. "4 Applying the Methodology: Some Specific Research and Development Topics." Improving Surface Transportation Security: A Research and Development Strategy. Washington, DC: The National Academies Press, 1999.
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
TABLE 4-1 Illustration of the Matrix Categorization of R&D Topics
Type of Attack
Cyber and C3
study of redundancies
low-tech best practices
ITS graceful degradation
lessons from natural disasters
chemical detector evaluation
identification of abnormal activity
rapid bridge repairs
Note: This table categorizes some of the technologies and processes discussed in this chapter according to type of attack and type of R&D response. Also included, to show how they fit into the matrix concept, are two studies discussed in Chapter 2 (a compendium of lessons learned from past natural disasters and accidents and a study of redundancies and interdependencies). This is not a complete or exclusive list, just some examples arranged to illustrate the matrix approach.
the value of taking a dual-use approach, in which security objectives are furthered at the same time as other transportation goals
the potential for more use of modeling to develop a better understanding of the scope of the security problem
the importance of DOT's role in developing and disseminating information about best practices that use existing technologies and processes, including low-technology alternatives
the need to consider security as part of a broader picture, not a wholly new and different problem, but one that is similar and closely connected to the transportation community's previous experience in responding to concerns about safety, natural disasters, and hazardous materials
The strategy begins with definition of the problem and establishment of objectives. As discussed in Chapter 3, DOT's broad objectives for R&D efforts in surface transportation security should resemble the following: