scispace - formally typeset
Search or ask a question
Author

David Rehak

Bio: David Rehak is an academic researcher from Technical University of Ostrava. The author has contributed to research in topics: Critical infrastructure & Resilience (network). The author has an hindex of 10, co-authored 42 publications receiving 379 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The paper introduces the CIERA methodology designed for Critical Infrastructure Elements Resilience Assessment, involving a complex evaluation of their robustness, their ability to recover functionality after the occurrence of a disruptive event and their capacity to adapt to previous disruptive events.

124 citations

Journal ArticleDOI
04 Jun 2018-System
TL;DR: Factors determining the resilience of critical infrastructure elements are identified, both in terms of technical resilience and organizational resilience, in the context of case studies focused on the electricity, gas, information and communications technology, and road transport sectors.

58 citations

Journal ArticleDOI
TL;DR: The CIA Method (Cascading Impact Assessment - further only CIA) serves for the quantification of the spread of cascading impacts in a CIS, which lies in its assessment of all lines of business occurring in the chosen area, as well as an assessment of their resilience and links.

55 citations

Journal ArticleDOI
TL;DR: A theory of synergistic linkages, their levels and the synergistic effects due to the joint action of impacts, which increase the overall impact on the critical infrastructure and on society are presented.

51 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present a method for assessing and strengthening organisational resilience in a critical infrastructure system, namely, ASOR Method, in which the authors define the factors that determine organizational resilience and the process of assess and strengthening organizational resilience, thus allowing weaknesses to be identified and the subsequent quantification of positive impacts that strengthen individual factors.

35 citations


Cited by
More filters
01 Jan 2016
TL;DR: Thank you very much for reading input output analysis foundations and extensions, as many people have search hundreds of times for their chosen readings like this, but end up in infectious downloads.
Abstract: Thank you very much for reading input output analysis foundations and extensions. As you may know, people have search hundreds times for their chosen readings like this input output analysis foundations and extensions, but end up in infectious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they are facing with some malicious virus inside their desktop computer.

1,316 citations

01 Jan 2017
TL;DR: Armstrong's Handbook of Human Resource Management Practice is the bestselling, definitive text for all HRM students and professionals as mentioned in this paper, providing a complete resource for understanding and implementing HR in relation to the needs of the business as a whole, it contains in-depth coverage of all the key areas essential to the HR function such as employment law, employee relations, learning and development, performance and reward.
Abstract: Armstrong's Handbook of Human Resource Management Practice is the bestselling, definitive text for all HRM students and professionals. Providing a complete resource for understanding and implementing HR in relation to the needs of the business as a whole, it contains in-depth coverage of all the key areas essential to the HR function such as employment law, employee relations, learning and development, performance and reward. Accessible and to the point as ever, this fully updated 14th edition includes emerging theory and practice, embracing the most current thinking on engagement, talent management and leadership development. With updated case studies and references to academic journals, professional magazines and recent research and surveys, it also includes coverage of new approaches to topics such as job evaluation and pay structures. Armstrong's Handbook of Human Resource Management Practice is aligned with the Chartered Institute of Personnel and Development (CIPD) professional map and standards, with the sections meeting CIPD learning outcomes now even clearer than before. Comprehensive online support material for instructors, students and HR managers are included. Resources for students and professionals include multiple-choice-questions, flash cards, case studies, further reading and a glossary of HRM terms. The lecturers' manual contains session notes, discussion questions, a literature review and a complete set of PowerPoint slides.

345 citations

Book
01 Jan 1953
TL;DR: Input-output analysis is a method of calculating income and employment multipliers which takes account of differences in technology between industries and of the linkages between industries.
Abstract: Input-output analysis is a method of calculating income and employment multipliers which takes account of differences in technology between industries and of the linkages between industries. The data required is the input-output accounts for the region often referred to as the transactions matrix. Example: the numbers are billions of $ Purchases Sales interm, demand final demand sector manuf. nonmanuf cons. govt. expt. total inter. manuf, 18 18 40 14 30 120 inputs nonman 20 37 43 7 18 125 hshlds 56 52 16 9 27 160 prim. govt. 6 7 20 22 0 55 inputs impt. 20 11 41 3 5 80 total 120 125 160 55 80 Here just two industrial sectors are used. Their output and the income and employment generated in each sector is determined by the final demand for the output of each sector. Input-output analysis is a method for estimating how changes in final demand will affect these outputs, incomes and employment.

278 citations

Journal ArticleDOI
TL;DR: The paper introduces the CIERA methodology designed for Critical Infrastructure Elements Resilience Assessment, involving a complex evaluation of their robustness, their ability to recover functionality after the occurrence of a disruptive event and their capacity to adapt to previous disruptive events.

124 citations

Journal ArticleDOI
TL;DR: This survey provides an overview of the general SCADA architecture, along with a detailed description of the SCADA communication protocols, and carries out an extensive review of the security proposals and tactics that aim to secure SCADA systems.
Abstract: Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the increasing connection of SCADA systems to the Internet, as well as corporate networks, introduces severe security issues. Security considerations for SCADA systems are gaining higher attention, as the number of security incidents against these critical infrastructures is increasing. In this survey, we provide an overview of the general SCADA architecture, along with a detailed description of the SCADA communication protocols. Additionally, we discuss certain high-impact security incidents, objectives, and threats. Furthermore, we carry out an extensive review of the security proposals and tactics that aim to secure SCADA systems. We also discuss the state of SCADA system security. Finally, we present the current research trends and future advancements of SCADA security.

118 citations