Critical Infrastructures, Key Resources, Key Assets by Adrian V. Gheorghe Dan V. Vamanu Polinpapilinho F. Katina & Roland Pulfer
Author:Adrian V. Gheorghe, Dan V. Vamanu, Polinpapilinho F. Katina & Roland Pulfer
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
A Complex Situation shows a living system of systems landscape and there involved and concerned entities driven by a specific stressor (event) under specific circumstances. Each component is documented as a model with all their capabilities, attributes, and dependencies.
To avoid useless complexity instead of a comprehensive system of system description, a system of system landscape can be documented with interconnected system context (well-defined disjunctive or overlapping number of artifacts). The purpose of each individual system context or the related system of systems with all their standardized entities (artifacts) and dependencies is to outlined and characterized all required attributes, rules, and exceptions. A special aggregation of elements (cluster of artifacts) in key resources, key assents as well as their key collaborations and interfaces exists to follow the expanded standard of homeland security.
Depending on the maintenance cycle or the degree of interconnection to the real existing system landscape in operation, quality, maturity as well as the trust of information can be measured or calculated based on a set of predefined rules. For each artifact, system, system of systems, or system context , the related governance with the individual mapped responsibility, accountability, concerned or involved parties can be mapped, characterized, measured, and assessed. The governance self is divided between person (Holder), role, job, board, and the related organizational definition. By the fact that each artifact covers attributes (responsible, accountable, concerned, and involved) as link to person and role, the entire governance can be sustainable documented .
The system of systems resilience description depends on each individual system context, the related dependency, the specified governance, and the applied risk-ability (capability to identify, assess, mitigate, control, and monitor risks with their dependencies), the applied and validated type of actions (manage, control, and mitigate risk) as well as individual rules and attributes. Each context is assessed and depends on the outcome of feasibility and manageability assessment positioned on a four-quadrant map where also the fragility and solvability of a system context can be shown.
Related to the stakeholder dependency risk perception and consequences can be identified, documented, calculated, reviewed, implemented, and visualized related to their governance. Dependent of all individual available attributes, rules, facts and figures and indicators the performance, conformance and change-related description can be developed, documented, and visualized. If all required dynamic capabilities are outlined the system ability to manage and improve performance (perform-ability), to fulfill internal and external legal requirements, internal policies and rules (conform-ability), to close required modifications, requests for change or planned improvements (change-ability) as well as to understand, mitigate and monitor identified risks (risk-ability) a comprehensive and sustainable system of system documentation is characterized and available.
All the abilities are summarized to an aggravated behavior of a system of systems landscape call dynamic capabilities. One ought to ask: are dynamic capabilities required? or are present capabilities capable of managing and transforming a system of systems landscape? At any time, all or a required part of dynamic capabilities with all the related entities can be clustered to support an assessment. In this case assessment is driven to support a comprehensive vulnerability 9 analysis.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Secret History by Donna Tartt(18083)
The Social Justice Warrior Handbook by Lisa De Pasquale(11941)
Thirteen Reasons Why by Jay Asher(8416)
This Is How You Lose Her by Junot Diaz(6411)
Weapons of Math Destruction by Cathy O'Neil(5800)
Zero to One by Peter Thiel(5461)
Beartown by Fredrik Backman(5304)
The Myth of the Strong Leader by Archie Brown(5217)
The Fire Next Time by James Baldwin(4998)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4940)
Promise Me, Dad by Joe Biden(4899)
Stone's Rules by Roger Stone(4833)
100 Deadly Skills by Clint Emerson(4661)
Rise and Kill First by Ronen Bergman(4536)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4532)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4359)
Secrecy World by Jake Bernstein(4354)
The Farm by Tom Rob Smith(4305)
The Doomsday Machine by Daniel Ellsberg(4233)
