Template-Type: ReDIF-Article 1.0 Author-Name: Lin Jiwei Author-X-Name-First: Lin Author-X-Name-Last: Jiwei Author-Name: Tai Kang Author-X-Name-First: Tai Author-X-Name-Last: Kang Author-Name: Robert Tiong Lee Kong Author-X-Name-First: Robert Tiong Lee Author-X-Name-Last: Kong Author-Name: Sim Mong Soon Author-X-Name-First: Sim Mong Author-X-Name-Last: Soon Title: Modelling critical infrastructure network interdependencies and failure Abstract: Critical infrastructures are fundamental systems that are interconnected with one another, and their interdependencies need to be modelled in order to analyse any vulnerabilities that exist in these infrastructure networks. In this work, a Leontief input-output model of the critical infrastructure systems and two physical critical infrastructure networks are developed. The input-output model serves to evaluate the interdependencies among the various infrastructure systems, while the physical infrastructure network describes the linkages within a single physical infrastructure system. This study examines the overall impact of any failures in the telecommunication infrastructure or electricity grid within the input-output interdependencies model systematically so as to evaluate the worst case scenarios based on the impact caused by one or more points of failure in the physical infrastructure. Journal: Int. J. of Critical Infrastructures Pages: 1-23 Issue: 1 Volume: 15 Year: 2019 Keywords: critical infrastructures; interdependency modelling; network analysis simulation; cascading failures; impact; worst case scenario. File-URL: http://www.inderscience.com/link.php?id=96557 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:1:p:1-23 Template-Type: ReDIF-Article 1.0 Author-Name: Ibikunle Olalekan Ogundari Author-X-Name-First: Ibikunle Olalekan Author-X-Name-Last: Ogundari Author-Name: Funso Ayotunde Otuyemi Author-X-Name-First: Funso Ayotunde Author-X-Name-Last: Otuyemi Title: Project planning and monitoring analysis for sustainable environment and power infrastructure project development in Lagos State, Nigeria Abstract: This study examined the project planning and control parameters for a public-private partnership sustainable environment and power (SEP) critical infrastructure project (waste-to-energy initiative) in Lagos State, Nigeria, taking into cognisance the state's critical infrastructure planning limitations, and the project's role as model for Nigeria's federal and state governments. State-approved project time and costs were 15 months and US$6 million dollars, respectively. Techno-economic and environmental conversion factors as well as project financial and work schedule data were obtained through literature, questionnaire and site inspection. Project assessment and earned value management (EVM) methodology were used. The results showed annual waste-to-energy generation potentials of 2.37~2.85 TWh for electricity and 4.75 TWh for district heating, electricity revenue of US$187.93~226.0 million, estimated cost at completion of $7.31 million, and estimated completion time of 17 months. The study concluded that in spite of the project being completed over budget and behind schedule, the SEP critical infrastructure project was viable and a suitable template for waste management in Nigeria. Journal: Int. J. of Critical Infrastructures Pages: 24-45 Issue: 1 Volume: 15 Year: 2019 Keywords: sustainable environment initiatives; power infrastructure; critical infrastructure; earned value management; EVM; Lagos; project planning and management; estimated completion time; estimate at completion; cost performance index; project schedule variance; Nigeria. File-URL: http://www.inderscience.com/link.php?id=96566 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:1:p:24-45 Template-Type: ReDIF-Article 1.0 Author-Name: Saswati Tripathi Author-X-Name-First: Saswati Author-X-Name-Last: Tripathi Author-Name: K. Rangarajan Author-X-Name-First: K. Author-X-Name-Last: Rangarajan Author-Name: Sumana Das Author-X-Name-First: Sumana Author-X-Name-Last: Das Title: Quantitative and qualitative constructs of trade infrastructure in hilly regions - a case study of Himachal Pradesh, India Abstract: The globalised world order has made infrastructural development as a priority by every country. In order to increase global market participation, the developing economies commit huge investments in improving the trade infrastructure. The investment in infrastructure in these countries is being guided by the infrastructure index constructed for the purpose. Most of these infrastructure indices are based on the social and economic indicators drawn from the hard and soft infrastructure. This paper brings out some of the shortcomings of the infrastructure index as guidance for infrastructure development. It is argued that infrastructure development should be guided, not by the size of investment but by the micro level feasibility as well as the effectiveness for improving the social and economic indicators. Journal: Int. J. of Critical Infrastructures Pages: 46-69 Issue: 1 Volume: 15 Year: 2019 Keywords: trade infrastructure: H 540; multilateral trading system: F 140; trade liberalisation: O 240; infrastructure index: H 540; economies of agglomeration D210; infrastructure investment; sectoral performance; infrastructure development; infrastructure effectiveness; everything but arms F150. File-URL: http://www.inderscience.com/link.php?id=96569 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:1:p:46-69 Template-Type: ReDIF-Article 1.0 Author-Name: Haitao Wang Author-X-Name-First: Haitao Author-X-Name-Last: Wang Author-Name: Yuedong Wu Author-X-Name-First: Yuedong Author-X-Name-Last: Wu Author-Name: Hui Jin Author-X-Name-First: Hui Author-X-Name-Last: Jin Author-Name: Jinqing Jia Author-X-Name-First: Jinqing Author-X-Name-Last: Jia Author-Name: Kai Wang Author-X-Name-First: Kai Author-X-Name-Last: Wang Title: Field measurement and numerical simulation of the influence of blasting excavation on adjacent buried pipelines Abstract: The blasting seismic waves generated by tunnel blasting will have an adverse effect on adjacent buried pipelines, which increasing the difficulty of subway construction. In this paper, taking the section of blasting excavation in Dalian Metro Line 1 as the engineering background, the attenuation law of blasting seismic wave in the soil and the vibration response of the buried pipeline are systematically studied by means of field measurement and numerical simulation. The deformation monitoring of the pipeline shows that the time curve of the pipeline and the surface settlement are distributed exponentially, and the trend of them is the same. The attenuation law of seismic wave obtained by numerical simulation is basically consistent with the measured results, which indicates that it is feasible to study the blasting vibration effect by numerical simulation. The Sa Rodolfo J Ki prediction formula is established according to the measured data, which can reflect the propagation law of the blasting seismic wave. It can provide some basis for the construction of subway tunnels at the subsequent stage. Journal: Int. J. of Critical Infrastructures Pages: 70-89 Issue: 1 Volume: 15 Year: 2019 Keywords: subway tunnel; blasting excavation; buried pipeline; field monitoring; numerical simulation. File-URL: http://www.inderscience.com/link.php?id=96572 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:1:p:70-89 Template-Type: ReDIF-Article 1.0 Author-Name: Qais Saif Qassim Author-X-Name-First: Qais Saif Author-X-Name-Last: Qassim Author-Name: Norziana Jamil Author-X-Name-First: Norziana Author-X-Name-Last: Jamil Author-Name: Maslina Daud Author-X-Name-First: Maslina Author-X-Name-Last: Daud Author-Name: Hafizah Che Hasan Author-X-Name-First: Hafizah Che Author-X-Name-Last: Hasan Title: Towards implementing scalable and reconfigurable SCADA security testbed in power system environment Abstract: The Stuxnet appears to be the very first cyber-attack upon industrial control systems. It has forced cybersecurity providers to put a lot of attention on outdated and obsolete security countermeasures of existing critical infrastructure systems due to the poor protection and security. Investigation of the effect of an attack upon the actual system is neither recommended due to the unintended consequences nor feasible on a replicated system, mainly due to the cost and the effort involved. Therefore, the SCADA cybersecurity researchers mostly rely on developing realistic SCADA testbeds for cybersecurity exercises. With that, this paper serves three goals; first, to present an overview of the electrical power grid SCADA system, as well as to describe the potential vulnerabilities and threats. Second, this paper pinpoints varied testbed research application areas, implementation requirements, and design approaches. Lastly, a scalable and reconfigurable SCADA testbed is proposed for cybersecurity practices. Journal: Int. J. of Critical Infrastructures Pages: 91-120 Issue: 2 Volume: 15 Year: 2019 Keywords: SCADA; cybersecurity; testbed. File-URL: http://www.inderscience.com/link.php?id=98834 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:2:p:91-120 Template-Type: ReDIF-Article 1.0 Author-Name: Polinpapilinho F. Katina Author-X-Name-First: Polinpapilinho F. Author-X-Name-Last: Katina Author-Name: Charles B. Keating Author-X-Name-First: Charles B. Author-X-Name-Last: Keating Author-Name: Joseph A. Sisti Author-X-Name-First: Joseph A. Author-X-Name-Last: Sisti Author-Name: Adrian V. Gheorghe Author-X-Name-First: Adrian V. Author-X-Name-Last: Gheorghe Title: Blockchain governance Abstract: Blockchain is probably best known as a technology that underpins bitcoin cryptocurrency, taking records (e.g., confirmed financial transactions) and placing them into 'blocks', which are linked to prior blocks - forming a chronological 'chain' of blocks. However, bitcoin blockchain is only one instantiation of blockchain technology and there exist a few qualitative analyses addressing instantiations of blockchain technology. The aim of this study was two-fold: 1) to understand the difference between bitcoin and blockchain; 2) to delineate the need (and role) of governance in blockchain technology. First, fundamental relationships (and differences) between bitcoin and blockchain are presented. Second, drawing on societal blockchain technology concerns, a key element (i.e., governance) and its role in shaping blockchain technology is suggested. This research concludes with possible areas of research (and research questions) that can enable realisation of blockchain governance along the areas philosophical, theoretical, axiological, methodological, axiomatic, method and application dimensions. Journal: Int. J. of Critical Infrastructures Pages: 121-135 Issue: 2 Volume: 15 Year: 2019 Keywords: bitcoin; blockchain; blockchain governance; critical infrastructure; research questions; vulnerability. File-URL: http://www.inderscience.com/link.php?id=98835 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:2:p:121-135 Template-Type: ReDIF-Article 1.0 Author-Name: Seongwon Hwang Author-X-Name-First: Seongwon Author-X-Name-Last: Hwang Author-Name: Namsuk Cho Author-X-Name-First: Namsuk Author-X-Name-Last: Cho Title: Optimisation models for critical infrastructure protection, rebuilding, and interdependency in the event of mass destruction Abstract: All critical infrastructures (CIs) are already very complex and it is getting more complicated as different systems are integrated with each other. For this reason, implementing a mathematical model for critical infrastructure is a rarely researched topic. In this study, we investigate an optimisation model for critical infrastructure protection, rebuilding, and damage assessment. In particular, our model can be usefully applied to a case of which critical infrastructure is widely damaged by a weapon of mass destruction or by a disaster. Moreover, we introduce a novel idea regarding the implementation of interdependency as a mathematical formulation. In order to validate our model, we test our model in the water system of Seoul, South Korea. We describe computational results and insights from various experiments as well. Journal: Int. J. of Critical Infrastructures Pages: 136-162 Issue: 2 Volume: 15 Year: 2019 Keywords: critical infrastructure protection; rebuilding strategy; mathematical model for critical infrastructures; mass destruction; interdependency modelling. File-URL: http://www.inderscience.com/link.php?id=98836 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:2:p:136-162 Template-Type: ReDIF-Article 1.0 Author-Name: Arash Beheshtian Author-X-Name-First: Arash Author-X-Name-Last: Beheshtian Author-Name: Kieran Donaghy Author-X-Name-First: Kieran Author-X-Name-Last: Donaghy Author-Name: Xue Zhang Author-X-Name-First: Xue Author-X-Name-Last: Zhang Author-Name: Rick Geddes Author-X-Name-First: Rick Author-X-Name-Last: Geddes Title: Vulnerability analysis of Manhattan's motor fuel supply chain network Abstract: We extend the concept of a critical infrastructure (CI) network's vulnerability and advance a methodological approach for identifying the vulnerability of a CI extended over a large expanse of space - Manhattan's motor fuel supply chain - in the face of extreme weather events. In the methodological approach, we search for the network's disrupted component(s) having the maximum impact on the spatially extensive network's operability if maintained or repaired. To do so, we developed a bi-stage mixed integer stochastic mathematical program to rank disrupted elements that are the best candidates for fortifying investments. Simulation experiments with the model reveal that its solution identifies a different set of vulnerable components than are identified through the most commonly employed approach. Model results also indicate that a CI network's vulnerability in the face of extreme weather events is highly responsive to network topology in time of disaster and the objective function defined by the modeller. Journal: Int. J. of Critical Infrastructures Pages: 163-180 Issue: 2 Volume: 15 Year: 2019 Keywords: disaster; hurricane; Manhattan flooding; fuel supply chain; vulnerability analysis; climate change; resilience; gas station. File-URL: http://www.inderscience.com/link.php?id=98837 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:2:p:163-180 Template-Type: ReDIF-Article 1.0 Author-Name: Pamela M. Torres-Jiménez Author-X-Name-First: Pamela M. Author-X-Name-Last: Torres-Jiménez Title: Failure modes and effects analysis for an engineering design modification in the US nuclear power industry Abstract: Engineering design modifications for nuclear power plants can be extensive and complex projects involving numerous activities and multi-discipline resources. Failure modes, or risks, involved with these activities can impact project cost, schedule, or even introduce safety hazards. The identification of risks and the establishment of detection and mitigation strategies early on the project development stage can prevent future adverse effects on project cost and schedule. This paper focuses on the evaluation of risks that can arise during the development of a conceptual design modification project at a US nuclear power plant using the failure modes and effects analysis tool. The analysis evaluates a list of activities to be completed as part of a conceptual design package. Failure modes are identified for each activity and ranked for severity, the likelihood of failure, and opportunity for detection. These ranks are later used to calculate a risk priority number for each activity. This number is used to identify the activities with higher risk to assist engineers in the development of person-hour estimates for projects. The results presented in this paper are expected to support the US nuclear industry in the identification and mitigation of risks beyond what is already addressed in plant-specific procedures. Journal: Int. J. of Critical Infrastructures Pages: 181-205 Issue: 3 Volume: 15 Year: 2019 Keywords: failure mode and effects analysis; FMEA; engineering; design modification; US; nuclear. File-URL: http://www.inderscience.com/link.php?id=100423 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:3:p:181-205 Template-Type: ReDIF-Article 1.0 Author-Name: Elena Ragazzi Author-X-Name-First: Elena Author-X-Name-Last: Ragazzi Author-Name: Alberto Stefanini Author-X-Name-First: Alberto Author-X-Name-Last: Stefanini Title: Are security standards for electricity infrastructure a good choice for Europe? Evidence on cost and benefits from two case studies Abstract: Power system controls are vulnerable to cyber-attacks that can seriously affect and even inhibit their operation. Such attacks may affect large portions of the power system, make repair difficult and cause huge societal impact, so pressure to ensure cyber-security of control and communication systems is now strong worldwide. Several cyber-security frameworks were developed, but it is rather difficult to anticipate adoption costs and benefits, and this hampers their generalised adoption. This paper focuses on the outcome of two case studies (concerning the Italian power generation and the Polish transmission systems. The socio-economic impact of failures and the costs of standard adoption are estimated on an objective basis. It is up to public authorities to decide whether to require the adoption of security standards to operators in the electric system. The nature of public good of security underlines the necessity of public support for this operation, but we discuss the extent and the management of this support. Journal: Int. J. of Critical Infrastructures Pages: 206-229 Issue: 3 Volume: 15 Year: 2019 Keywords: security standards; electricity systems; cybersecurity; cost-benefit analysis; impact evaluation; network security plans; security policies; regulations; power system controls; countermeasures. File-URL: http://www.inderscience.com/link.php?id=100425 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:3:p:206-229 Template-Type: ReDIF-Article 1.0 Author-Name: Abdulrahman Alfaqiri Author-X-Name-First: Abdulrahman Author-X-Name-Last: Alfaqiri Author-Name: Niamat Ullah Ibne Hossain Author-X-Name-First: Niamat Ullah Ibne Author-X-Name-Last: Hossain Author-Name: Raed Jaradat Author-X-Name-First: Raed Author-X-Name-Last: Jaradat Author-Name: Sawsan Abutabenjeh Author-X-Name-First: Sawsan Author-X-Name-Last: Abutabenjeh Author-Name: Charles B. Keating Author-X-Name-First: Charles B. Author-X-Name-Last: Keating Author-Name: Mahmoud T. Khasawneh Author-X-Name-First: Mahmoud T. Author-X-Name-Last: Khasawneh Author-Name: C. Ariel Pinto Author-X-Name-First: C. Ariel Author-X-Name-Last: Pinto Title: A systemic approach for disruption risk assessment in oil and gas supply chains Abstract: Twenty-first century systems are characterised by rapid changes and constantly evolving dynamics. Therefore, supply chains have become more globalised and complex than ever before. Global supply chains are often accompanied by serious threats and significant additional risks to industries that rely heavily on them. The oil and gas industry encounter significant supply chain risks throughout all stages. The objective of this paper is to provide a holistic complex system governance (CSG) perspective to investigate disruption risks in oil and gas supply chains. As a case study, the piracy problem in Africa is used to demonstrate the efficacy and extensibility of the CSG perspective to a wider array of potential supply chain disruptions. Unlike ready-made solutions or 'off-the-shelf' strategies that may actually undermine the establishment of a resilient global oil and gas supply chain, this paper examines associated risks as a complex system, or a system of systems problem. Journal: Int. J. of Critical Infrastructures Pages: 230-259 Issue: 3 Volume: 15 Year: 2019 Keywords: supply chain risks; oil and gas industry; risk management. File-URL: http://www.inderscience.com/link.php?id=100428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:3:p:230-259 Template-Type: ReDIF-Article 1.0 Author-Name: Mamadou Seck Author-X-Name-First: Mamadou Author-X-Name-Last: Seck Author-Name: Ange-Lionel Toba Author-X-Name-First: Ange-Lionel Author-X-Name-Last: Toba Title: Powering West Africa: modelling sustainable long-term electricity planning Abstract: This paper presents a tree-like exploration method to analyse strategies for the development of grids of the future in West Africa. The approach helps generate plausible future grids, based on demand requirements and resource availability, by either building power plants or transmission lines. These grids are generated via a modelling framework, <i>Spark!</i>, which captures key components of the power system, as well as relationships between them. <i>Spark!</i> analyses financial, environmental and reliability performances, and also addresses concerns caused by high renewable penetration in large-scale power grids. Contrary to other models used to address long-term planning in African countries, <i>Spark!</i> performs long-term planning of energy resource use to satisfy the demands, but also simulates grid operations in real-time. It enables decision makers to examine long-term effects of decisions made, but also observe how the system responds to these decisions. Journal: Int. J. of Critical Infrastructures Pages: 260-284 Issue: 3 Volume: 15 Year: 2019 Keywords: energy; system modelling; electricity; grid simulation; power grid; African power sector; energy planning; sustainable development; energy planning model; Africa; West Africa. File-URL: http://www.inderscience.com/link.php?id=100430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:3:p:260-284 Template-Type: ReDIF-Article 1.0 Author-Name: Ouafae Kasmi Author-X-Name-First: Ouafae Author-X-Name-Last: Kasmi Author-Name: Amine Baina Author-X-Name-First: Amine Author-X-Name-Last: Baina Author-Name: Mostafa Bellafkih Author-X-Name-First: Mostafa Author-X-Name-Last: Bellafkih Title: Security evaluation management over LTE critical infrastructures networks: IMS case study Abstract: The security of telecommunications infrastructures is a major issue for satisfied it in terms of confidentiality, integrity, availability and in terms of quality of services (QoS) and it is difficult to guarantee the availability of these critical infrastructures (CIs) 24 hours a day. They present the vulnerabilities and a failure in one CI can impact to another CI to cause service disruptions. In this purpose, we propose a new approach of multi-level criticality to better assess and monitor CIs and their interdependencies in order to predict possible risks for increasing security. This paper proposes CI security modelling for trust components and interdependencies based on multi-levels of criticality, which are added to the security of IP multimedia subsystem (IMS) components to reduce its impacts and improve its resilience in order to prioritise risks according to several levels of criticality. The proposed approach is based on Totel model and implicative interdependency model (IIM). Journal: Int. J. of Critical Infrastructures Pages: 285-306 Issue: 4 Volume: 15 Year: 2019 Keywords: multi-level criticality; IIM; IP multimedia subsystem; IMS; long-term evolution; LTE; risk priority; severity; criticality; interdependency. File-URL: http://www.inderscience.com/link.php?id=103013 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:4:p:285-306 Template-Type: ReDIF-Article 1.0 Author-Name: Rajni Kant Rajhans Author-X-Name-First: Rajni Kant Author-X-Name-Last: Rajhans Author-Name: Aritra Halder Author-X-Name-First: Aritra Author-X-Name-Last: Halder Title: Urban infrastructure financing in India: a proposed framework for ULBs Abstract: Infrastructure has been identified as the backbone of any economy as it provides channels of economic growth. For emerging economies like India, with 31% current urban population and contribution of 63% to GDP; the pie is expected to increase to approximately 40 percentages by 2031 with a GDP contribution of 70%-75%. This creates a need for rapid development as well as the strengthening of existing urban infrastructure to accommodate growing demand and to exploit its economic contribution. The extent of urban infrastructure development is delivered at three levels of governance; Centre, State and urban local bodies (ULBs). ULBs being the last level of governance for infrastructure development in urban India, they are grossly under-equipped to effectively generate revenues and raise capital. The present study has identified issues in the existing financing and assessment framework of ULBs and suggests a framework to rationalise their funding patterns and to bring competitiveness. The paper stresses the need of the proposed framework to bring smart city SPV and other ULBs at the equal platform. Journal: Int. J. of Critical Infrastructures Pages: 307-323 Issue: 4 Volume: 15 Year: 2019 Keywords: infrastructure; urban local bodies; ULBs; financing; smart city. File-URL: http://www.inderscience.com/link.php?id=103014 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:4:p:307-323 Template-Type: ReDIF-Article 1.0 Author-Name: Boris A. Lyovin Author-X-Name-First: Boris A. Author-X-Name-Last: Lyovin Author-Name: Alexey V. Shvetsov Author-X-Name-First: Alexey V. Author-X-Name-Last: Shvetsov Author-Name: Roberto Setola Author-X-Name-First: Roberto Author-X-Name-Last: Setola Author-Name: Svetlana V. Shvetsova Author-X-Name-First: Svetlana V. Author-X-Name-Last: Shvetsova Author-Name: Marco Tesei Author-X-Name-First: Marco Author-X-Name-Last: Tesei Title: Method for remote rapid response to transportation security threats on high speed rail systems Abstract: Present day high speed rail systems (HSRS) operate under permanent risk of criminal and terrorist attacks. HSRS security threats require special attention and immediate responses. The purpose of this research is to develop a method for remote rapid response to HSRS transportation security threats. The method is based on the employment of automated drone stations that ensure the arrival of an unmanned aerial vehicle (drone) at the place of incident within 13 minutes of the alarm signal, i.e., when there is an intrusion on the railroad track. Detailed inspection of the incident location allows the dispatcher to make a rapid decision about actions that follow the signal: whether there is a need to send a rapid response team to the place of incident and/or to interrupt the train operation on the involved track section. In our research the method was designed based on the Moscow-Saint-Petersburg HSRS but this method can be applied to the HSRS of the other countries. Journal: Int. J. of Critical Infrastructures Pages: 324-335 Issue: 4 Volume: 15 Year: 2019 Keywords: transportation security; unmanned aerial vehicle; UAVs; drone; drone station; high speed rail systems. File-URL: http://www.inderscience.com/link.php?id=103015 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:4:p:324-335 Template-Type: ReDIF-Article 1.0 Author-Name: Serdar Korkmaz Author-X-Name-First: Serdar Author-X-Name-Last: Korkmaz Author-Name: Dal Jae Park Author-X-Name-First: Dal Jae Author-X-Name-Last: Park Title: A study on local residents' perception in communication process for LNG terminal risks Abstract: The objective of this paper is to explore the locals' perception on risk communication process between LNG organisation and local residents. Using a traditional communication model based on the source-message-channel-receiver-effect (SMCRE), the factors of risk communication process were measured to determine the residents' perception of facility risks. The individual factors that influenced SMCRE elements were grouped and analysed by factor analysis. Also, multiple regression analysis was conducted to examine the effect of latter element on former element: the order of elements was S &rarr; M, M &rarr; C, C &rarr; R, and R &rarr; E. In terms of the model's final process, an effective pathway had two cases. The first case was the relieving of social conflicts and anxieties through mutual understanding. The second case was the promotion of trust. This study can assist LNG organisations with providing better risk communication to residents and enhance the acceptance of LNG facilities. Journal: Int. J. of Critical Infrastructures Pages: 336-354 Issue: 4 Volume: 15 Year: 2019 Keywords: local residents; risk communication; liquefied natural gas; LNG; LNG infrastructure; source; message; channel; receiver; effect. File-URL: http://www.inderscience.com/link.php?id=103020 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:4:p:336-354 Template-Type: ReDIF-Article 1.0 Author-Name: Ni Ni Author-X-Name-First: Ni Author-X-Name-Last: Ni Author-Name: Richard G. Little Author-X-Name-First: Richard G. Author-X-Name-Last: Little Author-Name: Thomas C. Sharkey Author-X-Name-First: Thomas C. Author-X-Name-Last: Sharkey Author-Name: William Wallace Author-X-Name-First: William Author-X-Name-Last: Wallace Title: Modelling the recovery of critical commercial services and their interdependencies on civil infrastructures Abstract: When an extreme event occurs in a specific area, the mere recovery of civil infrastructures is not enough to help recover local communities due to the cascading disruptions that can occur to supply chains of critical commercial services, whose operation and restoration is highly dependent on infrastructures. We build single-period, multi-commodity disruption models to examine the interdependencies between infrastructures and critical commercial services and predict the outages experienced by local communities after extreme events. We further build multi-period restoration models to select and schedule the restoration tasks after disruptive events with an objective to maximise the aggregated flows of utilities and commodities. We simulate scenarios of Categories 2, 3, 4 hurricanes and apply the models to a dataset of an artificial county with a population of half a million. We find that coordinated infrastructure restoration decisions with critical commercial services help improve community resilience, especially under relatively severe extreme events. Journal: Int. J. of Critical Infrastructures Pages: 355-382 Issue: 4 Volume: 15 Year: 2019 Keywords: infrastructure restoration; interdependencies; critical commercial services; community resilience; cascading failures; supply chain disruption. File-URL: http://www.inderscience.com/link.php?id=103023 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijcist:v:15:y:2019:i:4:p:355-382