Posts Tagged ‘Policy’

Optimizing Mass Transit Transportation Resilience: Model, Implementation and Policy Directions

Posted: July 25, 2017 at 1:41 pm

By Fadi A. Karaa, PhD Director, Critical Infrastructure Systems Program, New Jersey Institute of Technology Transportation Role in Community and Societal Resilience A disruption in one or more of the modes of transportation is bound to send ripple effects in a number if not all of the infrastructure sectors due to the significant inter-dependencies between […]

Safeguarding the Resilience of Power and Transportation Infrastructures during Transitions to Sustainability

Posted: July 20, 2017 at 3:23 pm, Last Updated: July 20, 2017 at 3:24 pm

Elisabeth Graffy, Arizona State University Lucia Gauchia, Michigan Technological University Winslow Burleson, New York University Elizabeth Chalecki, University of Nebraska-Omaha Jacqueline Tidwell, Arizona State University Ellen B. Stechel, Arizona State University Global reliance on fossil fuels for electric power and transportation energy raises a spectrum of concerns about societal stability and well-being, not in small […]

A Human-Centered Approach to the Prioritization of Critical Infrastructure Resilience

Posted: July 13, 2017 at 2:15 pm

Susan Spierre Clark, RENEW Institute, University at Buffalo Thomas P. Seager, School for Sustainable Engineering and the Built Environment, Arizona State University Introduction The current approach to infrastructure prioritization by the U.S. involves the identification of 16 critical infrastructure (CI) sectors, including the lifeline sectors of water, energy, transportation, and communications, that are considered vital […]

The Cyber-Security Industrial Policy: The Challenges of Structuring a Complex Dialogue

Posted: October 18, 2016 at 9:36 am, Last Updated: October 18, 2016 at 9:37 am

Danilo D’Elia In the aftermath of Edward Snowden’s intelligence revelations, many governments around the world are increasingly elaborating so-called “digital sovereignty”  policies. The declared aim is to develop trusted technologies to protect more sensitive networks. Rather than attempting a theoretical analysis, the ambition of this research is to start from a specific case study (the […]