PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Selected options of vulnerability assessment – state of the art in literature review

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper deals with the selected aspects of vulnerability assessment of systems. Historically, the vulnerability is recognized as one of the important aspects of system properties – system quality. The wide utilization of vulnerability can be observed in the IT area. Some approaches to vulnerability assessment are based on experiences and empiricism. For some other works it is necessary to have a quantitative value used for expressing vulnerability. In this paper we have applied the methods of analytical research, information search and a synthesis. They serve to introduce selected approaches expressing system vulnerability. The attention is paid mainly to the environmental and critical infrastructure systems. The results are presented in the form of definitions, equations or graphs. All these alternatives are further usable for assessing critical infrastructure elements. The results are also suitable for deeper development of a safety research scientific discipline.
Rocznik
Strony
33--40
Opis fizyczny
Bibliogr. 48 poz., tab., rys.
Twórcy
  • Wroclaw University of Technology, Wroclaw, Poland
autor
  • University of Defence, Brno, Czech Republic
Bibliografia
  • [1] Adger, W. N. Vulnerability. Glob Environ Change. Vol. 16, p. 268-281, 2006.
  • [2] Adger, W. N. Hughes, T. P., Folke, C., Carpenter, S. R., Rockstorm, J. Social-ecological resilience to coastal disasters. Science, No. 309, p. 1036-1039, 2005.
  • [3] Agliardi, F. Crosta, G. B., Frattini, P. Integrating rock-fall risk assessment and countermeasure design by 3D modelling techniques.Nat Hazards Earth Syst Sci. Vol. 9, p. 1059-1073, 2009.
  • [4] Bell, R., Glade, T. Quantitative risk analysis for landslides – Example from Bíldudalur, NW-Iceland. Nat Hazards Earth Syst Sci, Vol. 4, p. 117-131, 2004.
  • [5] Budetta, A. Assessment of rockfall risk along roads. Nat Hazards Earth Syst Sci, Vol. 4, p. 71-81, 2004.
  • [6] Cairns Jr J. Estimating hazard. Bioscene, Vol. 30, p.101-107, 1980.
  • [7] Cairns Jr J. Dickson, K. L., Maki, A. W. Estimating the hazard of chemical substances to aquatic life. Hydrobiologia, Vol. 64, p.157-166, 1979.
  • [8] Castleton, J. Rock-fall hazards in Utah, USGS publications, PI-94, 2009.
  • [9] Chau, K. T., Wong, R. H. C., Wu, J. J. Coefficient of restitution and rotational motions of rockfall impacts. Int Journal Rock Mech Min, Vol. 39, p. 69-77, 2002.
  • [10]Christopher, M., Peck, H. Building the resilient supply chain.International Journal of Logistics Management. Vol 15(2), p- 1-13, 2004.
  • [11]Colema, L. Frequency of man-made disasters in the 20th century.Journal of Contingencies and Crisis Management, Vol. 14 (1), p. 3-11, 2006.
  • [12]Corominas, J., Copons, R., Moya, J. Vilaplana, J. M., Altimir, J., Amigó, J. Quantitative assessment of the residual risk in a rock fall protected area. Landslides, Vol. 2, p. 343-357, 2005.
  • [13]Craighead, C. W., Blackhurst, J., Rungtusanatham, M. J., Handfield, R. B., The severity of supply chain distribution: design characteristics and mitigation capabilities. Decision Science, Vol. 38 (1), p. 131-156, 2007.
  • [14]Dai, F. C., Lee, C. F., Ngai, Y. Y. Landslide risk assessment and management: an overview.Eng Geol, Vol. 64, p. 65-87, 2002.
  • [15]De Lange, H. J., Sala, S., Vighi, M., Faber, J. H. Ecological vulnerability in risk assessment – A review and perspectives. Science of the Total Environment, No. 408, p. 3871-3879, 2010.
  • [16]De Lange, H. J., Lahr, J, Van der Pol, J. J. C., Wessels, Y., Faber, J. H. Ecological vulnerability in wildlife.An expert judgement and multi criteria analysis tool using ecological traits to assess relative impact of pollutants.Environ Toxicol Chem, Vol. 29, p. 2233-2240, 2009.
  • [17]Evans, S. G., Hungr, O. The assessment of rockfall hazard at the base of talus slopes. Can Geotech Jour, Vol. 30, p. 620-636, 1993.
  • [18]Eytan, R.,Cost effective retrofit of structures against the effects of terrorist attacks -the Israeli experience, Proceedings of the Structures Congress and Exposition , pp. 2161-2172, 2005.
  • [19]French, G.S., Gootzit, D.Defining and assessing vulnerability of infrastructure to terrorist attack, Vulnerability, Uncertainty, and Risk: Analysis, Modeling, and Management - Proceedings of the ICVRAM 2011 and ISUMA 2011 Conferences , pp. 782-789, 2011.
  • [20]Glade, T. Vulnerability assessment in landslide risk analysis. Die Erd. Vol. 134 (2), p. 123-146, 2003.
  • [21]Guzzetti, F., Reichenbach, P., Ghigi, S. Rockfall hazard and risk assessment along a transportation corridor in the Nera valley, Central Italy.Environ Manage, Vol. 34 (2), p. 191-208, 2004.
  • [22]Heinimann, H. R. Risikoanalyse bei gravitativen Naturgefahren – Fallbeispiele und Daten.Umwelt-Materialen 107/I, Bern, 1999.
  • [23]Henry, M.D., Lilley, S.R., Pan, J.A., Grimes, M., Haimes, Y.Y., Risk-based methodology for assessing and managing the severity of a terrorist attack, 2009 IEEE Systems andInformation Engineering Design Symposium, SIEDS '09 , art. no. 5166175, pp. 171-176, 2009
  • [24]Iding, R.H.,A methodology to evaluate robustness in steel buildings -Surviving extreme fires or terrorist attack using a robustness index, Proceedings of the Structures Congress and Exposition , pp. 511-515, 2005
  • [25]Jüttner, U., Peck, H., Christopher, M. Supply chain risk management: outlining the agenda for future research.International Journal of Ligistics: Research and Application. Vol. 6(4), p. 197-210, 2003.
  • [26]Kelly, T.J., Hofacre, K.C., Derringer, T.L., Riggs, K.B., Koglin, E.N., Testing of safe buildings detection technologies and other homeland security technologies in EPA's Environmental Technology Verification (ETV) program, Proceedings of the Air and Waste Management Association's Annual Meeting and Exhibition , pp. 3449-3457, 2004
  • [27]Kemp, R.L., Assessing the vulnerability of buildings, Journal of Applied Fire Science, Vol. 14 (1), pp. 53-61, 2007
  • [28]Lee, H. L. The triple-A supply chain. Harvard Business Review, Vol. 82(10), p. 102-112, 2004.
  • [29]Li, Z. H., Huang, H. W., Xue, Y. D. Yin, J. Risk assessment of rockfall hazard on highways. Georisk, Vol 3 (3), p. 147-154, 2009.
  • [30]Marshall, H.E., Chapman, R.E., Leng, C.J., Risk mitigation plan for optimizing protection of constructed facilities, Cost Engineering (Morgantown, West Virginia), Vol 46 (8), pp. 26-33, August 2004
  • [31]Mavrouli, O., Corominas, J. Rockfall vulnerability assessment for reinforced concrete buildings. Nat Haz Earth Syst Sci, Vol. 10, p. 2055-2066, 2010.
  • [32]Munich Re, Annual Review: Natural Catastrophes 2005. Munich Re publications, Munich, 2006.
  • [33]Pierson, L. A., Davis, S. A., Van Vickle, R. Rockfall hazard rating system implementation manual. Federal Highway Administration (FHWA), Report FHWAOR-EG-90-01, FHWA, US Department of Transportation, 1990.
  • [34]Roberds, W. J. Estimating temporal and spatial variability and vulnerability, in: Lanslide risk management. Edited by Hungr, O., Fell, R., Couture, R., Eberhardt, E. Proceedings of the International Conference on Landslide Risk Management, Vancouver, London: Taylor and Francis, p. 129-157, 2005.
  • [35]Schröter, D., Polsky, C., Patt, A. Assessing vulnerability tot he effect of global change: an eight step approach. Mitig Adapt Strategies Glob Chang, Vol. 10, p. 573-595, 2005.
  • [36]Skondras, N. A., Karavitis, Ch. A., Gkotsis, I. I., Scott, P. J. B., Kaly, U. L. Application and assesssment of the Environmental Vulnerability Index in Greece. Ecological Indicators, Vol. 11, p. 1699-1706, 2011.
  • [37]Suter II, G. W., Norton, S. B., Fairbrother, A. Individuals versus organisms versus populations in the definition of ecological assessment endpoints. Int Environ Assess Man, Vol. 1, p. 397-400, 2005.
  • [38]Tang, C. S. Robust strategies for mitigating supply chain disruptions. International journal of Logistics: Research and Applications. Vol. 9 (1), p. 33-45, 2006.
  • [39]Tang, C. S. Perspectives in supply chain risk management. International Journal of Production Economics. Vol. 103 (1), p. 12-27, 2006.
  • [40]Turner II B. L., Kasperson, R. E., Matson, P. A., McCarthy J. J., Corel, R. W., Christensen, L, et al. A framework for vulnerability analysis in sustainability science. Proc Natl Acad Sci, 100:8074-9, 2003.
  • [41]Uzielli, M., Nadim, F., Lacasse, S., Kaynia, A. M. A conceptual framework for quantitative estimation of physical vulnerability to landslides. Eng Geol, Vol. 102, p. 251-256, 2008.
  • [42]Valis D., Nowakowski T.,Stan wiedzy na temat wybranych możliwości oceny podatności na zagrożenia - przegląd literatury. Materiały XLI Zimowej Szkoły Niezawodności, Wydział Transportu Politechniki Warszawskiej, Warszawa 2013.
  • [43]Vališ, D., Vintr, Z. Malach , J. Selected aspects of physical structures vulnerability– state-of-the-art. Eksploatacja i Niezawodnosc – Maintenance and Reliability, Vol. 14 (3), p. 189-194, 2012,. ISSN 1507-2711.
  • [44]Wagner S. M., Neshat N. Assessing the vulnerability of supply chains using graph theory. International Journal Production Economics, No. 126, p. 121-129, 2010, ISSN 0925-5273.
  • [45]Wagner, S. M., Bode, C. An empirical investigation into supply chain vulnerability. Journal of Purchasing & Supply Management. Vol. 12(6), p. 301-312, 2006.
  • [46]Wieczorek, G. F., Snyder, J. B. Historical rosk falls in Yosemite National Park.Us Geol Surv Open-File Report 03-491, http://pubs.usgs.gov/of/2003/of03-491.pdf, 2004.
  • [47]Williams, L. R. R., Kapustka, L. A. Ecosystem vulnerability: a complex interface with technical components.Environ Toxicol CHem, Vol. 19, p. 1055-1058, 2000.
  • [48]Zehrt Jr., W.H., Acosta, P.F., Analysis and design of structures to withstand terrorist attack,Proceedings of the Structures Congress and Exposition , pp. 585-592, 2003.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a28c2407-1355-46b1-bf67-fbdfda9f1d6d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.