Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii Jun 2013

National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii

George H Baker

The Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack has provided a compelling case for protecting civilian infrastructure against the effects of EMP and geomagnetic disturbances (GMD) caused by severe solar storms. Similar to protecting critical infrastructure against any hazard, it will be important to take a risk-based priority approach for these two electromagnetic threats, recognizing that it will be fiscally impracticable to protect everything. In this regard, EMP and GMD are particularly challenging in that they interfere with electrical and electronic data, control, transmission, and communication systems organic to nearly all critical infrastructures, simultaneously, …


Special Section Editorial: Risk, Complexity And Sustainability, Lindsay Robertson, Katina Michael May 2013

Special Section Editorial: Risk, Complexity And Sustainability, Lindsay Robertson, Katina Michael

Professor Katina Michael

This special section is dedicated to risk as understood within our society, in which we depend upon increasingly complex and interconnected technologies for even our most basic needs - water, food, shelter, electricity, gas, sewage, communications, and banking.

Natural disasters and their impact on vital services has been a research area that has flourished, especially since the 2004 Indian Ocean Tsunami that claimed hundreds of thousands of lives in South Asia. Out of this research has come forth a plethora of strategies for addressing short term and geographically defined disasters. While such disaster preparedness systems are vital to minimise the …


Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov Mar 2013

Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov

Jeffrey Keisler

No abstract provided.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov Feb 2013

Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov

Jeffrey Keisler

Changing environment, uncertain economic conditions, and socio-political unrest have renewed interest in scenario analysis, both from theoretical and applied points of view. Nevertheless, neither the processes for scenario analysis (SA) nor evaluation criteria and metrics have been regularized. In this paper, SA-reported applications and implementation methodology are discussed in the context of an extensive literature review covering papers published between 2000 and 2010. Over 340 papers were identified through a series of queries in the web of science database. The papers were classified based on the North American Industrial Classification System and SA application goals (environmental, business, and social). SA …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr. Dec 2012

Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.

Maurice Dawson

Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …


Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina Dec 2012

Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina

Luis Mundaca

Transaction costs (TCs) must be taken into account when assessing the performance of policy instruments that create markets for the diffusion and commercialization of low-carbon technologies (LCTs). However, there are no comprehensive studies on the development and application of transaction cost analysis to LCTs. In this meta-analysis, a wide-ranging evaluation of TCs associated with energy efficiency, renewable energy, and carbon market technologies is provided. There is a plethora of different definitions of, and measurement techniques to estimate, TCs. There is wide variation in the quantitative estimates, which can be attributed to factors such as the definition used, data collection, quantification …


Levees And The National Flood Insurance Program: Improving Policies And Practices Dec 2012

Levees And The National Flood Insurance Program: Improving Policies And Practices

Earthea Nance, PhD (Stanford University, 2004)

.