|کد مقاله||کد نشریه||سال انتشار||مقاله انگلیسی||ترجمه فارسی||نسخه تمام متن|
|275871||1429498||2013||9 صفحه PDF||سفارش دهید||دانلود رایگان|
این مقاله ISI می تواند منبع ارزشمندی برای تولید محتوا باشد.
- تولید محتوا برای سایت و وبلاگ
- تولید محتوا برای کتاب
- تولید محتوا برای نشریات و روزنامه ها
پایگاه «دانشیاری» آمادگی دارد با همکاری مجموعه «شهر محتوا» با استفاده از این مقاله علمی، برای شما به زبان فارسی، تولید محتوا نماید.
State and local governments across the United States are leveraging the Internet and associated technologies to dramatically change the way they offer public services. While they are motivated to capture efficiencies, the public entities increasingly rely on information systems that are dependent on energy and related civil structures. This reliance is incongruous with the widespread awareness of aging infrastructure – decaying for lack of investment – in cities across the United States. Important questions that come up in this environment of persistent expansion of the use of digital assets are the following: What threat does aging infrastructure pose to governmental reliance on computing infrastructures? How are local governments responding to this threat? Are the solutions posed appropriate to the problem, or do they pose new and different threats?This paper uses a case involving the disruption of a local government data center due to the failure of an electrical bus to illustrate how the threats of aging infrastructure grow, quietly and steadily, into emergencies, on par with the catastrophic events encountered in the context of critical infrastructure protection. The decisions precipitating the disruption are routine, borne of circumstances shared by agencies that are pressed to maintain services with scarce resources. Patterns of capital investment and management explain the emergence of crises in routine operations. If, as in the case described in this paper, deferred maintenance motivates public agents to explore private cloud services, then governments may solve several problems, but may also be exposed to new risks as they enter into arrangements from which they are unable to exit.
Journal: International Journal of Critical Infrastructure Protection - Volume 6, Issues 3–4, December 2013, Pages 123–131