SlideShare a Scribd company logo
1 of 29
Source: winwallpapers.net




Micro-Scale Terrorism
Vulnerability Mapping
A Case Study of Tokyo, Japan

30/06/2012 — Konstantin Greger, University of Tsukuba, Division for Spatial Information Science
Vulnerability ≠ Risk


            risk
     (loss / probability)

                            hazard

     vulnerability
Vulnerability ≠ Risk


            risk
     (loss / probability)

                            hazard

     vulnerability
Vulnerability ≠ Risk


            risk
     (loss / probability)

                            hazard

     vulnerability
Vulnerability ≠ Risk


            risk
     (loss / probability)

                            hazard

     vulnerability
Vulnerability Concept


        susceptibility
    factors and attributes that make an asset
   more or less susceptible to a terrorist attack


                                                    vulnerability
              disutility
       value (worth) of the consequences
    of a successful attack to the stakeholder
Vulnerability Concept


        susceptibility
    factors and attributes that make an asset
   more or less susceptible to a terrorist attack


                                                    vulnerability
              disutility
       value (worth) of the consequences
    of a successful attack to the stakeholder
Vulnerability Concept


        susceptibility
    factors and attributes that make an asset
   more or less susceptible to a terrorist attack


                                                    vulnerability
              disutility
       value (worth) of the consequences
    of a successful attack to the stakeholder
Vulnerability Concept


        susceptibility
    factors and attributes that make an asset
   more or less susceptible to a terrorist attack


                                                    vulnerability
              disutility
       value (worth) of the consequences
    of a successful attack to the stakeholder
Problem Statement / Hypotheses

(1) vulnerability is not distributed equally in space

  ✤   places with high vulnerability vs. places with low vulnerability


(2) factors exist that enhance or mitigate vulnerability

  ✤   attributes of objects at risk


➡ it is necessary to evaluate factors and visualize inequalities
Research Objective
✤   vulnerability-centric, scenario-based research

✤   no investigation what outcome an attack at a location can cause

✤   the unit of analysis is the geography, not the event

✤   terrorist attacks can happen everywhere, but make more sense in
    some locations than in others

✤   "If I were a terrorist, I would ..." (Apostolakis and Lemon 2005:365)

➡ how prone a location is to an attack,      as a result of the attributes
     that define it
Study Area
✤   Central Tōkyō (around 東京駅),
    千代田区、中央区、港区

✤   ~6 km2 area

✤   ~6,500 buildings

✤   diverse land uses, building
    types and building density

✤   several landmarks, iconic
    buildings and critical
    infrastructures
Study Area
✤   Central Tōkyō (around 東京駅),
    千代田区、中央区、港区




                                                   m
✤   ~6 km2 area




                                                  5k
                                                 ~2.
                                  ~2.
                                        5k
                                             m
✤   ~6,500 buildings

✤   diverse land uses, building
    types and building density

✤   several landmarks, iconic
    buildings and critical
    infrastructures
Study Area
✤   Central Tōkyō (around 東京駅),
    千代田区、中央区、港区




                                                   m
✤   ~6 km2 area




                                                  5k
                                                 ~2.
                                  ~2.
                                        5k
                                             m
✤   ~6,500 buildings

✤   diverse land uses, building
    types and building density

✤   several landmarks, iconic
    buildings and critical
    infrastructures
Buildings

✤   buildings

    ✤   definition of “user groups” /
        user categories

    ✤   generalization

    ✤   mixed usage types

✤   critical infrastructures

✤   open spaces
Buildings

✤   buildings

    ✤   definition of “user groups” /
        user categories

    ✤   generalization

    ✤   mixed usage types

✤   critical infrastructures

✤   open spaces
Building Susceptibility Factors

✤   number of people in a building (daytime population)

✤   building use or function (mixed use)

✤   volume of public traffic (inside & outside)

✤   accessibility (security, parking garages)

✤   degree of fenestration

✤   symbolic value

✤   ...
Spatial Influence (SI)

✤   analysis focuses on the effect that the “crime generators” have on the
    object's immediate surroundings

✤   3-dimensional real-world objects vs. 1-dimensional point objects




“
    The best way to map crime factors for the articulation of criminogenic
    backcloths is to operationalize the spatial influence of each factor, acting as
    crime generators, throughout a common landscape rather than atheoretically
    mapping the factors as points, lines or polygons in a manner that keeps them
    disconnected from their broader social and environmental contexts.
                                                 (Caplan and Kennedy 2010a:23)
Vulnerability
Factor Map
           ted
    r ic a
 fab ta!
    da




50m distance from buildings with   low vulnerability
high fenestration rate (> 2 SD)    high vulnerability
Vulnerability
Factor Map
           ted
    r ic a
 fab ta!
    da                             50 m




50m distance from buildings with          low vulnerability
high fenestration rate (> 2 SD)           high vulnerability
Vulnerability
Factor Map
           ted
    r ic a
 fab ta!
    da




150m straight-line surroundings of   low vulnerability
police boxes (koban)                 high vulnerability
Vulnerability
Factor Map
           ted
    r ic a
 fab ta!
    da




kernel density of buildings with high number of   low vulnerability
employees (> 2 SD; search radius = 100m)          high vulnerability
Vulnerability
Factor Map
           ted
    r ic a
 fab ta!
    da
                                                  > 2 SD

                                                  1-2 SD

                                                  0-1 SD
                                                  -1 SD




                                                                    yees
                                                    number of emplo



kernel density of buildings with high number of                            low vulnerability
employees (> 2 SD; search radius = 100m)                                   high vulnerability
Vulnerability
Map
           ted
    r ic a
 fab ta!
    da




                                      low vulnerability
unweighted combination of three       ⋮
previously shown factor maps layers   high vulnerability
Multi-Threat Vulnerability Map

                                               vulnerability
                                                  maps

                 disutility

                 scenario 1: small explosion

                 scenario 2: large explosion
susceptibility
                  scenario 3: small release

                  scenario 4: large release
Multi-Threat Vulnerability Map

                                               vulnerability
                                                  maps

                 disutility

                 scenario 1: small explosion

                 scenario 2: large explosion
susceptibility
                  scenario 3: small release

                  scenario 4: large release
Summary

✤   analytic insight

    ✤   definition of attributes and factors affecting terrorism vulnerability

    ✤   new approach (terrorism + vulnerability + GIS)

✤   visualization

    ✤   creation of a micro-scale multi-threat vulnerability map of a study
        area in a Japanese urban area

    ✤   spatial distribution of vulnerability factors
ご清聴ありがとうございました
       Konstantin Greger

       University of Tsukuba
       Division for Spatial Information Science

       greger@geoenv.tsukuba.ac.jp
       http://www.konstantingreger.net
Bibliography
Abbott, Andrew. 1997. “Of Time and Space: The             Clarke, Ronald V. 1995. “Situational Crime                 Paté-Cornell, Elisabeth, and Seth Guikema. 2002.
Contemporary Relevance of the Chicago School.”            Prevention.” Crime and Justice 19:91–150.                  “Probabilistic Modeling of Terrorist Threats: A
Social Forces 75(4):1149–1182.                                                                                       Systems Approach to Setting Priorities Among
                                                          FEMA Federal Emergency Management Agency.                  Countermeasures.” Military Operations Research 7(4):
Apostolakis, George E., and Douglas M. Lemon. 2005.       2003a. “Insurance, Finance, and Regulation Primer for      5–20.
“A Screening Methodology for the Identification and        Terrorism Risk Management in Buildings.” (http://
Ranking of Infrastructure Vulnerabilities Due to          www.fema.gov/library/viewRecord.do?id=1562).               Patterson, S.A., and G.E. Apostolakis. 2007.
Terrorism.” Risk Analysis 25(2):361–376.                                                                             “Identification of critical locations across multiple
                                                          FEMA Federal Emergency Management Agency.                  infrastructures for terrorist actions.” Reliability
Bankoff, Greg. 2004. Mapping vulnerability : disasters,   2003b. “Reference Manual to Mitigate Potential             Engineering & System Safety 92(9):1183–1203.
development, and people. London ;;Sterling VA:            Terrorist Attacks Against Buildings.” (http://
Earthscan Publications.                                   www.fema.gov/library/viewRecord.do?id=1559).               Piegorsch, Walter W., Susan L. Cutter, and Frank
                                                                                                                     Hardisty. 2007. “Benchmark Analysis for Quantifying
Brantingham, P. J., and P. L. Brantingham. 1981.          John Garrick, B. et al. 2004. “Confronting the risks of    Urban Vulnerability to Terrorist Incidents.” Risk
Environmental Criminology. Thousand Oaks, CA:             terrorism: making the right decisions.” Reliability        Analysis 27(6):1411–1425.
Sage Publications.                                        Engineering & System Safety 86(2):129–176.
                                                                                                                     Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly. 2001.
Brantingham, Patricia, and Paul Brantingham. 1995.        Kaplan, Stanley, and B. John Garrick. 1981. “On The        “Identifying, understanding, and analyzing critical
“Criminality of place.” European Journal on Criminal      Quantitative Definition of Risk.” Risk Analysis 1(1):       infrastructure interdependencies.” IEEE Control
Policy and Research 3(3):5–26.                            11–27.                                                     Systems Magazine 21(6):11–25.

Brown, Gerald G., and Louis Anthony Tony Cox Jr.          Karydas, D.M., and J.F. Gifun. 2006. “A method for the     Saaty, Thomas L. 2008. “Decision making with the
2011. “How Probabilistic Risk Assessment Can              efficient prioritization of infrastructure renewal          analytic hierarchy process.” International Journal of
Mislead Terrorism Risk Analysts.” Risk Analysis 31(2):    projects.” Reliability Engineering & System Safety         Services Sciences 1(1):83.
196–204.                                                  91(1):84–99.
                                                                                                                     Tetlock, Philip E. 2005. Expert Political Judgment:
Caplan, Joel M., and Leslie W. Kennedy. 2010a. Risk       Lemon, Douglas M. 2004. “A Methodology for the             How Good Is It? How Can We Know? Princeton
Terrain Modeling Compendium. Newark, NJ: Rutgers          Identification of Critical Locations in Infrastructures.”   University Press.
Center on Public Security.
                                                          Michaud, David. 2005. “Risk Analysis of                    Weil, R, and G.E Apostolakis. 2001. “A methodology
Caplan, Joel M., and Leslie W. Kennedy. 2010b. Risk       Infrastructure Systems Screening Vulnerabilities in        for the prioritization of operating experience in
Terrain Modeling Manual: Theoretical Framework and        Water Supply Networks.”                                    nuclear power plants.” Reliability Engineering &
Technical Steps of Spatial Risk Assessment. Newark,                                                                  System Safety 74(1):23–42.
NJ: Rutgers Center on Public Security.                    National Consortium for the Study of Terrorism and
                                                          Responses to Terrorism (START). 2011. “Global
Cheok, Michael C., Gareth W. Parry, and Richard R.        Terrorism Database: Variables & Inclusion
Sherry. 1998. “Use of importance measures in risk-        Criteria.” (http://www.start.umd.edu/gtd/
informed regulatory applications.” Reliability            downloads/Codebook.pdf).
Engineering & System Safety 60(3):213–226.

More Related Content

Similar to Micro-Scale Terrorism Vulnerability Mapping

Eurac Geoframe Presentation
Eurac Geoframe PresentationEurac Geoframe Presentation
Eurac Geoframe Presentationguestca23f5
 
landslide risk assessment_Lanni_Pretto
landslide risk assessment_Lanni_Prettolandslide risk assessment_Lanni_Pretto
landslide risk assessment_Lanni_Prettoguestca23f5
 
Assessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk ForecastingAssessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk ForecastingJack Freund, PhD
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Papermartindudziak
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityDragos, Inc.
 
Research Project: Multihazard and vulnerability in the seismic context of the...
Research Project: Multihazard and vulnerability in the seismic context of the...Research Project: Multihazard and vulnerability in the seismic context of the...
Research Project: Multihazard and vulnerability in the seismic context of the...guest76176b
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
 
Mobile App for Disaster Management & Information Technology in Emergency Prep...
Mobile App for Disaster Management & Information Technology in Emergency Prep...Mobile App for Disaster Management & Information Technology in Emergency Prep...
Mobile App for Disaster Management & Information Technology in Emergency Prep...Associate Professor in VSB Coimbatore
 
SMART International Symposium for Next Generation Infrastructure:Identifying ...
SMART International Symposium for Next Generation Infrastructure:Identifying ...SMART International Symposium for Next Generation Infrastructure:Identifying ...
SMART International Symposium for Next Generation Infrastructure:Identifying ...SMART Infrastructure Facility
 
Risks projects - Hazard Maps - Honduras
Risks projects - Hazard Maps - HondurasRisks projects - Hazard Maps - Honduras
Risks projects - Hazard Maps - HondurasDavid Gutierrez Rivera
 
yoder_research_interests
yoder_research_interestsyoder_research_interests
yoder_research_interestsMark Yoder
 
Risk analysis for fire: the case of civil structures
Risk analysis for fire: the case of civil structuresRisk analysis for fire: the case of civil structures
Risk analysis for fire: the case of civil structuresKonstantinos Gkoumas
 
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...drboon
 
Lecture 6: Vulnerability Analysis
Lecture 6: Vulnerability AnalysisLecture 6: Vulnerability Analysis
Lecture 6: Vulnerability AnalysisESD UNU-IAS
 

Similar to Micro-Scale Terrorism Vulnerability Mapping (20)

Earthquake resilience
Earthquake resilienceEarthquake resilience
Earthquake resilience
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
A3 12jul05 V01
A3 12jul05 V01A3 12jul05 V01
A3 12jul05 V01
 
Eurac Geoframe Presentation
Eurac Geoframe PresentationEurac Geoframe Presentation
Eurac Geoframe Presentation
 
landslide risk assessment_Lanni_Pretto
landslide risk assessment_Lanni_Prettolandslide risk assessment_Lanni_Pretto
landslide risk assessment_Lanni_Pretto
 
Assessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk ForecastingAssessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk Forecasting
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Paper
 
IDRC14-Bouchon-Threvi2
IDRC14-Bouchon-Threvi2IDRC14-Bouchon-Threvi2
IDRC14-Bouchon-Threvi2
 
Role of RS & GIS; gis in disaster management prepared by er. bishnu khatri
Role of RS & GIS; gis in disaster management prepared by er. bishnu khatriRole of RS & GIS; gis in disaster management prepared by er. bishnu khatri
Role of RS & GIS; gis in disaster management prepared by er. bishnu khatri
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Research Project: Multihazard and vulnerability in the seismic context of the...
Research Project: Multihazard and vulnerability in the seismic context of the...Research Project: Multihazard and vulnerability in the seismic context of the...
Research Project: Multihazard and vulnerability in the seismic context of the...
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Mobile App for Disaster Management & Information Technology in Emergency Prep...
Mobile App for Disaster Management & Information Technology in Emergency Prep...Mobile App for Disaster Management & Information Technology in Emergency Prep...
Mobile App for Disaster Management & Information Technology in Emergency Prep...
 
SMART International Symposium for Next Generation Infrastructure:Identifying ...
SMART International Symposium for Next Generation Infrastructure:Identifying ...SMART International Symposium for Next Generation Infrastructure:Identifying ...
SMART International Symposium for Next Generation Infrastructure:Identifying ...
 
Risks projects - Hazard Maps - Honduras
Risks projects - Hazard Maps - HondurasRisks projects - Hazard Maps - Honduras
Risks projects - Hazard Maps - Honduras
 
yoder_research_interests
yoder_research_interestsyoder_research_interests
yoder_research_interests
 
Risk analysis for fire: the case of civil structures
Risk analysis for fire: the case of civil structuresRisk analysis for fire: the case of civil structures
Risk analysis for fire: the case of civil structures
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
 
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...
Fuzzy Logic Modeling Approach for Risk Area Assessment for Hazardous Material...
 
Lecture 6: Vulnerability Analysis
Lecture 6: Vulnerability AnalysisLecture 6: Vulnerability Analysis
Lecture 6: Vulnerability Analysis
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Micro-Scale Terrorism Vulnerability Mapping

  • 1. Source: winwallpapers.net Micro-Scale Terrorism Vulnerability Mapping A Case Study of Tokyo, Japan 30/06/2012 — Konstantin Greger, University of Tsukuba, Division for Spatial Information Science
  • 2. Vulnerability ≠ Risk risk (loss / probability) hazard vulnerability
  • 3. Vulnerability ≠ Risk risk (loss / probability) hazard vulnerability
  • 4. Vulnerability ≠ Risk risk (loss / probability) hazard vulnerability
  • 5. Vulnerability ≠ Risk risk (loss / probability) hazard vulnerability
  • 6. Vulnerability Concept susceptibility factors and attributes that make an asset more or less susceptible to a terrorist attack vulnerability disutility value (worth) of the consequences of a successful attack to the stakeholder
  • 7. Vulnerability Concept susceptibility factors and attributes that make an asset more or less susceptible to a terrorist attack vulnerability disutility value (worth) of the consequences of a successful attack to the stakeholder
  • 8. Vulnerability Concept susceptibility factors and attributes that make an asset more or less susceptible to a terrorist attack vulnerability disutility value (worth) of the consequences of a successful attack to the stakeholder
  • 9. Vulnerability Concept susceptibility factors and attributes that make an asset more or less susceptible to a terrorist attack vulnerability disutility value (worth) of the consequences of a successful attack to the stakeholder
  • 10. Problem Statement / Hypotheses (1) vulnerability is not distributed equally in space ✤ places with high vulnerability vs. places with low vulnerability (2) factors exist that enhance or mitigate vulnerability ✤ attributes of objects at risk ➡ it is necessary to evaluate factors and visualize inequalities
  • 11. Research Objective ✤ vulnerability-centric, scenario-based research ✤ no investigation what outcome an attack at a location can cause ✤ the unit of analysis is the geography, not the event ✤ terrorist attacks can happen everywhere, but make more sense in some locations than in others ✤ "If I were a terrorist, I would ..." (Apostolakis and Lemon 2005:365) ➡ how prone a location is to an attack, as a result of the attributes that define it
  • 12. Study Area ✤ Central Tōkyō (around 東京駅), 千代田区、中央区、港区 ✤ ~6 km2 area ✤ ~6,500 buildings ✤ diverse land uses, building types and building density ✤ several landmarks, iconic buildings and critical infrastructures
  • 13. Study Area ✤ Central Tōkyō (around 東京駅), 千代田区、中央区、港区 m ✤ ~6 km2 area 5k ~2. ~2. 5k m ✤ ~6,500 buildings ✤ diverse land uses, building types and building density ✤ several landmarks, iconic buildings and critical infrastructures
  • 14. Study Area ✤ Central Tōkyō (around 東京駅), 千代田区、中央区、港区 m ✤ ~6 km2 area 5k ~2. ~2. 5k m ✤ ~6,500 buildings ✤ diverse land uses, building types and building density ✤ several landmarks, iconic buildings and critical infrastructures
  • 15. Buildings ✤ buildings ✤ definition of “user groups” / user categories ✤ generalization ✤ mixed usage types ✤ critical infrastructures ✤ open spaces
  • 16. Buildings ✤ buildings ✤ definition of “user groups” / user categories ✤ generalization ✤ mixed usage types ✤ critical infrastructures ✤ open spaces
  • 17. Building Susceptibility Factors ✤ number of people in a building (daytime population) ✤ building use or function (mixed use) ✤ volume of public traffic (inside & outside) ✤ accessibility (security, parking garages) ✤ degree of fenestration ✤ symbolic value ✤ ...
  • 18. Spatial Influence (SI) ✤ analysis focuses on the effect that the “crime generators” have on the object's immediate surroundings ✤ 3-dimensional real-world objects vs. 1-dimensional point objects “ The best way to map crime factors for the articulation of criminogenic backcloths is to operationalize the spatial influence of each factor, acting as crime generators, throughout a common landscape rather than atheoretically mapping the factors as points, lines or polygons in a manner that keeps them disconnected from their broader social and environmental contexts. (Caplan and Kennedy 2010a:23)
  • 19. Vulnerability Factor Map ted r ic a fab ta! da 50m distance from buildings with low vulnerability high fenestration rate (> 2 SD) high vulnerability
  • 20. Vulnerability Factor Map ted r ic a fab ta! da 50 m 50m distance from buildings with low vulnerability high fenestration rate (> 2 SD) high vulnerability
  • 21. Vulnerability Factor Map ted r ic a fab ta! da 150m straight-line surroundings of low vulnerability police boxes (koban) high vulnerability
  • 22. Vulnerability Factor Map ted r ic a fab ta! da kernel density of buildings with high number of low vulnerability employees (> 2 SD; search radius = 100m) high vulnerability
  • 23. Vulnerability Factor Map ted r ic a fab ta! da > 2 SD 1-2 SD 0-1 SD -1 SD yees number of emplo kernel density of buildings with high number of low vulnerability employees (> 2 SD; search radius = 100m) high vulnerability
  • 24. Vulnerability Map ted r ic a fab ta! da low vulnerability unweighted combination of three ⋮ previously shown factor maps layers high vulnerability
  • 25. Multi-Threat Vulnerability Map vulnerability maps disutility scenario 1: small explosion scenario 2: large explosion susceptibility scenario 3: small release scenario 4: large release
  • 26. Multi-Threat Vulnerability Map vulnerability maps disutility scenario 1: small explosion scenario 2: large explosion susceptibility scenario 3: small release scenario 4: large release
  • 27. Summary ✤ analytic insight ✤ definition of attributes and factors affecting terrorism vulnerability ✤ new approach (terrorism + vulnerability + GIS) ✤ visualization ✤ creation of a micro-scale multi-threat vulnerability map of a study area in a Japanese urban area ✤ spatial distribution of vulnerability factors
  • 28. ご清聴ありがとうございました Konstantin Greger University of Tsukuba Division for Spatial Information Science greger@geoenv.tsukuba.ac.jp http://www.konstantingreger.net
  • 29. Bibliography Abbott, Andrew. 1997. “Of Time and Space: The Clarke, Ronald V. 1995. “Situational Crime Paté-Cornell, Elisabeth, and Seth Guikema. 2002. Contemporary Relevance of the Chicago School.” Prevention.” Crime and Justice 19:91–150. “Probabilistic Modeling of Terrorist Threats: A Social Forces 75(4):1149–1182. Systems Approach to Setting Priorities Among FEMA Federal Emergency Management Agency. Countermeasures.” Military Operations Research 7(4): Apostolakis, George E., and Douglas M. Lemon. 2005. 2003a. “Insurance, Finance, and Regulation Primer for 5–20. “A Screening Methodology for the Identification and Terrorism Risk Management in Buildings.” (http:// Ranking of Infrastructure Vulnerabilities Due to www.fema.gov/library/viewRecord.do?id=1562). Patterson, S.A., and G.E. Apostolakis. 2007. Terrorism.” Risk Analysis 25(2):361–376. “Identification of critical locations across multiple FEMA Federal Emergency Management Agency. infrastructures for terrorist actions.” Reliability Bankoff, Greg. 2004. Mapping vulnerability : disasters, 2003b. “Reference Manual to Mitigate Potential Engineering & System Safety 92(9):1183–1203. development, and people. London ;;Sterling VA: Terrorist Attacks Against Buildings.” (http:// Earthscan Publications. www.fema.gov/library/viewRecord.do?id=1559). Piegorsch, Walter W., Susan L. Cutter, and Frank Hardisty. 2007. “Benchmark Analysis for Quantifying Brantingham, P. J., and P. L. Brantingham. 1981. John Garrick, B. et al. 2004. “Confronting the risks of Urban Vulnerability to Terrorist Incidents.” Risk Environmental Criminology. Thousand Oaks, CA: terrorism: making the right decisions.” Reliability Analysis 27(6):1411–1425. Sage Publications. Engineering & System Safety 86(2):129–176. Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly. 2001. Brantingham, Patricia, and Paul Brantingham. 1995. Kaplan, Stanley, and B. John Garrick. 1981. “On The “Identifying, understanding, and analyzing critical “Criminality of place.” European Journal on Criminal Quantitative Definition of Risk.” Risk Analysis 1(1): infrastructure interdependencies.” IEEE Control Policy and Research 3(3):5–26. 11–27. Systems Magazine 21(6):11–25. Brown, Gerald G., and Louis Anthony Tony Cox Jr. Karydas, D.M., and J.F. Gifun. 2006. “A method for the Saaty, Thomas L. 2008. “Decision making with the 2011. “How Probabilistic Risk Assessment Can efficient prioritization of infrastructure renewal analytic hierarchy process.” International Journal of Mislead Terrorism Risk Analysts.” Risk Analysis 31(2): projects.” Reliability Engineering & System Safety Services Sciences 1(1):83. 196–204. 91(1):84–99. Tetlock, Philip E. 2005. Expert Political Judgment: Caplan, Joel M., and Leslie W. Kennedy. 2010a. Risk Lemon, Douglas M. 2004. “A Methodology for the How Good Is It? How Can We Know? Princeton Terrain Modeling Compendium. Newark, NJ: Rutgers Identification of Critical Locations in Infrastructures.” University Press. Center on Public Security. Michaud, David. 2005. “Risk Analysis of Weil, R, and G.E Apostolakis. 2001. “A methodology Caplan, Joel M., and Leslie W. Kennedy. 2010b. Risk Infrastructure Systems Screening Vulnerabilities in for the prioritization of operating experience in Terrain Modeling Manual: Theoretical Framework and Water Supply Networks.” nuclear power plants.” Reliability Engineering & Technical Steps of Spatial Risk Assessment. Newark, System Safety 74(1):23–42. NJ: Rutgers Center on Public Security. National Consortium for the Study of Terrorism and Responses to Terrorism (START). 2011. “Global Cheok, Michael C., Gareth W. Parry, and Richard R. Terrorism Database: Variables & Inclusion Sherry. 1998. “Use of importance measures in risk- Criteria.” (http://www.start.umd.edu/gtd/ informed regulatory applications.” Reliability downloads/Codebook.pdf). Engineering & System Safety 60(3):213–226.

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. Creation of disutility maps, incorporating multiple stakeholder's asset values and possible adverse effects of an attack\n Creation of multiple threat-specific susceptibility factor maps\n Combination of the susceptibility and disutility maps into multiple threat-specific vulnerability maps, using the Risk Terrain Modeling (RTM) methodology\n Combination of the threat-specific vulnerability maps into one holistic vulnerability map of the study area, again using the Risk Terrain Modeling (RTM) methodology\n
  40. \n
  41. \n
  42. \n