
James H. Lambert- Doctor of Philosophy
- Professor at University of Virginia
James H. Lambert
- Doctor of Philosophy
- Professor at University of Virginia
About
317
Publications
71,088
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,694
Citations
Introduction
Dept. of Systems & Information Engineering;
Dept of Civil & Environmental Engineering;
President, Soc. for Risk Analysis (2015-2016);
Chair, World Congress on Risk (2019);
Gen. Chair, CESUN2021.org (2021);
F.IEEE; F.AAAS; F.ASCE; F.SRA; P.E.; BC.WRE.;
Editor-in-Chief, Springer journal Environment Systems & Decisions;
Area Editor, Wiley journal Risk Analysis;
Assoc. Editor, IEEE Open Journal of Systems Engineering;
Site Director, NSF CHEST
Current institution
Additional affiliations
May 2019 - present
July 1996 - present
Education
August 1990 - May 1994
August 1988 - August 1990
August 1984 - May 1988
Publications
Publications (317)
The effects of climate change and water scarcity threaten the stability of critical infrastructure systems in developing regions. In particular, the interconnectedness of energy systems, natural resources, economic growth, and social welfare requires a systems‐level framework to identify scenarios which most impact these systems. This paper evaluat...
Transportation planning decisions are traditionally based on aggregated metrics, which may obscure crucial temporal and spatial observations of transportation performance. However, the emergence of connected vehicle (CV) data presents an opportunity to obtain new insights into system operations. CV data includes vehicle-specific performance informa...
Water security in arid and semi-arid Middle Eastern climates has been severely impacted by effects of climate change such as reduced precipitation, diminished storage, increased evapotranspiration, and prolonged heat waves. These climate effects are compounded in Iraq, where populations, agriculture, industry, and energy rely heavily on varying tra...
Artificial intelligence (AI) is advancing across technology domains including healthcare, commerce, the economy, the environment, cybersecurity, transportation, etc. AI will transform healthcare systems, bringing profound changes to diagnosis, treatment, patient care, data, medicines, devices, etc. However, AI in healthcare introduces entirely new...
Increases in the magnitudes and frequencies of climate‐related extreme events are redistributing risk across coastal systems, including their environmental, economic, and social components. Consequently, stakeholders (SHs) are faced with long‐term challenges and complex information when managing assets, services, and uses of the coast. In this cont...
Water security in arid and semi-arid Middle Eastern climates has been severely impacted by effects of climate change such as reduced precipitation, diminished storage, increased evapotranspiration, and prolonged heat waves. These climate effects are compounded in Iraq, where populations, agriculture, industry, and energy rely heavily on varying tra...
Resilience curves describe the diminished performance of a system over time following a shock, with the area integral above the curve representing the persistence of the lost performance. For example, in a power system, the lost power generation is measured in megawatts, and the persistence of the disruption is in megawatt hours; in a communication...
It is widely accepted that climate change is associated with vulnerabilities to infrastructure, and to economic and societal risk across the globe. Developing island nations are more susceptible to climate change impacts due to the unique location and logistical challenges already faced by these countries that are due to their geographical isolatio...
Maritime container ports are critical elements of global supply chains, facilitating trade across many economic sectors. Disruptions such as the COVID-19 pandemic and fluctuations in supply and demand show the need for intelligent methods to improve resilience of port operations. The scheduling and management of container yards is a key opportunity...
The security risks posed by electronics are numerous. There are typically a variety of risk‐reducing countermeasures for a given system or across an enterprise. Each countermeasure is associated with both a level of risk reduction and its lifecycle costs. Given budgetary constraints, risk managers and systems engineers must determine what combinati...
Climate change influences the frequency of extreme events that affect both human and natural systems. It requires systemic climate change adaptation to address the complexity of risks across multiple domains and tackle the uncertainties of future scenarios. This paper introduces a multirisk analysis of climate hazard, exposure, vulnerability, and r...
Real‐time tracking of tool and equipment inventories is a critical function of many organizations and sectors. For prisons and correctional facilities, tracking and monitoring of assets such as cookware, hardware, keys, janitorial equipment, vocational/technical specialty tools, etc., is essential for safety, security, trust, efficiency, education,...
The majority of countries attempting to switch from conventional energy sources to renewable energy sources have decided to make significant investments in these projects. Considering renewable energy is an industry with a high level of investment expenses, assessing investment risks is critical to making efficient investment strategies. Howbeit, s...
A recent large-scale information disruption of the Colonial Pipeline across the USA has highlighted the cyber vulnerabilities of the supply chains of liquid fuels. Information disruption and associated anomalies have become routine events for critical infrastructure of sociotechnical systems. The logistics systems that support energy commodity supp...
Cyber-physical systems encompass multiple system domains (i.e., water, energy, networking) with heterogeneous goals and complexity of interactions. Existing technologies do not address the disparate time and spatial scales across the many system domains, especially with the latest threats and challenge spaces. New methods to manage resilience of sy...
Future electric vehicles and associated vehicle-to-grid (V2G) infrastructure, including vehicle charging stations and network communications, face a variety of cybersecurity threats. The threats include disruptions of the supply chains and operations of the embedded hardware devices of these systems. Systemic and principled approaches are needed in...
Port systems are sensitive and complicated, yet they are subject to various forms of disruptiveness. Therefore, during the port life cycle, the port can be exposed to unexpected crises that include economic meltdowns, inappropriate designs, and the unavailability of resources. Scenario-based preference modeling was designed to define the nature of...
The ongoing pandemic has evolved and is posing diverse challenges for the world. Countermeasures for risks are needed to address both direct and indirect effects of disease on the healthcare system, economic and industrial sectors, governance, environment, transportation, energy, and communication systems. There are indicators of a forthcoming post...
Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is...
Program managers must manage heterogeneous sources of risk across the semiconductor lifecycle, identifying vulnerabilities which, if exploited, have adverse consequences to mission and/or business objectives. Identification of sources of risk involves understanding the business processes involved in the production, use, and maintenance of component...
Purpose
In the buyer-supplier relationship of a high-technology enterprise, the concepts of trust and risk are closely intertwined. Entering into a buyer-supplier relationship inherently involves a degree of risk, since there is always an opportunity for one of the parties to act opportunistically. Purchasing and supply managers play an important r...
Increases in the magnitude and frequency of climate and other disruptive factors are placing environmental, economic, and social stresses on coastal systems. This is further exacerbated by land use transformations, urbanization, over‐tourism, sociopolitical tensions, technological innovations, among others. A scenario‐informed multicriteria decisio...
This paper addresses security and risk management of hardware and embedded systems across several applications. There are three companies involved in the research. First is an energy technology company that aims to leverage electric- vehicle batteries through vehicle to grid (V2G) services in order to provide energy storage for electric grids. Seco...
This Special Issue is dedicated to issues and challenges related to pandemic risk and resilience, with a focus on policy and operations of global systems in the COVID‐19 pandemic. The cascading effects of emerging and reemerging infectious diseases to the global economy are a critical interest. Measures to confront the ongoing pandemic are an urgen...
Organizations increasingly follow comprehensive guidelines and standards when implementing programs for the assessment and management of risk, safety, resilience, or security. Programs often involve the coordination of multiple systems, of stakeholders and organizational units, and require balancing different needs and missions, as well as being fl...
There is global interest by transportation planners and enterprise operators to monitor the inherent uncertainty of transportation networks. Traditional performance metrics may erroneously prioritize project initiatives based on disruptions measured from ideal driving speeds; however, commuters and enterprise operators have demonstrated the ability...
Logistics systems operations, such as intermodal container shipping, are subject to the use of transportation corridors with inherent factors related to the safe, reliable, and efficient movement of freight. Risk analysis and resource allocation of freight operations must consider a diverse set of corridor attributes, system goals, and impacts of f...
Highway traffic congestion is often considered part of routine operations and is anticipated with transportation travel times; however, severe and unexpected delays cause disruption to deliveries, schedules, operations, and other enterprise logistics. This paper includes a description of methods for changepoint detection applied to disaggregate veh...
A variety of signals, metrics, and data may be pertinent to identifying country-level partners in science and technology innovation, and especially newcomers, within a given technology area. Identifying and determining which metrics can be reliably used is necessary to inform policy. There are extant metrics that could be used to predict innovation...
The global science and technology landscape is rapidly changing. In an environment where collaboration is necessary for scientific and technological innovation, it is nonetheless challenging to identify and establish relationships between international partners, especially in emerging technological fields where no country has yet demonstrated a cle...
Science, technology, and innovation (STI) are critical to national competitiveness, security, domestic and international policy, governance, politics, economic growth, culture, and human well-being. One course of action is to only collaborate with known, established partners. But this approach comes with the risk of missing out on the next “up and...
Purpose of Review
This paper provides a review of advances in the enterprise risk and resilience management of electric vehicle charging infrastructures. The works reviewed address the interactions of electric vehicles with power grids through coordinated networks of bidirectional chargers, or vehicle-to-grid technology, and the enterprise resilien...
Technologies such as smartphones, identification, sensors, and actuators are the basic components of an infrastructure that offers efficiencies and conveniences for citizens, governments, and organizations. This infrastructure faces a variety of threats including kinetic assaults, natural hazards, and accidents as well as information disruption and...
Blockchain, as an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, has attracted intensive attention in both research and applications recently. Blockchain, especially powered by chain-coded smart contracts, has the full potential of revolutionizing increasingly centralized cyber-...
Early in the lifecycle of a large-scale system, there are a variety of sources of enterprise risk to be identified and addressed as well as opportunity to improve enterprise resilience at a variety of geographic and temporal scales. This paper identifies the emergent and future conditions that most and least matter to enterprise risk management, de...
Current U.S. geometric road design standards are based on a prescribed value for a driver’s perception-reaction time (a constant value of 2.5 seconds), which represents the time necessary for a driver to safely stop the vehicle to avoid a crash (referred to as a stopping sight distance); however, these standards fail to consider how road complexity...
Guidance on negotiation stresses thorough and careful preparation during the pre-negotiation phase leading up to the actual negotiation discussion. One vital aspect of preparation is to evaluate the interests, preferences, and priorities of both yourself and the opposing party. Traditional negotiation models treat preferences as static. However, pr...
Where hybrid threats represent potential disruptions to interlaced and interdependent systems within national and local governments, companies, and even individual households, methodologies are needed to help identify and understand 1) the source of the disruptions; 2) the system vulnerabilities they exploit with varying degrees of success; and 3)...
Access management is used to control vehicular ingress and egress to adjacent property, where the main goal is to preserve the safety and capacity of the transportation network. Access management can assist in protecting billions of dollars in current investments in the transportation infrastructure, yet it is common for transportation planners to...
Models, being incomplete and simplified representations of complex, real-world systems, contain simplifications and abstractions. However, models with errors or incorrect assumptions can suggest misleading results from the perspective of the decision-maker. Model risk arises from errors within models, or the incorrect use of models, and if undetect...
Obsolescence of integrated systems which contain hardware and software is a problem that affects multiple industries and can occur for many reasons, including technological, economic, organizational, and social factors. It is especially acute in products and systems that have long life cycles, where a high rate of technological innovation of the su...
The future of energy mobility involves networks of users, operators, organizations, vehicles, charging stations, communications, materials, transportation corridors, points of service, and so on. The integration of smart grids with plug‐in electric vehicle technologies has societal and commercial advantages that include improving grid stability, mi...