Bridge Security
|
FHWA > Bridge > Security > Recommendations for Bridge and Tunnel Security > Appendix C: Case Study in Bridge and Tunnel Risk Assessment |
Recommendations for Bridge and Tunnel SecurityAppendix C: Case Study in Bridge and Tunnel Risk AssessmentRisk Assessment ApproachThis appendix describes the risk assessment method used to help determine how to allocate resources for mitigating the adverse effects of terrorist acts on critical transportation facilities and the occupants of those facilities. Decisions on how best to spend mitigation funds require a rational and systematic risk-based approach that considers, for each facility, the combination of hazard occurrence likelihood, consequences given the occurrence, and socioeconomic importance of the facility. Risk assessment methods for mitigation decisions related to natural hazards are fairly well-established. The application of these methods to non-natural hazards (i.e., acts of terrorism) is relatively new. There is no well-established comprehensive procedure that can be used to determine how terrorism mitigation funds should be spent given a finite list of facilities, mitigation alternatives, and agency-defined constraints. We used a rational and systematic risk assessment method for prioritizing alternatives for mitigating the effects of acts of terrorism. The method makes use of several key sources of information, including the following:
The risk to a facility due to a man-made hazard is represented as the combination of the following three factors as shown in Figure C-1:
Expressed in equation format, the risk score (RS) for a given facility, is written as follows: RS = IF X Σ [OFi X VFi ] (1) where OFi, VFi, and IF are defined as above, and Σ denotes the summation over all considered threats to the facility. Each of the factors in Equation (1) is a number between 0 and 1, computed using a multi-variate utility method. In this method, each factor is computed as the summation of the weighted values (between 0 and 1) of the attributes that define the factor as follows: IF = Σ [wj X vj(xj)] (2a) where xj is the value of attribute j (e.g., very high), vj(xj) is the function or table that maps xj to a utility value (between 0 and 1; e.g., very high corresponds to 1), wj is the weighting factor on attribute j, and Σ denotes the summation over all considered attributes for the factor. See Figure C-1 for a graphical depiction of the above discussion. The weighting factors used for combining the attributes that make up each of the factors listed above are developed using the pair-wise comparison procedure in the Analytic Hierarchy Process, whereby each member of the decision making group assigns a numerical value to the relative influence of one attribute over another. The scores are averaged and used to compute the weighting factors, which are then reviewed by the group as a whole and revised until all members of the group are satisfied with the results. Figures C-2 through C-4 show the relative weights for the attributes used to compute the Importance Factor, Occurrence Factor, and Vulnerability Factor, respectively. After the weighting factors have been developed, the risk assessment method proceeds as follows for each facility:
Risk Assessment ResultsThe result of this risk assessment effort is a ranked list that identifies the benefit of enacting each mitigation project. The costs (in terms of capital expenditure, operation and maintenance, and disruption) were developed in a parallel effort and used with these results in an explicit cost-benefit analysis to identify the final list of mitigation projects to pursue. Prior to developing the final ranked list of projects based on the cost-benefit comparison, several intermediate results were examined to ensure that the final results would be both rational and practical. For example, Figure C-5 shows the ranking of the eight facilities by Importance Factor. Figures C-6 through C-11 show the breakdown of each facility into the vulnerable components or threat targets. The final list of mitigation projects, ranked by the ratio of benefit (in terms of reduction in facility Risk Score) to project cost, is given in Table C-1. Figure C-12 shows the resulting ranked list in a chart format to help illustrate the comparison of mitigation project benefits and costs. Risk Assessment ReferencesAASHTO, 2002, A Guide to Highway Vulnerability Assessment for Critical Asset Identification and Protection, Prepared by SAIC, Washington, DC. Audigier, M.A., Kiremidjian, A.S., Chiu, S.S., and King, S.A., 2000, "Risk Analysis of Port Facilities," Proceedings of the 12th World Conference on Earthquake Engineering, paper no. 2311. Babaei, K., and Hawkins, N., 1993, Bridge Seismic Retrofit Planning Program, Report WA-RD 217.1, Washington State Department of Transportation, Olympia, WA. Basoz, N., and Kiremidjian, A.S., 1995, Prioritization of Bridges for Seismic Retrofitting, Report No. 114, John Blume Earthquake Engineering Center, Department of Civil Engineering, Stanford University, Stanford, CA. Hart Consultant Group et al., 1994, Seismic Risk Decision Analysis for Kaiser Permanente Pasadena, Final Project Report, Santa Monica, CA. Kim, S.H., 1993, A GIS-Based Risk Analysis Approach for Bridges Against Natural Hazards, Ph.D. Dissertation, Department of Civil Engineering, State University of New York, Buffalo, NY. King, S.A., and Kiremidjian, A.S., 1994, Regional Seismic Hazard and Risk Analysis Through Geographic Information Systems, Report No. 111, John Blume Earthquake Engineering Center, Department of Civil Engineering, Stanford University, Stanford, CA. Maroney, B., 1990, CALTRANS Seismic Risk Algorithm for Bridge Structures, Division of Structures, California Department of Transportation, Sacramento, CA. Saaty, T.L., 1980, The Analytic Hierarchy Process, McGraw-Hill, New York, NY. Sheng, L.H., and Gilbert, A., 1991, "California Department of Transportation Seismic Retrofit Program: The Prioritization and Screening Process," Proceedings of the Third U.S. National Conference on Lifeline Earthquake Engineering, pp. 1110-1119. U.S. Department of Defense, 1994, TM 5-853/AFMAN 32-1071, Volume 1, Chapter 3, Planning Phase, Washington, DC. U.S. Department of Justice, 2000, Fiscal Year 1999 State Domestic Preparedness Support Program, Washington, DC. Figure C-1. Components in Risk Assessment for an Individual Facility Figure C-2. Relative Weights for Attributes Used to Compute Importance Factor Figure C-3. Relative Weights for Attributes Used to Compute Occurrence Factor Figure C-4. Relative Weights for Attributes Used to Compute Vulnerability Factor Figure C-5. Ranking of Facilities by Importance Factor Figure C-6. Breakdown of Bridge 1 into Vulnerable Components and Mode of Access Figure C-7. Breakdown of Tunnel 1 into Vulnerable Components and Mode of Access Figure C-8. Breakdown of Tunnel 2 into Vulnerable Components and Mode of Access Figure C-9. Breakdown of Bridge 2 into Vulnerable Components and Mode of Access Figure C-10. Breakdown of Bridge 3 into Vulnerable Components and Mode of Access Figure C-11. Breakdown of Bridge 4 into Vulnerable Components and Mode of Access Table C-1. Final Ranking of Mitigation Projects by Benefit/Cost Ratio
|
EventsContactSteve Ernst |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
This page last modified on 08/17/07 |