IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v94y2009i2p404-411.html
   My bibliography  Save this article

Identification of safety and security critical systems and activities

Author

Listed:
  • Aven, Terje

Abstract

There are many initiatives taken to identify safety and security critical systems and activities, at different levels and in different contexts, ranging from infrastructures at the societal level to equipment on the production plant level. Different approaches are implemented to define the critical systems and activities. Some of these relate to vulnerabilities, others incorporate the probability dimension and are risk based. We also see approaches taking into account values of the decision-maker and relevant stakeholders. In this paper, we discuss the rationale for these approaches. Is vulnerability an adequate measure to be used as a basis for determining criticality? Is it meaningful to specify safety and security critical systems and activities without addressing risk? How should we take into account the limitations of the risk assessments? Should we extend the concept of criticality to also cover utility aspects? We bring new insights into the discussion by being precise on the key risk concepts—including uncertainty, probability and expected value—and considering alternative risk perspectives. A novel approach is suggested based on expected values and uncertainties in underlying phenomena and processes. Our main concern is activities with potential severe consequences and large uncertainties.

Suggested Citation

  • Aven, Terje, 2009. "Identification of safety and security critical systems and activities," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 404-411.
  • Handle: RePEc:eee:reensy:v:94:y:2009:i:2:p:404-411
    DOI: 10.1016/j.ress.2008.04.001
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832008001312
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2008.04.001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    2. Jenelius, Erik & Petersen, Tom & Mattsson, Lars-Göran, 2006. "Importance and exposure in road network vulnerability analysis," Transportation Research Part A: Policy and Practice, Elsevier, vol. 40(7), pages 537-560, August.
    3. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
    2. Garcez, Thalles Vitelli & de Almeida, Adiel Teixeira, 2014. "A risk measurement tool for an underground electricity distribution system considering the consequences and uncertainties of manhole events," Reliability Engineering and System Safety, Elsevier, vol. 124(C), pages 68-80.
    3. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    4. Reniers, G.L.L. & Sörensen, K. & Dullaert, W., 2012. "A multi-attribute Systemic Risk Index for comparing and prioritizing chemical industrial areas," Reliability Engineering and System Safety, Elsevier, vol. 98(1), pages 35-42.
    5. Zio, E., 2018. "The future of risk assessment," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 176-190.
    6. Wang, Wei & Di Maio, Francesco & Zio, Enrico, 2020. "Considering the human operator cognitive process for the interpretation of diagnostic outcomes related to component failures and cyber security attacks," Reliability Engineering and System Safety, Elsevier, vol. 202(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.
    2. Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.
    3. Guikema, Seth D. & Aven, Terje, 2010. "Assessing risk from intelligent attacks: A perspective on approaches," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 478-483.
    4. Seow Eng Ong & Davin Wang & Calvin Chua, 2023. "Disruptive Innovation and Real Estate Agency: The Disruptee Strikes Back," The Journal of Real Estate Finance and Economics, Springer, vol. 67(2), pages 287-317, August.
    5. Herrmann, Tabea & Hübler, Olaf & Menkhoff, Lukas & Schmidt, Ulrich, 2016. "Allais for the poor," Kiel Working Papers 2036, Kiel Institute for the World Economy (IfW Kiel).
    6. Christiane Goodfellow & Dirk Schiereck & Steffen Wippler, 2013. "Are behavioural finance equity funds a superior investment? A note on fund performance and market efficiency," Journal of Asset Management, Palgrave Macmillan, vol. 14(2), pages 111-119, April.
    7. Berg, Joyce E. & Rietz, Thomas A., 2019. "Longshots, overconfidence and efficiency on the Iowa Electronic Market," International Journal of Forecasting, Elsevier, vol. 35(1), pages 271-287.
    8. Reckers, Philip M.J. & Sanders, Debra L. & Roark, Stephen J., 1994. "The Influence of Ethical Attitudes on Taxpayer Compliance," National Tax Journal, National Tax Association;National Tax Journal, vol. 47(4), pages 825-836, December.
    9. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    10. Sitinjak Elizabeth Lucky Maretha & Haryanti Kristiana & Kurniasari Widuri & Sasmito Yohanes Wisnu Djati, 2019. "Investor behavior based on personality and company life cycle," HOLISTICA – Journal of Business and Public Administration, Sciendo, vol. 10(2), pages 23-38, August.
    11. Theo Arentze & Tao Feng & Harry Timmermans & Jops Robroeks, 2012. "Context-dependent influence of road attributes and pricing policies on route choice behavior of truck drivers: results of a conjoint choice experiment," Transportation, Springer, vol. 39(6), pages 1173-1188, November.
    12. van den Bergh, J.C.J.M. & Botzen, W.J.W., 2015. "Monetary valuation of the social cost of CO2 emissions: A critical survey," Ecological Economics, Elsevier, vol. 114(C), pages 33-46.
    13. Frank D. Hodge & Roger D. Martin & Jamie H. Pratt, 2006. "Audit Qualifications of Income†Decreasing Accounting Choices," Contemporary Accounting Research, John Wiley & Sons, vol. 23(2), pages 369-394, June.
    14. Philippe Fevrier & Sebastien Gay, 2005. "Informed Consent Versus Presumed Consent The Role of the Family in Organ Donations," HEW 0509007, University Library of Munich, Germany.
    15. Ran Sun Lyng & Jie Zhou, 2019. "Household Portfolio Choice Before and After a House Purchase," Economics Working Papers 2019-01, Department of Economics and Business Economics, Aarhus University.
    16. Homonoff, Tatiana & Spreen, Thomas Luke & St. Clair, Travis, 2020. "Balance sheet insolvency and contribution revenue in public charities," Journal of Public Economics, Elsevier, vol. 186(C).
    17. Shuang Yao & Donghua Yu & Yan Song & Hao Yao & Yuzhen Hu & Benhai Guo, 2018. "Dry Bulk Carrier Investment Selection through a Dual Group Decision Fusing Mechanism in the Green Supply Chain," Sustainability, MDPI, vol. 10(12), pages 1-19, November.
    18. Senik, Claudia, 2009. "Direct evidence on income comparisons and their welfare effects," Journal of Economic Behavior & Organization, Elsevier, vol. 72(1), pages 408-424, October.
    19. Rand Kwong Yew Low, 2018. "Vine copulas: modelling systemic risk and enhancing higher‐moment portfolio optimisation," Accounting and Finance, Accounting and Finance Association of Australia and New Zealand, vol. 58(S1), pages 423-463, November.
    20. Jose Apesteguia & Miguel Ballester, 2009. "A theory of reference-dependent behavior," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 40(3), pages 427-455, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:94:y:2009:i:2:p:404-411. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.