Advertisement

Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry

  • Felicjan Rydzak
  • Lars S. Breistrand
  • Finn Olav Sveen
  • Ying Qian
  • Jose J. Gonzalez
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4166)

Abstract

The transition to eOperations in the Norwegian oil and gas industry is expected to yield up to 30% reduction in costs and 10% increase in production. But new information security risks are introduced by substituting traditional offshore operations like drilling, production, delivery, etc, mostly locally operated at the offshore platforms with increasing remote onshore operation via computer networks. In eOperations, security incidents can have serious safety and performance implications. Using a generic risk matrix from case studies and a conceptual system dynamics model we explore policies for resource allocation to production and to security/safety. The simulation model allows studying the resilience of the system depending on management policies and incidents as represented in the risk matrix. We show that there is a region where the system behaviour is very sensitive to changes in resource allocation and to incidents.

Keywords

Information Security Security Level Incident Type Security Incident Multiple Incident 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Johnsen, S.O., Line, M.B., Askildsen, A.: Towards more secure virtual organizations by implementing a common scheme for incident response management. In: Eight International Conference on Probabilistic Safety Assesment and Management (PSAM8), New Orleans (2006)Google Scholar
  2. 2.
    Lipson, H.F.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, p. 85. CERT Coordination Center, Pittsburgh (2002)Google Scholar
  3. 3.
    Gonzalez, J.J., et al.: Helping Prevent Information Security Risks in the Transition to Integrated Operations. Telektronikk 101(1), 29–37 (2005)Google Scholar
  4. 4.
    Rich, E., Gonzalez, J.J.: Maintaining Security and Safety in High-threat E-operations Transitions. In: Hawaii International Conference on System Sciences, Hawaii (2006)Google Scholar
  5. 5.
    Repenning, N.P., Sterman, J.D.: Nobody ever gets credit for fixing problems that never happened. California Management Review 43(4), 64–88 (2001)Google Scholar
  6. 6.
    Sterman, J.D.: Business Dynamics: Systems Thinking and Modeling for a Complex World. McGraw-Hill/Irwin, Boston (2000)Google Scholar
  7. 7.
    Heifetz, R.A., Linsky, M.: Managing Yourself: A Survival Guide for Leaders. Harvard Business Review 8(6), 65–74 (2002)Google Scholar
  8. 8.
    Holling, C.S.: Resilience and Stability of Ecological Systems. Annual Review of Ecology and Systematics 4, 1–23 (1973)CrossRefGoogle Scholar
  9. 9.
    Gunderson, L.H., Holling, C.S., Light, S.S.: Barriers and bridges to renewal of ecosystems and institutions. Columbia University Press, New York (1995)Google Scholar
  10. 10.
    Carpenter, S.R., et al.: From Metaphor to Measurement: Resilience of What to What? Ecosystems 4, 765–781 (2001)CrossRefGoogle Scholar
  11. 11.
    Hammer, M., Champy, J.: Reengineering the Corporation. Harper Business, New York (1993)Google Scholar
  12. 12.
    Stoltz, P.: Building resilience for uncertain times. Leader to Leader 31(4), 16–17 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Felicjan Rydzak
    • 1
  • Lars S. Breistrand
    • 1
  • Finn Olav Sveen
    • 1
  • Ying Qian
    • 1
  • Jose J. Gonzalez
    • 2
  1. 1.Centre for Advanced Manufacturing TechnologiesWroclaw University of TechnologyWroclawPoland
  2. 2.Research Cell “Security and Quality in Organizations”, Faculty of Engineering and ScienceAgder University CollegeGrimstadNorway

Personalised recommendations