• Publications
  • Influence
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. I: Theory and Methodology
The paper discusses the theory and methodology supporting the development of the inoperability input-output model (IIM). The IIM is based on Leontief’s input-output model, which characterizesExpand
  • 304
  • 12
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. II: Case Studies
The paper discusses case studies of the inoperability input-output model (IIM) for modeling impacts of willful attacks on interdependent sectors. The IIM is a model for assessing sectorExpand
  • 183
  • 5
A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention thanExpand
  • 62
  • 5
The potential for underinvestment in internet security: implications for regulatory policy
TLDR
We construct a game-theoretic model that addresses the economic motivations for investment in added Internet security and makes a case for a possible market failure in the form of underinvestment in the provision of Internet security. Expand
  • 37
  • 2
  • PDF
Economic costs of firm‐level information infrastructure failures: Estimates from field studies in manufacturing supply chains
Purpose – This paper presents a method for estimating the macro‐economic cost of a firm‐level information system disruption within a supply chain.Design/methodology/approach – The authors combineExpand
  • 31
  • 2
  • PDF
Adaptive Two-Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence Analysis
Intelligence gathering and analysis for countering terrorism is a vital and costly venture; therefore approaches need to be explored that can help determine the scope of collection and improve theExpand
  • 26
  • 2
A System-Aware Cyber Security architecture
TLDR
A new systems engineering focused approach for mitigating such risks is introduced, integrating fault-tolerant system design concepts with advanced cyber security concepts. Expand
  • 38
  • 1
  • PDF
The Importance of Architecture in DoD Software
Abstract : This paper argues that in the face of declining military budgets and increasingly diverse threats, the key to making defense systems more flexible, while keeping costs down, is to procureExpand
  • 22
  • 1
Homeland security preparedness: Balancing protection with resilience in emergent systems
TLDR
The report of the President’s Commission on Critical Infrastructure Protection [PCCIP, Executive Order 13010, The White House, Washington, DC, 1997] which was issued in October 1997 set in motion a revolutionary and expensive national homeland security initiative. Expand
  • 28
  • 1
Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism
TLDR
A risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism builds on the premise that in planning, supporting, and carrying out a terrorist plot, those involved will conduct a series of related activities. Expand
  • 25
  • 1