.; Berg: Oxford, UK, 2009; pp. 67–84. ISBN 978-184788-365-0. [Google Scholar]
- NIPP. Partnering for Critical Infrastructure Security and Resilience. Homeland Security. 2013. Available online: https://www.dhs.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdf (accessed on 10 January 2019).
- Fekete, A. Common criteria for the assessment of critical infrastructures. Int. J. Disaster Risk Sci. 2011, 2, 15–24. [Google Scholar] [CrossRef]
- Katina, P.F.; Hester, P.T. Systemic determination of infrastructure criticality. Int. J. Crit. Infrastruct. 2013, 9, 211–225. [Google Scholar] [CrossRef]
- Fjäder, C.O. National Security in Hyper-connected World. In Exploring the Security Landscape: Non-Traditional Security Challenges; Masys, A.J., Ed.; Springer International Publishing: Cham, Switzerland, 2016; pp. 31–58. ISBN 978-3-319-27914-5. [Google Scholar]
- Riedman, D. Questioning the Criticality of Critical Infrastructure: A Case Study Analysis. Homeland Security Affairs. 2016, Volume 12. Available online: https://www.hsaj.org/articles/10578 (accessed on 14 January 2019).
- The Criminal Code of Finland 39/1889, Amendments up to 766/2015 Included (Translation from Finnish). FINLEX Database, Ministry of Justice. Available online: https://www.finlex.fi/en/laki/kaannokset/1889/en18890039_20150766.pdf (accessed on 10 January 2019).
- Alinizzi, M.; Chen, S.; Labi, S.; Kandil, A. A Methodology to Account for One-Way Infrastructure Interdependency in Preservation Activity Scheduling. Comput.-Aided Civil Infrastruct. Eng. 2018, 33, 905–925. [Google Scholar] [CrossRef]
- Pescaroli, G.; Alexander, D. A definition of cascading disasters and cascading effects: Going beyond the “toppling dominos” metaphor. Planet@Risk 2015, 2, 58–67. [Google Scholar]
- Critical Foundations. Protecting America’s Infrastructures: The Report of the President’s Commission on Critical Infrastructure Protection. 1997. Available online: https://fas.org/sgp/library/pccip.pdf (accessed on 10 January 2019).
- Peerenboom, J.P.; Fisher, R.E. System and sector interdependencies: An overview. In Wiley Handbook of Science and Technology for Homeland Security; Voeller, J.G., Ed.; John Wiley & Sons: Hoboken, NJ, USA, 2010; pp. 1161–1171. ISBN 978-0-471-76130-3. [Google Scholar]
- Macaulay, T. Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies; CRC Press: Boca Raton, FL, USA, 2009; ISBN 9781420068351. [Google Scholar]
- Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Control Systems, IEEEIdentifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Syst. 2001, 21, 11–25. [Google Scholar] [CrossRef]
- Haimes, Y.Y. Modeling and Managing Interdependent Complex Systems of Systems; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2019; ISBN 9781119173700. [Google Scholar]
- Maier, M.W. Architecting Principles for System of Systems. Syst. Eng. 1998, 1, 267–284. [Google Scholar] [CrossRef]
- Thissen, W.A.H.; Herder, P.M. System of Systems Perspectives on Infrastructures. In System of Systems Engineering. Innovations for the 21st Century; Jamshidi, M., Ed.; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2009; pp. 257–274. ISBN 978-0-470-19590. [Google Scholar]
- Eusgeld, I.; Nan, C.; Dietz, S. “System-of-systems” approach for interdependent critical infrastructures. Reliab. Eng. Syst. Saf. 2011, 96, 679–686. [Google Scholar] [CrossRef]
- Xu, T.; Masys, A.J. Critical Infrastructure Vulnerabilities: Embracing a Network Mindset. In Exploring the Security Landscape: Non-Traditional Security Challenges; Masys, A.J., Ed.; Springer International Publishing: Cham, Switzerland, 2016; pp. 177–194. ISBN 978-3-319-27914-5. [Google Scholar]
- Pescaroli, G.; Alexander, D. Critical infrastructure, panarchies and the vulnerability paths of cascading disasters. Nat. Hazards 2016, 82, 175–192. [Google Scholar] [CrossRef]
- Korkali, M.; Veneman, J.G.; Tivnan, B.F.; Bagrow, J.P.; Hines, D.H. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence. Sci. Rep. 2017, 7, 44499. [Google Scholar] [CrossRef]
- Bennett, B.T. Understanding, Assessing, and Responding to Terrorism. Protecting Critical Infrastructure and Personnel; John Wiley & Sons: Hoboken, NJ, USA, 2007; ISBN 978-0-471-77152-4. [Google Scholar]
- Dobson, I. Analysis of cascading infrastructure failures. In Wiley Handbook of Science and Technology for Homeland Security; Voeller, J.G., Ed.; John Wiley & Sons: Hoboken, NJ, USA, 2010; pp. 1334–1343. ISBN 978-0-471-76130-3. [Google Scholar]
- Folke, C. Resilience: The emergence of a perspective for social-ecological systems analyses. Glob. Environ. Chang. 2006, 16, 253–267. [Google Scholar] [CrossRef]
- Little, R.G. Controlling Cascading Failure: Understanding the Vulnerabilities of Interconnected Infrastructures. J. Urban Technol. 2002, 9, 109–123. [Google Scholar] [CrossRef]
- Rodina, L. Defining “water resilience”: Debates, concepts, approaches, and gaps. WIREs Water 2018. [Google Scholar] [CrossRef]
- Masys, A.J. Critical Infrastructure and Vulnerability: A Relational Analysis through Actor Network Theory. In Networks and Network Analysis for Defence and Security; Masys, A.J., Ed.; Springer: Cham, Switzerland, 2014; pp. 265–280. ISBN 978-3-319-04147-6. [Google Scholar]
- Maurino, D.E.; Reason, J.; Johnston, N.; Lee, R.B. Beyond Aviation Human Factors; Routledge: New York, NY, USA, 2016; ISBN 978-1840149487. [Google Scholar]
- Alpaslan, C.M.; Mitroff, I.I. Swans, Swine, and Swindlers. Coping with the Growing Threat of Mega-Crises and Mega-Messes; Stanford University Press: Stanford, CA, USA, 2011; ISBN 978-0-8047-7137-5. [Google Scholar]
- Alexander, D. A magnitude scale for cascading disaster. Int. J. Disaster Risk Reduct. 2018, 30, 180–185. [Google Scholar] [CrossRef]
- Security Strategy for Society: Government Resolution; The Security Committee: Helsinki, Finland, 2017; ISBN 978-951-25-2963-6.
- National Risk Assessment 2015; Ministry of the Interior Publication: Helsinki, Finland, 2016; ISBN 978-952-324-060-5.
- Branders, M. Kokonainen Turvallisuus? Kokonaisturvallisuuden Poliittinen Kelpoisuus ja Hallinnollinen Toteutettavuus. Doctoral Dissertation; Tampere University Press: Tampere, Finland, 2016; ISBN 978-951-44-9996-8. [Google Scholar]
- Yin, R.K. Qualitative Research from Start to Finish; Guilford Press: New York, NY, USA, 2011; ISBN 978-1-60623-701-4. [Google Scholar]
- Graham, S.; Marvin, S. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition; Routledge: London, UK, 2001; ISBN 0-203-45220-8. [Google Scholar]
- Pursiainen, C. Critical infrastructure resilience: A Nordic model in the making? Int. J. Disaster Risk Reduct. 2018, 27, 632–641. [Google Scholar] [CrossRef]
- Baber, C.; McMaster, R. Grasping the Moment. Sensemaking in Response to Routine Incidents and Major Emergencies; CRC Press: Boca Raton, FL, USA, 2016; ISBN 978-1-4724-7080-5. [Google Scholar]
- Boin, A.; Smith, D. Terrorism and Critical Infrastructures: Implications for Public–Private Crisis Management. Public Money Manag. 2006, 26, 295–304. [Google Scholar] [CrossRef]
- Lewis, T.G. Infrastructure Protection in Homeland Security. Defending a Networked Nation; John Wiley & Sons: Hoboken, NJ, USA, 2006; ISBN 978-0-471-78954-3. [Google Scholar]
- Brenner, J.F. Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bull. At. Sci. 2013, 69, 15–20. [Google Scholar] [CrossRef]
- Clarke, R.A.; Knake, R.K. Cyber War: The Next Threat to National Security and What to Do About It; Harper Collins: New York, NY, USA, 2010; ISBN 978-0-0619-6224-0. [Google Scholar]
- Dengg, A.; Schurian, M.N. On the Concept of Hybrid Threats. In Networked Insecurity—Hybrid Threats in the 21st Century; Schriftenreihe der Landesverteidigungsakademie: Vienna, Austria, 2016; pp. 25–80. ISBN 978-3-903121-01-0. [Google Scholar]
- Steele, W.E.; Hussey, K.; Dovers, S. What´s Critical about Critical Infrastructure? Urban Policy Res. 2017, 35, 74–86. [Google Scholar] [CrossRef]
- Braithwaite, A. The Logic of Public Fear in Terrorism and Counter-terrorism. J. Police Crim. Psychol. 2013, 28, 95–101. [Google Scholar] [CrossRef]
- Neumann, P.R.; Smith, M.L.R. The Strategy of Terrorism. How it Works, and Why it Fails; Routledge: London, UK, 2008; ISBN 978-0-203-93700-6. [Google Scholar]
- Friedland, N.; Merari, A. The psychological impact of terrorism: A double-edged sword. Polit. Psychol. 1985, 6, 591–604. [Google Scholar] [CrossRef]
- Zoli, C.; Steinberg, L.J.; Grabowski, M.; Hermann, M. Terrorist critical infrastructures, organizational capacity and security risk. Saf. Sci. 2018, 110, 121–130. [Google Scholar] [CrossRef]
- Barker, J. The No-Nonsense Guide to Terrorism; New Internationalist Publications: London, UK, 2003; ISBN 1-85984-433-2. [Google Scholar]
- Cinturati, F. The Bioterrorism Act and Water Utilities Protection: How to Proceed from Policy to Practice. J. Appl. Secur. Res. 2014, 9, 97–108. [Google Scholar] [CrossRef]
- Ranstorp, M.; Normark, M. Detecting CBRN terrorism signatures—Challenges and new approaches. In Unconventional Weapons and International Terrorism. Challenges and New Approaches; Ranstorp, M., Normark, M., Eds.; Routledge: New York, NY, USA, 2009; pp. 1–10. ISBN 978-0-203-88195-8. [Google Scholar]
- Meinhardt, P.L. Water and Bioterrorism: Preparing for the Potential Threat to U.S. Water Supplies and Public Health. Annu. Rev. Public Health 2005, 26, 213–237. [Google Scholar] [CrossRef] [PubMed]
- Ginsberg, M.D.; Hock, V.F. Terrorism and security of water distribution systems: A primer. Def. Secur. Anal. 2004, 20, 373–380. [Google Scholar] [CrossRef]
- Glass, T.A.; Schoch-Spana, M. Bioterrorism and the People: How to Vaccinate a City against Panic. Clin. Infect. Dis. 2002, 34, 217–223. [Google Scholar] [CrossRef] [PubMed]
- Boin, A.; Lagadec, P.; Michel-Kerjan, E.; Overdijk, W. Critical Infrastructures under Threat: Learning from the Anthrax Scare. J. Conting. Crisis Manag. 2003, 11, 99–104. [Google Scholar] [CrossRef]
- Schmid, A.P. Introduction. In The Routledge Handbook of Terrorism Research; Schmid, A.P., Ed.; Routledge: New York, NY, USA, 2011; pp. 1–38. ISBN 0-203-82873-9. [Google Scholar]
- Jordán, F. Predicting target selection by terrorists: A network analysis of the 2005 London underground attacks. Int. J. Crit. Infrastruct. Prot. 2008, 4, 206–214. [Google Scholar] [CrossRef]
- Richardson, L. What Terrorists Want. Understanding the Enemy, Containing the Threat; Random House: New York, NY, USA, 2007; ISBN 978-0-8129-7544-4. [Google Scholar]
- Horgan, J. The Psychology of Terrorism; Routledge: New York, NY, USA, 2005; ISBN 0-203-49696-5. [Google Scholar]
- Gunaratna, R. Global Threat Forecast. Count. Terror. Trends Anal. 2017, 9, 3–11. [Google Scholar]
- Hesterman, J. Soft Target Hardening. Protecting People from Attack; CRC Press: Boca Raton, FL, USA, 2015; ISBN 978-1-4822-4422-9. [Google Scholar]
- Graham, B.; Talent, J.; Allison, G.; Cleveland, R.; Rademaker, S.; Roemer, T.; Sherman, W.; Sokolski, H.; Verma, R. World at Risk. The Report of the Commission on the Prevention of WMD Proliferation and Terrorism; Vintage Books: New York, NY, USA, 2008; ISBN 978-0-307-47326-4. [Google Scholar]
- Gurr, N.; Cole, B. The New Face of Terrorism. Threats from Weapons of Mass Destruction; I.B. Tauris Publishers: London, UK, 2002; ISBN 1-86064-825-8. [Google Scholar]
- Maiolo, M.; Pantusa, D. Infrastructure Vulnerability Index of drinking water systems to terrorist attacks. Cogent Eng. 2018, 5, 1–21. [Google Scholar] [CrossRef]
- Monroe, J.; Ramsey, E.; Berglund, E. Allocating countermeasures to defend water distribution systems against terrorist attack. Reliab. Eng. Syst. Saf. 2018, 179, 37–51. [Google Scholar] [CrossRef]
- Achour, N.; Pantzartzis, E.; Pascale, F.; Price, A.D.F. Integration of resilience and sustainability: From theory to application. Int. J. Disaster Resil. Built. Environ. 2015, 6, 347–362. [Google Scholar] [CrossRef]
- Romero-Lankao, P.; Gnatz, D.M.; Wilhelmi, O.; Hayden, M. Urban Sustainability and Resilience: From Theory to Practice. Sustainability 2016, 8, 1224. [Google Scholar] [CrossRef]
- Thurlby, R.; Warren, K. Understanding and managing the threat of disruptive events to the critical national infrastructure. J. Facil. Manag. 2014, 12, 231–246. [Google Scholar] [CrossRef]
- Simon, J.D. Lone Wolf Terrorism. Understanding the Growing Threat; Prometheus Books: New York, NY, USA, 2016; ISBN 9781633882379. [Google Scholar]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Heino, O.; Takala, A.; Jukarainen, P.; Kalalahti, J.; Kekki, T.; Verho, P. Critical Infrastructures: The Operational Environment in Cases of Severe Disruption. Sustainability 2019, 11, 838. https://doi.org/10.3390/su11030838
Heino O, Takala A, Jukarainen P, Kalalahti J, Kekki T, Verho P. Critical Infrastructures: The Operational Environment in Cases of Severe Disruption. Sustainability. 2019; 11(3):838. https://doi.org/10.3390/su11030838
Chicago/Turabian StyleHeino, Ossi, Annina Takala, Pirjo Jukarainen, Joanna Kalalahti, Tuula Kekki, and Pekka Verho. 2019. "Critical Infrastructures: The Operational Environment in Cases of Severe Disruption" Sustainability 11, no. 3: 838. https://doi.org/10.3390/su11030838