Beruflich Dokumente
Kultur Dokumente
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
http://about.jstor.org/terms
Springer is collaborating with JSTOR to digitize, preserve and extend access to GeoJournal
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
Geojournal (201 3) 78:287-301
DOI 1 0. 1 007/s 1 0708-0 1 1 -94 1 1 -0
Abstract The concept of vulnerability is increas- mitigation efforts are strongly integrated at global,
ingly important in engineering and the socio-economic regional and local levels.
planning sciences, particularly given the enormous
costs associated with addressing it. The ability to Keywords Critical infrastructure • Networks •
identify and mitigate vulnerabilities is extremely Interdependency • Interdiction • Disaster mitigation •
challenging because it is influenced by a complex Spatial analysis • Public policy
and dynamic set of interacting factors that can
compromise social, economic and infrastructure
systems. Where the latter is concerned, the ability Introduction
to assess infrastructure vulnerability involves the
consideration of a range of physical, operational, In the United States, there is a growing interest in
geographical and socio-economic characteristics. In both social vulnerability (Cutter and Finch 2008;
this paper, significant elements of infrastructure Borden et al. 2007) and the vulnerability of infra-
vulnerability are identified and discussed with a focus structure systems, both of which are intimately
on their intrinsic spatial nature and their propensity to related (NRC 2006; White House 2003). Moreover,
interact across space. Further, the developed typology during the past two decades, both the executive and
of vulnerability outlined in this paper emphasizes the legislative branches of the U.S. government have
need to ensure that policy, planning and disaster made concerted efforts at better defining what
systems and assets are most important to the day-
to-day functioning of the nation, giving rise to what is
now termed critical infrastructure (Sec. 1016[e]).
T. H. Grubesic (E3) Critical infrastructure and assets include transporta-
College of Information Science and Technology, Drexel tion systems, telecommunication networks, the elec-
University, Philadelphia, PA 19104, USA trical grid, banking networks, reservoirs, natural gas
e-mail: grubesic@drexel.edu
distribution systems, and many other interdependent
T. C. Matisziw infrastructures, vital to the day-to-day functioning of
Department of Geography, University of Missouri, social, economic and physical systems in the United
Columbia, MO 6521 1, USA
States (Lewis 2006; Murray and Grubesic 2007).
T. C. Matisziw Although, the importance of such infrastructure is
Department of Civil and Environmental Engineering, obvious, how to most appropriately describe sources
University of Missouri, Columbia, MO 65211, USA of vulnerability is not, particularly given the sheer
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
288 GeoJournal (2013) 78:287-301
variety of critical
an entity assets and
to be vulnerable. In this system
context, the concept
matters is the ofrange and
risk is an important one. Kaplan level
and Garrick o
infrastructure systems
(1981) summarize risk as provide,
a simple function of three the
ces, and factors: (1) threats,
potential what can go wrong; (2) whatallis the of
significantly probability of
across it going wrong;
time and(3) what are the
space
The purpose of this
consequences if it does gopaper
wrong. For example is
typological framework
consider the impacts offor
a hurricane categoriz
making landfall in
vulnerability. a populated area.
While The loss of human life, economic
complimentary
social disruption and
vulnerability, the environmental/physical
which focuses damage o
of populations to hazards
caused and
by high winds, rain, storm surge andtheir
flooding
to/recover are certainly
from the negative outcomes. However, when
impacts of
(Cutter 2006), the analysis
efforts are of
made to mitigate risk, levels infra
of exposure
ability is primarily concerned
may not change, but the degree to which an area, w
operational, andpopulation
geographic charact
or system is vulnerable can be altered. For
structure instance, by
elements, developing and fragility
their implementing a compre- to
in the system(s) hensive
with hurricanewhich
evacuation plan, one does not
they in
the potential decrease the probability that aof
implications hurricane will hit
disrup
many factors influence vulnerab
communities along a coastal region, but it can reduce
primarily focuses
the vulnerability
on of their
populations within
spatial
the region. f
often the most difficult features to characterize. It is There are also elements of uncertainty associated
also important to note that the development of a with vulnerability. In many situations it is difficult to
typology concerning the spatial facets of critical ascertain the specific threats or events which may
infrastructure vulnerability, is largely absent in the generate negative outcomes for a population or
existing literature. While multiple facets of infra- infrastructure system (Sage and White 1980). Again,
structure vulnerability are certainly addressed in knowledge (or lack thereof) of these threats does not
other work (ASCE 2005; Pederson et al. 2006; decrease exposure (Holton 2004), but a systematic
Murray and Grubesic 2007), the failure to provide an understanding of, and planning for potential threats
overarching framework for categorizing these facets can help reduce vulnerability.
is a major oversight. Given the geographic emphasis Although the fundamental concept of vulnerability
of the taxonomy developed in this paper, it is hopedis related to the susceptibility of people, places and
that this will serve as a useful multiscalar (i.e. global, infrastructure to disruptive events, there are elements
regional and local) framework for developing more of uncertainty associated with how, when and where
effective and holistic policy, planning and disaster these events will occur. For example, although the
mitigation efforts. timing of earthquakes has proven exceedingly diffi-
In the next section, a brief review of the vocab- cult to predict, the scientific community has devel-
ulary, terms and literature that examines the spatial oped a relatively good understanding of which areas
and temporal context of infrastructure vulnerability is are vulnerable to major seismic events (USGS 2008).
provided. This is followed by the introduction of a It is also important to acknowledge that vulnera-
typological framework for categorizing infrastructurebility comprises elements of sensitivity and response.
vulnerability. This paper is concluded with a briefFor instance, some infrastructure systems are more
discussion and provide a roadmap for future research.resilient (i.e. able to recover or respond quickly) to
disruptions than others. Portions of this resilience can
often be attributed to careful planning (e.g. organized
Vulnerability vocabulary evacuations, availability of shelter, water, food and
medical supplies) and through good infrastructure
The concept of vulnerability is multifaceted (Adger design (e.g. retrofitted buildings, redundant and
2006). By definition, vulnerability means suscepti- diverse supply and distribution systems, etc.). From
bility to injury or attack (MW 2008a). However, there a social perspective, Cutter and Finch (2008: 2301)
are a number of pre-conditions that are required for note that response is also a multidimensional
<0 Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
Geojournal (2013) 78:287-301 289
Temporal
The spatial and temporal aspects of vulnerability
In addition to the spatial implications of infrastruc-
Given the complex interplay of vulnerability and ture vulnerability and failure, systems and their use
failure, it is also important to note that the demand for are rarely static - requiring the acknowledgement of
â Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
290 Geojournal (2013) 78:287-301
temporal dimensions of
most recent (2009) vulnerabilit
evaluation are sobering. Aviation,
overly dams, drinking
generalized statementwater, energy, hazardous
for waste, spa
provided inland waterways,
previously, the levees, roads,
"when"schools, transit, of
structure and wastewater allis
disruptions received grades of D-f, D or as
equally im
"where". For D- (ASCE 2009). Essentially,
example, if we a "D" quality level in
revisit
electrical disruptions, the
the ASCE report means temporal
that the infrastructures are
ated with not functioning
outages can inbe a safe and reliable manner,
quite pron
the teetering on collapse.
use
electricity of oftenThe question is,spikes
why? More b
winter (heating) and
importantly, how do summer
these conditions contribute to mon
temperate, mid-latitude
infrastructure vulnerability? climates (
loss of electricity during
As discussed these
in the previous sections, peri
vulnerability
problematic manifests
than duringin a variety of ways. Both spatial and spr
milder
months when climate related
temporal aspects of the level of demand for ahealth
service
heat stroke or are of obvious importance.
hypothermia) may be
Switching sectorsHowever,
for othera
dimensions
moment, of vulnerability do tem
can also be examined at a much smaller scale. exist for critical infrastructures. In this section, we
Consider the loss of telecommunications services to a will introduce these additional considerations and
residential household at 3 a.m. versus 7 p.m. The propose a typological framework for better under-
impacts of the 3 a.m. loss are likely less problematic standing their contributions to vulnerability. Figure 1
than the same loss at 7 p.m., when the demand and presents a depiction of our typological framework
use of broadband services is highest. It is also and displays eight distinct facets of infrastructure
important to note that larger temporal windows (e.g. vulnerability, including condition, capacity and use ,
decadal or multi-decadal) also impact vulnerability of obsolescence , location and topology , interdependen-
populations and infrastructure. The duration of a ces , disruptive threats , policy and political environ-
disruption is also relevant. As evident from the 9/1 1 ment , and safeguards. While this is not an exhaustive
attacks, although backup systems (e.g. emergency list, largely ignoring issues related to economic and
power supply) can provide a short-term bridge for social vulnerability, we believe it captures the bulk of
operational continuity, they are not viable long-term those factors underlying the geographic aspects of
substitutes (Grubesic and Murray 2006), frequently infrastructure systems. Individually, each of these
failing prior to initialization or simply running out of
alternative energy supplies (i.e. diesel).
Regardless of how one conceptualizes vulnerabil-
ity in time and space, infrastructures maintain a range
complex relationships (amongst and between each
other) and characteristics that contribute to their
vulnerability. As a result, efforts directed at main-
taining the operational continuity of critical infra-
structure systems must be driven by a broader
understanding of vulnerability. In the next section, a
typological framework for categorizing infrastructure
vulnerability is proposed to address these issues.
Ô Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
GeoJournal (201 3) 78:287-301 291
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
292 Geojournal (2013) 78:287-301
projected to condition/decay.
exceed 1 Specifically,
billion while obsolete infra-
by 20
sufficient structure canexists
capacity be in poor condition inor a decayed
this s
state, this is not
According to the always the case. Simply
ASCE put, brand
(2005), f
"significant new components can be obsolete, particularly inve
infrastructure if
delays are they do not meet
expected to cost th current application standards.3
$170 billion Obviously, things 2000
between get more complexandwhen engi-2012
In this type ofneered systems and critical infrastructure
operating are exam-
environ
induced ined for both obsolescence
vulnerability and condition. As noted
manifests in
instance, if we by the ASCE (2009), while
revisit the many infrastructure
capacity
ciated with systems are in extremely
airports, many poor condition,
major it is
capacity extremely difficult
to handle to say if one or more parts
traffic are
durin
According to obsolete. Analysis
Forrey at this minute scale
(2007), is time
preside
Air Traffic consuming, costly and
Controllers Associatio requires a significant invest-
were scheduled ment of
tohuman resources.
depart from
Unfortunately, it is all toobetween
International Airport frequent that one of the 9
on September parts
5, of an infrastructure system
2007, only is linked to a45
accommodated.catastrophic
Two system malfunction.
days For example,
later, one of a
occurred in Chicago at O'Hare
the most high-profile infrastructure failures in the last I
lack of capacity25 years was the collapse of airports
makes the Interstate 35 W
Bridge in Minneapolis,
significant ground control Minnesota indelays
August 2007. p
cient Killing 13 of
functioning people andboth
injuring nearly 100 more, the
airlines
for passengers. Nationalother
In Transportation and Safety Board (NTSB
infrastruct
of capacity has 2008) investigation revealed
similar several problems asso-
impacts. Fo
disrupted ciated with
systems arebridge design
unableand its structuralto
condi- rer
a lack tions. Post-collapse
capacity, of the analysis indicates that the bridge
ability for a
was constructed
and readjust after a disruption with gusset plates that were too thin i
for connecting steel beams
telecommunications in the truss bridge. In fact,
systems, th
the gusset plates were
congestion collapse is aboutparticular
50% too thin for this
particular application, resulting in sixteen
(Nagle 1984; Albuquerque et platesal. 2
with the loss of high bandwidth l
width connections are forced t
packets. If the remaining
Footnote 2 continued lower ba
overloaded with transmission
little throughput is available in the system. As a result, high r
increases in the system and con
levels of latency, packet delay and loss emerges (Johari and
Tan 2001).
becomes a possibility (Johari an
A good analogy here is the eight-track audio cartridge. While
querque et al. (2004).2
it is possible to design, produce and use a brand new eight-
track cartridge today, the technology is obsolete and the sound
2 Congestion collapse occurs when an overloaded network has quality, relative to digital audio technologies (e.g. compact
settled into a stable state, where traffic demand is high, but disc) is poor.
^ Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
GeoJournal (201 3) 78:287-301 293
â Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
294 GeoJournal (2013) 78:287-301
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
Geojournal (2013) 78:287-301 295
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
296 Geojournal (2013) 78:287-301
Disruptive threats
communications
tion to the loss of
The set of region
potential (Louisiana
threats to cri
highly diverse, eight 911
ranging call na
from ce
ical disasters to sabotage.
many of Consid
the mos
overall spatial were lost
distribution to
of flo
na
United States. House 2006).
Schmidtlein Iro
et
clusters of environmental
systems threat
that man
Plains (tornadoes and flooding
problems. In mo
(hurricanes and tropical
lines were storms)
overw
fornia (wildfiresnating and earthquake
from the
that other Combine these telecommunication
regions are losses with the
devoid of
1965 and 2004 natural disasters
damage done to transportation infrastructure, levees, w
the previously identified
the electrical areas
system, hospitals and most govern-
2008). mental buildings in New Orleans, the severity of this
The now classic example
natural disaster at the local and regionalof
level is a
disaster, Hurricane
apparent. Katrina, ex
ronmental threats
While Katrina wasand
an extreme eventthe
that garnered inter
and storm surge wreaked
national attention, there are also many smaller-scale hav
structure systems atthreats
environmental and technological local
that occur on and
example, in the
a weekly,report A
monthly or yearly basis in the Failure
United States
by the U.S. House of
that do not generate significant, Represe
long-term attention
brief inventory of
although they damage
can be similarly damaging to specific to th
Ö Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
GeoJournal (2013) 78:287-301 297
infrastructure sectors. Winter storm related losses in Sarewitz et al. (2003) explore six different "asser-
the Northeastern U.S. exceeded $45 million between tions" associated with both vulnerability and risk in the
1971 and 2007 Changnon (2008). Similarly, techno- context of policy, ranging from the need for acquiring
logical threats, such as the Baltimore Freight Rail accurate probabilistic information about extreme
Crash of 2001 which generated a chemical fire that events to understanding that such events are context
burned for nearly a week, ruptured a water main that driven. Consider, for example, the impacts of political
caused streets to flood, disrupted East Coast rail and economic rows between countries (or corpora-
service and slowed the Internet are also extremely tions) on the operational continuity of critical infra-
disruptive to a wide variety of sectors (NTSB 2004). structure systems. In 2008, Gazprom, headquartered in
While natural and technological disasters are unin- Russia and one of the largest oil and natural gas
tended, Sabotage and terrorist attacks are acts of companies in the world claimed that Ukrainian held
subversion with the direct intent to inflict physical and gas company, Naftogaz Ukrainy, owed it more than
emotional damage to people, property and critical $2 billion in missed payments and fines. Naftogaz
infrastructure. Although the terrorist attacks of Sep- Urkainy countered that they had paid the bill and that
tember 1 1, 2001 provide the most horrific example of Gazprom was trying to force a new price for gas which
such events, there are many others. For example, it could not afford. In a response to this disagreement,
during the initial stages of the U.S. war in Iraq, acts of Gazprom completely shut down its supply pipelines to
sabotage crippled critical infrastructure systems the Ukraine (Kramer 2009). While this may appear to
throughout the country. Glanz (2004) notes that over be a relatively isolated geographic incident, it is
100 electrical backbone lines were cut between 2003 important to note that Austria, Turkey, the Czech
and 2004, with 1,200 transmission towers toppled.Republic, Germany and Greece were impacted by the
Even after President Bush declared the end of major shutdown, forcing these nations to seek alternate
hostilities in Iraq (April 2003), over 200 oil pipeline supply sources for nearly a week. As a result of this
attacks occurred (April 2003 through December 2004), crisis, the Nabucco Pipeline project was developed,
primarily along the 600-mile, 40-inch Kirkuk-Ceyhan seeking to route alternative supplies of natural gas to
pipeline (Luft 2005). Europe via Turkey (Lyons 2010) - lessening Europe's
Interestingly, sabotage is not always committed by dependence on Russian supplies and its politically
outside threats such as terrorists or guerilla armies. Invulnerable distribution system.
many instances, acts of sabotage are committed by In a similar vein, geopolitical context also impacts
"insiders". As noted by Keeney (2005), these are homeland security policy in the United States. With the
typically individuals who were authorized to userecent failures of command and control infrastructures
infrastructure or its associated support systems (e.g.in the U.S. due to extreme events such as the
SCADA) that eventually leveraged this access to September 1 1th attacks and Hurricane Katrina, home
perpetrate a destructive act. Results of this detailed land security policy and vulnerability planning
study also reveal that 59% of the saboteurs were slowly moving to a more regionalized structure. For
former employees or contractors while 41% wereexample, Caruson and MacManus (2007) argue tha
currently engaged with the victimized company. The strongly integrated regional systems help overcome
vast majority of the insiders were employed in the multiplicity of state agencies and local govern-
technical positions and 96% were male. In additionments during disasters, facilitating stronger vertical
to citing odd pre-attack behavior around the office by (e.g. federal-state-local) and horizontal (local-local
the saboteurs, it was determined that the majority ofnetworks. In essence, these stronger and better-
perpetrated attacks were accomplished using com-integrated networks allow state and local government
pany computer equipment (Keeney 2005). to "harness the collective benefits of shared resources
and information: (Caruson and MacManus 2007, 1)".
Policy and political environment
Safeguards
From a political and policy perspective, vulnerability
is somewhat more difficult to define than many of the A final influence on infrastructure vulnerability is the
other facets of previously discussed. For example,presence and effectiveness of safeguards. In general,
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
298 Geojournal (2013) 78:287-301
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
GeoJournal (201 3) 78:287-301 299
Condition - A A
Safeguards A AAA
user demand, this can be a difficult task when operational strategies for critical infrastructure sys-
simultaneously attempting to reduce vulnerabilities. tems with more locational flexibility such as critical
Users must be able to access the system somewhere, stockpiles of emergency supplies (Church and Scap-
even if this access increases systematic exposure to arra 2007). These can be moved, albeit with some
risk. Not surprisingly, the need to serve infrastructure effort, to both minimize vulnerability and maximize
demand often results in relatively "problematic" accessibility.
clusters or agglomerations of critical infrastructure in In sum, regardless of the functional representation
certain locations (Parfomak 2005). For example, of vulnerability, or the selection of strategies for
considering that over 45% of U.S. securities are vulnerability mitigation, it is clear that the acquisi-
traded in the American Stock Exchange and New tion, analysis and synthesis of data from a wide
York Stock Exchange in lower Manhattan, A targeted variety of sources is needed to determine the specific
strike to this area, much like the events of September nature of vulnerability for infrastructure systems.
11th, 2001, could yield massive disruptions to theMore importantly, understanding both where and
global marketplace. The question is, how can suchwhen systems may be vulnerable to disruption is
vulnerabilities be mitigated? important for developing disaster mitigation plans
Again, while there is no single 'best' strategy, aand policies structured to minimize systemic weak-
variety of approaches have been recommended. For nesses. Further, as outlined by Murray et al. (2008),
example, during the Cold War era, the Long Linesthe ability to utilize multiple methods for better
Division of AT&T was particularly concerned withidentification and understanding vulnerability is
the vulnerability of critical telecommunications essential - ranging from strategy-specific, simula-
infrastructure in both the military and civilian sectorstion-based and mathematical modeling assessments.
to nuclear attack. In an effort to mitigate the In conclusion, while the presented typological
vulnerability of these systems, AT&T recommended framework for categorizing infrastructure vulnerabil-
a series of geographic strategies, including network ity is both complex and multifaceted, significant work
diversification, separation, avoidance and hardening is still required to capture the many nuances of
to minimize the impacts of a nuclear detonation on vulnerability through space and time and across and
their telecommunication equipment. For more details between systems. As suggested by Sarewitz et al.
on these strategies, see Grubesic and Murray (2005). (2003), extreme events are created by context - and
Obviously, these types of strategies are not always context is highly dynamic. So, while it may be nearly
possible; particularly if there are geographic con- impossible to concretely identify every conceivable
straints (e.g. immobility) associated with critical vulnerability within an infrastructure system, this
infrastructure systems (e.g. oil refining capacity does not absolve policy makers and analysts of their
clustered along the Gulf Coast). However, there are responsibility to explore the complex mesh of
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
300 GeoJournal (2013) 78:287-301
Adger, N. (2006). Vulnerability. Global Environmental Grubesic, T. H., Matisziw, T. C., Murray, A. T., & Snedicker,
Change , 16( 3), 268-281. D. (2008). Comparative approaches for assessing network
Albuquerque, C, Vickers, B. J., & Suda, T. S. (2004). Network vulnerability. International Regional Science Review,
border patrol: Preventing congestion collapse and pro- 31('), 88-112.
moting fairness in the Internet. IEEE/ACM Transactions Grubesic, T. H., & Murray, A. T. (2005). Spatial-historical
on Networking, 72(1), 173-186. landscapes of telecommunication network survivability.
American Association of State and Highway Transportation Telecommunications Policy, 29(11), 801-820.
Officials (AASHTO) (2004). LRFD-US-3. Bridge design Grubesic, T. H., & Murray, A. T. (2006). Vital nodes, inter-
specifications. connected infrastructures and the geographies of network
American Society for Civil Engineers (ASCE) (2005). Report survivability. Annals of the Association of American
card for America's infrastructure. URL: http://www.asce. Geographers, 96(1), 64-83.
org/reportcard/2005/index.cfm. Grubesic, T. H., Murray, A. T., & Mefford, J. N. (2007).
American Society for Civil Engineers (ASCE) (2009). Report Continuity in critical network infrastructures: Accounting
card for America's Infrastructure. URL: http://www.mfra for nodal disruptions. In A. T. Murray & T. H. Grubesic
structurereportcard.org/sites/default/files/RC2009_full_ (Eds.), Critical infrastructure : Reliability and vulnera-
report.pdf. bility. Berlin: Springer.
Associated Press (AP) (2008). Firefighters contain massive gas Holton, G. A. (2004). Defining risk. Financial Analysts Jour-
fire in Tenn. URL: http://www.msnbc.msn.com/id/2302 nal, 60(6), 19-25.
3302/. Johari, R., & Tan, D. K. H. (2001). End-to-end congestion
Axelrod, R., & Cohen, M. D. (1999). Harnessing complexity: control for the Internet: Delays and stability. IEEE/ACM
Organization implications of a scientific frontier. New Transactions on Networking, 9(6), 818-832.
York: Free Press. Kaplan, S., & Garrick, B. J. (1981). On the quantitative defi-
Barron, J. (2007). Steam blast Jolts Midtown, killing one. New nition of risk. Risk Analysis, 1( 1), 11-27.
York Times. URL: http://www.nytimes.com/2007/07/ Keeney, M. (2005). Computer system sabotage in critical
1 9/nyregion/ 1 9explode .html . infrastructure sectors. U.S. Secret Service and CERT
Borden, K. A., Schmidtlein, M. C., Emrich, C. T., Piegorsch, Coordination Center/SEA, Washington, D.C.
W. W., & Cutter, S. L. (2007). Vulnerability of U.S. citiesKramer, A. E. (2009). Gazprom shuts off gas links to Ukraine.
to environmental hazards. Journal of Homeland Security New York Times. URL: http://tinyurl.com/3mb24nh.
and Emergency Management , 4(2). Lewis, T. G. (2006). Critical infrastructure protection in
Borgatti, L. (2005). Status of infrastructure in the LDCs: A homeland security. New York: Wiley.
cluster analysis. Background paper prepared for the least Lichtenstein, A. G. (1993). The Silver Bridge collapse
developed countries report 2006, UNCTAD, Geneva. recounted. Journal of Performance of Constructed
Caruson, K., & MacManus, S. A. (2007). Designing homeland Facilities, 7(4), 249-261.
security polity within a regional structure: A needs Luft, G. (2005). Pipeline sabotage is terrorist's weapon of
assessment of local security concerns. Journal of Home- choice. Energy Security. URL: http://www.iags.org/n0328
land Security and Emergency Managementy 4(2), 1. 051.htm.
Changnon, S. A. (2008). Losses from sleet storms in the UnitedLyons, W. (2010). Nabucco at center of gas politics. Wall
States. Natural Hazards , 47 , 465-470. Street Journal. URL: http://tinyurl.com/yehbd9g.
Church, R. L., & Scaparra, M. P. (2007). Protecting criticalMack, E. A., & Grubesic, T. H. (2009). Broadband provision
assets: The r-interdiction median problem with fortifica- and firm location in Ohio: An exploratory spatial analysis.
tion. Geographical Analysis, 39(2), 129-149. Tijdschrift voor Economische en Sociale Geografie,
Cutter, S. L. (2006). Hazards , vulnerability and environmental 100(3), 298-315.
justice. London: Earthscan Publications. Marland, G., & Weinberg, A. M. (1988). Longevity of infra-
Cutter, S. L., & Finch, C. (2008). Temporal and spatial changes structure. In J. H. Ausubel & R. Herman (Eds.), Cities and
in social vulnerability to natural hazards. Proceedings of their vital systems. Washington, DC: National Academy
the National Academy of Sciences, 108(1), 2301-2306. Press.
Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms
GeoJournal (2013) 78:287-301 301
Ô Springer
This content downloaded from 14.139.58.194 on Sun, 04 Mar 2018 04:21:59 UTC
All use subject to http://about.jstor.org/terms