{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:52:55Z","timestamp":1725555175404},"reference-count":100,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009532","name":"Ministry of the Interior of the Czech Republic","doi-asserted-by":"publisher","award":["VI20192022151"],"id":[{"id":"10.13039\/100009532","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"Critical infrastructure is a complex system whose disruption or failure results in significant impacts on state interests, i.e., territorial security, economy, and the basic needs of the population. The current European Critical Infrastructure Protection Model does not allow the direct identification of critical elements at the regional level. Based on this, the paper brings a proposal for a unified system of critical infrastructure design based on a bottom-up approach. It is a progressive approach, utilizing contemporary trends in the application of science-based knowledge to critical infrastructure. A holistic view of this issue allows us to take into account the needs and preferences of the population, the preferences of the stakeholders and the local conditions of the region under consideration. The novelty of this approach is seen, in particular, in the identification of regional critical infrastructure elements through an integral assessment of these elements\u2019 failure impact, not only on the dependent subsectors, but also on the population (population equivalent) in the assessed region. The final part of the paper presents a case study demonstrating the practical application of the proposed system to the road infrastructure in the Pardubice Region of the Czech Republic.<\/jats:p>","DOI":"10.3390\/systems8020013","type":"journal-article","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T06:10:52Z","timestamp":1587622252000},"page":"13","source":"Crossref","is-referenced-by-count":6,"title":["Designating Regional Elements System in a Critical Infrastructure System in the Context of the Czech Republic"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7076-8918","authenticated-orcid":false,"given":"Petr","family":"Novotny","sequence":"first","affiliation":[{"name":"Faculty of Safety Engineering, VSB\u2014Technical University of Ostrava, Lumirova 630\/13, 700 30 Ostrava-Vyskovice, Czech Republic"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7719-4796","authenticated-orcid":false,"given":"Michaela","family":"Janosikova","sequence":"additional","affiliation":[{"name":"Faculty of Security Engineering, University of Zilina, 1. Maja 32, 01026 Zilina, Slovakia"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Frangopol, D.M., Soliman, M., and Dong, Y. (2014, January 16\u201318). Practical Applications of Life-cycle Considerations in Sustainable Development of Infrastructure. Proceedings of the Conference on Sustainable Development of Critical Infrastructure, American Society of Civil Engineers, Shanghai, China.","DOI":"10.1061\/9780784413470.002"},{"key":"ref_2","unstructured":"World Economic Forum (2014). Global Risk 2014, The World Economic Forum. [9th ed.]."},{"key":"ref_3","first-page":"125","article-title":"Complex Approach to Assessing Resilience of Critical Infrastructure Elements","volume":"25","author":"Rehak","year":"2019","journal-title":"Int. J. Crit. Inf. Prot."},{"key":"ref_4","unstructured":"European Commission (2008). Council Directive 2008\/114\/ES of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection, European Council."},{"key":"ref_5","unstructured":"European Commission (2013). Commission Staff Working Document \u201cOn a New Approach to the European Programme for Critical Infrastructure Protection Making European Critical Infrastructure More Secure\u201c, European Commission."},{"key":"ref_6","unstructured":"ISO 31000:2018 (2009). Risk Management\u2013Principles and Guidelines, International Organization for Standardization."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Lukas, L., and Hromada, M. (2011, January 23\u201326). Risk Analysis in Context of Critical Infrastructure Protection. Proceedings of the Annals of DAAAM for 2011 and 22nd International DAAAM Symposium Intelligent Manufacturing and Automation: Power of Knowledge and Creativity, Technische Universit\u00e4t Wien, Vienna, Austria.","DOI":"10.2507\/22nd.daaam.proceedings.719"},{"key":"ref_8","unstructured":"Hromada, M., and Lukas, L. (December, January 28). Multicriterial Evaluation of Critical Infrastructure Element Protection in Czech Republic. Proceedings of the Conference on Advanced Software Engineering and Its Applications (ASEA) and Conference on Disaster Recovery and Business Continuity (DRBC), Jeju Island, Korea."},{"key":"ref_9","first-page":"91","article-title":"Bases for Modelling the Impacts of the Critical Infrastructure Failure","volume":"53","author":"Rehak","year":"2016","journal-title":"Chem. Eng. Trans."},{"key":"ref_10","first-page":"943","article-title":"European Critical Infrastructure Risk and Safety Management: Directive Implementation in Practice","volume":"48","author":"Rehak","year":"2016","journal-title":"Chem. Eng. Trans."},{"key":"ref_11","unstructured":"European Commission (2011). Regions in the European Union: Nomenclature of Territorial Units for Statistics NUTS 2010\/EU-27, European Commission."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Haberlin, R.J., and Haimes, Y.Y. (2018). Regional Infrastructures as Complex Systems of Systems: Shared-State Model for Regional Resilience. J. Inf. Syst., 24.","DOI":"10.1061\/(ASCE)IS.1943-555X.0000421"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Rehak, D., Senovsky, P., and Slivkova, S. (2018). Resilience of Critical Infrastructure Elements and its Main Factors. Systems, 6.","DOI":"10.3390\/systems6020021"},{"key":"ref_14","unstructured":"Swiss Federal Office for Civil Protection (2009). Critical Infrastructure Protection: Second Report to the Federal Council and Measures for the Period 2009\u20132011, Federal Office for Civil Protection."},{"key":"ref_15","unstructured":"Swiss Federal Council (2009). Basic Strategy of the Federal Council-Critical Infrastructure Protection: Basis for the National Critical Infrastructure Protection Strategy."},{"key":"ref_16","unstructured":"Bundesamt f\u00fcr Bev\u00f6lkerungsschutz (2010). Methode zur Erstellung des SKI-Inventars, Bundesamt f\u00fcr Bev\u00f6lkerungsschutz, Konzeption und Koordination."},{"key":"ref_17","unstructured":"Tweede Kamer (2001). Eerste Voortgangsrapportage m.b.t. Actieplan Terrorismebestrijding en Veiligheid van 5 Oktober 2001 (First Progress Report w.r.t. the Action Plan Counter-terorism and Safety Dated 5 October 2001), Tweede Kamer der Staten-Heneraal vergaderjaar."},{"key":"ref_18","unstructured":"Luiijf, E., Burger, H., and Klaver, M. (2003). Critical Infrastructure Protection in the Netherlands: A Quick-scan, EICAR."},{"key":"ref_19","unstructured":"The Hague Security Delta (2015). Securing Critical Infrastructures in the Netherlands: Towards a National Testbed, The Hague Security Delta."},{"key":"ref_20","unstructured":"Cabinet Office (2008). The National Security Strategy of the United Kingdom: Security in an Independent World."},{"key":"ref_21","unstructured":"Cabinet Office (2010). Strategic Framework and Policy Statement: On Improving the Resilience of Critical Infrastructure to Disruption from Natural Hazards."},{"key":"ref_22","unstructured":"Cabinet Office (2011). Keeping the Country Running: Natural Hazards and Infrastructure, Section C: Practical Guidance."},{"key":"ref_23","unstructured":"Cabinet Office (2013). Risk Assessment: How the Risk of Emergencies in the UK is Assessed."},{"key":"ref_24","unstructured":"Cabinet Office (2013). National Infrastructure Plan."},{"key":"ref_25","unstructured":"Cabinet Office (2015). National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom."},{"key":"ref_26","unstructured":"National Emergency Management Agency (2002). Civil Defence Emergency Management (CDEM) Act."},{"key":"ref_27","unstructured":"Auckland Engineering Lifelines Group (2014). Auckland Engineering Lifelines Group Report: Stage 2. Version 1.1., Auckland Engineering Lifeline Group."},{"key":"ref_28","unstructured":"National Emergency Management Agency (2014). Revised National Civil Defence Emergency Management Plan: Resilient New Zealand."},{"key":"ref_29","unstructured":"Pruyt, E., Veldheer, V., Wijnmalen, D.J.D., Alink, F., Dam, A., van Horst, J., van der Knops, J., Bergmans, H., and Janssen, L. (2008). National Safety and Security Programme: National Risk Analysis Method Guide."},{"key":"ref_30","first-page":"56","article-title":"Determination of the Critical Infrastructure Elements at Regional Level","volume":"14","author":"Novotny","year":"2014","journal-title":"Spektrum"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.02.009","article-title":"Challenges in the Vulnerability and Risk Analysis of Critical Infrastructures","volume":"152","author":"Zio","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_32","first-page":"79","article-title":"Territorial Risk Analysis and Mapping","volume":"31","author":"Bernatik","year":"2013","journal-title":"Chem. Eng. Trans."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Siser, A., Maris, L., Rehak, D., and Pellowski, W. (2018, January 22\u201325). The Use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System. Proceedings of the 52nd Annual IEEE International Carnahan Conference on Security Technology (ICCST), Montr\u00e9al, QC, Canada.","DOI":"10.1109\/CCST.2018.8585718"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Slivkova, S., Rehak, D., Nesporova, V., and Dopaterova, M. (June, January 31). Correlation of Core Areas Determining the Resilience of Critical Infrastructure. Proceedings of the 12th International Scientific Conference on Sustainable, Modern and Safe Transport (TRANSCOM 2017), High Tatras, Slovakia.","DOI":"10.1016\/j.proeng.2017.06.140"},{"key":"ref_35","first-page":"215","article-title":"The State of the Art in Critical Infrastructure Protection: A Framework for Convergence","volume":"4","author":"Ghorbani","year":"2008","journal-title":"Int. J. Crit. Inf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/37.969131","article-title":"Identifying, Understanding and Analyzing Critical Infrastructure Interdependencies","volume":"21","author":"Rinaldi","year":"2001","journal-title":"IEEE Control Syst."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Rinaldi, S.M. (2004, January 5\u20138). Modelling and Simulating Critical Infrastructures and Their Interdependencies. Proceedings of the 37th Annual Hawaii International Conference on System Science, IEEE Computer Society, Big Island, HI, USA.","DOI":"10.1109\/HICSS.2004.1265180"},{"key":"ref_38","first-page":"258","article-title":"The Socio-political Dimensions of Critical Information Infrastructure Protection (CIIP)","volume":"1","author":"Dunn","year":"2005","journal-title":"Int. J. Crit. Inf."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s10796-008-9127-y","article-title":"UML-CI: A reference model for profiling critical infrastructure systems","volume":"12","author":"Bagheri","year":"2010","journal-title":"Inf. Syst. Front."},{"key":"ref_40","first-page":"114","article-title":"Infrastructure Risk Analysis Model","volume":"6","author":"Ezell","year":"2000","journal-title":"J. Inf. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TAC.1966.1098336","article-title":"A Class of Hybrid-state Continuous-time Dynamic Systems","volume":"11","author":"Witsenhausen","year":"1966","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_42","unstructured":"Ristvej, J., Holla, K., Simak, L., Titko, M., and Zagorecki, A. (2013, January 23\u201325). Modelling, Simulation and Information Systems as a Tool to Support Decision-Making Process in Crisis Management. Proceedings of the Modelling and Simulation 2013-European Simulation and Modelling Conference, Lancaster, UK."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1504\/IJEM.2013.059879","article-title":"Data Mining and Machine Learning in the Context of Disaster and Crisis Management","volume":"9","author":"Zagorecki","year":"2013","journal-title":"Int. J. Emergy Man."},{"key":"ref_44","unstructured":"Rubinstein, R.Y., and Kroese, D.P. (2011). Simulation and the Monte Carlo Method, John Wiley and Sons."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.1109\/59.41707","article-title":"Scenario Building for Operator Training Simulators Using a Transient Stability Program","volume":"4","author":"Zhang","year":"1989","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_46","unstructured":"Newman, D.E., Nkei, B., Carreras, B.A., Dobson, I., Lynch, V.E., and Gradney, P. (2005, January 3\u20136). Risk Assessment in Complex Interacting Infrastructure Systems. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, IEEE Computer Society, Big Island, HI, USA."},{"key":"ref_47","unstructured":"(2011). CARVER2."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Lima, A., Stojanovic, R., Papagiannaki, D., Rodriguez, P., and Gonzales, M.C. (2016). Understanding Individual Routing Behaviour. J. R. Soc. Int., 13.","DOI":"10.1098\/rsif.2016.0021"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/21.135678","article-title":"Cooperation and Conflict Resolution via Negotiation Among Autonomous Agents in Noncooperative Domains","volume":"21","author":"Zlotkin","year":"1991","journal-title":"IEEE Trans. Syst. Man Cybern"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"6100","DOI":"10.1016\/j.enpol.2011.07.010","article-title":"Methodologies and Applications for Critical Infrastructure Protection: State-of-the-art","volume":"39","author":"Yusta","year":"2011","journal-title":"Energy Policy"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Ben-Gal, I. (2008). Encyclopedia of Statistics in Quality and Reliability, Bayesian Networks, John Wiley and Sons.","DOI":"10.1002\/9780470061572.eqr089"},{"key":"ref_52","unstructured":"Tukey, J.W. (1977). Exploratory Data Analysis, Addison-Wesley."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MCAS.2003.1228503","article-title":"Complex Networks: Small-world, Scale-free and Beyond","volume":"3","author":"Wang","year":"2003","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/369836.571190","article-title":"Review of Modern Graph Theory by B\u00e9la Bollob\u00e1s","volume":"31","author":"Cenek","year":"2000","journal-title":"ACM SIGACT News"},{"key":"ref_55","unstructured":"Wolthusen, S.D. (2005, January 3\u20134). GIS-based Command and Control Infrastructure for Critical Infrastructure Protection. Proceedings of the 1st IEEE International Workshop on Critical Infrastructure Protection (IEEE), Darmstadt, Germany."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Ristvej, J., Sokolova, L., Strakacova, J., Ondrejka, R., and Lacinak, M. (2017, January 23\u201326). Experiences with Implementation of Information Systems within Preparation to Deal with Crisis Situations in Terms of Crisis Management and Building Resilience in the Slovak Republic. Proceedings of the International Carnahan Conference on Security Technology (ICCST), Madrid, Spain.","DOI":"10.1109\/CCST.2017.8167821"},{"key":"ref_57","unstructured":"UNISRD (2015). Sendai Framework for Disaster Risk Reduction 2015\u20132030, United Nations International Strategy for Disaster Reduction."},{"key":"ref_58","unstructured":"IEC 31010:2019 (2009). Risk Management\u2013Risk Assessment Techniques, International Organization for Standardization."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"7","DOI":"10.7906\/indecs.17.1.2","article-title":"Applying Risk Management Process in Critical Infrastructure Protection","volume":"17","author":"Luskova","year":"2019","journal-title":"Interdiscip. Descr. Complex Syst. INDECS"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Bialas, A. (2016). Risk Management in Critical Infrastructure\u2014Foundation for Its Sustainable Work. Sustainability, 8.","DOI":"10.3390\/su8030240"},{"key":"ref_61","first-page":"69","article-title":"Quantitative Assessment Parameters of the Protection Level of National Strategic Sites in the EU","volume":"43","author":"Lovecek","year":"2010","journal-title":"WIT Trans. Inf. Commun. Technol."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MS.1997.589225","article-title":"Software Risk Management","volume":"14","author":"Boehm","year":"1997","journal-title":"IEEE Softw."},{"key":"ref_63","first-page":"115","article-title":"Systematic Method of Risk Assessment in Industrial Processes","volume":"43","author":"Ristvej","year":"2010","journal-title":"WIT Trans. Inf. Commun. Technol."},{"key":"ref_64","unstructured":"Aagedal, J.O., Braber, F., Dimitrakos, T., Gran, B.A., Raptis, D., and Stolen, K. (2003, January 15\u201318). Model-based Risk Assessment to Improve Enterprise Security. Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC), IEEE Computer Society, Lausanne, Switzerland."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Leontief, W.W. (1986). Input-Output Economics, Oxford University Press.","DOI":"10.1057\/978-1-349-95121-5_1072-1"},{"key":"ref_66","first-page":"170","article-title":"Critical Infrastructure Dependency Assessment Using the Input\u2013output Inoperability Model","volume":"2","author":"Setola","year":"2009","journal-title":"Int. J. Crit. Inf. Prot."},{"key":"ref_67","first-page":"1","article-title":"Modelling Critical Infrastructure Network Interdependencies and Failure","volume":"15","author":"Jiwei","year":"2019","journal-title":"Int. J. Crit. Inf."},{"key":"ref_68","first-page":"125","article-title":"Cascading Impact Assessment in a Critical Infrastructure System","volume":"22","author":"Rehak","year":"2018","journal-title":"Int. J. Crit. Inf. Prot."},{"key":"ref_69","unstructured":"Barabasi, A.L. (2002). Linked: The New Science of Networks, Perseus Books Group."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.ssci.2012.08.013","article-title":"A Network Flow Model for Interdependent Infrastructures at the Local Scale","volume":"53","author":"Holden","year":"2013","journal-title":"Saf. Sci."},{"key":"ref_71","first-page":"289","article-title":"Vulnerability Analysis of Interdependent Critical Infrastructures: Case Study of the Swedish Railway System","volume":"7","author":"Johansson","year":"2011","journal-title":"Int. J. Crit. Inf."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Setola, R., Rosato, V., Kyriakides, E., and Rome, E. (2017). Managing the Complexity of Critical Infrastructures: A Modelling and Simulation Approach, Springer.","DOI":"10.1007\/978-3-319-51043-9"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1038\/nature16948","article-title":"Universal Resilience Patterns in Complex Networks","volume":"530","author":"Gao","year":"2016","journal-title":"Nature"},{"key":"ref_74","first-page":"781","article-title":"Safety Analysis of Interdependent Critical Infrastructure Networks","volume":"13","author":"Blokus","year":"2019","journal-title":"Int. J. Mar. Navig. Saf. Sea Transp."},{"key":"ref_75","first-page":"37","article-title":"Road Networks Segments at Risk\u2013Vulnerability Analysis and Natural Hazards Assessment","volume":"6","author":"Bil","year":"2014","journal-title":"Sci. Popul. Prot."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/S0165-0114(00)00076-2","article-title":"Critical Path Analysis in the Network with Fuzzy Activity Times","volume":"122","author":"Chanas","year":"2001","journal-title":"Fuzzy Sets Syst."},{"key":"ref_77","unstructured":"(2020, March 18). Collection of Laws of the Czech Republic. Act No. 240\/2000 Coll., on Crisis Management and on Amendments to Certain Acts, as Amended. Available online: https:\/\/ec.europa.eu\/echo\/sites\/echo-site\/files\/240_2000_crisis_management_act.pdf."},{"key":"ref_78","unstructured":"Novotny, P., and Rostek, P. (2014, January 19\u201321). Perspective of Cross-Cutting Criteria as a Major Instrument to Determination of Critical Infrastructure in the Czech Republic. Proceedings of the 9th International Doctoral Seminar, The University of Zielona Gora, Zielona Gora, Poland."},{"key":"ref_79","first-page":"12","article-title":"How to Quantify Deterrence and Reduce Critical Infrastructure Risk","volume":"8","author":"Taquechel","year":"2012","journal-title":"Homel. Secur. Aff."},{"key":"ref_80","unstructured":"Brown, K.A. (2006). Critical Path: A Brief History of Critical Infrastructure Protection in the United States, Spectrum Publishing Group."},{"key":"ref_81","unstructured":"Fotr, J., Vacik, E., Soucek, I., Spacek, M., and Hajek, S. (2012). Strategy Creation and Strategic Planning: Theory and Practice, Grada Publishing."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1111\/pirs.12133","article-title":"Explaining New Firm Creation in Europe from a Spatial and Time Perspective: A Multilevel Analysis Based upon Data of Individuals, Regions and Countries","volume":"95","author":"Hundt","year":"2014","journal-title":"Pap. Reg. Sci."},{"key":"ref_83","unstructured":"Brown, C., Milke, M., and Seville, E. (2010). Discussion Paper: Should Waste Management Be Considered a Lifeline in New Zealand?, Resilient Organisations."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1111\/j.1468-5973.2007.00500.x","article-title":"Anticipating Future Vulnerability: Defining Characteristics of Increasingly Critical Infrastructure-like Systems","volume":"15","author":"Egan","year":"2007","journal-title":"J. Conting. Crisis Manag."},{"key":"ref_85","unstructured":"Rostov, W.W. (1960). The Process of Economic Growth, Oxford University Press."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Rosenfeld, P., Culbertson, A., and Magnusson, P. (1992). Human Needs: A Literature Review and Cognitive Life Span Model, Navy Personnel Research and Development Center.","DOI":"10.21236\/ADA250073"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1037\/h0054346","article-title":"A Theory of Human Motivation","volume":"50","author":"Maslow","year":"1943","journal-title":"Psychol. Rev."},{"key":"ref_88","unstructured":"Rakowski, N. (2008). Maslow\u2019s Hierarchy of Needs Model\u2013the Difference of the Chinese and the Western Pyramid on the Example of Purchasing Luxurious Products, GRIN Academic Publishing."},{"key":"ref_89","unstructured":"Nesporova, V., Dopaterova, M., Slivkova, S., Novotny, P., and Rehak, D. (2016, January 5\u20137). Approaches to Critical Elements Evaluation in the Territory on the Basis of Human Basic Needs. Proceedings of the 25th International Conference on the Fire Protection, Association of Fire and Safety Engineering, Ostrava, Czech Republic."},{"key":"ref_90","unstructured":"Senovsky, M., Adamec, V., and Senovsky, P. (2007). Critical Infrastructure Protection, Association of Fire and Safety Engineering."},{"key":"ref_91","unstructured":"(2004). Interim Report on the August 14, 2003: Blackout Report."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1111\/pirs.12181","article-title":"Borrowing Size in Networks of Cities: City Size, Network Connectivity and Metropolitan Functions in Europe","volume":"95","author":"Meijers","year":"2015","journal-title":"Pap. Reg. Sci."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1002\/bs.3830280103","article-title":"On the Definition of Feedback","volume":"28","author":"Ramprasad","year":"1983","journal-title":"Behav. Sci."},{"key":"ref_94","unstructured":"(2016). Czech Office for Surveying, Mapping and Cadastre, Czech Office for Surveying."},{"key":"ref_95","unstructured":"(2017). The Geographic Base Data of the Czech Republic, Administration of Cadastre of Real Estate."},{"key":"ref_96","first-page":"548","article-title":"Assessment of Critical Infrastructure Elements in Transport, 10th International Scientific Conference Transbaltica 2017: Transportation Science and Technology","volume":"187","author":"Dvorak","year":"2017","journal-title":"Procedia Eng."},{"key":"ref_97","unstructured":"Ministry of Transport of the Czech Republic (2017). Results of the National Census on the Motorway and Road Networks of the Czech Republic 2016."},{"key":"ref_98","unstructured":"Transport Research Centre (2017). Single Transport Vector Map, Transport Research Centre."},{"key":"ref_99","unstructured":"Costing Asset Protection: An All-Hazards Guide for Transportation Agencies (CAPTA) (2009). National Academies of Sciences, Engineering, and Medicine, The National Academies Press."},{"key":"ref_100","unstructured":"(2006). Finding the Average Occupancy Rate and Purpose of Vehicle Ways on Selected Road and Motorway Networks of the Czech Republic in 2005 and 2006, SBP Consult."}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/8\/2\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T04:39:20Z","timestamp":1719463160000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/8\/2\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":100,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["systems8020013"],"URL":"https:\/\/doi.org\/10.3390\/systems8020013","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,22]]}}}