Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Spatial Methodologies for the Analysis of Vulne...

Spatial Methodologies for the Analysis of Vulnerability in Urban Areas ー A Case Study for Terrorism in Tokyo, Japan

The presentation I gave at the IGU2013 Conference in Kyoto on August 8, 2013. It contains an introduction into my ongoing research about the use of spatial methodologies in the analysis of vulnerabilities in highly urbanized areas. It also shows the applications and usefulness, as well as some preliminary results for a case study about terrorism vulnerability in Tokyo, Japan.

Konstantin Greger

August 08, 2013
Tweet

More Decks by Konstantin Greger

Other Decks in Research

Transcript

  1. Spatial Methodologies for the Analysis of Vulnerability in Urban Areas

    ʔ A Case Study for Terrorism in Tokyo, Japan Konstantin GREGER Division of Spatial Information Science University of Tsukuba [email protected] @kogreger Regional Conference of the IGU, Kyoto August 8, 2013 (Session CS18-12)
  2. Hypotheses 2 ᶃɹVulnerability is not distributed equally over space and

    time. ɹɹplaces with high vulnerability ← → places with low vulnerability ᶄɹFactors exist that enhance or mitigate vulnerability. ɹɹattributes of objects at risk ᶅɹVulnerabilities of objects influence their spatial surroundings. ɹɹspatial influence of objects
  3. Research Objectives 3 Establish a methodology to quantify how prone

    a location is to a certain kind of terrorist attack (“scenario”), as a result of the attributes that define it. The unit of analysis should be the geographical space (“place”), not the specific outcome of a singular event (“attack”). Gain analytic insight in the definition of attributes and factors affecting terrorism vulnerability in urban areas. Create micro-scale vulnerability maps to visualize the spatial distribution of single vulnerability factors and overall vulnerability. Target audiences are the general public, involved stakeholders, and academia.
  4. Spatio-Temporal Vulnerability Analysis Framework 5 factor 1 factor 2 factor

    n ... vulnerability spatial influence (SI) factor 1 maps factor 2 maps factor n map ... raster algebra (RTM) vulnerability maps building data address data census data movement data ... factor weights selection
  5. Spatial Influence ᶃɹspatial concentration ɹɹidentification of agglomerations (hotspots) of objects

    with equal attributes ɹɹ→ kernel density estimation (KDE) ᶄɹspatial proximity ɹɹeach object affects the space surrounding itself by its attributes ɹɹ→ buffering (euclidian distance) dimension of proximity to be defined for each factor case study: 250m KDE bandwidth / 100m buffer (CAPLAN & KENNEDY 2010a) 6
  6. Spatio-Temporal Vulnerability Analysis Framework 7 factor 1 factor 2 factor

    n ... vulnerability spatial influence (SI) factor 1 maps factor 2 maps factor n map ... raster algebra (RTM) vulnerability maps building data address data census data movement data ... factor weights selection
  7. Terrorism Vulnerability Factors 9 terrorism vulnerability factors goals ᶃɹbuilding population

    (stationary; [transient]) affect maximum number of people ɹɹestimated number of people within each bldg. affect maximum number of people ᶄɹmobile population affect maximum number of people ɹɹestimated number of pedestrians affect maximum number of people ɹɹ[estimated number of train passengers] affect maximum number of people ᶅɹsymbolic value gain maximum attention ɹɹbinary variable (yes/no) [→ weighted gradient] gain maximum attention ɹɹsubjective/qualitative selection & estimation gain maximum attention
  8. Study Area Central Tokyo: Chiyoda-ku, Chuo-ku, Minato-ku ~ 43 km2

    area ~ 92,000 buildings diverse land uses, building types and building density several iconic buildings many critical infrastructures
  9. Building Population Estimation volumetric estimation approach (from LWIN & MURAYAMA

    2009) enhanced by activity dimension ᶃɹhome ᶄɹbusiness & office ᶅɹeducation ᶆɹretail & service ᶇɹleisure ᶈɹpublic institution enhanced by temporal dimension 12
  10. Mobile Population Estimation pedestrian volume necessary data (all including spatial

    and temporal information): ɹɹtrain station passengers ɹɹbuilding population ɹɹmovement profiles calculation algorithm: ɹɹbetweenness centrality index ɹɹ(BRANDES 2001; FREEMAN 1977; SEVTSUK & MEKONNEN 2012) 63
  11. Symbolic Value Identification official buildings: ɹɹpolice stations, fire stations, government

    office buildings train stations with large passenger volume (> 500.000 per day): ɹɹࡾాɺژڮɺ୆৔ɺ඼઒ɺେ໳ɺๅொɺ޿ඌɺ৽ڮɺ݄ౡɺ౦ژɺࣚཹɺ ɹɹ඿ொɺాொɺਆాɺ஛ڮɺ஛ࣳɺங஍ɺ੺ࡔɺۜ࠲ɺ߿ொ landmark buildings and institutions: ɹɹeconomical (౦ژূ݊औҾॴ) ɹɹpolitical (ࠃձٞࣄಊɺ༃ࠃਆࣾ) ɹɹtouristic (ϑδςϨϏϏϧɺ౦ژλϫʔɺங஍ࢢ৔ɺ૿্ࣉ) 114
  12. for each raster cell (5m×5m) calculate , where vt is

    the total vulnerability at time t, F is the set of vulnerability factors, wi is the weight of factor i, fi,t is the value of factor i at time t on a normalized scale (1: low; 2: medium; 3: high; 4: very high) Vulnerability Map Creation (Raster Algebra) 20% 40% 40% building population mobile population symbolic value 119 ^
  13. Vulnerability Analysis vulnerability maps allow for quick and easy visual

    identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 145
  14. Vulnerability Analysis vulnerability maps allow for quick and easy visual

    identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 147
  15. Vulnerability Analysis vulnerability maps allow for quick and easy visual

    identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 149
  16. Summary introduction of spatio-temporal vulnerability analysis methodology: ɹɹtheoretical foundation →

    operationalization → calculation → analysis operationalization of abstract concept (“vulnerability”) and human behavior (“terrorist decision-making”) into mathematical calculations: ɹɹvulnerability factors ɹɹspatial influence ɹɹfactor weights proven usefulness and applicability in case study 153
  17. Thank you for your kind attention! http://www.konstantingreger.net [email protected] @kogreger This

    research is partly funded by the 2012 Sinfonica GIS & Statistics Research Grant (ฏ੒24೥౓ γϯϑΥχΧ౷ܭGISݚڀॿ੒) of the Statistical lnformation Institute for Consulting and Analysis (ެӹࡒஂ๏ਓ౷ܭ৘ใݚڀ։ൃηϯλʔ)
  18. Abbott, Andrew. 1997. “Of Time and Space: The Contemporary Relevance

    of the Chicago School.” Social Forces 75(4):1149– 1182. Apostolakis, George E., and Douglas M. Lemon. 2005. “A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism.” Risk Analysis 25(2):361–376. Bosserhoff, Dietmar. 2005. Integration von Verkehrsplanung und räumlicher Planung Teil 1: Grundsätze und Umsetzung. 2nd ed. Wiesbaden: Hessisches Landesamt für Straßen- und Verkehrswesen (http:// www.hessen.de/irj/hessen_Internet? rid=HStK_15/hessen_Internet/presse.jsp). Brandes, Ulrik. 2001. “A Faster Algorithm for Betweenness Centrality.” The Journal of Mathematical Sociology 25(2):163–77. Brantingham, Patricia, and Paul Brantingham. 1995. “Criminality of place.” European Journal on Criminal Policy and Research 3(3):5–26. Brown, Gerald G., and Louis Anthony Tony Cox Jr. 2011. “How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts.” Risk Analysis 31(2):196–204. Caplan, Joel M., and Leslie W. Kennedy. 2010a. Risk Terrain Modeling Compendium. Newark, NJ: Rutgers Center on Public Security. Caplan, Joel M., and Leslie W. Kennedy. 2010b. Risk Terrain Modeling Manual: Theoretical Framework and Technical Steps of Spatial Risk Assessment. Newark, NJ: Rutgers Center on Public Security. FEMA Federal Emergency Management Agency. 2009. “Handbook for Rapid Visual Screening of Buildings to Evaluate Terrorism Risks.” (http://www.fema.gov/library/ viewRecord.do? fromSearch=fromsearch&id=1567). Freeman, Linton C. 1977. “A Set of Measures of Centrality Based on Betweenness.” Sociometry 40(1):35–41. González, Marta C., César A. Hidalgo, and Albert-László Barabási. 2008. “Understanding individual human mobility patterns.” Nature 453(7196):779–782. Horanont, Teerayut. 2012. “A Study on Urban Mobility and Dynamic Population Estimation by Using Aggregate Mobile Phone Sources.” (http://www.csis.u- tokyo.ac.jp/dp/115.pdf). Jiang, Shan, Joseph Ferreira, and Marta C. González. 2012. “Clustering daily patterns of human activities in the city.” Data Mining and Knowledge Discovery 25(3):478–510. Kaplan, Stanley, and B. John Garrick. 1981. “On The Quantitative Definition of Risk.” Risk Analysis 1(1):11–27. Karydas, D.M., and J.F. Gifun. 2006. “A method for the efficient prioritization of infrastructure renewal projects.” Reliability Engineering & System Safety 91(1):84–99. Lemon, Douglas M. 2004. “A Methodology for the Identification of Critical Locations in Infrastructures.” Lwin, KoKo, and Yuji Murayama. 2009. “A GIS Approach to Estimation of Building Population for Micro-spatial Analysis.” Transactions in GIS 13(4):401–414. National Consortium for the Study of Terrorism and Responses to Terrorism (START). 2011. “Global Terrorism Database: Variables & Inclusion Criteria.” (http:// www.start.umd.edu/gtd/downloads/ Codebook.pdf). Patterson, S.A., and G.E. Apostolakis. 2007. “Identification of critical locations across multiple infrastructures for terrorist actions.” Reliability Engineering & System Safety 92(9):1183–1203. Perry, Walt L., and RAND Homeland Security and Defense Center Naval Research Laboratory (U.S.). 2013. Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets. Piegorsch, Walter W., Susan L. Cutter, and Frank Hardisty. 2007. “Benchmark Analysis for Quantifying Urban Vulnerability to Terrorist Incidents.” Risk Analysis 27(6): 1411–1425. Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly. 2001. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” IEEE Control Systems Magazine 21(6):11–25. Sevtsuk, Andres, and Michael Mekonnen. n.d. “Urban Network Analysis: A Toolbox for ArcGIS 10.” (http://cityform.mit.edu/files/ UNA_help.pdf). Weil, R, and G.E Apostolakis. 2001. “A methodology for the prioritization of operating experience in nuclear power plants.” Reliability Engineering & System Safety 74(1):23–42. Bibliography 155