National Academies Press: OpenBook
« Previous: 2 EPA's Challenges in Water Security Research
Suggested Citation:"3 Committee's Approach." National Research Council. 2007. Improving the Nation's Water Security: Opportunities for Research. Washington, DC: The National Academies Press. doi: 10.17226/11872.
×

3
Committee’s Approach

The criteria used by the committee to frame its review of progress of the Water Security Research and Technical Support Action Plan (Action Plan) and to guide recommendations for a long-term water security research program (see statement of task, Chapter 1) are presented in this chapter. The committee’s organizing assumptions and strategic criteria for future research management decisions, like its evaluations of the Action Plan, were framed from the perspective of the challenges and constraints outlined in Chapter 2.

The committee’s criteria are premised upon several broad findings. First, the Environmental Protection Agency’s (EPA’s) Office of Research and Development is working within a limited budget, and water security research cannot replace other essential research to support public health and the needs of water and wastewater utilities. Second, preventing a terrorist attack on the nation’s water infrastructure may be impossible because of the number and diversity of utilities, the multiple points of vulnerability, and the expense of protecting an entire system. Thus, the committee focused its attention on research to prevent or mitigate the consequences of an attack or attempted attack. Third, the information and technical products of the water security research program will be most valuable if they have dual-use benefits. For this report, “dual use” refers to research on technologies that addresses both security and important water utility objectives. Examples include identifying security measures that can mitigate the effects of both physical attacks and earthquake hazards or developing a water quality detection system that can be used to detect generic intrusion events while also providing data on key water quality parameters used to monitor system operations. Dual use can also apply to information technologies (e.g., databases) and their use for natural or accidental contamination events in addition to terrorist threats. In the committee’s usage, dual use was not meant to include work that addresses more than one purpose within homeland security (e.g., measures that safeguard both water and food from a biothreat agent attack).

Suggested Citation:"3 Committee's Approach." National Research Council. 2007. Improving the Nation's Water Security: Opportunities for Research. Washington, DC: The National Academies Press. doi: 10.17226/11872.
×

From the findings described above, the committee identified four criteria to guide its evaluation of the value of the EPA’s water security research projects and to provide a foundation for its recommendations for future research priorities:

  1. Water security threats with the greatest likelihood and potential consequences (including fatalities, sickness, economic losses, and loss of public confidence) are addressed.

  2. Effectiveness and efficiency of the nation’s response and recovery capacity are improved, and/or risk reduction or consequence mitigation measures are developed.

  3. Implementation of new technologies/methodologies is judged to be likely, taking into account their cost, usefulness, and maintenance requirements.

  4. Dual-use benefits accrue from the research.

Dual-use benefits are included among these criteria because they significantly improve the likelihood of implementation of the research products, and there is strong support for research with dual-use applications within the water industry and the public. Research in support of improved mitigation, recovery, and response is often of dual use because it can be applied to address both natural hazards and terrorist events. However, the committee does not view dual use as an absolute requirement for all water security research. These criteria shape the committee’s evaluations and recommendations in Chapters 4 through 6.

These criteria could also be used at a later date to evaluate the effectiveness and success of the program, although such an evaluation was not feasible here based on the number of products available at the time of the committee’s review. In sum, water security risks should be reduced if research products can be shown to address probable threats with significant consequences and if utilities or local, state, and federal response agencies use these products to address security vulnerabilities or to improve the effectiveness of response and recovery.

Suggested Citation:"3 Committee's Approach." National Research Council. 2007. Improving the Nation's Water Security: Opportunities for Research. Washington, DC: The National Academies Press. doi: 10.17226/11872.
×
Page 32
Suggested Citation:"3 Committee's Approach." National Research Council. 2007. Improving the Nation's Water Security: Opportunities for Research. Washington, DC: The National Academies Press. doi: 10.17226/11872.
×
Page 33
Next: 4 Progress in the Office of Research and Development's Water Security Program »
Improving the Nation's Water Security: Opportunities for Research Get This Book
×
Buy Paperback | $54.00 Buy Ebook | $43.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF
  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!