22.04.2014 Views

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

Abstracts (PDF file, 1.8MB) - Society for Risk Analysis

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SRA 2013 Annual Meeting <strong>Abstracts</strong><br />

W4-F.4 Palmer, MJ; UC Berkeley, Stan<strong>for</strong>d;<br />

palmer@berkeley.edu<br />

Globally Networked <strong>Risk</strong>s and the Decentralization of<br />

Biomanufacturing<br />

Advances in bioengineering technologies are catalyzing an<br />

expansion of research and development models. Horizontal<br />

technology plat<strong>for</strong>ms are emerging alongside more traditional<br />

vertically integrated activities (e.g. in medicine, industrial<br />

processing, agriculture, etc.). These horizontal technology<br />

plat<strong>for</strong>ms – sometimes referred to as bio-manufacturing<br />

capacities – include tools such as lower cost DNA synthesis,<br />

sequencing and assembly. These capacities have also expanded<br />

across a new set of actors, leveraging in<strong>for</strong>mation sharing tools<br />

and employing novel models to organize communities (e.g. the<br />

internet; social networking; crowd-sourced funding; DIY bio<br />

labs). This potential “decentralization of capacity” presents key<br />

challenges <strong>for</strong> the governance of biotechnology. These<br />

developments have been heralded as fueling an industrial<br />

revolution in the life sciences with significant economic<br />

potential. Yet biotechnology can both pose and mitigate key<br />

safety and security concerns (e.g. bioweapons development<br />

versus deterrence and preparedness; environmental release).<br />

This presentation will discuss organizational and institutional<br />

challenges in building bio-manufacturing capacities<br />

internationally. It will examine examine strategies in the US<br />

and abroad to foster distributed or centralized technology<br />

deployment and propose key factors essential to building<br />

resilient governance strategies.<br />

P.67 Pang, H*; Buchanan, RL; Schaffner, DW; Pradhan, AK;<br />

Pang, H; Buchanan, RL; Pradhan, AK; University of Maryland,<br />

College Park, MD, 20742; Schaffner, DW; Rutgers University,<br />

New Brunswick, NJ 08901; haopang@mail.umd.edu<br />

Quantitative <strong>Risk</strong> Assessment <strong>for</strong> Escherichia coli<br />

O157:H7 in Fresh-cut Lettuce<br />

Leafy green vegetables, including lettuce, are of serious food<br />

safety concern, as those are recognized as vehicles <strong>for</strong><br />

foodborne pathogens such as Escherichia coli O157:H7 that<br />

could cause human illnesses. Development and application of<br />

quantitative risk assessment models have been recognized as<br />

strong tools to identify and minimize potential risks associated<br />

with foodborne pathogens. This study was aimed at developing<br />

a quantitative microbial risk assessment model (QMRA) <strong>for</strong> E.<br />

coli O157:H7 in fresh-cut lettuce and evaluating the effects of<br />

intervention strategies on public health risks. The supply chain<br />

of fresh-cut lettuce was modeled from infield production until<br />

consumption at home. Using @RISK software a simulation<br />

model was developed <strong>for</strong> exposure and health outcome<br />

assessment. The developed model was simulated using Latin<br />

Hypercube Sampling <strong>for</strong> 100,000 iterations to estimate the<br />

number of illnesses due to consumption of fresh-cut lettuce in<br />

the U.S. With a prevalence of 1% of lettuce coming to the<br />

processing plant, the baseline model (with no inclusion of<br />

intervention strategies) predicted 8921 number of cases per<br />

year in the U.S. For each of the intervention strategies<br />

evaluated, the public health risks were reduced and the<br />

bacteriophage was the most effective in reducing the public<br />

health risks. Sensitivity analysis results indicated that irrigation<br />

water quality is the most important factor affecting the number<br />

of cases predicted. The developed risk model can be used to<br />

estimate the public health risk of E. coli O157:H7 from<br />

fresh-cut lettuce and to evaluate different potential intervention<br />

strategies to mitigate such risk.<br />

T1-H.3 Panjwani, S; THANE Inc; susmit@gmail.com<br />

Making risk-in<strong>for</strong>med decisions using the next<br />

generation algorithms <strong>for</strong> cyber-security and<br />

Cyber-Physical Systems (CPS) risk assessment<br />

Cyber-security has become a game that is almost impossible to<br />

win(1). According to the Global State of Security survey,(1)<br />

“The rules have changed, and opponents−old and new−are<br />

armed with expert technology skills, and the risks are greater<br />

than ever.” Despite this, more organizations are investing in<br />

security to achieve due-diligence as opposed to reducing the<br />

risks. Inconsistencies and inability of current expert driven risk<br />

assessment methods to improve the state of security are often<br />

cited as a reason to use a due-diligence driven security<br />

management approach. Cyber-Physical System (CPS) is hybrid<br />

network of physical and engineered systems. CPS will play an<br />

integral role in developing the next generation of critical<br />

infrastructure. CPS faces new types of risk pro<strong>file</strong> including<br />

cyber-security risks. Little research is done to develop scientific<br />

foundation <strong>for</strong> managing CPS risks. Better risk assessment<br />

methods are needed to improve decisions <strong>for</strong> managing<br />

complex and dynamic cyber systems. Currently artificial<br />

intelligence algorithms are used to generate system reliability<br />

and cyber-security risk scenarios. These algorithms function by<br />

assuming that there are no unknowns and everything is known<br />

a priori. This assumption is not valid <strong>for</strong> cyber-security and CPS<br />

risk assessment. Making this assumption produces<br />

counter-intuitive results and provides a false sense of security.<br />

However, eliminating this assumption precludes using majority<br />

of current algorithms <strong>for</strong> generating risk scenarios. Using<br />

lessons learned by conducting risk assessment <strong>for</strong> a critical<br />

infrastructure CPS, the author developed a new type of<br />

algorithm <strong>for</strong> automatically generating risk scenarios <strong>for</strong><br />

cyber-security and CPS. This new framework captures dynamic<br />

in<strong>for</strong>mation, and assumes that there are unknowns and new<br />

knowledge is available frequently. This framework allows<br />

making risk-in<strong>for</strong>med decisions in an unknown world. (1) PWC.<br />

Key findings from The Global State of In<strong>for</strong>mation Security®<br />

Survey 2013.<br />

M3-A.2 Panjwani, S; THANE Inc; susmit@gmail.com<br />

Cyber-security <strong>Risk</strong> Management<br />

Current cyber-security risk management is driven by two<br />

complementary philosophies. The first strategy is called is<br />

called “penetrate-and-patch”, which focuses on identifying and<br />

patching vulnerabilities. Often a team of security experts is<br />

used to identify exploitable vulnerabilities. The second strategy<br />

is called “secure-design,” which suggests preventing<br />

vulnerabilities by designing more secure systems and<br />

developing more secure software. This approach identifies<br />

secure coding practices by studying known vulnerabilities. To<br />

support these risk management strategies, current risk<br />

assessment methods focus on identifying vulnerabilities. The<br />

challenge with current vulnerability centric risk management<br />

strategies is that, in the last decade the overall number of<br />

reported vulnerabilities has increased. More importantly,<br />

despite ef<strong>for</strong>ts to make software and cyber-infrastructure more<br />

secure, all types of vulnerabilities that existed at the beginning<br />

of the decade still existed at the end. Current risk management<br />

methods also assume that there are no unknowns in the<br />

cyber-security domain and all in<strong>for</strong>mation is available a priori.<br />

This assumption produces counter intuitive results. Some<br />

experts have suggested replacing the risk based approach with<br />

a due-diligence based approach citing inconsistencies and<br />

inability of current expert driven risk management methods to<br />

improve the state of security. Current cyber-security risk<br />

management and assessment methods need to be improved.<br />

However, the lack of improved state of cyber-security is not<br />

only because of the limitation of current methods, but is caused<br />

by the failure to understand unique characteristics of the<br />

cyber-security domain. The author developed a new risk<br />

assessment framework by capturing these unique requirements<br />

of cyber-security domain. A new risk management philosophy is<br />

also developed that uses the attacker behavior to lead the<br />

attacker away from the target.<br />

December 8-11, 2013 - Baltimore, MD

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!