<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-39-00178</article-id><article-id pub-id-type="doi">10.35467/sdq/146789</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-2309-8464</contrib-id><name><surname>Sellevåg</surname><given-names>Stig Rune</given-names></name><email>stig-rune.sellevag@ffi.no</email></contrib><aff id="aff1">Total Defence Division, Norwegian Defence Research Establishment (FFI), Gunnar Randers vei 42, 2007, Kjeller, Norway</aff></contrib-group><pub-date pub-type="epub"><day>20</day><month>04</month><year>2022</year></pub-date><volume>39</volume><issue>3</issue><fpage>1</fpage><lpage>15</lpage><history><date date-type="received"><day>20</day><month>09</month><year>2021</year></date><date date-type="rev-recd"><day>14</day><month>02</month><year>2022</year></date><date date-type="accepted"><day>18</day><month>02</month><year>2022</year></date></history><permissions><copyright-statement>© 2022 S.R. Sellevåg published by War Studies University, Poland.</copyright-statement><copyright-year>2022</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>The objective of this work has been to propose a framework that will aid governments with the development of more coherent and effective infrastructure planning and resilience policies through a system-of-systems approach that is grounded in theory for complex sociotechnical systems. The framework has been developed by using a work domain analysis (WDA). The WDA consists of an abstraction hierarchy analysis and a part-whole decomposition. Together, the abstraction hierarchy and the part-whole description form the abstraction-decomposition space (ADS) for which the system constraints apply. By imposing constraints, the WDA promotes design for adaptation where actors within the system are allowed to adapt their behaviour as they find appropriate without violating the system’s constraints. The proposed ADS consists of five levels of abstraction and four levels of decomposition. By applying the ADS, it will aid decision making related to the overall purposes of the critical infrastructure system, the values and priority measures that are used to assess the system’s progress towards the functional purposes, as well as formulation of infrastructure needs that are necessary to achieve the functional purposes. The framework is formative in the sense that it reveals how work can be done in the critical infrastructure system. This is important because it is not feasible to prescribe, describe and risk assess all possibilities for action that are available in complex sociotechnical systems, especially when dealing with unforeseen events. Future research should focus on finding science-based yet useful in practice ways for establishing values and priority measures that encompass sustainability issues and resilience standards.</p></abstract><kwd-group><kwd>resilience</kwd><kwd>adaptation</kwd><kwd>critical infrastructures</kwd><kwd>national security</kwd><kwd>work domain analysis</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>The maintenance of vital societal functions and the supply of essential services by critical infrastructures under pressing conditions and without major failure is of utmost importance to our society. However, critical infrastructures are vulnerable to a multitude of stresses. Lessons from disasters like large-scale power outages (<xref ref-type="bibr" rid="ref1">Anderson <italic>et al</italic>., 2007</xref>; <xref ref-type="bibr" rid="ref5">Busby <italic>et al</italic>., 2021</xref>), terrorist attacks (<xref ref-type="bibr" rid="ref42">Santos, 2006</xref>), cyber-attacks (<xref ref-type="bibr" rid="ref19">Ghafur <italic>et al</italic>., 2019</xref>) and the still ongoing covid-19 pandemic (<xref ref-type="bibr" rid="ref21">Goel, Saunoris, and Goel, 2021</xref>) have shown that disruption of infrastructure-based services can directly or indirectly affect other critical infrastructures through a complicated web of interdependencies; not only affecting the national and global economy, but also our national security (<xref ref-type="bibr" rid="ref26">Lewis <italic>et al</italic>., 2013</xref>). The situation is exacerbated not only by mitigating the impacts of climate change, but also by the proliferation of digital technologies that continue to add complexity to our critical infrastructures as well as novel hybrid threats (<xref ref-type="bibr" rid="ref11">Cullen and Reichborn-Kjennerud, 2017</xref>; <xref ref-type="bibr" rid="ref20">Giannopoulos, Smith, and Theocharidou, 2021</xref>). Understanding the fragility induced by multiple interdependencies and improving the resilience of critical infrastructures therefore becomes a matter of urgency and a priority for national security (<xref ref-type="bibr" rid="ref9">Chang, 2009</xref>; <xref ref-type="bibr" rid="ref24">Helbing, 2013</xref>; <xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>; <xref ref-type="bibr" rid="ref40">Rinaldi, <italic>et al</italic>., 2001</xref>; <xref ref-type="bibr" rid="ref45">Vespignani, 2010</xref>). At the 2021 Brussels Summit, NATO Member States therefore agreed to enhance their resilience and to “develop a proposal to establish, assess, review and monitor resilience objectives to guide nationally-developed resilience goals and implementation plans” (<xref ref-type="bibr" rid="ref32">NATO, 2021a</xref>). However, NATO Allies do not provide any guidance on how to do so in the Summit Communiqué, which merely states that it “will be up to each individual ally to determine how to establish and meet national resilience goals and implementation plans” (<xref ref-type="bibr" rid="ref32">NATO, 2021a</xref>).</p><p>Critical infrastructures undergo constant interaction and exchange with their economic, social and natural environments. In addition, in free market economies, there is no single entity in control of the system. Critical infrastructures are therefore often characterised as complex sociotechnical systems (<xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>). Despite this insight since the seminal work by <xref ref-type="bibr" rid="ref40">Rinaldi <italic>et al</italic>. (2001)</xref>, conventional critical infrastructure protection strategies where risks are analysed, evaluated and treated individually as <italic>e.g</italic>. implied by the ISO 31000 standard, are still used. With increasing interconnectedness between critical infrastructure sectors following digital transformation and electrification, such strategies may lead to siloed risk management and are at the risk of becoming insufficient (<xref ref-type="bibr" rid="ref24">Helbing, 2013</xref>). The situation is exacerbated by the historically fragmented governance of critical infrastructures spanning several government departments (<xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>). Future strategies to strengthen the capability of critical infrastructures to cope with disruptions should therefore build on the principles of resilience and adaptation (<xref ref-type="bibr" rid="ref25">Hollnagel, Woods, and Leveson, 2006</xref>; <xref ref-type="bibr" rid="ref43">Schulman, 2022</xref>; <xref ref-type="bibr" rid="ref48">Woods, 2020</xref>).</p><p>Following <xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>. (2018)</xref>, we argue that the implementation of resilience and adaptation strategies for critical infrastructures at the national level is hampered by the low availability of easy-to-use frameworks building upon complexity theory-based system-of-systems approaches. Furthermore, as argued by <xref ref-type="bibr" rid="ref13">Dolan (2018)</xref>, with the absence of a shared strategic vision of the desired outcomes that infrastructure is expected to enable (purpose), it is not possible to fully evaluate system performance gaps or assess infrastructure needs. There is therefore a need for long-term, system-scale and cross-sector approaches to critical infrastructures resilience and planning efforts (<xref ref-type="bibr" rid="ref34">Otto <italic>et al</italic>., 2016</xref>).</p><p>Cognitive work analysis (CWA) is a well-suited framework for the analysis, design and evaluation of complex sociotechnical systems (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>). In particular, CWA defines the work demands for such systems in terms of constraints on actors, thus placing limits on behaviour (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>). Despite such limits, there are still many degrees of freedom for action in complex sociotechnical systems; in fact more than can be prescribed <italic>a priori</italic>. CWA therefore promotes designing for adaptation where actors within the system are allowed to adapt their behaviour as they find appropriate without violating the system’s constraints (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>). CWA is thus formative in the sense that it reveals how work can be done in a system. This is important because it is not feasible to prescribe, describe and risk assess all possibilities for action that are available in complex sociotechnical systems, especially when dealing with unforeseen events.</p><p>In this study, we propose CWA, in particular the work domain analysis (WDA) phase of CWA, as an approach to support critical infrastructure public policy decision-making at the national level. The novelty of this approach is that it will aid decision-makers with the development of more coherent and effective infrastructure planning and resilience policies through a system-of-systems approach that is grounded in theory for complex sociotechnical systems. In particular, the proposed approach will aid decision-making related to the overall purposes of the critical infrastructure system, the values and priority measures that are used to assess the system’s progress towards the functional purposes, as well as formulation of infrastructure needs that are necessary to achieve the functional purposes. The proposed approach complements and can be used in conjunction with other proposed approaches for infrastructure public policy decision-making (<xref ref-type="bibr" rid="ref13">Dolan, 2018</xref>; <xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>). To demonstrate the broad applicability of the framework, both civilian and defence-related critical infrastructure use cases will be exemplified.</p></sec><sec id="S2"><title>Methods</title><sec id="S2_1"><title>Work Domain Analysis</title><p>The CWA framework consists of five phases: work domain analysis (WDA), control task analysis, strategies analysis, social organisation and cooperation analysis and worker competencies analysis (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>). Only the WDA phase has been applied in this work. In the WDA phase, the functional structure of the system is described by identifying the purposes, values and priorities, functions, processes and object-related constraints of the work domain. As such, the WDA describe the fundamental reasons and resources for the different actors’ behaviour within the work domain (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>).</p><p>The WDA consists of an abstraction hierarchy analysis and a part-whole decomposition. Together, the abstraction hierarchy and the part-whole description form the abstraction-decomposition space (ADS) for which the system constraints apply. Since WDA is event-independent, the identified system constraints, <italic>e.g</italic>. the identified values and priorities, are applicable to many different situations, including unanticipated events.</p><p>The abstraction dimension of the WDA spans the set of concepts for describing the functional structure of the system (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>). This is done by employing the abstraction hierarchy method which uses means-ends links to show relationships between nodes across different levels of abstraction. Linked nodes above a node under consideration (the ‘what’) describe ‘why’ that node is required, while linked nodes below the node describe ‘how’ the node is achieved. In the context of this study, a node can <italic>e.g</italic>. be a critical infrastructure system or an infrastructure asset. By applying the how-what-why triad four times, an abstraction hierarchy for identification of critical entities providing essential services for maintaining vital societal functions can be developed as illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p><fig id="F1" orientation="portrait" position="float"><label>Figure 1.</label><caption><p>Five-level abstraction hierarchy with the how-what-why triad illustrated.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/146789/SDQ-39-00178-g001_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/146789/SDQ-39-00178-g001.jpg"/></fig><p>The abstraction hierarchy proposed in this work is a modification of the usual five-level abstraction hierarchy (<xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>), and consists of the following conceptual levels:</p><p><list list-type="order"><list-item><p><italic>Functional purposes</italic> – The overall purposes of the system;</p></list-item><list-item><p><italic>Values and priority measures</italic> – The values that are assessed and used to measure the system’s progress towards the functional purposes;</p></list-item><list-item><p><italic>Purpose</italic>-<italic>related functions</italic> – The generalised functions of the system that are necessary to achieve the functional purposes;</p></list-item><list-item><p><italic>Infrastructure-related processes</italic> – The functional capabilities of the system’s assets that enable the purpose-related functions;</p></list-item><list-item><p><italic>Assets</italic> – The system’s assets that undertake the infrastructure-related processes;</p></list-item></list></p><p>Here, the original term ‘physical objects’ has been replaced by ‘assets,’ which is considered to be more appropriate for describing infrastructures. This abstraction hierarchy is therefore consistent with the definition of infrastructure suggested by <xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>. (2018)</xref>, <italic>i.e</italic>. “the coordinated operation and management of a group of physical assets to perform a range of processes, thereby providing infrastructure services to users”.</p><p>It is important to note that the representations at the different levels of abstraction should be categories and not specific instances of a category. Furthermore, the means-ends relationships should be structural and not action means-ends relations (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>). Consequently, nouns rather than verbs should be used to describe the different functions and objects in the work domain.</p><p>The decomposition dimension of the WDA provides levels of granularity for describing the functional purpose of the system (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>). The levels of decomposition are connected by so-called part-whole relations; <italic>i.e</italic>., nodes at lower levels are functional parts of those at higher levels. For the purpose of this work and given the objectives of the proposed European Union (EU) COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>), the following levels of decomposition are found expedient for describing vital societal functions:</p><p><list list-type="order"><list-item><p>Whole system;</p></list-item><list-item><p>Sectors;</p></list-item><list-item><p>Sub-sectors;</p></list-item><list-item><p>Types of entities.</p></list-item></list></p><p>The fourth level, <italic>types of entities</italic>, describes the types of public or private entities that provide the assets, and will aid the identification of critical entities in accordance with Article 5 of the proposed EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>).</p></sec><sec id="S2_2"><title>Selection of Use Cases</title><p>To illustrate the usability and the different aspects of the proposed framework, several critical infrastructure use cases were selected. EU critical infrastructures, as described in the proposed EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>), were selected as the main use case in this study. This use case is considered relevant for many country-specific applications of the framework. In addition, Norway and the United Kingdom (UK) were included as use cases for the discussion of qualitative and quantitative values and priority measures, respectively, while NATO’s seven baseline requirements (<xref ref-type="bibr" rid="ref33">NATO, 2021b</xref>) were used to illustrate the use of the framework for defence-related use cases. UK was selected out of relevance for the discussion of quantitative values and priority measures, while Norway was selected out of convenience.</p></sec></sec><sec id="S3"><title>Results and Discussion</title><sec id="S3_1"><title>Abstraction-Decomposition Space Applied to Critical Infrastructure Systems</title><p>The ADS for describing critical infrastructure systems is summarised in <xref ref-type="table" rid="T1">Table 1</xref>. As argued by <xref ref-type="bibr" rid="ref46">Vicente (1999)</xref>, each cell in the ADS offers a complete but different representation of the same work domain. The top left cell in <xref ref-type="table" rid="T1">Table 1</xref> represents the functional purposes of the whole system, while the bottom right cell describes the types of entities for all of the individual assets in the system. It is often not necessary to populate the whole table since the solution is often found along the diagonal of the ADS as indicated by the shaded cells in <xref ref-type="table" rid="T1">Table 1</xref>. Still, it can be useful to define specific values and priority measures, <italic>e.g</italic>. resilience criteria, for the identified sectors, sub-sectors and types of entities.</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Abstraction-decomposition space for critical infrastructure systems with five levels of abstraction and four levels of decomposition. The shaded cells illustrate the relationship between abstraction and decomposition levels for critical infrastructure systems.</p></caption><table frame="border" rules="all"><thead valign="top"><tr><th align="right">Decomposition</th><th align="center">Whole system</th><th align="center">Sectors</th><th align="center">Sub-sectors</th><th align="center">Types of entities</th></tr><tr><th align="right">Abstraction</th><th align="center"/><th align="center"/><th align="center"/><th align="center"/></tr></thead><tbody valign="top"><tr><td>Functional purposes</td><td align="center" style="background: #DCDCDC"/><td/><td/><td/></tr><tr><td>Values and priority measures</td><td align="center" style="background: #DCDCDC"/><td/><td/><td/></tr><tr><td>Purpose-related functions</td><td/><td align="center" style="background: #DCDCDC"/><td/><td/></tr><tr><td>Infrastructure-related processes</td><td/><td/><td align="center" style="background: #DCDCDC"/><td/></tr><tr><td>Assets</td><td/><td/><td/><td align="center" style="background: #DCDCDC"/></tr></tbody></table></table-wrap><p>In the following, the use of the ADS will be exemplified and discussed with critical infrastructures in the UK and the EU as use cases. Examples from Norway and NATO will be leveraged as well. As a starting point for the discussion, the work domain (the whole system) is to be considered as an open sociotechnical system consisting of critical infrastructure systems that are to be identified. The work domain is therefore to be considered as a system of systems.</p></sec><sec id="S3_2"><title>Functional Purposes</title><p>The first level of abstraction in the ADS describes the purposes that the system, <italic>i.e</italic>. the system of systems, serves in its environment. That is, the system exists because the environment has certain needs and the system can fulfil these needs. As argued by <xref ref-type="bibr" rid="ref13">Dolan (2018)</xref>, such a strategic need assessment requires a clearly articulated systemic vision comprising sector-, solution- and technology-neutral desired outcomes which is understood and accepted. This is important in a defence and security context. First, it will be difficult to protect a system if the functional purposes of the system are not fully understood and accepted. Secondly, any solution- or technology-biased purpose description will shape the decisions made for the subsequent abstraction levels. Poor decision-making can result in “lock-in” effects that put the infrastructure systems on long-term path-dependent trajectories that can be hard to break away from due to, <italic>e.g</italic>. the financial or technological hurdles involved (<xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>).</p><p>Depending upon how the needs are described, who is the reference object for the need and which constraints are provided, different models of a system can emerge. For example, the purpose of the system can be to <italic>safeguard the basic needs of the population in the society</italic>. Here, one may say it is the population in the society that frames the constraints for the work domain. A different functional purpose can be to <italic>maintain national security, national defence and the functioning of the state</italic>. In this case, the national security act would provide a constraint on the work domain. A third functional purpose could be to <italic>safeguard the nation as a democracy and a state based on the rule of law and universal respect for human rights</italic> in accordance with the nation’s constitution. In this case, the constitution provides the constraint. A fourth type of need could be to <italic>maintain vital societal functions or economic activities in the EU internal marked</italic> in accordance with Article 1 of the proposed EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>); consequently, the constraint is given by the directive. A last example of a need is the need to <italic>resist armed attack</italic> as described by Article 3 in The North Atlantic Treaty. Here, it is the Treaty that provides the constraints on the work domain. Understanding the functional purposes of the system is therefore essential for applying the ADS.</p></sec><sec id="S3_3"><title>Values and Priority Measures</title><p>The values and priority measures level of abstraction provides two types of criteria: The first is measures for how well the system is progressing towards its functional purposes, while the second is criteria for comparing, prioritising and directing resources to the various purpose-related functions so that the functional purposes of the work system are fulfilled. Examples of the first type at the national level could be sustainability measures or levels of services, while the second could be resilience criteria. Since the criteria at this level of abstraction are invariants or relatively stable properties of the work domain, they provide guidance for reasoning from first principles when the system is confronted with stressful, unanticipated events.</p><p>Values and priority measures at the national level (whole system) may be difficult to describe quantitatively; such criteria are therefore usually qualitative. Taking the Norwegian Act relating to national security as an example, the values and priority measures for the system as a whole could be described as <italic>protection of national security interests</italic>. Such interests are defined as “Norway’s sovereignty, territorial integrity and democratic system of government, and general political security interests related to a) the activities, security and freedom of action of the highest state bodies; b) defence, security and contingency preparedness; c) relations with other states and international organisations; d) economic stability and freedom of action; e) fundamental national functions and the basic security of the population” (<xref ref-type="bibr" rid="ref44">Security Act, 2019</xref>). In the Norwegian security act, fundamental national functions are defined as “services, production and other types of activity which are of such importance that a complete or partial loss of the function would have consequences for the State’s ability to protect national security interests” (<xref ref-type="bibr" rid="ref44">Security Act, 2019</xref>). For the proposed EU COM (2020) 829 directive, the values and priority measures could be described as <italic>ensure the provision of essential services</italic> for the maintenance of vital societal functions or economic activities in the EU internal marked (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>).</p><p>Quantitative performance measures for infrastructure sectors are possible and have been taken by the UK National Infrastructure Commission (NIC) (<xref ref-type="bibr" rid="ref30">National Infrastructure Commission, 2018</xref>). These performance measures provide clear guidance for how to assess and measure each infrastructure sector’s performance. For this purpose, <xref ref-type="bibr" rid="ref14">Dolan <italic>et al</italic>. (2016)</xref> have proposed a conceptual approach for identifying outcome-oriented performance indicators for infrastructures, which has been applied by <xref ref-type="bibr" rid="ref7">Carhart <italic>et al</italic>. (2016)</xref>. However, because of infrastructure interdependencies, performance loss in one infrastructure sector may influence the performance of other infrastructure sectors. It is therefore necessary to define desired outcomes for the system as whole and not at a sector-by-sector level in order to define meaningful outcome-oriented performance indicators to evaluate cross-sectoral performance (<xref ref-type="bibr" rid="ref14">Dolan <italic>et al</italic>., 2016</xref>). Indicators at the sectoral level may still be helpful to guide the development of such whole-system performance indicators.</p><p>For example, performance measures for critical infrastructure sectors can be used to quantify resilience (<xref ref-type="bibr" rid="ref3">Bruneau <italic>et al</italic>., 2003</xref>). Although several definitions of resilience exist (<xref ref-type="bibr" rid="ref8">Cereè, Rezgui, and Zhao, 2017</xref>; <xref ref-type="bibr" rid="ref12">Curt and Tacnet, 2018</xref>; <xref ref-type="bibr" rid="ref23">Haimes, 2009</xref>; <xref ref-type="bibr" rid="ref37">Petersen <italic>et al</italic>., 2020</xref>; <xref ref-type="bibr" rid="ref47">Wied, Oehmen, and Welo, 2020</xref>), most definitions are formulated around the system’s ability to reduce the chances of an undesired event and to maintain and recover its core functionality in case of disruption. By setting constraints on minimum system performance loss and recovery time before the service level is restored, risk-based resilience standards for critical infrastructure sectors can be put forward (<xref ref-type="bibr" rid="ref18">FEMA, 2019</xref>; <xref ref-type="bibr" rid="ref38">Poland, 2009</xref>). However, as discussed by <xref ref-type="bibr" rid="ref23">Haimes (2009)</xref>, such efforts should be contextualised to the risks to the system and their associated consequences. This calls for unified approaches to risk and resilience analysis and management (<xref ref-type="bibr" rid="ref2">Aven, 2019</xref>). In addition, critical infrastructure sectors should undergo stress testing to evaluate whether they meet the resilience standards (<xref ref-type="bibr" rid="ref16">Esposito <italic>et al</italic>., 2020</xref>).</p><p>Resilience standards as part of the values and priority measures for critical infrastructure systems at the national level should therefore be established on the basis of the national risk assessment. Here, it is important to take the scale of possible undesired disruptive events into consideration. Lessons from the Covid-19 pandemic have shown that the pace, duration and the geographic scale of a crisis, the interconnectedness of critical infrastructures and the associated cascading risks, and nation states’ capacity to prepare and respond are all important drivers for a crisis (<xref ref-type="bibr" rid="ref10">Collins, Florin, and Renn, 2020</xref>). Thus, these are all important factors to take into consideration when establishing resilience standards. Furthermore, it is also important to take the vulnerabilities of critical infrastructure systems into consideration in the national risk assessment, since such vulnerabilities may translate into threat scenarios if they are exploited.</p><p>As argued by both the UK NIC (<xref ref-type="bibr" rid="ref31">National Infrastructure Commission, 2020</xref>) and the proposed EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>), resilience standards for critical infrastructure systems should be government’s responsibility and not the (usually) private entities providing the services. This is in agreement with the ADS proposed in this work since values and priority measures apply to the system as a whole. The UK NIC provides several reasons for this (<xref ref-type="bibr" rid="ref31">National Infrastructure Commission, 2020</xref>): Firstly, the government will be involved when there are serious failures or risks are too high for private entities. Secondly, resilience is not properly valued on the market. Thirdly, because of interdependencies, failure to provide a service does not just affect the consumers of that particular service. Lastly, markets focus on those who can pay, while in a crisis the focus should be on those who are in need.</p></sec><sec id="S3_4"><title>Purpose-Related Functions</title><p>As mentioned, purpose-related functions are functions that are necessary for fulfilling the functional purposes of the whole system. This requires coordination of the purpose-related functions in accordance with the values and priority measures. Furthermore, the functions are generalised functions to accommodate a wide variety of activities by the underlying levels of abstraction.</p><p>Purpose-related functions are typically decomposed into sectors where each sector would constitute a system. In the proposed EU COM(2020) 829 directive, the following ten sectors are identified (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>): (1) Energy; (2) Transport; (3) Banking; (4) Financial market infrastructures; (5) Health; (6) Drinking water; (7) Waste water; (8) Digital infrastructure; (9) Public administration; and (10) Space. These sectors can be translated into purpose-related functions by using nouns for describing the different objects of action, <italic>e.g. provision of energy, provision of transportation, provision of banking services, provision of financial market infrastructure services, provision of health services, provision of drinking water, provision of waste water services, provision of digital infrastructure services, provision of public administration services</italic> and <italic>provision of space-based services</italic>. In the context of this study, these purpose-related functions can be considered as vital societal functions because they provide essential services for the functional purposes of the EU internal market.</p><p>If we look at the functional purpose of maintaining civil preparedness in accordance with NATO’s seven baseline requirements, the following purpose-related functions can be described (<xref ref-type="bibr" rid="ref33">NATO, 2021b</xref>): (1) Provision of critical government services; (2) Provision of energy supplies; (3) Management of uncontrolled movement of people; (4) Provision of food and water resources; (5) Management of mass casualties; (6) Provision of telecommunications; and (7) Provision of transportation. Several sectors can be involved in providing the purpose-related function. In order to deal with mass casualties for example, both rescue services and the health sector are required.</p></sec><sec id="S3_5"><title>Infrastructure-Related Processes</title><p>The infrastructure-related processes level of abstraction describes the functional capabilities that enable the purpose-related functions in the work domain. Taking EU critical infrastructures (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>) as an example, the provision of electricity, district heating and cooling, oil, gas or hydrogen all contribute to the purpose-related function <italic>provision of energy</italic>. Likewise, air, rail, water and road transport services enable the function <italic>provision of transportation</italic>.</p></sec><sec id="S3_6"><title>Assets</title><p>The last level of abstraction in the proposed ADS represents the assets that enable the higher-level processes and functions. Such assets can be both physical and non-physical assets. Taking the electricity sector as an example, assets for generation, transmission, distribution, storage and supply are needed in order to provide electricity. Infrastructures can therefore be represented as networks that are interconnected with the physical and non-physical assets, where the network representation models the infrastructure-related processes and the asset representation models the components that are required for providing the processes (<xref ref-type="bibr" rid="ref22">Goldbeck, Angeloudis, and Ochieng, 2019</xref>; <xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>; <xref ref-type="bibr" rid="ref36">Ouyang, 2014</xref>).</p></sec><sec id="S3_7"><title>Interdependencies, object worlds and identification of critical entities</title><p>An infrastructure interdependency can be defined as a “bidirectional relationship between two infrastructures through which the state of each infrastructure influences or is correlated to the state of the other” (<xref ref-type="bibr" rid="ref40">Rinaldi <italic>et al</italic>., 2001</xref>). Such interdependencies can be of many different types, see <italic>e.g</italic>. <xref ref-type="bibr" rid="ref36">Ouyang (2014)</xref> for a review. Understanding the vulnerabilities induced by multiple interdependencies is generally considered one of the major challenges when it comes to improving infrastructure resilience (<xref ref-type="bibr" rid="ref9">Chang, 2009</xref>). If the vulnerabilities can be exploited by an adversary, the vulnerabilities will translate into threat scenarios. Mapping of assets and their interdependency relations is therefore needed for risk management and improving infrastructure resilience.</p><p>The types of interdependencies proposed by <italic>e.g</italic>. <xref ref-type="bibr" rid="ref40">Rinaldi <italic>et al</italic>. (2001)</xref>, <xref ref-type="bibr" rid="ref49">Zimmerman (2001)</xref> and <xref ref-type="bibr" rid="ref15">Dudenhoeffer, Permann, and Manic (2006)</xref>, see also <xref ref-type="bibr" rid="ref36">Ouyang (2014)</xref> for a review, can be considered as caused-based interdependencies. Such dependencies could be of physical, informational, geospatial, procedural or societal types. In a recent study, <xref ref-type="bibr" rid="ref22">Goldbeck <italic>et al</italic>. (2019)</xref> argued that effect-based classification of interdependencies is more important for modelling purposes, since interdependencies can yield similar effects despite having different causes. For this purpose, <xref ref-type="bibr" rid="ref22">Goldbeck <italic>et al</italic>. (2019)</xref> proposed four types of effect-based dependency relations: (i) stochastic failure propagation, (ii) logic, (iii) asset utilisation and (iv) resource input dependencies. A framework for characterising infrastructure dependencies has also been proposed by <xref ref-type="bibr" rid="ref6">Carhart and Rosenberg (2016)</xref>.</p><p>This study proposes that ADS can be used as a tool to frame the mapping of interdependencies to different levels of abstraction and decomposition. <xref ref-type="fig" rid="F2">Figure 2</xref> shows a simple, yet illustrative example of how the ADS can be used to map interdependencies by using the dependency relations example provided by <xref ref-type="bibr" rid="ref40">Rinaldi <italic>et al</italic>. (2001)</xref> for the electricity sub-sector that is a part of EU critical infrastructures (<xref ref-type="table" rid="T2">Table 2</xref>). As can be seen, the interdependencies are of both intra-sector and inter-sector types (<xref ref-type="bibr" rid="ref6">Carhart and Rosenberg, 2016</xref>). Such interdependency mapping can inform policy and decision-making at the national level on risks across different infrastructure sectors as well as aid the identification of critical entities in accordance with the EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>). It can also help inform entities to perform assessments of how their assets fit within and are affected by a broader web of interdependencies with other entities’ assets. Applying the ADS may therefore help to elucidate the structural complexity (<xref ref-type="bibr" rid="ref50">Zio, 2016</xref>) of critical infrastructures at the national level.</p><fig id="F2" orientation="portrait" position="float"><label>Figure 2.</label><caption><p>Simple, illustrative example of mapping of dependency relations (dashed arrows) for the electricity sub-sector using an abstraction hierarchy for EU critical infrastructures and an interdependency example provided by <xref ref-type="bibr" rid="ref40">Rinaldi <italic>et al</italic>. (2001)</xref>. The solid lines show the structural means-ends relationships.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/146789/SDQ-39-00178-g002_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/146789/SDQ-39-00178-g002.jpg"/></fig><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2</label><caption><p>Abstraction-decomposition space for EU critical infrastructures using the electricity sub-sector as an example.</p></caption><table frame="border" rules="all"><thead valign="top"><tr><th>Decomposition</th><th>Whole system</th><th>Sectors</th><th>Sub-sectors</th><th>Types of entities</th></tr><tr><th>Abstraction</th><th/><th/><th/><th/></tr></thead><tbody valign="top"><tr><td>Functional purposes</td><td align="center" style="background: #DCDCDC">Maintain vital societal functions or economic activities in the EU internal marked</td><td/><td/><td/></tr><tr><td>Values and priority measures</td><td align="center" style="background: #DCDCDC">Ensure provision of essential services</td><td/><td/><td/></tr><tr><td>Purpose-related functions</td><td/><td align="center" style="background: #DCDCDC">Provision of energy</td><td/><td/></tr><tr><td>Infrastructure-related processes</td><td/><td/><td align="center" style="background: #DCDCDC">Provision of electricity</td><td/></tr><tr><td>Assets</td><td/><td/><td/><td align="center" style="background: #DCDCDC">Generation;<break/>Transmission;<break/>Distribution;<break/>Storage;<break/>Supply</td></tr></tbody></table></table-wrap><p>Furthermore, as mentioned in the introduction, critical infrastructure systems in free market economies do not, in general, have a single entity in control of the system (<xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>). On the contrary, the control is often distributed amongst several stakeholders and where governmental authorities have limited regulatory control. In addition, governance at the national level is often fragmented across several government departments. The UK and other countries such as Australia and New Zealand have therefore taken steps to coordinate infrastructure policy across government (<xref ref-type="bibr" rid="ref35">Oughton <italic>et al</italic>., 2018</xref>).</p><p>In the context of the ADS proposed in this work, stakeholders’ interests and decision-making will occur at different levels of abstraction and decomposition. Consequently, different stakeholders will have different but overlapping views of the same system (work domain). Such views can be considered as different object worlds (<xref ref-type="bibr" rid="ref29">Naikar, Hopcroft, and Moylan, 2005</xref>). Because of the overlap and interdependencies between different stakeholders’ object worlds, changes or effects in one stakeholder’s object world can propagate to other object worlds (<xref ref-type="bibr" rid="ref29">Naikar <italic>et al</italic>., 2005</xref>). Finding ways for the different stakeholders to collaborate effectively is therefore necessary for improving risk management. The ADS proposed in this work will help to elucidate and frame the object worlds of different stakeholders and decision-makers thus aiding the mapping of interdependencies and the coordination of policies across different infrastructure sectors.</p></sec><sec id="S3_8"><title>Limitations</title><p>The limitations of this study pertain to the applicability of WDA in general and to critical infrastructure systems in particular. Although the usefulness of WDA has been demonstrated by many studies (<xref ref-type="bibr" rid="ref28">Naikar, 2017</xref>), there is generally a lack of validation of such models (<xref ref-type="bibr" rid="ref39">Rechard <italic>et al</italic>., 2015</xref>). Put simply, validation deals with building the right model (<xref ref-type="bibr" rid="ref41">Rykiel, 1996</xref>). The lack of validation also applies to this work. We therefore do not have empirical evidence for whether the methodology for WDA will result in valid and reliable ADS models of critical infrastructure systems. This needs to be investigated further. Expert opinions (<xref ref-type="bibr" rid="ref29">Naikar <italic>et al</italic>., 2005</xref>) and scenario mapping (<xref ref-type="bibr" rid="ref4">Burns, Bryant, and Chalmers, 2001</xref>) could serve as useful methods for validating that a proposed ADS model captures all relevant domain constraints for the critical infrastructure system under study.</p></sec></sec><sec id="S4"><title>Conclusions</title><p>The objective of this work has been to propose a framework that will aid governments with the development of more coherent and effective infrastructure planning and resilience policies through a system-of-systems approach that is grounded in theory for complex sociotechnical systems. To this end, a novel abstraction-decomposition space (ADS) for critical infrastructure systems has been proposed on the basis of work domain analysis (WDA) (<xref ref-type="bibr" rid="ref27">Naikar, 2013</xref>; <xref ref-type="bibr" rid="ref46">Vicente, 1999</xref>).</p><p>The ADS consists of five levels of abstraction and four levels of decomposition. The framework is formative in the sense that it reveals how work can be done in the critical infrastructure system without violating the system’s constraints established through the WDA. By imposing constraints, the ADS promotes design for adaptation where actors within the system are allowed to adapt their behaviour as they find appropriate within the system’s constraints. This is important because it is not feasible to prescribe, describe and risk assess all possibilities for action that are available in complex sociotechnical systems such as critical infrastructures, especially when dealing with unforeseen events. Efforts to strengthen the capability of critical infrastructures to cope with disruptions should therefore build on the principles of resilience and adaptation (<xref ref-type="bibr" rid="ref25">Hollnagel <italic>et al</italic>., 2006</xref>; <xref ref-type="bibr" rid="ref43">Schulman, 2022</xref>; <xref ref-type="bibr" rid="ref48">Woods, 2020</xref>).</p><p>In this work, we have argued that the implementation of resilience and adaptation strategies for critical infrastructures at the national level is hampered by the low availability of easy-to-use frameworks that build upon complexity theory-based system-of-systems approaches. Adding to this, the absence of a shared strategic vision of the desired outcomes that infrastructure is expected to enable will make it difficult to fully evaluate system performance gaps or assess future infrastructure needs (<xref ref-type="bibr" rid="ref13">Dolan, 2018</xref>; <xref ref-type="bibr" rid="ref14">Dolan <italic>et al</italic>., 2016</xref>).</p><p>By applying the ADS, it will aid decision-making related to the overall purposes of the critical infrastructure system, the values and priority measures that are used to assess the system’s progress towards the functional purposes, as well as formulation of infrastructure needs that are necessary to achieve the functional purposes. In addition, it will help to elucidate infrastructure interdependencies and aid the coordination of policies across different infrastructure sectors by framing the views (object worlds) of different stakeholders. This may help EU Member States and others to formulate better strategic objectives and priorities for enhancing the overall resilience of critical infrastructure systems. It may also assist governments with identification of essential services and the critical entities that deliver such services in accordance with the proposed EU COM(2020) 829 directive (<xref ref-type="bibr" rid="ref17">European Commission, 2020</xref>).</p><p>Future research should focus on finding science-based, yet pragmatic and useful in practice, ways for establishing values and priority measures that encompass sustainability issues and resilience standards at the national level. Such criteria should be relatively stable properties of the critical infrastructure system to allow reasoning from first principles when the system is under stress due to unanticipated events, in particular black swan events.</p></sec></body><back><sec id="S5"><title>Funding</title><p>This work was funded by the Norwegian Ministry of Defence through project grant 1619.</p></sec><sec id="S6"><title>Data Availability Statement</title><p>Not applicable.</p><p>The author read and agreed to the published version of the manuscript.</p></sec><sec id="S7" sec-type="COI-statement"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the author.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Anderson</surname>, <given-names>C.W</given-names></string-name>., <string-name><surname>Santos</surname>, <given-names>J.R</given-names></string-name>. and <string-name><surname>Haimes</surname>, <given-names>Y.Y</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘A risk-based input–output methodology for measuring the effects of the August 2003 Northeast blackout’</article-title>, <source>Economic Systems Research</source>, <volume>19</volume>(<issue>2</issue>), pp. <fpage>183</fpage>–<lpage>204</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09535310701330233</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aven</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘The call for a shift from risk to resilience: What does it mean?’</article-title>, <source>Risk Analysis</source>, <volume>39</volume>(<issue>6</issue>), pp. <fpage>1196</fpage>–<lpage>1203</lpage>. doi: <pub-id pub-id-type="doi">10.1111/risa.13247</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bruneau</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Chang</surname>, <given-names>S.E</given-names></string-name>., <string-name><surname>Eguchi</surname>, <given-names>R.T</given-names></string-name>., <string-name><surname>Lee</surname>, <given-names>G.C</given-names></string-name>., <string-name><surname>O’Rourke</surname>, <given-names>T.D</given-names></string-name>., <string-name><surname>Reinhorn</surname>, <given-names>A.M</given-names></string-name>., <string-name><surname>Shinozuka</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Tierney</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Wallace</surname>, <given-names>W.A</given-names></string-name>. and <string-name><surname>von Winterfeldt</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2003</year>) <article-title>‘A framework to quantitatively assess and enhance the seismic resilience of communities’</article-title>, <source>Earthquake Spectra</source>, <volume>19</volume>(<issue>4</issue>), pp. <fpage>733</fpage>–<lpage>752</lpage>. doi: <pub-id pub-id-type="doi">10.1193/1.1623497</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Burns</surname>, <given-names>C.M</given-names></string-name>., <string-name><surname>Bryant</surname>, <given-names>D.J</given-names></string-name>. and <string-name><surname>Chalmers</surname>, <given-names>B.A</given-names></string-name></person-group>. (<year>2001</year>) <article-title>‘Scenario mapping with work domain analysis’</article-title>, <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</source>, <volume>45</volume>(<issue>4</issue>), pp. <fpage>424</fpage>–<lpage>428</lpage>. doi: <pub-id pub-id-type="doi">10.1177/154193120104500434</pub-id>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Busby</surname>, <given-names>J.W</given-names></string-name>., <string-name><surname>Baker</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Bazilian</surname>, <given-names>M.D</given-names></string-name>., <string-name><surname>Gilbert</surname>, <given-names>A.Q</given-names></string-name>., <string-name><surname>Grubert</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Rai</surname>, <given-names>V</given-names></string-name>., <string-name><surname>Rhodes</surname>, <given-names>J.D</given-names></string-name>., <string-name><surname>Shidore</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Smith</surname>, <given-names>C.A</given-names></string-name>. and <string-name><surname>Webber</surname>, <given-names>M.E</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Cascading risks: Understanding the 2021 winter blackout in Texas’</article-title>, <source>Energy Research &amp; Social Science</source>, <volume>77</volume>, <fpage>102106</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.erss.2021.102106</pub-id>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Carhart</surname>, <given-names>N</given-names></string-name>. and <string-name><surname>Rosenberg</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘A framework for characterising infrastructure interdependencies’</article-title>, <source>International Journal of Complexity in Applied Science and Technology</source>, <volume>1</volume>, pp. <fpage>35</fpage>–<lpage>60</lpage>. doi: <pub-id pub-id-type="doi">10.1504/IJCAST.2016.10002359</pub-id>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Carhart</surname>, <given-names>N.J</given-names></string-name>., <string-name><surname>Bouch</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Walsh</surname>, <given-names>C.L</given-names></string-name>. and <string-name><surname>Dolan</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Applying a new concept for strategic performance indicators’</article-title>, <source>Infrastructure Asset Management</source>, <volume>3</volume>(<issue>4</issue>), pp. <fpage>143</fpage>–<lpage>153</lpage>. doi: <pub-id pub-id-type="doi">10.1680/jinam.16.00016</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cerè</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Rezgui</surname>, <given-names>Y</given-names></string-name>. and <string-name><surname>Zhao</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Critical review of existing built environment resilience frameworks: Directions for future research’</article-title>, <source>International Journal of Disaster Risk Reduction</source>, <volume>25</volume>, pp. <fpage>173</fpage>–<lpage>189</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijdrr.2017.09.018</pub-id>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chang</surname>, <given-names>S.E</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Infrastructure resilience to disasters’</article-title>, <source>The Bridge</source>, <volume>39</volume>, pp. <fpage>36</fpage>–<lpage>41</lpage>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Collins</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Florin</surname>, <given-names>M.-V</given-names></string-name>. and <string-name><surname>Renn</surname>, <given-names>O</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘COVID-19 risk governance: Drivers, responses and lessons to be learned’</article-title>, <source>Journal of Risk Research</source>, <volume>23</volume>(<issue>7–8</issue>), pp. <fpage>1073</fpage>–<lpage>1082</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13669877.2020.1760332</pub-id>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Cullen</surname>, <given-names>P.J</given-names></string-name>. and <string-name><surname>Reichborn-Kjennerud</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2017</year>) <article-title>MCDC countering hybrid warfare project: Understanding hybrid warfare</article-title>. <source>A multinational capability development campaign project</source>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/647776/dar_mcdc_hybrid_warfare.pdf">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/647776/dar_mcdc_hybrid_warfare.pdf</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Curt</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Tacnet</surname>, <given-names>J.-M</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Resilience of critical infrastructures: Review and analysis of current approaches’</article-title>, <source>Risk Analysis</source>, <volume>38</volume>(<issue>11</issue>), pp. <fpage>2441</fpage>–<lpage>2458</lpage>. doi: <pub-id pub-id-type="doi">10.1111/risa.13166</pub-id>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dolan</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Briefing: A systemic framework for infrastructure need assessment’</article-title>, <source>Proceedings of the Institution of Civil Engineers–Smart Infrastructure and Construction</source>, <volume>171</volume>(<issue>2</issue>), pp. <fpage>45</fpage>–<lpage>53</lpage>. doi: <pub-id pub-id-type="doi">10.1680/jsmic.18.00006</pub-id>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dolan</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Walsh</surname>, <given-names>C.L</given-names></string-name>., <string-name><surname>Bouch</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Carhart</surname>, <given-names>N.J</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘A conceptual approach to strategic performance indicators’</article-title>, <source>Infrastructure Asset Management</source>, <volume>3</volume>(<issue>4</issue>), pp. <fpage>132</fpage>–<lpage>142</lpage>. doi: <pub-id pub-id-type="doi">10.1680/jinam.16.00015</pub-id>.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dudenhoeffer</surname>, <given-names>D.D</given-names></string-name>., <string-name><surname>Permann</surname>, <given-names>M.R</given-names></string-name>. and <string-name><surname>Manic</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2006</year>) <article-title>‘CIMS: A framework for infrastructure interdependency modeling and analysis’, Proceedings of the 2006 Winter Simulation Conference, 3–6 December 2006</article-title>, pp. <fpage>478</fpage>–<lpage>485</lpage>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Esposito</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Stojadinović</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Babič</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Dolšek</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Iqbal</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Selva</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Broccardo</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Mignan</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Giardini</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Risk-based multilevel methodology to stress test critical infrastructure systems’</article-title>, <source>Journal of Infrastructure Systems</source>, <volume>26</volume>(<issue>1</issue>), <fpage>4019035</fpage>. doi: <pub-id pub-id-type="doi">10.1061/(ASCE)IS.1943-555X.0000520</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>European Commission</collab></person-group> (<year>2020</year>) <chapter-title><italic>Proposal for a directive of the European Parliament and of the Council on the resilience of critical entities</italic></chapter-title>. <source>(COM(2020) 829 final)</source>. <publisher-loc>Brussels</publisher-loc>: <publisher-name>European Commission</publisher-name>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>FEMA</collab></person-group> (<year>2019</year>) <article-title>2019 National Threat and Hazard Identifiaction and Risk Assessment (THIRA). Overview and methodology</article-title>. <source>U.S. Department of Homeland Security</source>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.fema.gov/sites/default/files/2020-06/fema_national-thira-overview-methodology_2019_0.pdf">https://www.fema.gov/sites/default/files/2020-06/fema_national-thira-overview-methodology_2019_0.pdf</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ghafur</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Kristensen</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Honeyford</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Martin</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Darzi</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Aylin</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘A retrospective impact analysis of the WannaCry cyberattack on the NHS’</article-title>, <source>NPJ Digital Medicine</source>, <volume>2</volume>(<issue>98</issue>). doi: <pub-id pub-id-type="doi">10.1038/s41746-019-0161-6</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Giannopoulos</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Smith</surname>, <given-names>H</given-names></string-name>. and <string-name><surname>Theocharidou</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2021</year>) <chapter-title><italic>The landscape of hybrid threats: A conceptual model</italic></chapter-title>. <source>(EUR 30585 EN)</source>. <publisher-loc>Luxembourg</publisher-loc>: <publisher-name>Publications Office of the European Union</publisher-name>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Goel</surname>, <given-names>R.K</given-names></string-name>., <string-name><surname>Saunoris</surname>, <given-names>J.W</given-names></string-name>. and <string-name><surname>Goel</surname>, <given-names>S.S</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Supply chain performance and economic growth: The impact of COVID-19 disruptions’</article-title>, <source>Journal of Policy Modeling</source>, <volume>43</volume>(<issue>2</issue>), pp. <fpage>298</fpage>–<lpage>316</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jpolmod.2021.01.003</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Goldbeck</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Angeloudis</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Ochieng</surname>, <given-names>W.Y</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Resilience assessment for interdependent urban infrastructure systems using dynamic network flow models’</article-title>, <source>Reliability Engineering and System Safety</source>, <volume>188</volume>, pp. <fpage>62</fpage>–<lpage>79</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2019.03.007</pub-id>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haimes</surname>, <given-names>Y.Y</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘On the definition of resilience in systems’</article-title>, <source>Risk Analysis</source>, <volume>29</volume>(<issue>4</issue>), pp. <fpage>498</fpage>–<lpage>501</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1539-6924.2009.01216.x</pub-id>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Helbing</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Globally networked risks and how to respond’</article-title>, <source>Nature</source>, <volume>497</volume>(<issue>7447</issue>), pp. <fpage>51</fpage>–<lpage>59</lpage>. doi: <pub-id pub-id-type="doi">10.1038/nature12047</pub-id>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Hollnagel</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Woods</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Leveson</surname>, <given-names>N</given-names></string-name></person-group>. (ed.). (<year>2006</year>) <chapter-title><italic>Resilience engineering: Concepts and precepts</italic></chapter-title>. <publisher-loc>Boca Raton</publisher-loc>: <publisher-name>CRC Press</publisher-name>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lewis</surname>, <given-names>A.M</given-names></string-name>., <string-name><surname>Ward</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Cyra</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Kourti</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘European reference network for critical infrastructure protection’</article-title>, <source>International Journal of Critical Infrastructure Protection</source>, <volume>6</volume>(<issue>1</issue>), pp. <fpage>51</fpage>–<lpage>60</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijcip.2013.02.004</pub-id>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Naikar</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2013</year>) <chapter-title><italic>Work domain analysis: Concepts, guidelines, and cases</italic></chapter-title>. <publisher-loc>Boca Raton</publisher-loc>: <publisher-name>CRC Press</publisher-name>.</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Naikar</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Cognitive work analysis: An influential legacy extending beyond human factors and engineering’</article-title>, <source>Applied Ergonomics</source>, <volume>59</volume>, pp. <fpage>528</fpage>–<lpage>540</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.apergo.2016.06.001</pub-id>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Naikar</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Hopcroft</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Moylan</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2005</year>) <chapter-title><italic>Work domain analysis: Theoretical concepts and methodology</italic></chapter-title>. <source>(DSTO-TR-1665)</source>. <publisher-loc>Australia</publisher-loc>: <publisher-name>Air Operations Division, Defence Science and Technology Organisation</publisher-name>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>National Infrastructure Commission</collab></person-group> (<year>2018</year>) <article-title><italic>National infrastructure assessment</italic></article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://nic.org.uk/app/uploads/CCS001_CCS0618917350-001_NIC-NIA_Accessible-1.pdf">https://nic.org.uk/app/uploads/CCS001_CCS0618917350-001_NIC-NIA_Accessible-1.pdf</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="web"><article-title>National Infrastructure Commission (2020) Anticipate, react, recover. Resilient infrastructure systems</article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://nic.org.uk/app/uploads/Anticipate-React-Recover-28-May-2020.pdf">https://nic.org.uk/app/uploads/Anticipate-React-Recover-28-May-2020.pdf</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>NATO</collab></person-group> (<year>2021a</year>) <article-title><italic>Brussels Summit Communiqué</italic></article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.nato.int/cps/en/natohq/news_185000.htm">https://www.nato.int/cps/en/natohq/news_185000.htm</ext-link> (Accessed: 5 February 2022)</comment>.</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>NATO</collab></person-group> (<year>2021b</year>) <article-title><italic>Civil preparedness</italic></article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.nato.int/cps/en/natohq/topics_49158.htm">https://www.nato.int/cps/en/natohq/topics_49158.htm</ext-link> (Accessed: 14 May 2021)</comment>.</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Otto</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Hall</surname>, <given-names>J.W</given-names></string-name>., <string-name><surname>Hickford</surname>, <given-names>A.J</given-names></string-name>., <string-name><surname>Nicholls</surname>, <given-names>R.J</given-names></string-name>., <string-name><surname>Alderson</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Barr</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Tran</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘A quantified system-of-systems modeling framework for robust national infrastructure planning’</article-title>, <source>IEEE Systems Journal</source>, <volume>10</volume>(<issue>2</issue>), pp. <fpage>385</fpage>–<lpage>396</lpage>. doi: <pub-id pub-id-type="doi">10.1109/JSYST.2014.2361157</pub-id>.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Oughton</surname>, <given-names>E.J</given-names></string-name>., <string-name><surname>Usher</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Tyler</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Hall</surname>, <given-names>J.W</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Infrastructure as a complex adaptive system’</article-title>, <source>Complexity</source>, <volume>2018</volume>. doi: <pub-id pub-id-type="doi">10.1155/2018/3427826</pub-id>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ouyang</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Review on modeling and simulation of interdependent critical infrastructure systems’</article-title>, <source>Reliability Engineering and System Safety</source>, <volume>121</volume>, pp. <fpage>43</fpage>–<lpage>60</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2013.06.040</pub-id>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Petersen</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Lange</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Theocharidou</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Who cares what it means? Practical reasons for using the word resilience with critical infrastructure operators’</article-title>, <source>Reliability Engineering &amp; System Safety</source>, <volume>199</volume>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2020.106872</pub-id>.</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Poland</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2009</year>) <article-title><italic>The resilient city: Defining what San Francisco needs from its seismic mitigation policies</italic></article-title>. <source>San Francisco Planning + Urban Research Association (SPUR)</source>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.spur.org/publications/spur-report/2009-02-01/defining-resilience">https://www.spur.org/publications/spur-report/2009-02-01/defining-resilience</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rechard</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Bignon</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Berruet</surname>, <given-names>P</given-names></string-name>. and <string-name><surname>Morineau</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Verification and validation of a work domain analysis with turing machine task analysis’</article-title>, <source>Applied Ergonomics</source>, <volume>47</volume>, pp. <fpage>265</fpage>–<lpage>273</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.apergo.2014.10.012</pub-id>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rinaldi</surname>, <given-names>S.M</given-names></string-name>., <string-name><surname>Peerenboom</surname>, <given-names>J.P</given-names></string-name>. and <string-name><surname>Kelly</surname>, <given-names>T.K</given-names></string-name></person-group>. (<year>2001</year>) <article-title>‘Identifying, understanding, and analyzing critical infrastructure interdependencies’</article-title>, <source>IEEE Control Systems Magazine</source>, <volume>21</volume>, pp. <fpage>11</fpage>–<lpage>25</lpage>. doi: <pub-id pub-id-type="doi">10.1109/37.969131</pub-id>.</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rykiel</surname>, <given-names>E.J</given-names></string-name></person-group>. (<year>1996</year>) <article-title>‘Testing ecological models: The meaning of validation’</article-title>, <source>Ecological Modelling</source>, <volume>90</volume>(<issue>3</issue>), pp. <fpage>229</fpage>–<lpage>244</lpage>. doi: <pub-id pub-id-type="doi">10.1016/0304-3800(95)00152-2</pub-id>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Santos</surname>, <given-names>J.R</given-names></string-name></person-group>. (<year>2006</year>) <article-title>‘Inoperability input-output modeling of disruptions to interdependent economic systems’</article-title>, <source>Systems Engineering</source>, <volume>9</volume>(<issue>1</issue>), pp. <fpage>20</fpage>–<lpage>34</lpage>. doi: <pub-id pub-id-type="doi">10.1002/sys.20040</pub-id>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Schulman</surname>, <given-names>P.R</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Reliability, uncertainty and the management of error: New perspectives in the COVID-19 era’</article-title>, <source>Journal of Contingencies and Crisis Management</source>, <volume>30</volume>, pp. <fpage>92</fpage>–<lpage>101</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1468-5973.12356</pub-id>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Security Act</collab></person-group> (<year>2019</year>) <article-title><italic>Act relating to national security</italic></article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://lovdata.no/dokument/NLE/lov/2018-06-01-24">https://lovdata.no/dokument/NLE/lov/2018-06-01-24</ext-link> (Accessed: 15 March 2022)</comment>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vespignani</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘The fragility of interdependency’</article-title>, <source>Nature</source>, <volume>464</volume>, pp. <fpage>984</fpage>–<lpage>985</lpage>. doi: <pub-id pub-id-type="doi">10.1038/464984a</pub-id>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Vicente</surname>, <given-names>K.J</given-names></string-name></person-group>. (<year>1999</year>) <chapter-title><italic>Cognitive work analysis. Toward safe, productive, and healthy computer-based work</italic></chapter-title>. <publisher-loc>Boca Raton</publisher-loc>: <publisher-name>CRC Press</publisher-name>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wied</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Oehmen</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Welo</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Conceptualizing resilience in engineering systems: An analysis of the literature’</article-title>, <source>Systems Engineering</source>, <volume>23</volume>(<issue>1</issue>), pp. <fpage>3</fpage>–<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1002/sys.21491</pub-id>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Woods</surname>, <given-names>D.D</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘The strategic agility gap: How organizations are slow and stale to adapt in turbulent worlds’</article-title>, in <person-group person-group-type="editor"><string-name><surname>B</surname>. <given-names>Journé</given-names></string-name>, <string-name><surname>H</surname>. <given-names>Laroche</given-names></string-name>, <string-name><surname>C</surname>. <given-names>Bieder</given-names></string-name>, and <string-name><surname>C</surname>. <given-names>Gilbert</given-names></string-name></person-group> (eds.), <source>Human and organisational factors: Practices and strategies for a changing world</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>, pp. <fpage>95</fpage>–<lpage>104</lpage>.</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zimmerman</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2001</year>) <article-title>‘Social implications of infrastructure network interactions’</article-title>, <source>Journal of Urban Technology</source>, <volume>8</volume>(<issue>3</issue>), pp. <fpage>97</fpage>–<lpage>119</lpage>. doi: <pub-id pub-id-type="doi">10.1080/106307301753430764</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zio</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Challenges in the vulnerability and risk analysis of critical infrastructures’</article-title>, <source>Reliability Engineering and System Safety</source>, <volume>152</volume>, pp. <fpage>137</fpage>–<lpage>150</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2016.02.009</pub-id>.</mixed-citation></ref></ref-list></back></article>
