0000000000315761

AUTHOR

Ying Qian

showing 4 related works from this author

Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk

2009

Abstract The protection of critical infrastructure requires an understanding of the effects of change on current and future safety and operations. Vulnerabilities may emerge during the rollout of updated techniques and integration of new technology with existing work practices. Managers need to understand how their decisions, often focused on economic priorities, affect the dynamics of vulnerability over time. Such understanding is difficult to obtain, as the historical data typically used for decision support, prediction and forecasting may not be available. We report on the use of group model building and simulation to consider proactively the effects of a 10-year, multi-billion dollar mo…

Decision support systemInformation Systems and ManagementTechnological changeManagement scienceComputer scienceProcess (engineering)VulnerabilityIntegrated operationsCritical infrastructureComputer Science ApplicationsRisk analysis (engineering)Vulnerability assessmentModeling and SimulationProblem domainSafety Risk Reliability and QualityInternational Journal of Critical Infrastructure Protection
researchProduct

Managing information security risks during new technology adoption

2012

Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…

General Computer Sciencedelaybusiness.industryinformation security managementVDP::Technology: 500::Information and communication technology: 550Context (language use)Information securityIntegrated operationsComputer securitycomputer.software_genreProblem managementreactive investmentInformation security managementRisk analysis (engineering)Information and Communications Technologyproactive investmentsystem dynamicsintegrated operationsbusinessLawcomputerRisk managementVulnerability (computing)Computers & Security
researchProduct

Insights from a Computer Simulation Model of a Landslide Disaster

2015

Disasters do not follow scripts and the management of disasters requires that responders act as "emergent organizations". We argue that a computer simulation model of the management of a major landslide suggests a disequilibrium-experimenting-emergence process in terms of feedback loops (Performance adjustment, Cognitive load causes errors, Communication mismatch causes errors, and Learning). Arguably, improvement of the drivers of such feedback could help improve the management of disasters.

Process managementKnowledge managementEmergency managementComputer scienceProcess (engineering)business.industryLandslidebusiness2015 48th Hawaii International Conference on System Sciences
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct