IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v7y2014i2p86-99.html
   My bibliography  Save this article

Fragility of oil as a critical infrastructure problem

Author

Listed:
  • Jaradat, Ra’ed M.
  • Keating, Charles B.

Abstract

Interdependences between critical infrastructures are becoming increasingly apparent. The 21st century has been defined by events that have changed perceptions about critical infrastructures and their fragility in the face of the inherent risks and vulnerabilities. A major critical infrastructure is the energy sector, of which oil is an important component. This paper explores the systemic interrelationships between oil and other infrastructures and the implications for future design, analysis and development of oil systems within the energy critical infrastructure. The paper argues that the relationships between oil and other elements of the critical infrastructure have significant implications for the structure of the oil industry due to increasing interdependence. Understanding how to manage the new oil industry structure is an emerging issue that can be examined from a systems view. Whether oil is in its crude or refined form, its value cannot be minimized due to its numerous applications and global importance as an energy source. However, oil and its derivatives do not exist as an independent infrastructure and cannot be considered in isolation from other critical infrastructures. Indeed, oil is inextricably interconnected to other forms of energy and other infrastructures. These interconnections introduce increased risks and vulnerabilities. The conclusion is that oil is – for the foreseeable future – critical to the wellbeing of society. It is a fragile interdependent component of the energy sector and, regardless of political proclivities and the desire for alternative forms of energy, oil must be viewed as a primary energy asset of the fossil-fuel-based global economy.

Suggested Citation

  • Jaradat, Ra’ed M. & Keating, Charles B., 2014. "Fragility of oil as a critical infrastructure problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 86-99.
  • Handle: RePEc:eee:ijocip:v:7:y:2014:i:2:p:86-99
    DOI: 10.1016/j.ijcip.2014.04.005
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548214000262
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2014.04.005?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    2. Armbruster, Ginger & Endicott-Popovsky, Barbara & Whittington, Jan, 2013. "Threats to municipal information systems posed by aging infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(3), pages 123-131.
    3. Correa-Henao, Gabriel J. & Yusta, Jose M. & Lacal-Arántegui, Roberto, 2013. "Using interconnected risk maps to assess the threats faced by electricity infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(3), pages 197-216.
    4. Polinpapilinho F. Katina & Ra'ed M. Jaradat, 2012. "A three-phase framework for elicitation of infrastructure requirements," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 8(2/3), pages 121-133.
    5. Russell L. Ackoff, 1971. "Towards a System of Systems Concepts," Management Science, INFORMS, vol. 17(11), pages 661-671, July.
    6. Dorothy E. Denning, 2012. "Stuxnet: What Has Changed?," Future Internet, MDPI, vol. 4(3), pages 1-16, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Lan, Meng & Gardoni, Paolo & Qin, Rongshui & Zhang, Xiao & Zhu, Jiping & Lo, Siuming, 2022. "Modeling NaTech-related domino effects in process clusters: A network-based approach," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
    2. Tahseen AL-Saadi & Alexey Cherepovitsyn & Tatyana Semenova, 2022. "Iraq Oil Industry Infrastructure Development in the Conditions of the Global Economy Turbulence," Energies, MDPI, vol. 15(17), pages 1-29, August.
    3. Robertas Alzbutas & Mindaugas Vaisnoras & Inga Saruniene & Ricardas Krikstolaitis & Mindaugas Valincius & Egidijus Babilas & Juozas Augutis & Sigitas Rimkevicius & Tomas Iesmantas & Feliksas Anusauska, 2021. "Aggregated Risk Assessment and Survey for Risk Reduction in Oil Terminals," Sustainability, MDPI, vol. 13(21), pages 1-21, November.
    4. Zhu, Zhu & Liao, Qi & Liang, Yongtu & Qiu, Rui & Zhang, ZeZhou & Zhang, Haoran, 2022. "The era of renewables: Infrastructure disposal strategies under market decline of oil products," Energy, Elsevier, vol. 249(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jianguo Ding & Attia Qammar & Zhimin Zhang & Ahmad Karim & Huansheng Ning, 2022. "Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions," Energies, MDPI, vol. 15(18), pages 1-37, September.
    2. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    3. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    4. Mohammad Bagher Abolhasani Jabali & Mohammad Hosein Kazemi, 2017. "Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach," Energies, MDPI, vol. 10(8), pages 1-14, July.
    5. Jenelius, Erik & Mattsson, Lars-Göran, 2012. "Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study," Transportation Research Part A: Policy and Practice, Elsevier, vol. 46(5), pages 746-760.
    6. Monsalve, Mauricio & de la Llera, Juan Carlos, 2019. "Data-driven estimation of interdependencies and restoration of infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 181(C), pages 167-180.
    7. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
    8. Liu, Huan & Tatano, Hirokazu & Pflug, Georg & Hochrainer-Stigler, Stefan, 2021. "Post-disaster recovery in industrial sectors: A Markov process analysis of multiple lifeline disruptions," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
    9. Gupta, Ranjit & Mejia, Cristian & Kajikawa, Yuya, 2019. "Business, innovation and digital ecosystems landscape survey and knowledge cross sharing," Technological Forecasting and Social Change, Elsevier, vol. 147(C), pages 100-109.
    10. Mingers, John, 2011. "Soft OR comes of age--but not everywhere!," Omega, Elsevier, vol. 39(6), pages 729-741, December.
    11. Mishra, Vishrut Kumar & Palleti, Venkata Reddy & Mathur, Aditya, 2019. "A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 26(C).
    12. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    13. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    14. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    15. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    16. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
    17. Li, Tao & Rong, Lili & Yan, Kesheng, 2019. "Vulnerability analysis and critical area identification of public transport system: A case of high-speed rail and air transport coupling system in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 127(C), pages 55-70.
    18. Ouyang, Min & Zhao, Lijing & Hong, Liu & Pan, Zhezhe, 2014. "Comparisons of complex network based models and real train flow model to analyze Chinese railway vulnerability," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 38-46.
    19. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    20. Wu, Jen-Her & Kao, Hao-Yun & Sambamurthy, Vallabh, 2016. "The integration effort and E-health compatibility effect and the mediating role of E-health synergy on hospital performance," International Journal of Information Management, Elsevier, vol. 36(6), pages 1288-1300.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:7:y:2014:i:2:p:86-99. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.