Slide 1

Slide 1 text

Spatial Methodologies for the Analysis of Vulnerability in Urban Areas ʔ A Case Study for Terrorism in Tokyo, Japan Konstantin GREGER Division of Spatial Information Science University of Tsukuba [email protected] @kogreger Regional Conference of the IGU, Kyoto August 8, 2013 (Session CS18-12)

Slide 2

Slide 2 text

Hypotheses 2 ᶃɹVulnerability is not distributed equally over space and time. ɹɹplaces with high vulnerability ← → places with low vulnerability ᶄɹFactors exist that enhance or mitigate vulnerability. ɹɹattributes of objects at risk ᶅɹVulnerabilities of objects influence their spatial surroundings. ɹɹspatial influence of objects

Slide 3

Slide 3 text

Research Objectives 3 Establish a methodology to quantify how prone a location is to a certain kind of terrorist attack (“scenario”), as a result of the attributes that define it. The unit of analysis should be the geographical space (“place”), not the specific outcome of a singular event (“attack”). Gain analytic insight in the definition of attributes and factors affecting terrorism vulnerability in urban areas. Create micro-scale vulnerability maps to visualize the spatial distribution of single vulnerability factors and overall vulnerability. Target audiences are the general public, involved stakeholders, and academia.

Slide 4

Slide 4 text

Research Framework

Slide 5

Slide 5 text

Spatio-Temporal Vulnerability Analysis Framework 5 factor 1 factor 2 factor n ... vulnerability spatial influence (SI) factor 1 maps factor 2 maps factor n map ... raster algebra (RTM) vulnerability maps building data address data census data movement data ... factor weights selection

Slide 6

Slide 6 text

Spatial Influence ᶃɹspatial concentration ɹɹidentification of agglomerations (hotspots) of objects with equal attributes ɹɹ→ kernel density estimation (KDE) ᶄɹspatial proximity ɹɹeach object affects the space surrounding itself by its attributes ɹɹ→ buffering (euclidian distance) dimension of proximity to be defined for each factor case study: 250m KDE bandwidth / 100m buffer (CAPLAN & KENNEDY 2010a) 6

Slide 7

Slide 7 text

Spatio-Temporal Vulnerability Analysis Framework 7 factor 1 factor 2 factor n ... vulnerability spatial influence (SI) factor 1 maps factor 2 maps factor n map ... raster algebra (RTM) vulnerability maps building data address data census data movement data ... factor weights selection

Slide 8

Slide 8 text

Case Study

Slide 9

Slide 9 text

Terrorism Vulnerability Factors 9 terrorism vulnerability factors goals ᶃɹbuilding population (stationary; [transient]) affect maximum number of people ɹɹestimated number of people within each bldg. affect maximum number of people ᶄɹmobile population affect maximum number of people ɹɹestimated number of pedestrians affect maximum number of people ɹɹ[estimated number of train passengers] affect maximum number of people ᶅɹsymbolic value gain maximum attention ɹɹbinary variable (yes/no) [→ weighted gradient] gain maximum attention ɹɹsubjective/qualitative selection & estimation gain maximum attention

Slide 10

Slide 10 text

Study Area Central Tokyo: Chiyoda-ku, Chuo-ku, Minato-ku ~ 43 km2 area ~ 92,000 buildings diverse land uses, building types and building density several iconic buildings many critical infrastructures

Slide 11

Slide 11 text

ᶃ Building Population Estimation Results

Slide 12

Slide 12 text

Building Population Estimation volumetric estimation approach (from LWIN & MURAYAMA 2009) enhanced by activity dimension ᶃɹhome ᶄɹbusiness & office ᶅɹeducation ᶆɹretail & service ᶇɹleisure ᶈɹpublic institution enhanced by temporal dimension 12

Slide 13

Slide 13 text

Spatio-Temporal Population Profile maxhome = 506 maxwork = 343 13

Slide 14

Slide 14 text

00:00 Building Population Time Series 14

Slide 15

Slide 15 text

01:00 Building Population Time Series 15

Slide 16

Slide 16 text

02:00 Building Population Time Series 16

Slide 17

Slide 17 text

03:00 Building Population Time Series 17

Slide 18

Slide 18 text

04:00 Building Population Time Series 18

Slide 19

Slide 19 text

05:00 Building Population Time Series 19

Slide 20

Slide 20 text

06:00 Building Population Time Series 20

Slide 21

Slide 21 text

07:00 Building Population Time Series 21

Slide 22

Slide 22 text

08:00 Building Population Time Series 22

Slide 23

Slide 23 text

09:00 Building Population Time Series 23

Slide 24

Slide 24 text

10:00 Building Population Time Series 24

Slide 25

Slide 25 text

11:00 Building Population Time Series 25

Slide 26

Slide 26 text

12:00 Building Population Time Series 26

Slide 27

Slide 27 text

13:00 Building Population Time Series 27

Slide 28

Slide 28 text

14:00 Building Population Time Series 28

Slide 29

Slide 29 text

15:00 Building Population Time Series 29

Slide 30

Slide 30 text

16:00 Building Population Time Series 30

Slide 31

Slide 31 text

17:00 Building Population Time Series 31

Slide 32

Slide 32 text

18:00 Building Population Time Series 32

Slide 33

Slide 33 text

19:00 Building Population Time Series 33

Slide 34

Slide 34 text

20:00 Building Population Time Series 34

Slide 35

Slide 35 text

21:00 Building Population Time Series 35

Slide 36

Slide 36 text

22:00 Building Population Time Series 36

Slide 37

Slide 37 text

23:00 Building Population Time Series 37

Slide 38

Slide 38 text

00:00 Building Population SI Time Series 38

Slide 39

Slide 39 text

01:00 Building Population SI Time Series 39

Slide 40

Slide 40 text

02:00 Building Population SI Time Series 40

Slide 41

Slide 41 text

03:00 Building Population SI Time Series 41

Slide 42

Slide 42 text

04:00 Building Population SI Time Series 42

Slide 43

Slide 43 text

05:00 Building Population SI Time Series 43

Slide 44

Slide 44 text

06:00 Building Population SI Time Series 44

Slide 45

Slide 45 text

07:00 Building Population SI Time Series 45

Slide 46

Slide 46 text

08:00 Building Population SI Time Series 46

Slide 47

Slide 47 text

09:00 Building Population SI Time Series 47

Slide 48

Slide 48 text

10:00 Building Population SI Time Series 48

Slide 49

Slide 49 text

11:00 Building Population SI Time Series 49

Slide 50

Slide 50 text

12:00 Building Population SI Time Series 50

Slide 51

Slide 51 text

13:00 Building Population SI Time Series 51

Slide 52

Slide 52 text

14:00 Building Population SI Time Series 52

Slide 53

Slide 53 text

15:00 Building Population SI Time Series 53

Slide 54

Slide 54 text

16:00 Building Population SI Time Series 54

Slide 55

Slide 55 text

17:00 Building Population SI Time Series 55

Slide 56

Slide 56 text

18:00 Building Population SI Time Series 56

Slide 57

Slide 57 text

19:00 Building Population SI Time Series 57

Slide 58

Slide 58 text

20:00 Building Population SI Time Series 58

Slide 59

Slide 59 text

21:00 Building Population SI Time Series 59

Slide 60

Slide 60 text

22:00 Building Population SI Time Series 60

Slide 61

Slide 61 text

23:00 Building Population SI Time Series 61

Slide 62

Slide 62 text

ᶄ Mobile Population Estimation Results

Slide 63

Slide 63 text

Mobile Population Estimation pedestrian volume necessary data (all including spatial and temporal information): ɹɹtrain station passengers ɹɹbuilding population ɹɹmovement profiles calculation algorithm: ɹɹbetweenness centrality index ɹɹ(BRANDES 2001; FREEMAN 1977; SEVTSUK & MEKONNEN 2012) 63

Slide 64

Slide 64 text

Spatio-Temporal Centrality Profile 64

Slide 65

Slide 65 text

00:00 Building Centrality Time Series 65

Slide 66

Slide 66 text

01:00 Building Centrality Time Series 66

Slide 67

Slide 67 text

02:00 Building Centrality Time Series 67

Slide 68

Slide 68 text

03:00 Building Centrality Time Series 68

Slide 69

Slide 69 text

04:00 Building Centrality Time Series 69

Slide 70

Slide 70 text

05:00 Building Centrality Time Series 70

Slide 71

Slide 71 text

06:00 Building Centrality Time Series 71

Slide 72

Slide 72 text

07:00 Building Centrality Time Series 72

Slide 73

Slide 73 text

08:00 Building Centrality Time Series 73

Slide 74

Slide 74 text

09:00 Building Centrality Time Series 74

Slide 75

Slide 75 text

10:00 Building Centrality Time Series 75

Slide 76

Slide 76 text

11:00 Building Centrality Time Series 76

Slide 77

Slide 77 text

12:00 Building Centrality Time Series 77

Slide 78

Slide 78 text

13:00 Building Centrality Time Series 78

Slide 79

Slide 79 text

14:00 Building Centrality Time Series 79

Slide 80

Slide 80 text

15:00 Building Centrality Time Series 80

Slide 81

Slide 81 text

16:00 Building Centrality Time Series 81

Slide 82

Slide 82 text

17:00 Building Centrality Time Series 82

Slide 83

Slide 83 text

18:00 Building Centrality Time Series 83

Slide 84

Slide 84 text

19:00 Building Centrality Time Series 84

Slide 85

Slide 85 text

20:00 Building Centrality Time Series 85

Slide 86

Slide 86 text

21:00 Building Centrality Time Series 86

Slide 87

Slide 87 text

22:00 Building Centrality Time Series 87

Slide 88

Slide 88 text

23:00 Building Centrality Time Series 88

Slide 89

Slide 89 text

00:00 89 Building Centrality SI Time Series

Slide 90

Slide 90 text

01:00 90 Building Centrality SI Time Series

Slide 91

Slide 91 text

02:00 91 Building Centrality SI Time Series

Slide 92

Slide 92 text

03:00 92 Building Centrality SI Time Series

Slide 93

Slide 93 text

04:00 93 Building Centrality SI Time Series

Slide 94

Slide 94 text

05:00 94 Building Centrality SI Time Series

Slide 95

Slide 95 text

06:00 95 Building Centrality SI Time Series

Slide 96

Slide 96 text

07:00 96 Building Centrality SI Time Series

Slide 97

Slide 97 text

08:00 97 Building Centrality SI Time Series

Slide 98

Slide 98 text

09:00 98 Building Centrality SI Time Series

Slide 99

Slide 99 text

10:00 99 Building Centrality SI Time Series

Slide 100

Slide 100 text

11:00 100 Building Centrality SI Time Series

Slide 101

Slide 101 text

12:00 101 Building Centrality SI Time Series

Slide 102

Slide 102 text

13:00 102 Building Centrality SI Time Series

Slide 103

Slide 103 text

14:00 103 Building Centrality SI Time Series

Slide 104

Slide 104 text

15:00 104 Building Centrality SI Time Series

Slide 105

Slide 105 text

16:00 105 Building Centrality SI Time Series

Slide 106

Slide 106 text

17:00 106 Building Centrality SI Time Series

Slide 107

Slide 107 text

18:00 107 Building Centrality SI Time Series

Slide 108

Slide 108 text

19:00 108 Building Centrality SI Time Series

Slide 109

Slide 109 text

20:00 109 Building Centrality SI Time Series

Slide 110

Slide 110 text

21:00 110 Building Centrality SI Time Series

Slide 111

Slide 111 text

22:00 111 Building Centrality SI Time Series

Slide 112

Slide 112 text

23:00 112 Building Centrality SI Time Series

Slide 113

Slide 113 text

ᶅ Symbolic Value Evaluation Results

Slide 114

Slide 114 text

Symbolic Value Identification official buildings: ɹɹpolice stations, fire stations, government office buildings train stations with large passenger volume (> 500.000 per day): ɹɹࡾాɺژڮɺ୆৔ɺ඼઒ɺେ໳ɺๅொɺ޿ඌɺ৽ڮɺ݄ౡɺ౦ژɺࣚཹɺ ɹɹ඿ொɺాொɺਆాɺ஛ڮɺ஛ࣳɺங஍ɺ੺ࡔɺۜ࠲ɺ߿ொ landmark buildings and institutions: ɹɹeconomical (౦ژূ݊औҾॴ) ɹɹpolitical (ࠃձٞࣄಊɺ༃ࠃਆࣾ) ɹɹtouristic (ϑδςϨϏϏϧɺ౦ژλϫʔɺங஍ࢢ৔ɺ૿্ࣉ) 114

Slide 115

Slide 115 text

115 Symbolic Value

Slide 116

Slide 116 text

116 Symbolic Value Spatial Influence

Slide 117

Slide 117 text

Vulnerability Mapping

Slide 118

Slide 118 text

Vulnerability Map Creation (Raster Algebra) 118 building population (SI): mobile population (SI): symbolic value (SI):

Slide 119

Slide 119 text

for each raster cell (5m×5m) calculate , where vt is the total vulnerability at time t, F is the set of vulnerability factors, wi is the weight of factor i, fi,t is the value of factor i at time t on a normalized scale (1: low; 2: medium; 3: high; 4: very high) Vulnerability Map Creation (Raster Algebra) 20% 40% 40% building population mobile population symbolic value 119 ^

Slide 120

Slide 120 text

00:00 Vulnerability Map 120

Slide 121

Slide 121 text

01:00 Vulnerability Map 121

Slide 122

Slide 122 text

02:00 Vulnerability Map 122

Slide 123

Slide 123 text

03:00 Vulnerability Map 123

Slide 124

Slide 124 text

04:00 Vulnerability Map 124

Slide 125

Slide 125 text

05:00 Vulnerability Map 125

Slide 126

Slide 126 text

06:00 Vulnerability Map 126

Slide 127

Slide 127 text

07:00 Vulnerability Map 127

Slide 128

Slide 128 text

08:00 Vulnerability Map 128

Slide 129

Slide 129 text

09:00 Vulnerability Map 129

Slide 130

Slide 130 text

10:00 Vulnerability Map 130

Slide 131

Slide 131 text

11:00 Vulnerability Map 131

Slide 132

Slide 132 text

12:00 Vulnerability Map 132

Slide 133

Slide 133 text

13:00 Vulnerability Map 133

Slide 134

Slide 134 text

14:00 Vulnerability Map 134

Slide 135

Slide 135 text

15:00 Vulnerability Map 135

Slide 136

Slide 136 text

16:00 Vulnerability Map 136

Slide 137

Slide 137 text

17:00 Vulnerability Map 137

Slide 138

Slide 138 text

18:00 Vulnerability Map 138

Slide 139

Slide 139 text

19:00 Vulnerability Map 139

Slide 140

Slide 140 text

20:00 Vulnerability Map 140

Slide 141

Slide 141 text

21:00 Vulnerability Map 141

Slide 142

Slide 142 text

22:00 Vulnerability Map 142

Slide 143

Slide 143 text

23:00 Vulnerability Map 143

Slide 144

Slide 144 text

Outcome Analysis

Slide 145

Slide 145 text

Vulnerability Analysis vulnerability maps allow for quick and easy visual identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 145

Slide 146

Slide 146 text

09:00 Vulnerability Map 146

Slide 147

Slide 147 text

Vulnerability Analysis vulnerability maps allow for quick and easy visual identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 147

Slide 148

Slide 148 text

Total Population in Vulnerable Areas 148

Slide 149

Slide 149 text

Vulnerability Analysis vulnerability maps allow for quick and easy visual identification of vulnerable places and times spatio-temporal investigation of highly vulnerable places: ᶃɹtotal population in vulnerable areas ᶄɹsensitive infrastructures in vulnerable areas ɹɹ❶ɹschools & kindergartens ɹɹ❷ɹhospitals & homes for the elderly 149

Slide 150

Slide 150 text

150 Sensitive Infrastructures

Slide 151

Slide 151 text

Sensitive Infrastructures in Vulnerable Areas (9am) 151

Slide 152

Slide 152 text

Conclusion

Slide 153

Slide 153 text

Summary introduction of spatio-temporal vulnerability analysis methodology: ɹɹtheoretical foundation → operationalization → calculation → analysis operationalization of abstract concept (“vulnerability”) and human behavior (“terrorist decision-making”) into mathematical calculations: ɹɹvulnerability factors ɹɹspatial influence ɹɹfactor weights proven usefulness and applicability in case study 153

Slide 154

Slide 154 text

Thank you for your kind attention! http://www.konstantingreger.net [email protected] @kogreger This research is partly funded by the 2012 Sinfonica GIS & Statistics Research Grant (ฏ੒24೥౓ γϯϑΥχΧ౷ܭGISݚڀॿ੒) of the Statistical lnformation Institute for Consulting and Analysis (ެӹࡒஂ๏ਓ౷ܭ৘ใݚڀ։ൃηϯλʔ)

Slide 155

Slide 155 text

Abbott, Andrew. 1997. “Of Time and Space: The Contemporary Relevance of the Chicago School.” Social Forces 75(4):1149– 1182. Apostolakis, George E., and Douglas M. Lemon. 2005. “A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism.” Risk Analysis 25(2):361–376. Bosserhoff, Dietmar. 2005. Integration von Verkehrsplanung und räumlicher Planung Teil 1: Grundsätze und Umsetzung. 2nd ed. Wiesbaden: Hessisches Landesamt für Straßen- und Verkehrswesen (http:// www.hessen.de/irj/hessen_Internet? rid=HStK_15/hessen_Internet/presse.jsp). Brandes, Ulrik. 2001. “A Faster Algorithm for Betweenness Centrality.” The Journal of Mathematical Sociology 25(2):163–77. Brantingham, Patricia, and Paul Brantingham. 1995. “Criminality of place.” European Journal on Criminal Policy and Research 3(3):5–26. Brown, Gerald G., and Louis Anthony Tony Cox Jr. 2011. “How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts.” Risk Analysis 31(2):196–204. Caplan, Joel M., and Leslie W. Kennedy. 2010a. Risk Terrain Modeling Compendium. Newark, NJ: Rutgers Center on Public Security. Caplan, Joel M., and Leslie W. Kennedy. 2010b. Risk Terrain Modeling Manual: Theoretical Framework and Technical Steps of Spatial Risk Assessment. Newark, NJ: Rutgers Center on Public Security. FEMA Federal Emergency Management Agency. 2009. “Handbook for Rapid Visual Screening of Buildings to Evaluate Terrorism Risks.” (http://www.fema.gov/library/ viewRecord.do? fromSearch=fromsearch&id=1567). Freeman, Linton C. 1977. “A Set of Measures of Centrality Based on Betweenness.” Sociometry 40(1):35–41. González, Marta C., César A. Hidalgo, and Albert-László Barabási. 2008. “Understanding individual human mobility patterns.” Nature 453(7196):779–782. Horanont, Teerayut. 2012. “A Study on Urban Mobility and Dynamic Population Estimation by Using Aggregate Mobile Phone Sources.” (http://www.csis.u- tokyo.ac.jp/dp/115.pdf). Jiang, Shan, Joseph Ferreira, and Marta C. González. 2012. “Clustering daily patterns of human activities in the city.” Data Mining and Knowledge Discovery 25(3):478–510. Kaplan, Stanley, and B. John Garrick. 1981. “On The Quantitative Definition of Risk.” Risk Analysis 1(1):11–27. Karydas, D.M., and J.F. Gifun. 2006. “A method for the efficient prioritization of infrastructure renewal projects.” Reliability Engineering & System Safety 91(1):84–99. Lemon, Douglas M. 2004. “A Methodology for the Identification of Critical Locations in Infrastructures.” Lwin, KoKo, and Yuji Murayama. 2009. “A GIS Approach to Estimation of Building Population for Micro-spatial Analysis.” Transactions in GIS 13(4):401–414. National Consortium for the Study of Terrorism and Responses to Terrorism (START). 2011. “Global Terrorism Database: Variables & Inclusion Criteria.” (http:// www.start.umd.edu/gtd/downloads/ Codebook.pdf). Patterson, S.A., and G.E. Apostolakis. 2007. “Identification of critical locations across multiple infrastructures for terrorist actions.” Reliability Engineering & System Safety 92(9):1183–1203. Perry, Walt L., and RAND Homeland Security and Defense Center Naval Research Laboratory (U.S.). 2013. Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets. Piegorsch, Walter W., Susan L. Cutter, and Frank Hardisty. 2007. “Benchmark Analysis for Quantifying Urban Vulnerability to Terrorist Incidents.” Risk Analysis 27(6): 1411–1425. Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly. 2001. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” IEEE Control Systems Magazine 21(6):11–25. Sevtsuk, Andres, and Michael Mekonnen. n.d. “Urban Network Analysis: A Toolbox for ArcGIS 10.” (http://cityform.mit.edu/files/ UNA_help.pdf). Weil, R, and G.E Apostolakis. 2001. “A methodology for the prioritization of operating experience in nuclear power plants.” Reliability Engineering & System Safety 74(1):23–42. Bibliography 155