2007
DOI: 10.1111/j.1539-6924.2007.00907.x
|View full text |Cite
|
Sign up to set email alerts
|

Infrastructure Vulnerability Assessment Model (I‐VAM)

Abstract: Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0
2

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(60 citation statements)
references
References 11 publications
0
58
0
2
Order By: Relevance
“…The Best Evidence in Irish Court, whenever dealing with the contents of photograph, writing, or recording, courts occasionally need the original evidence [19], [5]. The originalevidence drive of this rule was to confirm that decisions made in court were founded on the best available information.…”
Section: Previous Workmentioning
confidence: 99%
“…The Best Evidence in Irish Court, whenever dealing with the contents of photograph, writing, or recording, courts occasionally need the original evidence [19], [5]. The originalevidence drive of this rule was to confirm that decisions made in court were founded on the best available information.…”
Section: Previous Workmentioning
confidence: 99%
“…While many authors consider aleatoric and semantic uncertainties (Bogardi 2004, Adger 2006, Ezell 2007 as the two main groups, this part focuses on other classifications and highlights definitions of uncertainties.…”
Section: Introductionmentioning
confidence: 99%
“…Turvey (2007) put forward a spatial methodology for vulnerability assessment in developing countries by constructing a composite vulnerability index [12]. Ezell (2007) developed an Infrastructure Vulnerability Assessment Model to quantify the vulnerability of water supply systems [19]. However, vulnerability analysis has not been widely applied in real-world applications and in particular there are few attempts in the field of urban drainage systems.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Murray et al (2004) developed a probability and statistics method which can be used to assess the vulnerability of a water utility to a large range of contamination attacks [26]. Ezell (2007) developed a comprehensive index method (i.e., deterrence, detection, delay, and response) which can also be used to quantify the vulnerability of the systems by establishing the comprehensive evaluation index [19]. Pinto et al (2010) introduced the theory of vulnerability of water pipe network (TVWPN) which is to help design water pipe networks (WPN) more robust against damage to the pipelines [31].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation