<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Stefan Wolfgang Pickla, Maryna Zharikovaa and Volodymyr Sherstjukb</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Kherson National Technical University</institution>
          ,
          <addr-line>Beryslavske shose 24, Kherson, 73008</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bundeswehr</institution>
          ,
          <addr-line>Werner-Heisenberg-Weg, Neubiberg, 85579</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>1 We summarize the CITRisk-2021 Workshop on Computational &amp; Information Technologies for RiskInformed Systems co-located with XXI International Conference on Information Technologies in Education and Management (ІТЕМ 2021) and held online on September 16-17, 2021.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Risk is an important concept for any person who needs to make a decision or at least to do
something. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], risk is defined as “the possibility of something bad happening”. Everyone hopes
that everything gets better and take some risk. Thus, risk is closely related to uncertainty about
both the conditions and the consequences of activity. People vary greatly in how much risk they
might take, and which risk they consider acceptable or unacceptable. Regardless of whether one's
attitude is risk-averse, risk-neutral, or risk-seeking [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], people take risks every day, and since
ancient times, risk surrounds their activities almost always and everywhere. The results of many
millennia of the risky human activity are not only masterpieces of art, architecture, technology,
etc., but at the same time a lot of bad things.
      </p>
      <p>
        The new millennium has brought the world a significant acceleration of climate change,
population growth, increased urbanization, industrialization, and many other negative
consequences of human activities. The more intense and destructive the development of human
civilization is for nature, the more nature responds to it by sufficient changes. Currently, the world
is overloaded with natural disasters, from large-scale floods and forest fires to sudden earthquakes,
tsunamis, tornadoes, and other natural incidents, which are often lined up in chains and
accompanied by man-made disasters because of anthropogenic factors, human inattention,
negligence, etc. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
      </p>
      <p>Not only nature, but also people suffer themselves from various unintentional, deliberate and
even malicious risky activities. Thus, conflicts and wars that have been going on for many
hundreds and thousands of years have claimed the lives of many millions of people and crippled
the lives of other millions of people, but people continue to create new and more destructive types
of weapons, accumulate them, and use them. Gradually, wars were transferred to near-Earth space
and cyberspace. Technological incidents, traffic accidents, crime, terrorism, and other challenges
have become our daily routine. Therefore, risk that has become a statistically significant, mass
phenomenon requires deeper study.</p>
      <p>
        People have always wanted to assess correctly the level and acceptability of risk. That is why
researchers have long begun to study such aspects as risk finding, recognizing, identification,
analysis, evaluation, etc. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. However, the main obstacles have always been uncertainty [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which
people were not able to overcome, unpredictability and complexity. Therefore, researchers had
rather limited opportunities to study and model risk, while even more difficult tasks appeared, such
as multi-hazard and multi-risk analysis [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Fortunately, the new era has brought humanity not only new challenges, but also new
opportunities related to the technology revolutions. Explosive development in such areas as
computers, information technologies, unmanned vehicles, remote sensing, image processing,
machine learning, artificial intelligence (AI), and other modern technologies enabled people to
partially overcome the uncertainty, unpredictability, low observability, but many problems are still
not fully understood.</p>
      <p>
        Today, computational models and information technologies are the reliable basis in the field of
risk modeling, analysis, and assessment [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Using such modern tools, researchers began to create
early warning and forecasting systems, diagnostic and monitoring systems, decision support
systems, advising and recommending systems in many fields of activity, including those based on
artificial intelligence technologies. The kind of above systems, which tasks are risk identification,
modeling, and analysis based on computer models, algorithms, and information technologies, are
usually called Risk-Informed Systems [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In this context, the ever-changing scope and rapid
development of Risk-Informed Systems create new problems and questions, resulting in the real
needs for sharing brilliant ideas and stimulating good awareness of this important research field.
That is why the scope of the International Workshop on Computational &amp; Information
Technologies for Risk-Informed Systems includes various computational models and methods,
modern AI-based methods and information technologies that can be used for Risk-Informed
Systems including those solving diagnostic, modeling, and monitoring tasks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] in crisis and
disaster situations, where we seek to explore new ideas.
      </p>
      <p>
        Since risk manifests itself in any human activity, risk is multidisciplinary [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The
understanding of risk, the methods of risk assessment, and even the definitions of risk differ in
many areas of activity (environment, business, finance, economics, health, safety, security, etc.).
      </p>
      <p>This explains why the papers of our authors cover the wide range of domains, including natural
disasters, aviation, information security, engineering, etc. We concluded that the same set of
computer methods and information technologies can be used to analyze and modeling risk in all
these areas, so bridging computer science, intelligent information technology, and risk field
research can be highlighted as a focus of the CITRisk workshops.</p>
    </sec>
    <sec id="sec-2">
      <title>CITRisk Workshop Series</title>
      <p>CITRisk is a series of workshops, which is a part and co-located with the International Conference
on Information Technologies in Education and Management (ІТЕМ). The first International
Workshop on Computational &amp; Information Technologies for Risk-Informed Systems
(CITRisk2020) was held online (because of the COVID-19 situation) on October 15-16, 2020, within the
XX International Conference ІТЕМ-2020. The second International Workshop on Computational
&amp; Information Technologies for Risk-Informed Systems (CITRisk-2021) was also held online
(due to the current COVID-19 situation) on September 16-17, 2021.</p>
      <p>The purpose of the CITRisk workshop series is to provide a platform for dissemination of
current research progress, innovative approaches, and original research results on application of
computational and information technologies for Risk-Informed Systems.</p>
      <p>The Proceedings contain the papers presented at the 2nd International Workshop on
Computational &amp; Information Technologies for Risk-Informed Systems (CITRisk-2021).</p>
    </sec>
    <sec id="sec-3">
      <title>CITRisk-2021 Workshop</title>
      <p>The Workshop CITRisk-2021 was jointly organized by the University of Bundeswehr (Munich,
Germany) and Kherson National Technical University (Kherson, Ukraine) and held online on
September 16-17, 2021.</p>
      <p>IT Hub Kherson Public Organization was the main partner organization in preparing and
sponsoring the CITRisk-2021 Workshop as well as the previous CITRisk-2020 Workshop.</p>
      <p>We called for papers on Risk Analysis and Risk-Informed Systems, including but not limited
to the following topics:
• Computational Models and Methods for Risk-Informed Systems.
• Intelligent Information Technologies for Risk-Informed Systems.
• Diagnostic, Modeling, and Monitoring of Crisis and Disaster Situations.</p>
      <p>All CITRisk-2021 topics are related to Computer Science.
120 reports were submitted to the International Program Committee.</p>
      <p>At the first turn, all reports were peer-reviewed by the International Program Committee (IPC)
members and external reviewers. All submitted papers were rigorously reviewed by 3 reviewers.</p>
      <p>After the first turn, 34 reports were conditionally pre-accepted for presentation at the
CITRisk2021 workshop. At the second turn, all selected reports were again peer-reviewed by 2 or 3
reviewers and checked for plagiarism.</p>
      <p>Finally, the IPC decide to accept 32 submitted reports for the presentation after the
peerreviewing based on their quality and relevance to the scope of the CITRisk-2021 Workshop. The
final acceptance rate is 26.6%.</p>
      <p>All 32 papers were prepared to publish as regular and short papers in this Volume of
CITRisk2021 Proceedings based on their presentations made at the Workshop. Out of them, 26 were
accepted to publish as regular papers and 6 as short papers.</p>
      <p>The workshop took place in the form of oral presentations by presenters of the accepted reports.</p>
      <p>The CITRisk-2021 program was organized in three thematic sessions corresponding to the
workshop topics. The thematic sessions followed an interactive format. The sessions were
structured into talks, each of which includes 4-5 reports and a debate time slot to discuss reports,
their contributions and other topic issues.</p>
      <p>All presenters had a 10-minute time slot for presentation and a 5-minute time slot for queries
and answers. Moderators introduced presenters and their reports during each talk and moderated
presentations, questions, and discussions from the audience. All attendees were given the
opportunity to ask questions and participate in discussions.</p>
    </sec>
    <sec id="sec-4">
      <title>Workshop Chairs and Committees</title>
      <p>The international scope of the CITRisk-2021 Workshop was confirmed by the International
Program Committee, which members represented 12 countries: United Kingdom, Canada,
Germany, Austria, Spain, Slovakia, Poland, Czech Republic, China, Moldova, Kazakhstan, and
Ukraine. The IPC consists of 35 scholars, which are well-known scientists contributed valuable in
the field of computer science.</p>
      <sec id="sec-4-1">
        <title>General Chairs:</title>
        <p>Prof. Maryna Zharikova, Bundeswehr University Munich, Germany
Prof. Volodymyr Sherstjuk, Kherson National Technical University, Ukraine</p>
      </sec>
      <sec id="sec-4-2">
        <title>International Program Committee Co-Chairs:</title>
        <p>Prof. Stefan Wolfgang Pickl, Bundeswehr University Munich, Germany
Prof. Volodymyr Lytvynenko, Kherson National Technical University, Ukraine</p>
      </sec>
      <sec id="sec-4-3">
        <title>International Program Committee Members:</title>
        <p>Prof. Inna Skarga-Bandurova, Oxford Brookes University, United Kingdom
Prof. Joaquin Huerta Guijarro, Universitat Jaume I, Spain
Prof. Christine Strauss, University of Vienna, Austria
Dr. Iryna Ivanochko, University of Vienna, Vienna, Austria
Prof. Natalia Kryvinska, Comenius University, Bratislava, Slovakia
Prof. Michal Greguš, Comenius University in Bratislava, Slovakia
Prof. Waldemar Wojcik, Lublin University of Technology, Lublin, Poland
Prof. Svetlana Cojocaru, Academy of Sciences of Moldova, Moldova
Dr. Martin Hromada, Tomas Bata University in Zilin, Czech Republic
Dr. Zhengbing Hu, Central China Normal University, Wuhan, China
Prof. Sergii Babichev, Jan Evangelista Purkyně University in Usti nad Labem, Czech Republic
Prof. Viktor Mashkov, Jan Evangelista Purkyně University in Usti nad Labem, Czech Republic
Prof. Sergiy Gnatyuk, Yessenov University, Aktau, Kazakhstan
Prof. Dmytro Peleshko, GeoGuard, Vancouver, Canada
Prof. Vyacheslav Kharchenko, National Aerospace University “Kharkiv Aviation Institute”
Prof. Yurii Krak, Taras Shevchenko National University of Kyiv, Ukraine
Prof. Alexandr Kuznetsov, V. N. Karazin Kharkiv National University, Ukraine
Prof. Anatoliy Sachenko, Ternopil National Economic University, Ukraine
Prof. Tetiana Hovorushchenko, Khmelnytskyi National University, Ukraine
Prof. Sergiy Lysenko, Khmelnytskyi National University, Ukraine
Prof. Sergey Subbotin, National University “Zaporizhzhia Polytechnic”, Ukraine
Prof. Aleksandr Gozhyj, Petro Mohyla Black Sea National University, Nikolaev, Ukraine
Prof. Natalia Savina, National University of Water and Env. Engineering, Rivne, Ukraine
Prof. Nataliia Shakhovska, Lviv Polytechnic National University, Ukraine
Prof. Vasyl Lytvyn, Lviv Polytechnic National University, Lviv, Ukraine
Dr. Ivan Izonin, Lviv Polytechnic National University, Ukraine
Dr. Victoria Vysotska, Lviv Polytechnic National University, Ukraine
Dr. Ivanna Dronyuk, Lviv Polytechnic National University, Ukraine
Prof. Vitaliy Kobets, Kherson State University, Ukraine
Dr. Mariia Voronenko, Kherson National Technical University, Ukraine
Dr. Iryna Lurie, Kherson National Technical University, Ukraine</p>
      </sec>
      <sec id="sec-4-4">
        <title>ORGANIZING COMMITTEE Co-Chairs:</title>
        <p>Beside those, the IPC additionally involved 104 external reviewers in the peer-review process.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>On behalf of the International Program Committee and organizers, we thank all researchers who
submitted papers to CITRisk-2021, all authors who contributed to the Proceedings with papers
selected by the International Program Committee after the double-blind peer-reviewing.</p>
      <p>We recognize the commitment of all speakers who shared their knowledge and experience.</p>
      <p>We especially thank our distinguished International Program Committee Members for
reviewing the submissions and providing useful feedback to the authors. We appreciate the
assistance of all external reviewers who agreed to provide their expert criticism of the submissions
as well as many constructive suggestions for their authors. We would like to thank the organization
staff and all persons involved who worked so hard to make this event a success.</p>
      <p>Finally, we are grateful to the CEUR team for giving us a great opportunity for publishing this
Workshop proceedings.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Risk</surname>
          </string-name>
          , in: The Cambridge Advanced Learner's Dictionary, Cambridge University Press,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ayton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Bernile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bucciol</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Zarric,</surname>
          </string-name>
          <article-title>The impact of life experiences on risk taking</article-title>
          .
          <source>J Econ Psychol</source>
          .
          <volume>79</volume>
          (
          <year>2020</year>
          )
          <article-title>102274</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.joep.
          <year>2020</year>
          .
          <volume>102274</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <article-title>A global expected risk analysis of fatalities, injuries, and damages by natural disasters</article-title>
          .
          <source>Sustainability</source>
          <volume>10</volume>
          (
          <issue>7</issue>
          ) (
          <year>2018</year>
          )
          <article-title>2573</article-title>
          . doi:
          <volume>10</volume>
          .3390/su10072573.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Sulaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Weyns</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Höst</surname>
          </string-name>
          ,
          <article-title>A review of research on risk analysis methods for IT systems</article-title>
          ,
          <source>in: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering (EASE'13)</source>
          , NY, USA (
          <year>2013</year>
          )
          <fpage>86</fpage>
          -
          <lpage>96</lpage>
          . doi:
          <volume>10</volume>
          .1145/2460999.2461013.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Bjerga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Aven</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Zio,</surname>
          </string-name>
          <article-title>Uncertainty treatment in risk analysis of complex systems: The cases of STAMP and FRAM</article-title>
          ,
          <string-name>
            <surname>Reliability</surname>
            <given-names>Engineering</given-names>
          </string-name>
          &amp;
          <source>System Safety</source>
          <volume>156</volume>
          (
          <year>2016</year>
          )
          <fpage>203</fpage>
          -
          <lpage>209</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ress.
          <year>2016</year>
          .
          <volume>08</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Pilone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Demichela</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Baldissone, The Multi-Risk Assessment Approach as a Basis for the Territorial Resilience</article-title>
          .
          <source>Sustainability</source>
          <volume>11</volume>
          (
          <year>2019</year>
          )
          <article-title>2612</article-title>
          . doi:
          <volume>10</volume>
          .3390/su11092612.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>E. Zio,</surname>
          </string-name>
          <article-title>The future of risk assessment</article-title>
          .
          <source>Reliability Engineering and System Safety</source>
          <volume>177</volume>
          (
          <year>2018</year>
          )
          <fpage>176</fpage>
          -
          <lpage>190</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ress.
          <year>2018</year>
          .
          <volume>04</volume>
          .020.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Parhizkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. Bouwer</given-names>
            <surname>Utne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Vinnem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mosleh</surname>
          </string-name>
          ,
          <article-title>Supervised dynamic probabilistic risk assessment of complex systems, part 2: Application to risk-informed decision making, practice and results</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          <volume>208</volume>
          (
          <year>2021</year>
          )
          <article-title>107392</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.ress.
          <year>2020</year>
          .
          <volume>107392</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Slater</surname>
          </string-name>
          , Modelling, Monitoring, Manipulating and Managing?
          <article-title>Modelling Process Flow in Complex Systems</article-title>
          . Cambrensis: Porthcawl,
          <string-name>
            <surname>UK</surname>
          </string-name>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Klüppelberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Straub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. M.</given-names>
            <surname>Welpe</surname>
          </string-name>
          , Risk - A Multidisciplinary Introduction. Springer International Publishing, Switzerland,
          <year>2014</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -04486-6.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>