Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration

Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration

Dean A. Jones (Sandia National Laboratories, USA), Linda K. Nozick (Cornell University, USA), Mark A. Turnquist (Cornell University, USA) and William J. Sawaya (Texas A&M University, USA)
DOI: 10.4018/978-1-60566-326-5.ch013
OnDemand PDF Download:


A pandemic influenza outbreak could cause serious disruption to operations of several critical infrastructures as a result of worker absenteeism. This chapter focuses on freight transportation services, particularly rail and port operations, as an illustration of analyzing performance of critical infrastructures under reduced labor availability. It develops models to assess the likely impacts of varying levels of worker absenteeism on the capacity of these critical systems. Using current data on performance of specific rail and port facilities, we reach some conclusions about the likelihood of severe operational disruption under varying assumptions about the absentee rate. Other infrastructures that are more dependent on information technology and less labor-intensive than transportation might respond to largescale worker absenteeism in different ways, but the general character of this analysis can be adapted for application in other infrastructures.
Chapter Preview


Influenza viruses have presented a threat to the health of animal and human populations for centuries. Pandemics occur when a new strain of influenza virus emerges, and develops the ability to infect and be passed between humans. Because humans have little immunity to the new virus, a worldwide epidemic, or pandemic, can ensue.

In 1997, the H5N1 influenza virus emerged in chickens in Hong Kong. The virus has shown the ability to infect multiple species, including migratory birds, pigs, cats and humans (World Health Organization, 2008). While it is impossible to predict whether the H5N1 virus will lead to a pandemic, history suggests that a new influenza virus will emerge at some point and spread quickly through an unprotected human population. The impact of a pandemic is likely to be pervasive, removing essential personnel from the workplace for extended periods. This has significant ramifications for the economy, national security, and the basic functioning of society.

An area of particular concern is the potential effects of worker absenteeism on the functioning of critical infrastructures in our society. In 1997, the report of the U.S. President’s Commission on Critical Infrastructure Protection identified eight critical infrastructures, including telecommunications, electric power, oil and natural gas, banking and finance, transportation, water supply, government services and emergency services (President’s Commission on Critical Infrastructure Protection, 1997). In subsequent years, this list of critical infrastructures has been expanded and now includes a set of 17 critical infrastructures / key resources (CI/KR) identified in the National Infrastructure Protection Plan (U.S. Department of Homeland Security, 2006).

An important part of government planning for the possibility of a pandemic influenza episode is to understand the potential impacts on the functioning of critical infrastructures. This portion of the government’s role in creating a pandemic influenza response plan is part of the homeland security mission. The National Infrastructure Protection Plan lays out an integrated view of physical, cyber and human resources, with a series of iterative activities designed to enhance protection of CI/KR, as illustrated in Figure 1. The volume of which this chapter is a part is focused on cyber security, but a broad view of cyber security should include consideration of the interactions among human and cyber resources, in particular the possible effects of large-scale worker absenteeism resulting from a pandemic event.

Figure 1.

Integrated view of physical, cyber and human resources for infrastructure protection. (source: U.S. Department of Homeland Security, 2006).

The work described here is not focused directly on the cyber infrastructure. It focuses instead on another critical infrastructure – freight transportation. Provision of transportation services is much more labor-intensive than provision of cyber services and one might reasonably question the applicability of this analysis to cyber security concerns. We believe there are two good reasons for inclusion of the work in this volume on cyber security, apart from what we hope are interesting implications for worker absenteeism in the freight transportation sector. First, the analysis illustrates a mechanism for focusing attention on parts of a “flow through” system that may create critical bottlenecks if insufficient resources (in this case, labor) are available. The units of flow through the freight transportation network are containers and railcars, rather than information packets, but the core concepts are transferrable between transportation networks and information networks. Second, the primary focus is on delays and congestion associated with the bottlenecks. This concept of service degradation is also transferrable to information networks. Thus, rather than providing results that are directly reflective of cyber network concerns, this analysis should be viewed as an illustration of an approach that has implications for analysis of cyber systems.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Merrill Warkentin
Kenneth J. Knapp
Kenneth J. Knapp
Chapter 1
Jaziar Radianti, Jose J. Gonzalez
This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult... Sample PDF
Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
Chapter 2
Somak Bhattacharya, Samresh Malhotra, S. K. Ghosh
As networks continue to grow in size and complexity, automatic assessment of the security vulnerability becomes increasingly important. The typical... Sample PDF
An Attack Graph Based Approach for Threat Identification of an Enterprise Network
Chapter 3
Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila
The purpose of this chapter is to introduce the insider threat and discuss methods for preventing, detecting, and responding to the threat. Trusted... Sample PDF
Insider Threat Prevention, Detection and Mitigation
Chapter 4
Richard T. Gordon, Allison S. Gehrke
This chapter describes a methodology for assessing security infrastructure effectiveness utilizing formal mathematical models. The goal of this... Sample PDF
An Autocorrelation Methodology for the Assessment of Security Assurance
Chapter 5
Ken Webb
This chapter results from a qualitative research study finding that a heightened risk for management has emerged from a new security environment... Sample PDF
Security Implications for Management from the Onset of Information Terrorism
Chapter 6
Yves Barlette, Vladislav V. Fomin
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A... Sample PDF
The Adoption of Information Security Management Standards: A Literature Review
Chapter 7
Peter R. Marksteiner
Information overload is an increasingly familiar phenomenon, but evolving United States military doctrine provides a new analytical approach and a... Sample PDF
Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
Chapter 8
John W. Bagby
The public expects that technologies used in electronic commerce and government will enhance security while preserving privacy. These expectations... Sample PDF
Balancing the Public Policy Drivers in the Tension between Privacy and Security
Chapter 9
Indira R. Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano
The goal of our study is to contribute to a better understanding of role conflict, skill expectations, and the value of information technology (IT)... Sample PDF
Human Factors in Security: The Role of Information Security Professionals within Organizations
Chapter 10
Nikolaos Bekatoros HN, Jack L. Koons III, Mark E. Nissen
The US Government is moving apace to develop doctrines and capabilities that will allow the Department of Defense (DoD) to exploit Cyberspace for... Sample PDF
Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations
Chapter 11
Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester
This chapter outlines components of a strategy for government and a conceptual identity fraud enterprise management framework for organizations to... Sample PDF
An Approach to Managing Identity Fraud
Chapter 12
Alanah Davis, Gert-Jan de Vreede, Leah R. Pietron
This chapter presents a repeatable collaboration process as an approach for developing a comprehensive Incident Response Plan for an organization or... Sample PDF
A Repeatable Collaboration Process for Incident Response Planning
Chapter 13
Dean A. Jones, Linda K Nozick, Mark A. Turnquist, William J. Sawaya
A pandemic influenza outbreak could cause serious disruption to operations of several critical infrastructures as a result of worker absenteeism.... Sample PDF
Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration
Chapter 14
Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee
We live in a digital era where the global community relies on Information Systems to conduct all kinds of operations, including averting or... Sample PDF
Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events
Chapter 15
Gregory B. White, Mark L. Huson
The protection of cyberspace is essential to ensure that the critical infrastructures a nation relies on are not corrupted or disrupted. Government... Sample PDF
An Overview of the Community Cyber Security Maturity Model
Chapter 16
Doug White, Alan Rea
In this chapter the authors present essential server security components and develop a set of logical steps to build hardened servers. The authors... Sample PDF
Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
Chapter 17
Jeff Teo
Computer attacks of all sorts are commonplace in today’s interconnected, globalized society. A computer worm, written and released in one part of... Sample PDF
Trusted Computing: Evolution and Direction
Chapter 18
Miguel Jose Hernandez y Lopez, Carlos Francisco Lerma Resendez
This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and... Sample PDF
Introduction, Classification and Implementation of Honeypots
About the Contributors