Those are the slides I have been using to introduce my research about a spatial approach for the analysis of terrorism vulnerability at the 2012 Annual Meeting of the Japan Geoscience Union (JpGU) at Makuhari Messe on May 22nd, 2012, and the 5th Annual Meeting of the Japan Association on Geographical Space (JAGS) at the Tokyo Campus of Tsukuba University on June 30th, 2012.
6. Vulnerability Concept
susceptibility
factors and attributes that make an asset
more or less susceptible to a terrorist attack
vulnerability
disutility
value (worth) of the consequences
of a successful attack to the stakeholder
7. Vulnerability Concept
susceptibility
factors and attributes that make an asset
more or less susceptible to a terrorist attack
vulnerability
disutility
value (worth) of the consequences
of a successful attack to the stakeholder
8. Vulnerability Concept
susceptibility
factors and attributes that make an asset
more or less susceptible to a terrorist attack
vulnerability
disutility
value (worth) of the consequences
of a successful attack to the stakeholder
9. Vulnerability Concept
susceptibility
factors and attributes that make an asset
more or less susceptible to a terrorist attack
vulnerability
disutility
value (worth) of the consequences
of a successful attack to the stakeholder
10. Problem Statement / Hypotheses
(1) vulnerability is not distributed equally in space
✤ places with high vulnerability vs. places with low vulnerability
(2) factors exist that enhance or mitigate vulnerability
✤ attributes of objects at risk
➡ it is necessary to evaluate factors and visualize inequalities
11. Research Objective
✤ vulnerability-centric, scenario-based research
✤ no investigation what outcome an attack at a location can cause
✤ the unit of analysis is the geography, not the event
✤ terrorist attacks can happen everywhere, but make more sense in
some locations than in others
✤ "If I were a terrorist, I would ..." (Apostolakis and Lemon 2005:365)
➡ how prone a location is to an attack, as a result of the attributes
that define it
12. Study Area
✤ Central Tōkyō (around 東京駅),
千代田区、中央区、港区
✤ ~6 km2 area
✤ ~6,500 buildings
✤ diverse land uses, building
types and building density
✤ several landmarks, iconic
buildings and critical
infrastructures
13. Study Area
✤ Central Tōkyō (around 東京駅),
千代田区、中央区、港区
m
✤ ~6 km2 area
5k
~2.
~2.
5k
m
✤ ~6,500 buildings
✤ diverse land uses, building
types and building density
✤ several landmarks, iconic
buildings and critical
infrastructures
14. Study Area
✤ Central Tōkyō (around 東京駅),
千代田区、中央区、港区
m
✤ ~6 km2 area
5k
~2.
~2.
5k
m
✤ ~6,500 buildings
✤ diverse land uses, building
types and building density
✤ several landmarks, iconic
buildings and critical
infrastructures
15. Buildings
✤ buildings
✤ definition of “user groups” /
user categories
✤ generalization
✤ mixed usage types
✤ critical infrastructures
✤ open spaces
16. Buildings
✤ buildings
✤ definition of “user groups” /
user categories
✤ generalization
✤ mixed usage types
✤ critical infrastructures
✤ open spaces
17. Building Susceptibility Factors
✤ number of people in a building (daytime population)
✤ building use or function (mixed use)
✤ volume of public traffic (inside & outside)
✤ accessibility (security, parking garages)
✤ degree of fenestration
✤ symbolic value
✤ ...
18. Spatial Influence (SI)
✤ analysis focuses on the effect that the “crime generators” have on the
object's immediate surroundings
✤ 3-dimensional real-world objects vs. 1-dimensional point objects
“
The best way to map crime factors for the articulation of criminogenic
backcloths is to operationalize the spatial influence of each factor, acting as
crime generators, throughout a common landscape rather than atheoretically
mapping the factors as points, lines or polygons in a manner that keeps them
disconnected from their broader social and environmental contexts.
(Caplan and Kennedy 2010a:23)
19. Vulnerability
Factor Map
ted
r ic a
fab ta!
da
50m distance from buildings with low vulnerability
high fenestration rate (> 2 SD) high vulnerability
20. Vulnerability
Factor Map
ted
r ic a
fab ta!
da 50 m
50m distance from buildings with low vulnerability
high fenestration rate (> 2 SD) high vulnerability
21. Vulnerability
Factor Map
ted
r ic a
fab ta!
da
150m straight-line surroundings of low vulnerability
police boxes (koban) high vulnerability
22. Vulnerability
Factor Map
ted
r ic a
fab ta!
da
kernel density of buildings with high number of low vulnerability
employees (> 2 SD; search radius = 100m) high vulnerability
23. Vulnerability
Factor Map
ted
r ic a
fab ta!
da
> 2 SD
1-2 SD
0-1 SD
-1 SD
yees
number of emplo
kernel density of buildings with high number of low vulnerability
employees (> 2 SD; search radius = 100m) high vulnerability
24. Vulnerability
Map
ted
r ic a
fab ta!
da
low vulnerability
unweighted combination of three ⋮
previously shown factor maps layers high vulnerability
25. Multi-Threat Vulnerability Map
vulnerability
maps
disutility
scenario 1: small explosion
scenario 2: large explosion
susceptibility
scenario 3: small release
scenario 4: large release
26. Multi-Threat Vulnerability Map
vulnerability
maps
disutility
scenario 1: small explosion
scenario 2: large explosion
susceptibility
scenario 3: small release
scenario 4: large release
27. Summary
✤ analytic insight
✤ definition of attributes and factors affecting terrorism vulnerability
✤ new approach (terrorism + vulnerability + GIS)
✤ visualization
✤ creation of a micro-scale multi-threat vulnerability map of a study
area in a Japanese urban area
✤ spatial distribution of vulnerability factors
28. ご清聴ありがとうございました
Konstantin Greger
University of Tsukuba
Division for Spatial Information Science
greger@geoenv.tsukuba.ac.jp
http://www.konstantingreger.net
29. Bibliography
Abbott, Andrew. 1997. “Of Time and Space: The Clarke, Ronald V. 1995. “Situational Crime Paté-Cornell, Elisabeth, and Seth Guikema. 2002.
Contemporary Relevance of the Chicago School.” Prevention.” Crime and Justice 19:91–150. “Probabilistic Modeling of Terrorist Threats: A
Social Forces 75(4):1149–1182. Systems Approach to Setting Priorities Among
FEMA Federal Emergency Management Agency. Countermeasures.” Military Operations Research 7(4):
Apostolakis, George E., and Douglas M. Lemon. 2005. 2003a. “Insurance, Finance, and Regulation Primer for 5–20.
“A Screening Methodology for the Identification and Terrorism Risk Management in Buildings.” (http://
Ranking of Infrastructure Vulnerabilities Due to www.fema.gov/library/viewRecord.do?id=1562). Patterson, S.A., and G.E. Apostolakis. 2007.
Terrorism.” Risk Analysis 25(2):361–376. “Identification of critical locations across multiple
FEMA Federal Emergency Management Agency. infrastructures for terrorist actions.” Reliability
Bankoff, Greg. 2004. Mapping vulnerability : disasters, 2003b. “Reference Manual to Mitigate Potential Engineering & System Safety 92(9):1183–1203.
development, and people. London ;;Sterling VA: Terrorist Attacks Against Buildings.” (http://
Earthscan Publications. www.fema.gov/library/viewRecord.do?id=1559). Piegorsch, Walter W., Susan L. Cutter, and Frank
Hardisty. 2007. “Benchmark Analysis for Quantifying
Brantingham, P. J., and P. L. Brantingham. 1981. John Garrick, B. et al. 2004. “Confronting the risks of Urban Vulnerability to Terrorist Incidents.” Risk
Environmental Criminology. Thousand Oaks, CA: terrorism: making the right decisions.” Reliability Analysis 27(6):1411–1425.
Sage Publications. Engineering & System Safety 86(2):129–176.
Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly. 2001.
Brantingham, Patricia, and Paul Brantingham. 1995. Kaplan, Stanley, and B. John Garrick. 1981. “On The “Identifying, understanding, and analyzing critical
“Criminality of place.” European Journal on Criminal Quantitative Definition of Risk.” Risk Analysis 1(1): infrastructure interdependencies.” IEEE Control
Policy and Research 3(3):5–26. 11–27. Systems Magazine 21(6):11–25.
Brown, Gerald G., and Louis Anthony Tony Cox Jr. Karydas, D.M., and J.F. Gifun. 2006. “A method for the Saaty, Thomas L. 2008. “Decision making with the
2011. “How Probabilistic Risk Assessment Can efficient prioritization of infrastructure renewal analytic hierarchy process.” International Journal of
Mislead Terrorism Risk Analysts.” Risk Analysis 31(2): projects.” Reliability Engineering & System Safety Services Sciences 1(1):83.
196–204. 91(1):84–99.
Tetlock, Philip E. 2005. Expert Political Judgment:
Caplan, Joel M., and Leslie W. Kennedy. 2010a. Risk Lemon, Douglas M. 2004. “A Methodology for the How Good Is It? How Can We Know? Princeton
Terrain Modeling Compendium. Newark, NJ: Rutgers Identification of Critical Locations in Infrastructures.” University Press.
Center on Public Security.
Michaud, David. 2005. “Risk Analysis of Weil, R, and G.E Apostolakis. 2001. “A methodology
Caplan, Joel M., and Leslie W. Kennedy. 2010b. Risk Infrastructure Systems Screening Vulnerabilities in for the prioritization of operating experience in
Terrain Modeling Manual: Theoretical Framework and Water Supply Networks.” nuclear power plants.” Reliability Engineering &
Technical Steps of Spatial Risk Assessment. Newark, System Safety 74(1):23–42.
NJ: Rutgers Center on Public Security. National Consortium for the Study of Terrorism and
Responses to Terrorism (START). 2011. “Global
Cheok, Michael C., Gareth W. Parry, and Richard R. Terrorism Database: Variables & Inclusion
Sherry. 1998. “Use of importance measures in risk- Criteria.” (http://www.start.umd.edu/gtd/
informed regulatory applications.” Reliability downloads/Codebook.pdf).
Engineering & System Safety 60(3):213–226.
Editor's Notes
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Creation of disutility maps, incorporating multiple stakeholder's asset values and possible adverse effects of an attack\n Creation of multiple threat-specific susceptibility factor maps\n Combination of the susceptibility and disutility maps into multiple threat-specific vulnerability maps, using the Risk Terrain Modeling (RTM) methodology\n Combination of the threat-specific vulnerability maps into one holistic vulnerability map of the study area, again using the Risk Terrain Modeling (RTM) methodology\n