James H. Lambert

James H. Lambert
University of Virginia | UVa · Dept of Engineering Systems & Environment

Ph.D., D.WRE, F.ASCE, F.SRA, F.IEEE, P.E.

About

271
Publications
57,717
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,239
Citations
Introduction
President, Society for Risk Analysis (2015-2016); Chair, World Congress on Risk (Cape Town, 2019); Fellow, IEEE; Fellow, American Soc. of Civil Engineers; Fellow, Soc. for Risk Analysis; Professional Engineer; Diplomate, American Academy of Water Resources Eng.; Editor-in-Chief, Springer journal Environment Systems & Decisions; Member, Comm. on Health Threats Resilience, Nat. Academy of Medicine; Area Editor, Wiley journal Risk Analysis; Assoc. Editor, ASCE/ASME Journal of Risk & Uncertainty in Eng Sys
Additional affiliations
May 2019 - present
University of Virginia
Position
  • Managing Director
July 1996 - present
University of Virginia
Position
  • Professor
Education
August 1990 - May 1994
August 1988 - August 1990
August 1984 - May 1988
Princeton University
Field of study

Publications

Publications (271)
Article
Real‐time tracking of tool and equipment inventories is a critical function of many organizations and sectors. For prisons and correctional facilities, tracking and monitoring of assets such as cookware, hardware, keys, janitorial equipment, vocational/technical specialty tools, etc., is essential for safety, security, trust, efficiency, education,...
Article
Full-text available
A recent large-scale information disruption of the Colonial Pipeline across the USA has highlighted the cyber vulnerabilities of the supply chains of liquid fuels. Information disruption and associated anomalies have become routine events for critical infrastructure of sociotechnical systems. The logistics systems that support energy commodity supp...
Article
Future electric vehicles and associated vehicle-to-grid (V2G) infrastructure, including vehicle charging stations and network communications, face a variety of cybersecurity threats. The threats include disruptions of the supply chains and operations of the embedded hardware devices of these systems. Systemic and principled approaches are needed in...
Article
The ongoing pandemic has evolved and is posing diverse challenges for the world. Countermeasures for risks are needed to address both direct and indirect effects of disease on the healthcare system, economic and industrial sectors, governance, environment, transportation, energy, and communication systems. There are indicators of a forthcoming post...
Article
Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is...
Article
Purpose In the buyer-supplier relationship of a high-technology enterprise, the concepts of trust and risk are closely intertwined. Entering into a buyer-supplier relationship inherently involves a degree of risk, since there is always an opportunity for one of the parties to act opportunistically. Purchasing and supply managers play an important r...
Article
Full-text available
Increases in the magnitude and frequency of climate and other disruptive factors are placing environmental, economic, and social stresses on coastal systems. This is further exacerbated by land use transformations, urbanization, over‐tourism, sociopolitical tensions, technological innovations, among others. A scenario‐informed multicriteria decisio...
Conference Paper
This paper addresses security and risk management of hardware and embedded systems across several applications. There are three companies involved in the research. First is an energy technology company that aims to leverage electric- vehicle batteries through vehicle to grid (V2G) services in order to provide energy storage for electric grids. Seco...
Article
This Special Issue is dedicated to issues and challenges related to pandemic risk and resilience, with a focus on policy and operations of global systems in the COVID‐19 pandemic. The cascading effects of emerging and reemerging infectious diseases to the global economy are a critical interest. Measures to confront the ongoing pandemic are an urgen...
Chapter
Organizations increasingly follow comprehensive guidelines and standards when implementing programs for the assessment and management of risk, safety, resilience, or security. Programs often involve the coordination of multiple systems, of stakeholders and organizational units, and require balancing different needs and missions, as well as being fl...
Article
There is global interest by transportation planners and enterprise operators to monitor the inherent uncertainty of transportation networks. Traditional performance metrics may erroneously prioritize project initiatives based on disruptions measured from ideal driving speeds; however, commuters and enterprise operators have demonstrated the ability...
Conference Paper
Logistics systems operations, such as intermodal container shipping, are subject to the use of transportation corridors with inherent factors related to the safe, reliable, and efficient movement of freight. Risk analysis and resource allocation of freight operations must consider a diverse set of corridor attributes, system goals, and impacts of f...
Article
Highway traffic congestion is often considered part of routine operations and is anticipated with transportation travel times; however, severe and unexpected delays cause disruption to deliveries, schedules, operations, and other enterprise logistics. This paper includes a description of methods for changepoint detection applied to disaggregate veh...
Article
A variety of signals, metrics, and data may be pertinent to identifying country-level partners in science and technology innovation, and especially newcomers, within a given technology area. Identifying and determining which metrics can be reliably used is necessary to inform policy. There are extant metrics that could be used to predict innovation...
Article
The global science and technology landscape is rapidly changing. In an environment where collaboration is necessary for scientific and technological innovation, it is nonetheless challenging to identify and establish relationships between international partners, especially in emerging technological fields where no country has yet demonstrated a cle...
Article
Science, technology, and innovation (STI) are critical to national competitiveness, security, domestic and international policy, governance, politics, economic growth, culture, and human well-being. One course of action is to only collaborate with known, established partners. But this approach comes with the risk of missing out on the next “up and...
Article
Full-text available
Purpose of Review This paper provides a review of advances in the enterprise risk and resilience management of electric vehicle charging infrastructures. The works reviewed address the interactions of electric vehicles with power grids through coordinated networks of bidirectional chargers, or vehicle-to-grid technology, and the enterprise resilien...
Article
Technologies such as smartphones, identification, sensors, and actuators are the basic components of an infrastructure that offers efficiencies and conveniences for citizens, governments, and organizations. This infrastructure faces a variety of threats including kinetic assaults, natural hazards, and accidents as well as information disruption and...
Article
Blockchain, as an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, has attracted intensive attention in both research and applications recently. Blockchain, especially powered by chain-coded smart contracts, has the full potential of revolutionizing increasingly centralized cyber-...
Article
Early in the lifecycle of a large-scale system, there are a variety of sources of enterprise risk to be identified and addressed as well as opportunity to improve enterprise resilience at a variety of geographic and temporal scales. This paper identifies the emergent and future conditions that most and least matter to enterprise risk management, de...
Article
Current U.S. geometric road design standards are based on a prescribed value for a driver’s perception-reaction time (a constant value of 2.5 seconds), which represents the time necessary for a driver to safely stop the vehicle to avoid a crash (referred to as a stopping sight distance); however, these standards fail to consider how road complexity...
Article
Guidance on negotiation stresses thorough and careful preparation during the pre-negotiation phase leading up to the actual negotiation discussion. One vital aspect of preparation is to evaluate the interests, preferences, and priorities of both yourself and the opposing party. Traditional negotiation models treat preferences as static. However, pr...
Article
Where hybrid threats represent potential disruptions to interlaced and interdependent systems within national and local governments, companies, and even individual households, methodologies are needed to help identify and understand 1) the source of the disruptions; 2) the system vulnerabilities they exploit with varying degrees of success; and 3)...
Article
Access management is used to control vehicular ingress and egress to adjacent property, where the main goal is to preserve the safety and capacity of the transportation network. Access management can assist in protecting billions of dollars in current investments in the transportation infrastructure, yet it is common for transportation planners to...
Article
Full-text available
Models, being incomplete and simplified representations of complex, real-world systems, contain simplifications and abstractions. However, models with errors or incorrect assumptions can suggest misleading results from the perspective of the decision-maker. Model risk arises from errors within models, or the incorrect use of models, and if undetect...
Article
Obsolescence of integrated systems which contain hardware and software is a problem that affects multiple industries and can occur for many reasons, including technological, economic, organizational, and social factors. It is especially acute in products and systems that have long life cycles, where a high rate of technological innovation of the su...
Article
The future of energy mobility involves networks of users, operators, organizations, vehicles, charging stations, communications, materials, transportation corridors, points of service, and so on. The integration of smart grids with plug‐in electric vehicle technologies has societal and commercial advantages that include improving grid stability, mi...
Article
Assuring future performance of systems-of-systems through advanced-technology investments is a perpetual challenge of industry and agencies. Among the complicating factors are technology innovation, escalating scales, and diversity of software and hardware applications, increasing availability and scrutiny of big data, and evolving business, enviro...
Chapter
Supply chains are among the most exposed and vulnerable component of any system. This chapter explores the resilience perspective of the supply chain for the ubiquitous electronic hardware embedded within modern cyber-physical systems. The chapter begins by identifying a set of factors that enable resilience. It also explains the nature of actors w...
Article
Port infrastructure and port operations are highly impacted by disruptive scenarios that stem from several different types of causes, including adverse weather events, economic crises, traffic congestion, and spikes in demand, among others. Port intermodal transportation systems are characterized by high complexity and uncertainty since they serve...
Article
Particular scenarios of emergent and future conditions are more disruptive than others in terms of project schedules and the evolving priorities of project managers. It is essential to associate the scenarios with cost and schedule impacts to guide corrective or precautionary actions. The innovation of this paper is to use scenarios to investigate...
Article
Large‐scale logistics systems operate under uncertainties of schedule, cost, environmental impacts, reliability, and others rendering it critical for system operations to consider emergent and future conditions involving markets, technologies, environment, and organizations. Business process modeling is used widely to document the activities of an...
Article
The data collected on second-to-second operations of large-scale freight and logistics systems have increased in recent years. Data analytics can provide valuable insight and improve efficiency and reduce waste of resources. Understanding sources of uncertainty, including emergent and future conditions, is critical to enterprise resilience, recogni...
Article
Full-text available
Various emerging technologies challenge existing governance processes to identify, assess, and manage risk. Though the existing risk-based paradigm has been essential for assessment of many chemical, biological, radiological, and nuclear technologies, a complementary approach may be warranted for the early-stage assessment and management challenges...
Article
A key project management capability is time management, prioritizing activities in time while tracking emergent and future conditions along with the influences of those conditions on project metrics. The research objective of this paper is to introduce a method of updating of importance for project activities as a class of entity. The methodology i...
Article
A coordinated network of bidirectional chargers can be useful to improve grid stability and resilience and provide revenues to owner/operators of fleets of electric vehicles. This paper quantifies the resilience of a portfolio of vehicle-to-grid technology investments and milestones when it is subjected to a variety of emergent and future condition...
Article
As the Defense Department evaluates the implementation of blockchain technologies, proactively developing related governance now will help ensure that their long-term impacts are consistent with the military’s needs and missions.
Article
Full-text available
Regulatory agencies have long adopted a three‐tier framework for risk assessment. We build on this structure to propose a tiered approach for resilience assessment that can be integrated into the existing regulatory processes. Comprehensive approaches to assessing resilience at appropriate and operational scales, reconciling analytical complexity a...
Article
E-commerce and other software-related projects are subject to disruptions that result in schedule delays, cost overruns, and degraded quality. Systems integration projects must address and mitigate the most disruptive scenarios resulting in the potential to miss predefined programmatic targets. In this paper, we present a method that aids in the se...
Article
Presents a listing ot the SMC society's Technical Committee on Social and Economic Security.
Article
Regulatory agencies have long adopted a three-tier framework for risk assessment. We build on this structure to propose a tiered approach for resilience assessment that can be integrated into the existing regulatory processes. Comprehensive approaches to assessing resilience at appropriate and operational scales, reconciling analytical complexity a...
Article
With cloud computing, Internet-of-things, wireless sensors, social media, fast storage and retrieval, etc., organizations and enterprises have access to unprecedented amounts and varieties of data. Current risk analysis methodology and applications are experiencing related advances and breakthroughs. For example, highway operations data are readily...
Article
Transportation agencies are challenged with managing large-scale networks of roads, spanning geographic areas diverse in terms of jurisdictions, topography, demographics, economy, organizations, and others. Risk management, asset management, and resource allocation must be approached from a holistic perspective without compromising specific regiona...
Article
Schedule risk analysis plays a key role in new product development. A typical project-schedule model using the Critical Path Method (CPM) and Program, Evaluation, and Review Technique (PERT) falls short in many practical situations. Instead, a graphical evaluation and review technique (GERT) has been recommended for its ability to address probabili...
Chapter
In the big data era, new research opportunities and challenges exist for systems optimization and control problems. In this concluding chapter, we share several probable related areas which may lead to fruitful research in the future. We also summarize the future research directions proposed by papers featured in this book.
Chapter
The big data era is characterized by the presence of many Vs in terms of data and data usage. In this introductory chapter, we first discuss some challenges in optimization and control for systems in the presence of massive amount of data. We then introduce the papers featured in this book.