Abstract
The concept of vulnerability is increasingly important in engineering and the socio-economic planning sciences, particularly given the enormous costs associated with addressing it. The ability to identify and mitigate vulnerabilities is extremely challenging because it is influenced by a complex and dynamic set of interacting factors that can compromise social, economic and infrastructure systems. Where the latter is concerned, the ability to assess infrastructure vulnerability involves the consideration of a range of physical, operational, geographical and socio-economic characteristics. In this paper, significant elements of infrastructure vulnerability are identified and discussed with a focus on their intrinsic spatial nature and their propensity to interact across space. Further, the developed typology of vulnerability outlined in this paper emphasizes the need to ensure that policy, planning and disaster mitigation efforts are strongly integrated at global, regional and local levels.
Similar content being viewed by others
Notes
According to the ASCE (2009), A dam’s “hazard potential” is classified on the basis of the anticipated consequences of failure, not the condition of the dam. The classifications include “high hazard potential” (anticipated loss of life in the case of failure), “significant hazard potential” (anticipated damage to buildings and important infrastructure), and “low hazard potential” (anticipated loss of the dam or damage to the floodplain, but no expected loss of life).
Congestion collapse occurs when an overloaded network has settled into a stable state, where traffic demand is high, but little throughput is available in the system. As a result, high levels of latency, packet delay and loss emerges (Johari and Tan 2001).
A good analogy here is the eight-track audio cartridge. While it is possible to design, produce and use a brand new eight-track cartridge today, the technology is obsolete and the sound quality, relative to digital audio technologies (e.g. compact disc) is poor.
While a significant portion of pipeline infrastructure is subterranean, a tornado recently hit a natural gas pumping station in Tennessee (AP 2008), generating a massive fire.
References
Adger, N. (2006). Vulnerability. Global Environmental Change, 16(3), 268–281.
Albuquerque, C., Vickers, B. J., & Suda, T. S. (2004). Network border patrol: Preventing congestion collapse and promoting fairness in the Internet. IEEE/ACM Transactions on Networking, 12(1), 173–186.
American Association of State and Highway Transportation Officials (AASHTO) (2004). LRFD-US-3. Bridge design specifications.
American Society for Civil Engineers (ASCE) (2005). Report card for America’s infrastructure. URL: http://www.asce.org/reportcard/2005/index.cfm.
American Society for Civil Engineers (ASCE) (2009). Report card for America’s Infrastructure. URL: http://www.infrastructurereportcard.org/sites/default/files/RC2009_full_report.pdf.
Associated Press (AP) (2008). Firefighters contain massive gas fire in Tenn. URL: http://www.msnbc.msn.com/id/23023302/.
Axelrod, R., & Cohen, M. D. (1999). Harnessing complexity: Organization implications of a scientific frontier. New York: Free Press.
Barron, J. (2007). Steam blast Jolts Midtown, killing one. New York Times. URL: http://www.nytimes.com/2007/07/19/nyregion/19explode.html.
Borden, K. A., Schmidtlein, M. C., Emrich, C. T., Piegorsch, W. W., & Cutter, S. L. (2007). Vulnerability of U.S. cities to environmental hazards. Journal of Homeland Security and Emergency Management, 4(2).
Borgatti, L. (2005). Status of infrastructure in the LDCs: A cluster analysis. Background paper prepared for the least developed countries report 2006, UNCTAD, Geneva.
Caruson, K., & MacManus, S. A. (2007). Designing homeland security polity within a regional structure: A needs assessment of local security concerns. Journal of Homeland Security and Emergency Management, 4(2), 7.
Changnon, S. A. (2008). Losses from sleet storms in the United States. Natural Hazards, 47, 465–470.
Church, R. L., & Scaparra, M. P. (2007). Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis, 39(2), 129–149.
Cutter, S. L. (2006). Hazards, vulnerability and environmental justice. London: Earthscan Publications.
Cutter, S. L., & Finch, C. (2008). Temporal and spatial changes in social vulnerability to natural hazards. Proceedings of the National Academy of Sciences, 108(7), 2301–2306.
Fay, M., & Yepes, T. (2003). Investing in infrastructure: What is needed from 2000 to 2010? World Bank. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=636464.
Federal Aviation Administration (FAA) (2007). Capacity needs in the National Airspace System. URL: http://tinyurl.com/24attx.
Federal Emergency Management Administration (FEMA) (2008). Why dams fail. URL: http://www.fema.gov/hazard/damfailure/why.shtm.
Forrey, P. (2007). Airline delays and consumer issues. Testimony before the house transportation and infrastructure subcommittee on aviation. URL: http://tinyurl.com/5jftzn.
Glanz, J. (2004). Sabotage taking toll on Iraq’s power lines. New York Times. June 11.
Grubesic, T. H., Matisziw, T. C., Murray, A. T., & Snedicker, D. (2008). Comparative approaches for assessing network vulnerability. International Regional Science Review, 31(1), 88–112.
Grubesic, T. H., & Murray, A. T. (2005). Spatial-historical landscapes of telecommunication network survivability. Telecommunications Policy, 29(11), 801–820.
Grubesic, T. H., & Murray, A. T. (2006). Vital nodes, interconnected infrastructures and the geographies of network survivability. Annals of the Association of American Geographers, 96(1), 64–83.
Grubesic, T. H., Murray, A. T., & Mefford, J. N. (2007). Continuity in critical network infrastructures: Accounting for nodal disruptions. In A. T. Murray & T. H. Grubesic (Eds.), Critical infrastructure: Reliability and vulnerability. Berlin: Springer.
Holton, G. A. (2004). Defining risk. Financial Analysts Journal, 60(6), 19–25.
Johari, R., & Tan, D. K. H. (2001). End-to-end congestion control for the Internet: Delays and stability. IEEE/ACM Transactions on Networking, 9(6), 818–832.
Kaplan, S., & Garrick, B. J. (1981). On the quantitative definition of risk. Risk Analysis, 1(1), 11–27.
Keeney, M. (2005). Computer system sabotage in critical infrastructure sectors. U.S. Secret Service and CERT Coordination Center/SEA, Washington, D.C.
Kramer, A. E. (2009). Gazprom shuts off gas links to Ukraine. New York Times. URL: http://tinyurl.com/3mb24nh.
Lewis, T. G. (2006). Critical infrastructure protection in homeland security. New York: Wiley.
Lichtenstein, A. G. (1993). The Silver Bridge collapse recounted. Journal of Performance of Constructed Facilities, 7(4), 249–261.
Luft, G. (2005). Pipeline sabotage is terrorist’s weapon of choice. Energy Security. URL: http://www.iags.org/n0328051.htm.
Lyons, W. (2010). Nabucco at center of gas politics. Wall Street Journal. URL: http://tinyurl.com/yehbd9g.
Mack, E. A., & Grubesic, T. H. (2009). Broadband provision and firm location in Ohio: An exploratory spatial analysis. Tijdschrift voor Economische en Sociale Geografie, 100(3), 298–315.
Marland, G., & Weinberg, A. M. (1988). Longevity of infrastructure. In J. H. Ausubel & R. Herman (Eds.), Cities and their vital systems. Washington, DC: National Academy Press.
Matisziw, T. C., Murray, A. T., & Grubesic, T. H. (2008). Exploring the vulnerability of network infrastructure to disruption. Annals of Regional Science. doi:10.1007/s00168-008-0235-x.
Matisziw, T. C., Murray, A. T., & Grubesic, T. H. (2010). Strategic network restoration. Networks and Spatial Economics, 10(3), 345–361.
McDaniels, T., Chang, S., Peterson, K., Mikawoz, J., & Reed, D. (2007). Empirical framework for characterizing infrastructure failure interdependencies. Journal of Infrastructure Systems, 13(3), 175–184.
Merriam-Webster Dictionary (MW). (2008a). Vulnerability. URL: http://www.merriam-webster.com/.
Merriam-Webster Dictionary (MW). (2008b). Decay. URL: http://www.merriam-webster.com/.
Merriam-Webster Dictionary (MW). (2008c). Capacity. URL: http://www.merriam-webster.com/.
Minkel, J. R. (2008). The 2003 Northeast blackout—Five years later. Scientific American. URL: http://www.scientificamerican.com/article.cfm?id=2003-blackout-five-years-later.
Murray, A. T., & Grubesic, T. H. (2007). Critical infrastructure: Reliability and vulnerability. Berlin: Springer.
Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2007). Critical network infrastructure analysis: Interdiction and system flow. Journal of Geographical Systems, 9(2), 103–117.
Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2008). A methodological overview of network vulnerability analysis. Growth and Change, 39(4), 573–592.
Murray, C. J. (2007). Fatigue could loom large in bridge collapse. Design News. URL: http://tinyurl.com/5jclc8.
Nagle, J. (1984). Congestion control in IP/TCP internetworks. Computer Communication Review, 14(4), 61–65.
National Research Council. (2006). Terrorism and the chemical infrastructure: Protecting people and reducing vulnerabilities. Washington, DC: National Academies Press.
National Transportation Safety Board. (2004). CSX freight train derailment and subsequent fire in the Howard street tunnel in Baltimore, Maryland, on July 18, 2001. URL: http://www.ntsb.gov/publictn/2004/RAB0408.htm.
National Transportation Safety Board. (2008). Transportation for tomorrow: Report of the National Surface Transportation Policy and Revenue Study Commission. URL: http://www.transportationfortomorrow.org/final_report/.
Parfomak, P. W. (2005). Vulnerability of concentrated infrastructure: Background and policy options. CRS Report for Congress. URL: http://www.hsdl.org/?view&doc=55205&coll=limited.
Pederson, P., Dudenhoeffer, D., Hartley, S., & Permann, M. (2006). Critical infrastructure interdependency modeling: A survey of U.S. and international research. Idaho National Laboratory. URL: http://tinyurl.com/6fzweo.
Perrow, C. (1999). Normal accidents: Living with high-risk technologies. Princeton, NJ: Princeton University Press.
Reid, R. L. (2008). The infrastructure crisis. Civil Engineering. January.
Richardson, H. W., Gordon, P., & Moore II, J. E. (2006). The economic impacts of terrorist attacks. Northampton, MA: Edward Elgar.
Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine. December 11–25.
Sage, A. P., & White, E. B. (1980). Methodologies for risk and hazard assessment: A survey and status report. IEEE Transactions on Systems, Man and Cybernetics, 10(8), 425–446.
Sarewitz, D., Pielke, R., & Keykhah, M. (2003). Vulnerability and risk: Some thoughts from a political and policy perspective. Risk Analysis, 23(4), 805–810.
Schmidtlein, M. C., Deutsch, R. C., Piegorsch, W. W., & Cutter, S. L. (2008). A sensitivity analysis of the social vulnerability index. Risk Analysis, 28(4), 1099–1114.
Tighe, S., Li, N., Falls, L. C., & Haas, R. (2000). Incorporating road safety into pavement management. Transportation Research Record, 1699, 1–10. doi:10.3141/1699-01.
Transportation Research Board. (2005). Inspection and management of bridges with fracture-critical details. URL: http://onlinepubs.trb.org/Onlinepubs/nchrp/nchrp_syn_354.pdf.
U.S.-Canada Power System Outage Task Force (USCPSOTF). (2004). URL: https://reports.energy.gov/.
United States Geological Survey (USGS). (2008). URL: http://earthquake.usgs.gov/.
United States House of Representatives. (2006). A failure of initiative: The final report of the select Bipartisan Committee to investigate the preparation for and response to Hurricane Katrina. URL: http://katrina.house.gov/full_katrina_report.htm.
White House. (2003). The national strategy for the physical protection of critical infrastructures and key assets. URL: http://www.whitehouse.gov/pcipb/physical.html.
Willis, H. L. (2002). Spatial electric load forecasting. New York: CRC Press.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Grubesic, T.H., Matisziw, T.C. A typological framework for categorizing infrastructure vulnerability. GeoJournal 78, 287–301 (2013). https://doi.org/10.1007/s10708-011-9411-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10708-011-9411-0