APPENDIX B - Minerva Access
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of APPENDIX B - Minerva Access
A Conceptual Model for Assessing Risks and Building
Resilience for Urban Infrastructure System: An
Indonesian Case
dissertation submitted in total fulfilment of the requirement for the degree of
Doctor of Philosophy
Presented by:
Citra Satria Ongkowijoyo B.Sc.-Civil Eng. (Petra Christian University, Indonesia)
M.Sc.-Construction Eng. (National Taiwan University of Science and Technology, Taiwan)
ORCID identifier: orcid.org/0000-0002-3124-2980
Supervisor:
Dr. Hemanta Kumar Doloi
Advisory Committee:
A/Prof. Alan March
Dr. Toong-Khuan Chan
Dr. Anna C. Hurlimann
Melbourne School of Design
Faculty of Architecture, Building and Planning
Department of Construction and Property
November 2017
Page i
“Life isn't about waiting for the storm to pass, ...
It's about learning to dance in the rain.”
― Vivian Greene
ABSTRACT
Page iii
ABSTRACT
The urban infrastructure (UI) systems fundamentally underpin the ceaseless and mobile
process of urban life in the myriad of ways. The continuous reliance of modern and high
paced society on huge and complex systems of UI stretched across geography creates its
inevitable vulnerabilities. While the UI system poses significant complexity and challenges
to the society under dynamic and uncertain condition, extreme event and unexpected
conditions may lead to failures. The failures can undermine the successful realization of the
reliable UI serviceability, thus, affecting the whole communities which defiantly dependent
to the UI systems.
Recently, resilience concept has been acknowledged and applied to minimize specifically
direct and indirect losses from hazards through enhanced resistance and robustness to
extreme events, as well as more effective recovery strategies. Particularly, the resilience
approach is rooted in the well-established framework of risk analysis (RA). Nonetheless,
current resilience analysis (REA) lacks the consideration of RA as a unified process within
REA body. While, it is also acknowledged that in the dynamic environment of risk resilient
UI context common RA mainly spotlighted the static behavior of risk characteristic.
Researcher and practitioners focusing on either RA or REA without a mutual consideration
of the assessment processes, face severe inefficiency and that may eventually result in
substandard building of resilient plan and strategy. Accordingly, this research suggests that
risk and resilience analyses are complementary and should be applied in an integrated
perspective. To fill the knowledge gaps this research develop a conceptual risk-based REA
framework which give a focus on UI system robustness dimension, which consist of several
quantitative methods, such as; Failure Mode Effect and Criticality Analysis, Fuzzy and Grey
theory, and Social Network Analysis. The methods account for uncertainty in the analysis
processes, including; people perceptions and judgments towards risk as well as the risks
interaction.
The risk impact characteristic and mechanism, such as; risk magnitude, risk causality and
interaction pattern, and the impact of the risks on the urban community, are processed
following the analysis model proposed. The risk criticality model is then presented as a core
element within UI system robustness capacity analysis developed in this research. The
ABSTRACT
Page iv
recovery analysis is, further, proposed towards enhancing the robustness capacity after
disturbances occurred within recovery function transition over time.
To validate and exemplify the reliability and applicability of the framework, this research
applied the framework using a water supply infrastructure system, in Surabaya-Indonesia,
as a main case study. A data collection strategy, rigorous quantification processes, output
analyses followed by comprehensive discussion and findings towards the framework
application in the case study is demonstrated in this dissertation. The result shows that
appropriate measurement of the risk criticality model is inevitably crucial towards obtaining
overall robustness and recovery assessment.
Importantly, the increasing value of robustness capacity of UI system is not only influenced
by the recovery scenarios applied, but also the complexity in which influenced by the time
dimensions, spatial dimensions and by interdependencies between different economic
sectors that are interested in the recovery process. The simulation illustrates the benefits of
implementing the right recovery action. This indicates that it is possible to arrive at an
‘optimal recovery strategy’ that would enable the system to bounce back quickly and
efficiently considering the figure-of-merit of interest.
This research has provided fundamental contributions to the body of knowledge and, to the
implication of the comprehensive risk and robustness assessment considering its value to
the built environment and dependent communities. The findings have shedded lights on the
understanding of dynamic risk propagation and underlying affect in both risk events and
dependent community. The framework and assessment techniques are not limited to the
case study alone but also in various types of civil infrastructure systems.
Keywords: Urban infrastructure; social network; impact mechanism; system resiliency;
robustness capacity; risk management.
DECLARATION
Page v
DECLARATION
This is to certify that:
➢ The dissertation comprises only my original work towards the Ph.D., except where
indicated in the Preface,
➢ Due acknowledgement has been made in the text to all other material used,
➢ The dissertation is fewer than 100.000 words in length, exclusive of Tables, Figures,
Bibliographies and Appendices.
Citra Satria Ongkowijoyo November 2017
ACKNOWLEDGEMENT
Page vii
ACKNOWLEDGEMENT
This dissertation could not have been completed without the great support that I have
received over the years from many exemplary people around me. I firstly wish to offer my
most heartfelt thanks to the almighty God. Without his blessing and gifts, it is impossible for
me to complete this extraordinarily education journey. Further, I also would like to express
my gratitude to the following people;
To University of Melbourne, thank you for the rare and special opportunity I could have for
pursuing Doctorate degree. Without both Melbourne International Fee Remission
Scholarship (MIFRS) and Melbourne International Research Scholarship (MIRS) scholarship
schemes, I realized it is impossible for me to do this course. Further, I also thank you for the
generous funds and opportunity so that I could go for presenting my research at the
international conferences across the world.
Particularly, I also thank the International Strategic Alliance for providing me the funding
and opportunity to participate the APRU Multi-Hazards Summer School in Tohoku University,
Sendai-Japan (2015) as a representative of The University of Melbourne.
To my research advisors, Dr Hemanta Kumar Doloi. Thank you for the advice, kindness,
support, patient, and willingness that allowed and guided me to pursue Doctorate degree
and research on topics for which I am truly passionate. I see the same drive and passion in
your own research efforts, and I thank you for letting me do the same. Thank you for all the
meetings and chats over the years. You recognized that I at times needed to work alone but
also made sure to check in on me so that I stayed on the right path.
To all of my advisory members, for whom I indebted; Associate Professor Alan March; Dr.
Toong-Khuan Chan; and Dr. Anna Hurlimann. I believe that this study is still far from perfect
yet thank you for all of your support and critical thought during my study. Without all of the
critical thoughts and suggestions, I believe this dissertation would not have been as good as
we wanted.
To Jane Trewin, Ceira Barr and all whom I cannot announce the name. As the department’s
graduate advisor and research ethic, you have been an ever presents beacon of support,
ACKNOWLEDGEMENT
Page viii
encouragement, and advice. Thank you for keeping your office door open and available for
all the times when I needed it.
To Associate Professor Chris Heywood, I am far more grateful for and appreciative of the
conversations we have had. Thank you.
To my Mom and Dad. You have encouraged my academic interests from day one, even when
my curiosity led to incidents that were kind of hard to explain. Thank you.
To both of my sisters, Indahwati and Fentje Laurensia, thank you the ongoing encouragement
over the years.
To my brother, Cendranata. While I have taken my own directions at times, I have always
appreciated the path that you have blazed before me. You may be the first doctor in our family,
but you are now no longer the only one.
To my lovely wife; Yuanita Gondorejo. From the day I even have not started and began this
graduate school, you have become one of my precious partners whom patiently wait for me
to go through whole of the Ph.D., processes. We have seen, supported each other and gone
through both good times and bad. You are a great partner and a rock of stability in my life.
Our relationship was strong before and I hope it will continue to be as strong in the future. I
will always remember the great conversations we had over time, and I know that we will
reach our dream together in further time.
To all of the graduate students who did or are doing assistive technology and creativity work.
In the last several years, I have seen a large and active assistive literature and technology
research group come into being at the university. Thank you for the community and the
conversations. Continue doing the great work both at University of Melbourne and wherever
you go in life.
To my study participants. While I have said the same for others in this list, it is literally true
that this dissertation could not have been completed without your participation. Thank you.
To anyone that may I have forgotten. I apologize. Thank you as well.
LIST OF FIGURES
Page ix
TABLE OF CONTENTS
ABSTRACT ........................................................................................................................................ III
DECLARATION .................................................................................................................................. V
ACKNOWLEDGEMENT .................................................................................................................. VII
TABLE OF CONTENTS ..................................................................................................................... IX
LIST OF FIGURES ........................................................................................................................... XV
LIST OF TABLES ......................................................................................................................... XVIII
LIST OF PUBLICATIONS .............................................................................................................. XXI
LIST OF ABBREVIATIONS ........................................................................................................ XXIII
NOMENCLATURES ....................................................................................................................... XXV
CHAPTER 1 INTRODUCTION ......................................................................................................... 1
1.1 Introduction ................................................................................................................................................... 1
1.2 Research Background and Motivation .............................................................................................. 1
1.3 Rationale of the Research ........................................................................................................................ 2
1.4 Research Questions .................................................................................................................................... 5
1.5 Research Aim and Objectives ................................................................................................................ 6
1.6 Synopsis of the Research Design, Methodology and Sources of Data ................................ 7
1.7 Research Scope and Boundaries .......................................................................................................... 8
1.8 Significance of the Research................................................................................................................... 9
1.9 Dissertation Structure............................................................................................................................... 9
1.10 Chapter Summary...................................................................................................................................12
CHAPTER 2 URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY .......................... 13
2.1 Introduction .................................................................................................................................................13
2.2 Understanding Urban Infrastructure ..............................................................................................13
2.2.1 The Nature of Urban Infrastructure.....................................................................................15
2.2.2 Urban Infrastructure System Roles ......................................................................................18
2.2.3 The Urban Infrastructure Relationship with Urban Community...........................20
2.3 Vulnerable Urban Infrastructure System and its’ Impact towards Disruptions .........23
2.4 Resilient Urban Infrastructure System towards Disturbances ...........................................24
2.4.1 Definitions and Formulations .................................................................................................29
2.4.2 The Four Properties of Resilience .........................................................................................30
LIST OF FIGURES
Page x
2.5 Chapter Summary .............................................................................................................................................. 31
CHAPTER 3 RISK ANALYSIS AND RESILIENCE RELATIONSHIP ERROR! BOOKMARK NOT
DEFINED.
3.1 Introduction ................................................................................................................................................ 33
3.2 Understanding Risk Concept in Urban Infrastructure System Context .......................... 33
3.3 Risk Characteristic and its’ Impact Mechanism ......................................................................... 35
3.3.1 The Magnitude of Risk (Risk Priority Level) ................................................................... 35
3.3.2 Risk Impact Connection and Interaction Pattern ......................................................... 37
3.3.3 Risk Causality, Ripple Impact and Propagation Pattern ............................................ 40
3.3.4 Social Amplification of Risk ..................................................................................................... 42
3.4 Risk Analysis and Approaches Review ........................................................................................... 47
3.4.1 Shortage of Conventional Risk Analysis Method........................................................... 50
3.4.2 Knowledge Gaps on The RA Model towards Risk Impact to Community .......... 52
3.4.3 Knowledge Gaps on Risk Causality and Interaction Pattern Analysis Model .. 55
3.4.4 The Logic for Developing Critical RA Model.................................................................... 57
3.5 Risk and Resilience (Analysis) Relationship ............................................................................... 60
3.6 The Resilience Analysis Model Review and Evaluation ......................................................... 64
3.7 Chapter Summary ..................................................................................................................................... 65
CHAPTER 4 RESEARCH DESIGN AND METHODOLOGY ........................................................ 67
4.1 Introduction ................................................................................................................................................ 67
4.2 Research Design ........................................................................................................................................ 68
4.3 Employing Mixed Method Approach ............................................................................................... 71
4.3.1 Mixed Method Design Classification ................................................................................... 72
4.3.2 External Validity ........................................................................................................................... 73
4.4 Case Study Approach .............................................................................................................................. 75
4.5 Research Ethics and Conduct .............................................................................................................. 77
4.6 Approaches and Strategies to Data Collection ............................................................................ 78
4.6.1 Plain Language Statement (Cover Letter) ........................................................................ 78
4.6.2 Confidentiality and Anonymity of Participants ............................................................. 80
4.6.3 Questionnaire and Interviews Design Arrangement .................................................. 81
4.6.4 A Pilot Study ................................................................................................................................... 83
4.6.5 Public Verification and Systematic Observation ........................................................... 83
4.7 Population Arrangement and Sampling Methods ..................................................................... 84
4.7.1 Sampling Strategy Applied ...................................................................................................... 85
TABLE OF CONTENTS
Page xi
4.7.2 Judgmental or Purposive Sampling ......................................................................................86
4.7.3 Convenience and Snowball Sampling..................................................................................86
4.7.4 Survey Participants ......................................................................................................................87
4.8 The Time Dimension Design ................................................................................................................88
4.9 Empirical Analysis Methods and Techniques Applied ............................................................89
4.9.1 Failure Mode Effect and Criticality Analysis Method ...................................................91
4.9.2 Fuzzy Theory ..................................................................................................................................94
4.9.3 Social Network Analysis ............................................................................................................97
4.9.3.1 One-mode and Two-mode (Affiliation) Network ........................................ 98
4.9.3.2 Building Network Structure and Visualization ............................................ 99
4.9.3.3 Network Topology Decipherment Measurements ..................................... 101
4.9.4 True Empirical Experiments (Computational Simulation).................................... 104
4.9.5 Quasi-Experimental Design .................................................................................................. 105
4.9.6 Assumptions of Science Applied......................................................................................... 106
4.10 Chapter Summary................................................................................................................................ 107
CHAPTER 5 CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS ............................... 109
5.1 Introduction .............................................................................................................................................. 109
5.2 Conceptual Framework Development ......................................................................................... 109
5.3 The Preliminary Phase......................................................................................................................... 111
5.3.1 Establishing the Context ......................................................................................................... 111
5.3.2 Determine Risk Measurement and Input Data Process........................................... 113
5.3.3 Initial Data Processing............................................................................................................. 114
5.4 Phase 1: Risk Magnitude Analysis .................................................................................................. 115
5.4.1 Determined Fuzzy Linguistic Rules................................................................................... 117
5.4.2 Risk Decision Matrix Development ................................................................................... 119
5.4.3 Defuzzification Process ........................................................................................................... 119
5.4.4 Defining Comparative, Standard and Different Series Matrix .............................. 120
5.4.5 Calculating Grey Relation Coefficient ............................................................................... 122
5.4.6 Degree of Relation Determination ..................................................................................... 123
5.5 Phase 2: Risk Causality and Interaction Pattern Analysis .................................................. 123
5.5.1 Stakeholder and Risk Event Identification .................................................................... 125
5.5.2 Collecting The Data from Community.............................................................................. 126
5.5.3 Preliminary Matrix Development ...................................................................................... 127
5.5.4 Produced Global Matrix with Weight Relation Link .................................................. 128
TABLE OF CONTENTS
Page xii
5.6 Phase 3: Risk Impact to Community Analysis .......................................................................... 130
5.6.1 Data Collection from The Community ............................................................................. 132
5.6.2 Developing Stakeholder-Risk Affiliation Matrix ......................................................... 132
5.7 Phase 4: Risk Criticality Analysis ................................................................................................... 135
5.8 Phase 5: System Robustness Analysis ......................................................................................... 136
5.8.1 System of Interest Definition ............................................................................................... 137
5.8.2 Figure-of-Merit or System Function ................................................................................. 138
5.8.3 Disruptive Event ........................................................................................................................ 139
5.8.4 Recovery System Action as a Function of Time .......................................................... 140
5.8.5 Main Shock Function Transition Model Development ............................................ 141
5.8.6 Main Stress Function Transition Model Development ............................................ 143
5.9 Phase 6: System Recovery Analysis .............................................................................................. 145
5.10 Assumptions Applied ........................................................................................................................ 149
5.11 Chapter Summary ............................................................................................................................... 149
CHAPTER 6 FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY ................ 151
6.1 Introduction ............................................................................................................................................. 151
6.2 Case Study Background ...................................................................................................................... 151
6.2.1 Indonesia UWS Infrastructure System and Regulation........................................... 152
6.2.2 Surabaya Water Supply Infrastructure System ........................................................... 154
6.3 Stakeholder Groups Identification ................................................................................................ 157
6.4 Risk Events Identification .................................................................................................................. 162
6.5 Data Collection Process and Respondent Profile ................................................................... 169
6.6 Chapter Summary .................................................................................................................................. 172
CHAPTER 7 DATA PROCESSING, SIMULATION AND ANALYSIS ....................................... 175
7.1 Introduction ............................................................................................................................................. 175
7.2 Initial Data Processing ........................................................................................................................ 176
7.3 Phase 1-Data Processing, Simulation and Analysis ............................................................... 177
7.4 Phase 2-Data Processing, Simulation and Analysis ............................................................... 180
7.5 Phase 3-Data Processing, Simulation and Analysis ............................................................... 191
7.6 Phase 4-Data Processing, Simulation and Analysis ............................................................... 199
7.7 Phase 5-Data Processing, Simulation and Analysis ............................................................... 202
7.7.1 Shock Impact Analysis Model and Simulation............................................................. 202
7.7.2 Shock and Stress Impact Analysis Model and Simulation ..................................... 208
7.7.3 Critical Risk-River Pollution and Contamination (R5) ............................................ 211
TABLE OF CONTENTS
Page xiii
7.8 Phase 6-Data Processing, Simulation and Analysis ............................................................... 213
7.8.1 What is Included within The Recovery Scenarios ...................................................... 213
7.8.2 Recovery Analysis towards Enhancing Robustness Capacity ............................... 213
7.9 Chapter Summary .................................................................................................................................. 219
CHAPTER 8 FINDINGS AND DISCUSSION ............................................................................... 221
8.1 Introduction .............................................................................................................................................. 221
8.2 Review of the Previous Chapters .................................................................................................... 221
8.3 Discussion and Findings towards Preliminary Risk Analyses .......................................... 223
8.4 Joint Risk Analysis: The Analysis of Critical Risk .................................................................... 227
8.5 Robustness and Recovery Model Analysis Discussion and Findings ............................ 229
8.6 Summary of Findings............................................................................................................................ 231
8.7 Chapter Summary .................................................................................................................................. 234
CHAPTER 9 SUMMARY AND CONCLUSION............................................................................ 237
9.1 Introduction .............................................................................................................................................. 237
9.2 Summary of Content ............................................................................................................................. 237
9.3 Chronological Development of Research Objectives and its Achievements .............. 240
9.4 Limitation of the Current Research ............................................................................................... 245
9.5 Recommendations for Further Work ........................................................................................... 248
9.6 Implication of the Research............................................................................................................... 252
9.6.1 Theoretical Implications ........................................................................................................ 253
9.6.2 Practical Implications .............................................................................................................. 255
9.7 Closure ......................................................................................................................................................... 258
BIBLIOGRAPHY ............................................................................................................................ 261
APPENDIX A .................................................................................................................................. 283
APPENDIX B .................................................................................................................................. 289
APPENDIX C .................................................................................................................................. 317
APPENDIX D .................................................................................................................................. 331
LIST OF FIGURES
Page xv
LIST OF FIGURES
Figure 2-1. The downstream system between infrastructure users and consumers (Source:
Frischmann, B. M. [19]). ................................................................................................................... 19
Figure 2-2. The interrelationship basic model of UI systems with the community. ................. 22
Figure 2-3. The basic notion of hazard and risk impact. ........................................................................ 24
Figure 2-4. Four main properties of resilience. .......................................................................................... 26
Figure 2-5. Performance response curve of a system on a disruptive event. (Source:
Ouyang, M., L. Duen as-Osorio, and X. Min [69]). ................................................................... 28
Figure 3-1. Example of risk likelihood and severity in a risk matrix. (Source: Komendantova,
N., et al. [84]).......................................................................................................................................... 36
Figure 3-2. An example of interconnected risk map in electricity infrastructure. (Source:
Correa-Henao, G. J., J. M. Yusta, and R. Lacal-Ara ntegui [80]). ........................................ 38
Figure 3-3. A propagation pattern of the domino effect. (Source: Khakzad, N., et al., [91]). 41
Figure 3-4. The conceptual framework of social amplification of risk. (Source Kasperson, R.
E., et al. and Kasperson, J. X., et al. [81, 82]). ........................................................................... 43
Figure 3-5. The conceptual model of risk and its impact in UIs context. ....................................... 45
Figure 3-6. The standard framework of RA. (Source: ISO/IEC, ISO/IEC FDIS 31010:2009,
[99]). .......................................................................................................................................................... 48
Figure 3-7. Risk analysis correlation with UI system robustness. ..................................................... 62
Figure 3-8. Assessing critical risk in further potential uncertain condition. ............................... 63
Figure 4-1. The research design framework. ............................................................................................... 70
Figure 4-2. Trapezoidal Fuzzy set of number A . (Source: Figure from: Silva, M.M., et al.
[161])......................................................................................................................................................... 96
Figure 4-3. (a) An example of one-mode network and (b) Two-mode network. ....................... 99
Figure 4-4. (a) Non-directional and (b) Directional relationship tie. (Source Park, H., et al.
[184]).......................................................................................................................................................100
Figure 4-5. (a) Non-directional and (b) directional matrix structure. ..........................................100
Figure 5-1. Empirical framework development. ......................................................................................110
Figure 5-2. Flowchart of Fuzzy-based FMECA. .........................................................................................116
Figure 5-3. Trapezoidal Fuzzy membership of the traditional rating for O, S and D. .............118
Figure 5-4. Trapezoidal Fuzzy membership of the linguistic term moderate. ..........................119
Figure 5-5. Risk causality and interaction pattern analysis model flowchart. ..........................125
Figure 5-6. Risk impact to community analysis model flowchart. ..................................................131
Figure 5-7. Robustness analysis conceptual model flowchart. .........................................................137
LIST OF FIGURES
Page xvi
Figure 5-8. Delivery function transition in resilience. .......................................................................... 138
Figure 5-9. Main shock function transition over time. ......................................................................... 142
Figure 5-10. Main stress function transition over time. ...................................................................... 144
Figure 5-11. Recovery function transition over time. ........................................................................... 146
Figure 6-1. General UWS infrastructure system in Indonesia. ......................................................... 153
Figure 6-2. Surabaya city position in Indonesia. ..................................................................................... 155
Figure 6-3. Brantas river basin map and the split streams of Brantas river. ............................. 156
Figure 6-4. The supply chain of Surabaya water supply and its’ stakeholder groups. .......... 159
Figure 6-5. The conceptual model of UWS system risks affecting community. ........................ 163
Figure 6-6. Identified risk events for Surabaya water supply infrastructure system. ........... 164
Figure 6-16. Total respondents from eight stakeholder groups. ..................................................... 170
Figure 7-1. Risk causality and interaction pattern network topology based on DC. ............. 185
Figure 7-2. Risk causality and interaction concentric map based on DC. ................................... 185
Figure 7-3. Risk causality and interaction pattern network topology based on BC. .............. 186
Figure 7-4. Risk causality and interaction concentric map based on BC. .................................... 187
Figure 7-5. Risk causality and interaction pattern network topology based on CC. .............. 187
Figure 7-6. Risk causality and interaction concentric map based on CC. .................................... 188
Figure 7-7. Risk causality and interaction pattern network topology based on EC. .............. 188
Figure 7-8. Risk causality and interaction concentric map based on EC. .................................... 189
Figure 7-9. Risk causality and interaction pattern network topology based on SC. .............. 190
Figure 7-10. Risk causality and interaction concentric map based on SC. ................................. 190
Figure 7-11. Risk impact to community network visualization based on DEG. ....................... 193
Figure 7-12. Risk impact to community network visualization based on DC. .......................... 193
Figure 7-13. Risk impact to community concentric map based on DC. ........................................ 194
Figure 7-14. Risk impact to community network visualization based on BC............................ 194
Figure 7-15. Risk impact to community concentric map based on BC. ........................................ 195
Figure 7-16. Risk impact to community network visualization based on CC. ........................... 195
Figure 7-17. Risk impact to community concentric map based on CC. ........................................ 197
Figure 7-18. Risk impact to community concentric map based on EC. ........................................ 198
Figure 7-19. Risk causality and interaction network based on DC, BC, CC, EC and SC. ........ 203
Figure 7-20. Risk causality and interaction concentric map based on DC, BC, CC and EC. . 204
Figure 7-21. Risk causality and interaction concentric map based on SC. ................................. 204
Figure 7-22. Risk impact to community network based on DEG, DC, BC, CC and EC. ............ 205
Figure 7-23. Risk impact to community concentric map based on DEG, DC, BC, and CC. ... 205
LIST OF FIGURES
Page xvii
Figure 7-24. Risk impact to community concentric map based on EC. .........................................206
Figure 7-25. The UI system robustness capacity towards R5 effect over period of time. ....209
Figure 7-26. River pollution in Surabaya caused by the industry wastage. ................................212
Figure 7-26. Resilience analysis for pollution and contamination risk (R5)..............................215
Figure A-1. Fieldwork fund grant letter. .......................................................................................................285
Figure A-2. Application letter (in Bahasa). .................................................................................................286
Figure A-3. The PLS (in English) used in the fieldwork. .......................................................................287
Figure A-4. The PLS (in Bahasa) used in the fieldwork. .......................................................................288
Figure C-1. Gunung Sari Floodgate (front) managed by Jasa Tirta-I public corporation.
(Source: http://kodim0832.blogdetik.com/2016/10/11/pantauan-babinsa-
karah-pintu-air-rolak-gunung-sari-status-aman)..............................................................319
Figure C-2. Gunung Sari Floodgate (back) managed by Jasa Tirta-I public corporation.
(Source: http://travpacker.blogspot.com.au/2015/05/bangunan-sejarah-
bendungan-rolak-songo.html). ...................................................................................................319
Figure C-3. Physical UWS infrastructure system managed by PDAM. ...........................................319
Figure C-4. Water treatment plant owned and operated by PDAM. (Source:
http://kelanakota.suarasurabaya.net/news/2014/144689-250-Ribu-Pelanggan-
PDAM-Surabaya-Tak-Dapat-Pasokan-Air). ............................................................................320
Figure C-5. Trans-logistic business in Surabaya, a business which need UWS service.
(Source: https://thestoryofwardana.files.wordpress.com/2013/05/guariglia-
cityscape-urban-city-architectural-9.jpg). .............................................................................320
Figure C-6. Activity of beverage plant which need a non-stop UWS service. (Source:
https://coca-colaamatil.co.id/cctour). ....................................................................................320
Figure C-7. Surabaya water supply is definitely required for bottled water industry. (Source:
http://www.harianterbit.com/hanterhumaniora/read/2017/05/08/81009/0/4
0/KPPU-Diminta-Netral-dalam-Menyikapi-Kasus-AMDK#). .......................................321
Figure C-8. Plaza as both commercial and public space which need water supply. (Source:
https://www.gotomalls.com/blog/2016/11/10-mall-terbaik-di-surabaya/). ...321
Figure C-9. An open space in Surabaya equipped with ready-to-drink water facilities.
(Source: https://www.flickr.com/photos/eastjava/4874286030). .........................321
LIST OF TABLES
Page xviii
LIST OF TABLES
Table 2-1. The four properties of resilience and its definition. ........................................................... 30
Table 3-1. Conventional RA drawbacks summary. .................................................................................... 52
Table 4-1. Factors affecting external validity. ............................... Error! Bookmark not defined.
Table 4-2. The general network topology indicator applied. ............................................................ 102
Table 5-1. The example of participants list with its identity. ............................................................ 115
Table 5-2. The example of risk events list with its identity. ............................................................... 115
Table 5-3. Traditional ratings for occurrence (O). .................................................................................. 117
Table 5-4. Traditional ratings and TFN for severity (S). ...................................................................... 118
Table 5-5. Traditional ratings and TFN for detectability (D). ............................................................ 118
Table 5-6. Example of comparative series. ................................................................................................. 121
Table 5-7. Example of Grey relation coefficient. ...................................................................................... 122
Table 5-8. Grey relation coefficient and degree of Grey relation information. ......................... 123
Table 5-9. The network indicator in the context of risk causality and its interaction. ......... 129
Table 5-10. The network indicator in the context of risk affecting community. ...................... 134
Table 6-1. Summarized stakeholder groups. ............................................................................................. 160
Table 6-2. Determined risk events and the description. ...................................................................... 165
Table 6-3. Respondents number. ..................................................................................................................... 171
Table 6-4. Respondents demographic data based on the age group. ............................................ 171
Table 6-5. Respondents demographic data based on the education level. ................................. 171
Table 6-6 Respondents demographic data based on working experience. ................................ 171
Table 7-1. Variables and mathematical symbols adopted. ................................................................. 176
Table 7-2. The risk magnitude output based on local and global analysis. ................................ 177
Table 7-3. R-R network topology decipherment simulation output .............................................. 183
Table 7-4. Risk magnitude and normalized S-R network topology decipherment. ................ 192
Table 7-5. Risk magnitude and risk criticality simulation outputs. ............................................... 200
Table 7-6. Shock impact and network topology simulation output. .............................................. 207
Table 7-7. System robustness capacity level simulation output. ..................................................... 208
Table 7-8. System-of-interest F t( ) facing R5 simulation output. ..................................................... 216
Table B-1. R-R matrix with global interrelationship value ................................................................. 310
Table B-2. Dichotomized R-R matrix ............................................................................................................. 311
Table B-3. S-R matrix from input data (1). ................................................................................................. 312
Table B-4. S-R matrix from input data (2). ................................................................................................. 313
Table B-5. S-R matrix from input data (3). ................................................................................................. 314
LIST OF TABLES
Page xix
Table B-5. S-R matrix from input data (4). ..................................................................................................315
Table B-7. S-R matrix from input data (4). ..................................................................................................316
Table C-1. Scenario-1 for simulation-based recovery strategy .........................................................322
Table C-2. Scenario-2 for simulation-based recovery strategy .........................................................323
Table C-3. Scenario-3 for simulation-based recovery strategy .........................................................324
Table C-4. Scenario-4 for simulation-based recovery strategy .........................................................325
Table C-5. Scenario-5 for simulation-based recovery strategy .........................................................326
Table C-6. Shock impact simulation output. ...............................................................................................327
Table C-7. Stress impact simulation output. ..............................................................................................327
Table C-8. Expected recovery simulation output. ....................................................................................328
Table C-9. Scenario-1 recovery simulation output. ................................................................................328
Table C-10. Scenario-2 recovery simulation output. ..............................................................................329
Table C-11. Scenario-3 recovery simulation output. ..............................................................................329
Table C-12. Scenario-4 recovery simulation output. ..............................................................................330
Table C-13. Scenario-5 recovery simulation output. ............................................................................. 330
LIST OF PUBLICATIONS
Page xxi
LIST OF PUBLICATIONS
The following papers were produced to disseminate some results from the work undertaken
by the author during the period of this research.
International Journal Papers
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, Risk Criticality-based Resilient
Assessment Model for Urban Infrastructure System: With a Focus on Restoration
Modeling and Analysis, International Journal of Reliability Engineering and System
Safety. (Under Review)
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, Participatory-based Urban
Infrastructure System Risk Causality and Interaction Pattern Analysis using Social
Network Analysis, International Journal of Reliability Engineering and System
Safety. (Under Review)
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, A Network-based Risk Analysis Model
for Assessing Urban Infrastructure Risk Impact to Community, Built Environment
Project and Asset Management. (Under Review)
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Determining Critical Infrastructure
Risks using Social Network Analysis, International Journal of Disaster Resilience in
The Built Environment. (Published)
Conference Papers
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Risk-based Resilience Assessment
Model Focusing on Urban Infrastructure System Restoration, Procedia Engineering
for 7th International Conference on Building Resilience 2017 (ICBR-2017), 27-29
November, Bangkok-Thailand.
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Understanding of Impact and
Propagation of Risk based on Social Network Analysis, Procedia Engineering for 7th
International Conference on Building Resilience 2017 (ICBR-2017), 27-29
November, Bangkok-Thailand.
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Setting the Priority of Risks To
Community based on Social Network Analysis, 6th International Conference on
Building Resilience (ICBR-2016) 2016, 7-9 September, Auckland-New Zealand.
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Analyzing Community Hazard in
LIST OF PUBLICATIONS
Page xxii
Urban Infrastructure System, 6th International Conference on Building Resilience
2016 (ICBR-2016), 7-9 September, Auckland-New Zealand.
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Analyzing The Risk Criticality of
Infrastructure System on The Community, American Society in Civil Engineering
(ASCE) for Construction Research Congress 2016 (CRC-2016), 31 May-2 June, San
Juan-Puerto Rico.
LIST OF ABBREVIATIONS
Page xxiii
LIST OF ABBREVIATIONS
BC Betweenness Centrality
BIM Building Information Modelling
BN Bayesian Network
BUMD Badan Usaha Milik Daerah
BUMN Badan Usaha Milik Negara
CC Closeness Centrality
CI Critical Infrastructure
CIP Critical Infrastructure Protection
DAS Daerah Aliran Sungai
DC Degree Centrality
DEA Domino Effect Analysis
DEDE Dust Explosion Domino Effect
DEG Degree
DMs Decision Makers
FDIS Final Draft International Standard
FMECA Failure Mode Effect and Criticality Analysis
EC Eigenvector Centrality
ERM Enterprise Risk Management
GRM Global Risk Matrix
HazId Hazard Identification
HAZOP Hazard and Operability
HEAG Human Ethics Advisory Group
HREC Human Research Ethics Committee
IFIs Infrastructure Failure Interdependencies
IKM Indeks Kepuasan Masyarakat
IRB Institutional Research Board
LTS Large Technical System
MCS Monte Carlo Simulation
MGSE Melbourne Graduate School of Education
PDAM Perusahaan Daerah Air Minum
PLS Plain Language Statement
PU Pekerjaan Umum
LIST OF ABBREVIATIONS
Page xxiv
QRA Quantitative Risk analysis
RA Risk Analysis
RAI Research Aim
REA Resilience Analysis
RO Research Objective
RPN Risk Priority Number
RPV Risk Priority Value
RQ Research Question
SAR Social Amplification of Risk
SC Status Centrality
SNA Social Network Analysis
SOI System-of-Interest
SPM Standar Pelayanan Minimal
SPP Standar Pelayanan Publik
SRA Society of Risk Analysis
TFN Trapezoidal Fuzzy Number
UWS Urban Water Supply
UI Urban Infrastructure
WCDR World Conference on Disaster Reduction
WTP Water Treatment Plant
WEF World Economic Forum
NOMENCLATURES
Page xxv
NOMENCLATURES
O Risk occurrence (likelihood)
S Risk severity
D Risk detectability
( )n kR Risk decision factor of risk n
( )F r Risk decision factor defuzzification
Relative defuzzification value identifier
( )Ar Trapezoidal Fuzzy Number membership function
( ),n i jr r The degree of relation between potential causes and optimum decision factor
( )nn R Risk Priority Value (RPV)
R-R Risk causality and interaction matrix
nmR An interaction between risk event n and risk event m
Risk event interaction capacity value
Risk event interaction capacity value coefficient
[R-R]
DC ( )nR Degree centrality of network topology from R-R analysis
[R-R]
BC ( )nR Betweenness centrality of network topology from R-R analysis
[R-R]
CC ( )nR Closeness centrality of network topology from R-R analysis
[R-R]
EC ( )nR Eigenvector centrality of network topology from R-R analysis
[R-R]
SC ( )nR Status centrality of network topology from R-R analysis
S-R Stakeholder-risk associated matrix
K The logic matrix (or relation/disjoint) of the S-R network
* #
g
i nS R S R Stakeholder-associated risk
[S-R]
DC ( )nR Degree centrality of network topology from S-R analysis
[S-R]
BC ( )nR Betweenness centrality of network topology from S-R analysis
[S-R]
CC ( )nR Closeness centrality of network topology from S-R analysis
[S-R]
EC ( )nR Eigenvector centrality of network topology from S-R analysis
B Boolean domain
LIST OF ABBREVIATIONS
Page xxvi
( )A
f x Membership function of a Fuzzy set
( )A
f v Degree of preference in favor
( )Ax Trapezoidal Fuzzy Number membership function
( )n
R Critical risk event n (stress event)
0S Original state of system-of-interest
dS Disrupted state of system-of-interest
fS Recovered state of system-of-interest
het Disruptive event time
hdt Initial set of recovery action started (slack time start)
t Initial substantive recovery action time
ft Time that system-of-interest recovered
( )F • Figure-of-merit (FOM) for specific system-of-interest state
( )G • Decreasing state value
S State value
0( )F t Delivery function value of the system corresponding to state 0S
( )he
F t Delivery function value of the system corresponding to state dS at time het
E Set of all disruptive events
( )n
R Shock impact from risk event n
( )n
R Normalized stress impact value
ROB.( )
nF R Robustness level of the system withstanding towards risk event n impact
I Random variable expressed as function of the mean
Lm Mean of the random variable function
I Standard deviation of the random variable I
a Multiplier of the standard deviation corresponding to a specific level of losses
CHAPTER 1-INTRODUCTION
Page 1
CHAPTER 1
INTRODUCTION
CHAPTER HEADINGS Introduction Research Background and Motivation Rationale of the Research Research Aim and Objectives Research Questions Synopsis of the Research Design, Methodology and Sources of Data Research Scope and Boundaries Significance of the Research Dissertation Structure Chapter Summary
1.1 Introduction
This Chapter provides a brief motivation of the research through introducing the research
background and highlighting the rationale of the research. Based on the research problem,
the aim of the research followed by research objectives and several key questions are
established. The Chapter continues to describe the synopsis of research design, methodology
and sources of data, research scopes and boundaries, and research significance. This Chapter
then discusses the research methodology that comprises mathematical algebraic and
modeling methods. The dissertation structure and brief description of the first Chapter are
presented and summarized in the last part of this Chapter.
1.2 Research Background and Motivation
On our rapidly urbanizing planet, everyday life of the world’s swelling population of
urbanities is increasingly sustained by vast and unknowably complex system of urban
infrastructure (UI) and technology stretched across demographic space. The UI system are
interdependent, spatially diverse, vast and complex which are made of many interacting
components assembled by design to provide optimal performance, reliable operation and
functional. Within our built environment, UI plays a crucial role, not only as the backbone of
socio-economic development but also community wellbeing.
The UI system fundamentally underpins the ceaseless and mobile process of city life
in a myriad of ways. While UI system provides the fundamental background to modern urban
everyday life, however its’ system often hidden, assumed, even naturalized. The continuous
reliance of urban dwellers on huge and complex systems of UI stretched across geography
CHAPTER 1-INTRODUCTION
Page 2
creates its inevitable vulnerabilities. Therefore, when UI services are taken for granted,
paradoxically, it is often the moment when the disruption occurs, the dependence of cities on
UI networks become more visible.
On the practical side of the issue, as a matter of fact, UI are witnessing more and more
system-level breakdowns, which emerge from small perturbations that cascade to large-
scale consequences. In UI sectors, the hazardous events can potentially exert significant
failure on the functionality of one infrastructure and another, which finally affecting
community wellbeing. Despite suffering significant traumatic conditions of extreme
deprivation, serious threat and major stress, UI system manage to endure and recover fully.
This unique ability has been called ‘resilience’, a term taken from the physics of materials.
Recently, it emerges as a new concept towards the capacity to recover from extremes
of trauma and stress. Accordingly, resilience reflects a dynamic confluence of factors that
promotes positive adaptation despite exposure to adverse life experience [1]. Therefore, it
is not surprising that UI protection and resilience have become a national and international
priority which calls for the analysis of UI vulnerability and the evaluation of their resilient
properties, for ensuring their protection and resilience [2, 3].
As a result, there is a significant need to measure, monitor and maintain the reliability
and potential vulnerabilities of UI system. In any study of both UI and community resilience,
risk and vulnerability assessment of great importance plays a crucial role. The assessment
stands as the basis of building an effective response strategy for the preparedness, response
and further fostering the recovery period of the infrastructure in both pre-and post-extreme
event period, assuring the UI serviceability towards a disturbance. Therefore, managing risks
for UI system is inevitably important step towards ensuring its continue serviceability for
supporting both the UI systems and the whole community.
From this, research is required to gain a comprehensive understanding in the issues
of urban UI complexity and inherent risk including its impact nature. Considering the UI
system’s complexity, which are supported by various aspect, such as; physical-engineering,
cybernetic or organizational, and by environment (demographical, natural) and operational
context (political/ legal/ institutional, and economic) [4], the discussion towards UI system
facing the disturbance during its service life leads to the requirement of an integrated and
unified assessment model of UI system resilience [5, 6].
1.3 Rationale of the Research
The built environment such as UI system provides the essential physical basis for modern
CHAPTER 1-INTRODUCTION
Page 3
societies and have multi-dimensional impact on public safety and economic prosperity at
regional and national levels. Past experiences have shown that such systems are exposed to
various natural and manmade hazards. The resulting damage to the systems may cause
human causalities and disrupt the normal day-to-day life of people in the short run. This
damage may also impose significant direct and secondary economic losses due to business
interruption that may not ever fully recover [7].
With extensive globalization and connectivity, the effects of natural and manmade
disasters (intentional and unintentional) may no longer be restricted to any demographic or
political vicinity. Severe disruptions are also becoming more unpredictable, more frequent
and more damaging. When a disaster strikes particular UI systems, the affected community
requires immediate help and action to survive, resources, and efforts to recover in a short
time. Accordingly, the concepts of ‘risk management’ have become keywords when dealing
with hazardous events.
Understanding the nature and reducing the level of risk impact pertaining to an UI in
general is a major task in infrastructure risk management. Moreover, the UI systems are faced
with continuously changing operating environments due to dynamics of external as well as
internal variables. As this happens the nature of disturbance events (hazards) also takes a
variety of forms calling for more rigorous continuous and holistic analysis of risk
management practice [8]. One way to mitigate and prepare the UI system facing the
disturbances is by building-in reserve capacity that may be exploited when the system is in
need.
Meanwhile, the community needs to be ‘prepared’ and less ”vulnerable”, in order to
achieve a high ‘resilience’ [9]. Unlike, risk analysis (RA), the resilience approach
acknowledges the dynamic nature of complex systems and postulates the ability of the
system to flexibly accommodate potential disturbances effects without irreversible or
unacceptable declines in performance, structure and function. Preparing for these adverse
events as if they are inevitable requires regular evaluation of operational procedures, safety
procedures and policy guidelines, RA methods, and counter measures, which are the key
aspects in resilience analysis (REA).
Resilience is an integrated concept that allows multiple risks, shocks and stresses and
their impacts on ecosystem and community at large. Resilience also refers to the drivers of
change that influence systems in the transformation processes. It focuses attention on a set
of institutional, community and individual capacities and particularly on learning, innovation
and adaptation. Strengthening resilience can be associated with windows of opportunities
CHAPTER 1-INTRODUCTION
Page 4
for change, often opening after disturbance.
The concept of resilience may underpin organizational philosophy changes that is
required to manage risks from a holistic picture, ensure safety and efficiency throughout the
life cycle of the system [8]. Importantly, an alternative approach to resilience is to start from
the basis of effective risk management, recognizing the inherent similarities between risk
and resilience as organizing frames and the extent to which RA and risk management provide
a window on resilience.
In addition, an UI system that is effective in managing risk is likely to become more
resilient to shocks and stresses event, though the exact relationship needs to be tested
empirically. Managing risk in this context means reducing risk, transferring and sharing risk,
preparing for impact and responding and recovering efficiently. It also involves being
prepared for surprises-those disturbance events beyond the lived experience or occurring
very infrequently. Thus, there is a need to go beyond the intuitive definition and provide a
comprehensive quantitative of system.
Therefore, there is an urgent need to develop a novel REA model particularly
departing from a concept of uncertainty, dynamic and complex UI system risk characteristic
and environment. This research aims to develop a risk-based REA conceptual framework for
assessing, measuring and evaluating the UI system robustness capacity. The model retaining
to use of risk criticality model for expressing the dynamic and complex risk characteristics
about highly uncertain, unforeseeable and unknowable behavior in UI environment as well
as the adventitious people perceptions towards risk and UI security.
The REA is distinguished from RA in several ways. Principally, conventional RA
methods are used to determine the negative consequences of potential undesired events, and
to mitigate the organization’s exposure to those undesirable outcomes. Further, risk as a
measure of potential loss of any type and is associated with the uncertainty about and
severity of the consequences of a disruptive activity [10]. In contrast, resilience is an
endowed or enriched property of a system that is capable of effectively combating (absorbing,
adapting to or rapidly recovery from) disruptive events.
The resilience approach emphasizes an assessment of the system’s ability to; (i)
Anticipate and absorb potential disruptions; (ii) Develop adaptive means to accommodate
changes within or around the system; and (iii) Establish response behaviors aimed at either
building the capacity to withstand the disruption or recover as quickly as possible after an
impact. Meanwhile, resilience could be viewed as the “intrinsic capacity of a system,
community or society predisposed to a shock and, or stress event to adapt and survive by
CHAPTER 1-INTRODUCTION
Page 5
changing its non-essential attributes and rebuilding itself”.
Furthermore, emphasizing the concept of UI system resilience means to focus on the
quality of life of the community at risk and to develop opportunities to enhance a better
outcome. The challenge, notwithstanding, lies in comprehensively integrating quantitatively
REA with RA beyond conventional mechanism for endowing a system with necessary
capabilities to cope with disturbance events.
Interestingly, risk and resilience approaches share four key characteristic; (i) They
provide an holistic framework for assessing systems and their interaction, from the
household and communities through to the sub-national and national level, (ii) They
emphasize capacities to manage hazards or disturbances, (iii) They help to explore options
for dealing with uncertainty, surprises and changes, (iv) They focus on being proactive [11].
While resilience clearly has attractions as a unifying concept and as a vision with
political currency in uncertain times, achieving positive outcomes will require policy makers
and practitioners to fall back on more familiar concepts with which they have practical
experience. Risk and risk management provide this familiarity and, similarly, allow a cross-
disciplinary, cross-issue discussion.
From the discussion above, it is ascertained that RA plays pivotal roles as the
foundation of REA. However, previous REA processes lack of considering the risk analysis)
dimension. Accordingly, this issue prevents the development of a metric to measure
resilience in a generic and consistent manner. Such a risk metric would greatly enable
development of resilient systems, comparison of resilience strategies and support of
resilience related decisions during design and operation.
1.4 Research Questions
The study of UI in the face of disturbance and its effect to the community and resilient level
received high attention in the academia and industry recently. Particularly, robust REA
output lies in the comprehensive RA. Accordingly, various RA methods have been proposed
in the past either by using empirical data or, qualitative or quantitative assessment, in a way
of deterministic, stochastic or dynamic method. Nonetheless, in many conventional RA
methods development, the focus is usually in quantitative analysis, evaluation of the risks
and that to single event environment.
Meanwhile, knowing the inherent hazard in UI system and its resilience context, the
ability of particular UI system to withstand the disturbance (risk event) and maintain its
serviceability level is called as ‘robustness’. Accordingly, the robustness analysis in the UI
CHAPTER 1-INTRODUCTION
Page 6
system, importantly refers to the REA which is considering RA as its’ pivotal element. In
addition, it is acknowledged that conventional RA methods mostly underestimated the
existence of risk nature, characteristic and impact mechanisms as well as the stakeholder
engagements towards assessment processes.
Therefore, it misleads the REA output which yields on ineffectiveness on the resilience
plan and strategy building. In the light of these knowledge gaps, there’s a need to develop a
novel conceptual framework which capable to model and analyze the UI system resiliency in
the face of risk nature, characteristic, impact mechanism complexity and dependent relations
with the community. Correspondingly, this research raised several questions (RQs) which
stated below:
RQ1: What the risk characteristic and impact mechanism that are significant in defining the
critical risk?
RQ2: How to conceptually model the variables and functions, and empirically quantify the
critical risk based on the risk characteristic and impact mechanism?
RQ3: How to empirically derive the risk-criticality analysis model into system-of-interest
robustness analysis as a function of time?
RQ4: How the system-of-interest robustness capacity against particular risk can be
empirically assessed and enhanced over post-disturbance period?
1.5 Research Aim and Objectives
It is acknowledged that both RA and REA have an intricate connection. The issue of risk being
connected to resilience is receiving relative high attention in both academia and industry
recently especially in its concept of system resiliency. Based on research background,
rationale and questions raised in previous section, the overarching aim of this research (RAI)
is:
RAI: To develop a conceptual risk-based resilience assessment framework which focuses on
urban infrastructure system robustness dimension.
To achieve RAI above, this research formulates several research objectives (ROs), as
follows:
CHAPTER 1-INTRODUCTION
Page 7
RO1: To determine the risk characteristics and impact mechanisms based on literatures.
RO2: To explore risk analysis methods literature and evaluate its shortages in UI context.
RO3: To identify and develop risk function and analysis model respectively towards
measuring the critical risk upon its’ impact mechanisms.
RO4: To establish system-of-interest robustness analysis model as a function of time
RO5: To develop system-of-interest recovery analysis model.
RO6: To undertake a case study investigation to test the applicability and validate the
conceptual assessment model.
1.6 Synopsis of the Research Design, Methodology and Sources of Data
This dissertation follows a research design with an in-depth review of literatures pertaining
to; UI system and its role for supporting the urban activities, UI serviceability degradation
and its impact post-disturbance, the concept of risk including its impact nature and
characteristic, and the general system-of-interest resilience discussions. Importantly, this
research also evaluates the previous literature in the area of UI system RA and REA that
outlines the argument and discuss the shortcomings in the conventional methods.
In this research, both quantitative and qualitative research designs were adopted to
provide comprehensive analysis, discussing and understanding towards the framework in
both conceptual and practical context. This research applies several empirical methodologies
to establish the risk criticality and robustness analysis functions. The empirical methods
include; Failure Mode Effect and Critical Analysis (FMECA), Fuzzy theory, Grey theory and
Social Network Analysis (SNA).
Further, a dichotomize method to determine the weight for each of the matrix element
to mimic the real risk interrelationship and behavior is also proposed within the framework
for supporting participatory-based two mode network analysis. A holistic approach is then
utilized, integrating risk magnitude, risk ripple and propagation impact between risk events,
and risk impact to community to establish the risk criticality analysis model.
Moreover, to build the system robustness analysis model, this research establishes the
shock and stress impact capacity model of risk that affect the UI system. To exemplify the
framework towards assessing and evaluating UI system robustness level, a five scenario-
based recovery strategy is developed as a guidance for building the mitigation plan and
intervention strategy to enhance both UI system and community resilience. To examine five
recovery strategies, an ‘expected’ recovery strategy model which acts as a benchmark is
CHAPTER 1-INTRODUCTION
Page 8
defined using simplified trigonometric recovery function.
This work takes the form of a case-study of the urban water supply (UWS)
infrastructure in the Indonesian context to test and validate the applicability and usefulness
respectively of the framework. The research is conducted in the form of a survey and
interview, with data being gathered from various stakeholder groups as research
participants via face-to-face and email-based communication. A combination of quantitative
and qualitative approaches was used in the data analysis. Data for this research was collected
using design-based questionnaire with both closed-response (nominal, forced choice
alternative category and Likert response format) and open-ended type of questions.
Regarding the data collection, it is not quite sufficient for the author to collect the data
only from the participants which basically are the individuals who are dependent and
affected by the presence of the particular UI system. Therefore, participants of this research
expand to the stakeholder groups on the entire UI system supply chain. The supply chain
comprises its services and stakeholder groups from government and local institution,
experts and also the lay people. Accordingly, to collect the data, this research applied the
purposeful-stratified simple random sampling method.
The research input data, simulation output analysis and interpretation are drawn
from four main sources, namely; literature related to UWS infrastructure system, UI system
risk management and REA, participants point of view (obtained from face-to-face interview)
and, rational explanation. The rational explanation refers to the two basic assumptions of
science; the first is to determined behavior which in the explanation that one can observe or
confirm through public verification. Second, the behavior follows a lawful pattern that can be
studied, in which the explanation makes clear and logical link between the cause and effect
[12]. Explanations that are not rational are not scientific.
1.7 Research Scope and Boundaries
This research is confined within the following scope and boundaries:
- It is acknowledged that resilience has four properties, that is; (i) Rapidity, (ii)
Redundancy, (iii) Robustness and (iv) Resourcefulness. In this research, the
conceptual framework of REA developed is confined on the robustness property.
- The proposed analysis models are constrained towards assessing risk at the discrete
and single point time (non-continuous time series risk event).
- Instead of positive consequences, the risk events identified consider negative
consequences only.
CHAPTER 1-INTRODUCTION
Page 9
- The assessment input is based on both expert and laypeople perception in terms of
measuring the risk based on determined risk criticality function.
- The proposed conceptual framework focuses on the UI system RA and REA of post-
disturbance period, which means that the system performance has not interrupted by
the extreme event in the present time.
- Several simplified and determined assumptions applied within the proposed
framework mainly due to the limitations of; (i) Understanding risk characteristic,
impact and its mechanism, (ii) The community dynamic with their divergent
perceptions towards risk, (iii) Limited computational resources available at the time,
and (iv) Limited knowledge in hand to mimic the real condition.
1.8 Significance of the Research
This research brings several significances both to the body of knowledge and practical
situation, which describes below:
- This research is the first attempt to propose a novel risk-based REA framework for
assessing UI system robustness capacity a unified resilience model. Importantly, in
real world the framework could be a practical tool that supports decision making in
UI system RA and building community resilience.
- This research contributes to fill the risk management and resilience knowledge gaps
by examining that both risk and REA viewed as a unified paradigm.
- It supports community participation within preliminary RA processes, leading to
measure the function of risk criticality.
- The framework provides a new understanding towards the comprehensive RA which,
not only pegged by single element (e.g., risk magnitude which measured by its
decision factors) but also; (i) People perceptions towards risk, (ii) The dynamics of
risk impact and propagation mechanism affecting other risks, and (iii) The dissimilar
of relationship and impact affecting stakeholder members.
- The framework and analysis model support and enhance the stakeholder ability to
perceive, understand, assess the UI system risks as well as to collaborate and
communicate in an effective and efficient way; thereby supporting and achieving the
effective of decision making and higher performance in strategic UI risk management.
1.9 Dissertation Structure
This dissertation overall structure is composed of nine theme Chapters including the
CHAPTER 1-INTRODUCTION
Page 10
introductory Chapter. Chapter one introduces the research study by discussing the research
background and rationale. Further, by highlighting the research gaps on literatures basis, the
research questions are then formulated to state the position for the investigation and
argument. Correspondingly, the overarching research aim following by a number of research
objectives are then formulated to accomplish the research aim. An overview of the research
design and several methods apply also describes at a glance in the synopsis section. Further,
the research scopes and boundaries described as a research restriction towards making the
research focus on the main aim. Finally, the research significance describes the contribution
of this research.
Chapter two begins by laying out the theoretical dimensions of the UI system concept
and its important role to the urban flow. The literature review is delivered based on several
references and through previous studies discussions which come with arguments. The
discussion continues to explain the disturbances (extreme events) affecting UI system
serviceability. Accordingly, the discussion shifting towards the effects of disturbances on UI
serviceability. The discussion then subsequently moves ahead towards how disturbed UI
system affecting the urban flow. Following the previous discussion, then the relation between
UI risks and the community is explored. An argument towards shortcomings of the
conventional RA methods relating with the issue discussed previously is establish, further.
Chapter three provides an in-depth literature review towards; the inherent of risk in
UI context and, its behavior. The discussion continues to review RA methods as well as its
drawback pertain to latent risk characteristics and impact mechanisms. Shifting from the
previous discussion, the discussion alters and begin to discuss the system resilience capacity
in the context of UI system. Four properties of resilience which assemble the entire resilience
context is briefly considered. Additionally, the argument on literature review pertaining to
drawbacks of the UI system REA methods is then developed. In the last section, Chapter three
concludes the research needs towards various gaps defined in Chapter 2 and 3.
Chapter four presents the research design and methodology as well as the
development of both framework and analysis models. A description on how this research
integrate stakeholders to various aspects of the research is explained. The case study
approach, research ethics, data collection method and strategy following by the population
arrangement and sampling technique are discussed thoroughly. This Chapter’s goal is to
provide sufficient detail action plan for getting from RQs and, RAI to ROs to be answered and
accomplished, and to some conclusions toward RQs.
Chapter five discusses the conceptual framework developed in this research. The
CHAPTER 1-INTRODUCTION
Page 11
framework consists of six main phases which each holds different analysis models. The initial
and first four main phases established poses the integrated guidance stream to the final
phases which is the UI system robustness and recovery analysis model development. This
Chapter also reviews preliminary data processing, a number of empirical models and
simulation techniques applied. A comprehensive mathematical functions and vigorous
equations adopted followed by the establishment of new formulas are explained in this
Chapter.
Chapter six describes the background of the Surabaya city water supply
infrastructure system as main case study. The stakeholder groups based on literatures and
field investigation towards water supply chain system investigation is determined.
Hereinafter, the inherent risk events which potentially could arise in the Surabaya water
supply infrastructure system are identified. Further, structured data collection process and
preliminary results obtained (such as; participant demographics) are then presented and
described. Finally, collected data from the fieldwork are initially processes and discusses
before employ the empirical analysis.
Chapter seven discusses the extensive data input, data conversion, data
manipulation and information processing, computational simulation output, numerical
analysis and preliminary outcome, and interpretation. The preliminary RAs output are
discussed step by step. Throughout three preliminary RAs outputs, the risk criticality
simulation and result can be constructed and analyzed respectively. From here, the REA and
scenario-based recovery action strategies simulation output are presented in the last part of
the Chapter.
Chapter eight draws upon the entire empirical calculation and simulation, tying up
the various theoretical and empirical strands in order to discuss the findings from a number
of computational simulations generated and obtained in the previous Chapter. The theme is
not only to discuss the interview and data simulation results undertaken during the data
processing, but also the case study facts that can be brought up as ground argument
supporting the findings. Importantly, this Chapter also examine and review several research
objectives and questions which is answered within the research bodies.
Chapter nine summaries and concludes the dissertation by providing an overall
discussion that merges the critical findings supporting the ROs accomplishment. The main
contribution, the theoretical and practical implication, limitations and directions for further
research are also provided in Chapter nine. Following the reference list, supplementary
information (i.e., the research ethical approval and the questionnaires, and supplementary
CHAPTER 1-INTRODUCTION
Page 12
Tables as well as the Figures) are provided in Appendices section.
1.10 Chapter Summary
This Chapter has predominately presents the research prologue which consists of several
sub-sections to explore the knowledge gaps and research needs. The research key questions
compliance with both RAI and ROs are established. The contribution of this research as to
fill the knowledge and practical gaps in the area of UI system risk and resilience management
is highlighted. Moreover, this Chapter also briefly discussed the research design and methods,
research scope and limitation, and research significance. A structure of this dissertation is
exhibited at the end Chapter in order to make this dissertation accessible and
understandable.
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 13
CHAPTER 2
URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
CHAPTER HEADINGS Introduction Understanding Urban Infrastructure Vulnerable UI System and its Impact towards Disruption Resilient UI System towards Disturbances Chapter Summary
2.1 Introduction
This Chapter intends to build an understanding towards urban infrastructure (UI) system
role and its’ importance for the urban flow. Widespread studies on the concept and nature of
UI system in the context of urban development are carried out and discussed. The
exploration of UI system vulnerability towards extreme events and various disturbances are
then reviewed and discussed thoroughly. Further, a discussion pertaining to the degraded
performance of UI serviceability-when the system encounter disruptions during its service-
life affecting urban community is presented. The last part of this Chapter ends with the
discussion related to the existing concept of UI system resilience.
2.2 Understanding Urban Infrastructure
The vital networks of UIs are necessary for the functioning of the 21st century urban complex.
An urban complex with urban health outcomes which dependent on many interactions and
feedback loops [13]. As a result, prediction within the planning process is fraught with
difficulties and unintended consequences are common. Accordingly, the presence of a
sophisticated range of infrastructure types provide a basis for human activity which is critical
to the function of the modern urban environment. While, UI systems integrate cities as
shared spaces of common life, it also supports urban territories into zones of differential
access and exclusion [14].
Further, UI can be defined as the network of services (other than public buildings)
that allows the circulation of people, materials, and information within the city to support
various society activities [15]. There are no settled universal theories or even definition of
what constitutes the system of ‘infrastructure’. Frischmann, B. M., defined “infrastructure” as
generally conjures up the notion of a large-scale physical resource made by humans for
public consumption where this standard definitions of infrastructure refers to the
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 14
‘underlying framework of a system” or the “underlying foundation” of a system [14].
Some infrastructure types include (but not limited to): roads, public or collective
transit, water supply and distribution system, drainage network, electric power generation
and distribution system, telecommunication network system. Often taken to exemplify the
designs of public power and formal planning, the realities of UI more usually involve
unsteady integrations of public, private and informal infrastructures.
Meanwhile, the American heritage dictionary defines infrastructures as ‘an
underlying base or foundation, especially for an organization or system’ [15]. Zio, E., defined
infrastructure as a large scale, man-made systems that function interdependently to produce
and distribute essential goods (such as energy, water and data) and services (such as
transportation, banking and health care) [16]. Moreover, the term of infrastructure is applied
to a variety of systems but is most often associated with the physical structure that makes
cities work.
In the meantime, UIs retain powerful images of stability which often regarded as
‘symbols of the complexity, ubiquity and the embodied power of modern technology’ [17].
Central to the entire discipline of infrastructure, infrastructure can be seen in the concept of
common management. According to Frischmann, B. M., infrastructure is examined as a
commons [14]. The terms ‘commons’ generally conjures up the notion of a shared
community resource and often brings to mind the related concept of open access, or, more
generally openness.
Commons typically are distinguished from open access because commons are open
only to community members and often subject to a particular governance regime, while
open-access resources are open to the public without ownership or attendant in governance
regimes. In view of this, common management refers to the situation in which a resource is
accessible to all members of a community on nondiscriminatory terms, meaning terms that
do not depend on the users’ identity or intended use.
Further, common management is used to capture a nondiscriminatory sharing
strategy, which can be implemented through a variety of public and private institution,
including open access, common property, and other resource management or governance
regimes [14]. The general value of the common management strategies is that it maintains
openness, does not discriminate among users or uses of the resource and eliminates the need
to obtain approval or a license to use the resource.
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 15
2.2.1 The Nature of Urban Infrastructure
To understand the nature of the infrastructure, it is necessary to understand the purpose,
aims and the type of infrastructure. Infrastructure can be classified based on its type by a
number way which is a key element in order to understand the nature of the urban
environment. Accordingly, the infrastructure classification indicates the complexity of urban
living and its dimensions which are social, environmental, cultural and economic but
founded on the provision of tangible and concrete structures.
The presence of infrastructure type and classification demonstrate the breath of
infrastructure concerns and the elements necessary to provide the foundations of the
modern urban flow. The benefit of establishing a classification of infrastructure types and
consideration of the urban environment in terms of infrastructure types is that comparisons
between different planning systems can be made effectively [18].
Following the most frequently distinction, Ennis, F., classified the type of
infrastructure based on ‘hard’ and ‘soft’ infrastructure [18]. The former refers to
infrastructure networks such as; electricity, gas, telecommunications, water, sewerage and
transport, while the latter refers to community (e.g., emergency services, community centers,
schools), environmental infrastructure (landscaping, open space) and so on.
Ennis, F., also distinct the infrastructure based on ‘marketable’ and ‘non-marketable’
infrastructure [18]. The marketable infrastructure refers to physical, economic and housing.
Meanwhile the non-marketable infrastructure refers to community, health, education and
environmental infrastructure where the provision of these would be considered as loss-
making by the private sectors. Thus, the non-marketable infrastructure held no attraction.
Meanwhile, Frischmann, B. M., classified an infrastructure as a ‘traditional and non-
traditional’ infrastructure [14]. Three generalizations about traditional infrastructure help
set the stage. First, the government has played and continues to play a significant and widely
accepted role in ensuring the provision of many traditional infrastructures. Second,
traditional infrastructures generally are managed in an openly accessible manner whereby
all members of a community who wish to use the resources may do so on equal and
nondiscriminatory terms. Third, traditional infrastructures generate significant spillovers
(positive externalities) that result in large social gains.
Familiar examples of “traditional infrastructure’, include; (i) Transportation systems,
such as highway systems, railway systems, airline systems, and ports; (ii) Communication
systems, such as telephone networks and postal services; (iii) Governance systems, such as
court systems and, (iv) Basic public services and facilities, such as school, sewers, and water
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 16
systems. The list could be expanded considerably but the point is simply to bring to mind the
range of traditional infrastructure resources on which urban community rely daily.
The ‘non-traditional’ infrastructures, on the other hand, refers to complex dynamic
processes, that are associated with natural ecosystem, social and cultural processes. In short,
the ‘non-traditional’ infrastructure typically provide additional institutional support, in the
form of public subsidies for basic research or in the form of command-and-control regulation.
The example of ‘non-traditional’ infrastructure includes; environmental and intellectual
infrastructures.
Again, Frischmann, B. M., also classified an infrastructure based on its resources
topology such as; commercial, public, social and mixed infrastructure [19]. Commercial
infrastructure resources support production of a wide variety of private goods, while public
and social infrastructure resources are used to produce a wide variety of public and social
goods, respectively. Many traditional infrastructures, including transportation and
communications infrastructures, contribute to the production of a wide range of public and
social goods because of the ways in which they connect communities and social systems.
In spite of knowledge about the infrastructure type classification, an important
consideration towards infrastructure is the characteristic of infrastructure itself which are
important to determine the infrastructure behavior. Rinaldi, S. M. et al. provides a clear
explanation towards several main infrastructure characteristics including; spatial
(demographical) scales, temporal scales, operational factors, and organizational
characteristics [3]. Spatial scales can vary widely in infrastructure analyses. Pertinent spatial
scales range from individual parts to the meta-structure composed of interdependent
infrastructures and the environment.
Closely related is the notion of demographic scales, given that infrastructures span
physical space ranging in scale from cities, regions, and nations to international levels.
Infrastructure dynamics span a vast temporal range. Relevant time scales of interest vary
from milliseconds (e.g., power system operation) to hours (e.g., gas, water, and transportation
system operations) to years (e.g., infrastructure upgrades and new capacity). Operational
factors influence how infrastructures react when stressed or perturbed. Finally,
organizational characteristic can be key factors in determining the operational characteristic
of infrastructures, with important security and risk implications.
These factors are closely related to security and risk as well as the operating
procedures; operator education and training; backups and redundant systems; emergency
workarounds; contingency plans, including periodic reviews and updates; and security
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 17
policies, including implementation and enforcement. Another contribution related to the
dynamic nature of infrastructure can be seen in the Chapter four of book written by
Frischmann, B. M. [14]. Frischmann, B. M., examined the dynamic nature of infrastructure
and gives suppression that infrastructures evolve over time, at different rates and in different
manners, depending on the infrastructure in question.
Changes may occur, for example, by exogenous changes in the environment, changes
in demand, emergence of unforeseen uses, new knowledge about the relative values of
different uses, and supply-side change in design, management, or priority. These drivers may
interact and influence each other dynamically in incredibly complex ways. Following Graham,
S. and C. McFarlane, following the notion of the infrastructure nature, the infrastructure is a
changing set of processes that are often lively, powerful, and uncertain [20].
On the other hand, Moss, T., seen the infrastructure system as a Large Technological
Systems (LTS) concept [21]. Based on the premise, nonetheless, LTS cannot be understood
solely in terms of their technological components but as complex systems which link material
technologies with organizations, institutional rules and cultural values [21]. Similarly, Little,
R. G., seen the infrastructure as a LTS which by their nature are intricate constructions of
technology, people, and governance structures [22] .
Even if it were possible to fully model the technical components of the system, the
human and organizational aspects of LTS make predicting the behavior of the system in
duress with a significant degree of accuracy and precision somewhat illusory [22]. The
development of LTS is determined not by technological advancement alone but also by the
interplay between various components. Importantly, the purpose of LTS theory is to explain
how actors, technologies, markets and regulations interact to shape the initiation, evolution
and expansion of large technological systems [23].
Bowker, G.C. and S.L. Star, stated one of the eight defining characteristics of LTS that
achieve the cultural status of “infrastructure” is that they “become visible upon breakdown”
[24]. The study further wrote that “the normally invisible quality of working infrastructure
becomes visible when it breaks. Even when there are meticulous backup mechanisms and
procedures, their existence highlights the now visible infrastructure.
Central to the argument of LTS concept are three characteristics introduced by
Hughes, T. P., that is: system-builders, momentum and reverse salient [25]. The combined
impact of these three characteristics of LTS is visible in the various phases of development
which each LTS experiences. Although the boundaries between the different phases are fluid,
each phase is regarded as distinctive in terms of the principal actors involved and the
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 18
openness of the structures to change.
2.2.2 Urban Infrastructure System Roles
The UI, consists of huge and complex mechanism with significant incoherent connections of
numerous dependent infrastructure systems [26]. Thus, UI system’s incapacity or
destruction has a significant impact on health, safety, security, economics and social well-
being. A failure in such UI system, or the loss of its service (serviceability degradation), can
be damaging to a single society and its economy, while it could also cascade across
boundaries causing failures in multiple infrastructures with potential catastrophic
consequences [4, 16].
Furthermore, all of the UIs have one property in common-they are all dynamic-
complex adaptive systems which are also highly interdependent on a set of critical products
and services (complex collections of interacting components in which change often occurs as
a result of learning processes), both physically and through a pervasive use of information
and communication technologies [3, 18, 27, 28]. It is also considered a separate system that
in kind of weaving together in all sorts of mutually dependent manner. As a result, disruption
in one tends to cascade to others very quickly.
Besides, UI is also characterized by its relationship to other infrastructure, agents,
possible disruptions, possible interventions, jurisdictions and markets. For that reason, each
components of an infrastructure consist of a small part of the intricate web that forms the
overall infrastructure. Consequently, it is of the utmost importance to government, business,
and the public at large to understand the nature of UI and take measures necessary to ensure
that the flow of services provided by particular system continues unimpeded in the face of a
broad range of both natural and manmade hazards (extreme events).
The UI system are multifaceted by nature, for instances; physical-engineering,
cybernetic or organizational, and by environment (demographical, natural) and operational
context (political/ legal/ institutional, economic, etc). A number of examples of UIs sectors
which provides services can be seen in [3, 29-31]. The UI system are complex which made by
many components interacting in a network structure. Most often, the components are
physically and functionally heterogeneous, and organized in a hierarchy of subsystems that
contributes to the system function. This leads to both structural and dynamic complexity [4].
The structural complexity derives from; (i) Heterogeneity of components across
different technological domains due to increased integration among systems, (ii) Scale and
dimensionality of connectivity through a large number of components (nodes), highly
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 19
interconnected by: (a) Dependences, i.e., undirectional relationship: a component depends
on another through a link, but this other one does not depend on the former through the
same link, and (b) Interdependencies, i.e., bidirectional relationships: a component depends
on another through some links, and this latter component likewise depends on the former
component through the same and, or other links.
On the other hand, dynamic complexity manifests through the emergence of (even
unexpected) system behavior in response to local changes in the environmental and
operational conditions of its components. Further, emergence is another dynamic property
of complex systems, which appears only at a macro level manifesting itself by the arising of
novel and coherent structures, patterns and behavioral properties.
The design politics of how UIs developed, governed and integrated is core to the ways
that the common life of cities is conceived and realized. The UIs is made up around objects
and networks, but also around human associations, labor and interactions-an embodied
urbanism involving auto-infrastructures which is rigged together from public provisions,
private concession and informal improvisations. It is an exemplary instance of how an urban
order emerges ‘from the relation of people to things, as well as from the relation of people to
each other [14].
In the context of urban living and infrastructure provision, Frischmann, B. M.,
proposed a point of view that infrastructure can be interpreted as a resource where it
satisfies these three criteria [19]. In the context of urban living and infrastructure provision,
which are; (i) The resource may be consumed non-rivalrously for some appreciable range of
demand, (ii) Social demand for the resource is driven primarily by downstream productive
activities that require the resource as an input and, (iii) The resource may be used as an input
into a wide range of goods and services, which may include private goods, public goods, and
social goods [19].
Figure 2-1. The downstream system between infrastructure users and consumers (Source: Frischmann, B. M. [19]).
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 20
Following the third criteria, Figure 2-1 shows the downstream systems that arise
between and among infrastructures users and consumers of the outputs produced. The UIs
seen as a resource to the community whose dependent on it. Meanwhile, providing
infrastructures for the human action in the context of urban living is a complex task for the
nation considering the wide range of mechanism, the dynamic of society and the
infrastructure itself considering many inherent aspects (i.e., economic, social, cultural,
political and technical). The UIs is a means to other ends, and the effectiveness, efficiency,
and reliability of its contribution to the other ends must ultimately be the measure of
infrastructure performance. A focus on the UI provision within the urban context is critical
to develop an understanding of how UIs does not simply exist, but occurs [20].
2.2.3 The Urban Infrastructure Relationship with Urban Community
The UIs are vehicles of movement and becoming, ways of mediating the constantly oscillating
intersections of various times, spaces, economics, constraint and possibilities making up city
life [32]. While the existence of UIs shapes the cities by fulfilling community needs in various
ways, conversely urban community works maintaining the UI system in order to ensure the
reliability of respective UI system serviceability (e.g., both government and non-government
bodies boundary). This linkage between systems and services is critical to understanding the
complex relationships that exist between the physical systems, the people and the
enterprises they serve.
The UIs conventionally seen as a technical matter of; the networks and the variable
flows through them. However, such a conventional sense is inflected by the modern
understanding of UI as an object of material and ‘conscious design’ in the city. Furthermore,
the UIs consist of social interaction and creativity. The design of UIs is in part a technical
project, but is, moreover, a social and political project that integrates the city as a space of
collective provision, or segments in into uneven patterns of infrastructural access and
exclusion.
The individual makes use of the UIs to create opportunities and to develop their
abilities and skills, to advance their desire to enjoy the good life. The UI is therefore the social
and cultural action which is made possible by the existing UIs. The buildings and equipment
provide empty spaces which are of significance for human activities. In turn, the UIs
themselves are created by ideas and concepts which emerge from the human activity which
occurs in the superstructure. This notion leads to further discussion with respect to the
relationship between infrastructure systems and the community.
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 21
Accordingly, several studies have been acknowledged pertaining the relationship
between UI system and the community. Ennis, F., drew together a number of researches in
the topic of the provision of UI by consider the means of local actors securing the
infrastructure from various actors in the context of negotiation [18]. The study has examined
the relationships between developer and planning agencies and the institutional framework
which have provided the parameters for securing contributions towards infrastructure.
Furthermore, this relationship has been clearly stated in the study conducted by Mau,
B. and J. Leonard, in which infrastructure services have always been foregrounded in the lives
of more precarious social groups, that result either of socio-spatial differentiation strategies
or infrastructure crises [33]. Graham, S., in his study, discussion highlights the way in which
the technological circulations sustained by infrastructural assemblages inseparably blend
together the social relations of urban life and the relations between cities with the natural
and biospheric processes open which they rely [17].
A critical approach to infrastructure as a less transparent and less complete kind of
‘assemblage’ are not considered solely on the complex and often incoherent connection of
socio-material elements (expressed and submerged as infrastructural stuff). Instead, the
human actors, incidental materials, policies and plans, and information systems both virtual
and social-that generate, distribute and appropriate basic services and resources in the city
[26]. Certainly, the design of UIs is in part a technical project, but is, moreover, a social aspect
and political project that integrates the city as a space of collective provision, or segments in
into uneven patterns of infrastructural access and exclusion.
The interconnected UI system is an integrated part for supporting human needs in the
urban living circumstances. Thus, a clear relationship exists between the UI and dependent
community [22, 34-37]. Therefore, to understand the complex relationships that exist
between the physical UI systems and, the people (including the enterprise they serve), it is
important to explore the various factors and interrelationship pattern between the UI system
and the stakeholder groups. Figure 2-2, depicts the basic model of interrelationship between
UI systems with community. Accordingly, the existing interrelationship between UIs system
and the community is inevitably crucial towards ensuring the security and continuity of UIs
system serviceability.
The basic model illustrates how urban community are responding to the signals in the
way that they (as the UI system stakeholders) provide, manage, regulate and harness the
utility services as a response which create for more efficient form of resource use.
Nonetheless, during the previous time, past studies commonly discussed the planning of
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 22
infrastructure networks which tends to be conceived as the rational management of resource
with little regard to the dynamic, contextually contingent strategies of infrastructure
stakeholders (e.g., regulator and operators) and users [38].
In UI system supply chain, each phase of developments is characterized by different
dominant actor groups, and today there are other actors besides those engaged on the supply
side of utility services who have a say in how they develop. Importantly, the interrelationship
concept aforementioned followed by a traditional logic of infrastructure management which
is coming under pressure from a variety of emerging challenge [39].
Urban
Infrastructure
Urban
CommunityMutual
relationship
Resources
Users
Service that shape the urban life
Managing the infrastructure
Figure 2-2. The interrelationship basic model of UI systems with the community.
The relationships between UI system and the various actors (stakeholders) has been
supported by a considerable amount of literatures published. For instances; Guy, S. and S.
Marvin, emphasized the need to develop an alternative analytical framework which
recognizes infrastructure systems as socio-technical networks [38]. The study offers a new
understanding of the interrelationships between physical production processes shaping the
construction of cities and the changing social dynamics or urban consumption.
Ennis, F., examined the relationships between several actors society and the
infrastructure development [36]. Furthermore, Li, T.H.Y., S.T. Ng, and M. Skitmore, studied
and proposed a systematic method of analyzing stakeholder concerns relating to public
infrastructure and construction projects by examining the degree of consensus and/or
conflict involved [35]. The relationship between UI system and the urban community has
been widely investigated and recognized, both the UI system and community have a very
strong relationship which crucial for the building of decision and policy strategies towards
the security advancement of UIs superiorly.
While the existence of mutual relationship between UI system and the community
give substantial emphasis on the UI serviceability improvement, nonetheless, the continued
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 23
reliance of urban dwellers on huge and complex UI stretched across geography creates its
inevitable vulnerabilities [22].
2.3 Vulnerable Urban Infrastructure System and its’ Impact towards Disruptions
The UIs are exposed and challenged by potential disruptive factors coming from many types
of hazardous events, including; natural and man-made, environments. Some of the examples
are; natural hazards (e.g., global warming, heavy solar storms), climate changes, component
aging and failure, sharp load demand increase, intentional attacks, disease outbreaks, food
(distribution) shortages, financial crashes, and organized (cyber-) crime, or cyber warfare.
Further, increasing interdependencies in the UIs system in somewhat uncontrollable
manner, creates unprecedented events of dangerous hazards and damaging events which can
spread rapidly and globally throughout the system. The UI faces a range of potentially serious
hazards. In addition to natural hazards, experience demonstrates that excessively prolonged
service lives, aging materials, and inadequate maintenance all negatively affect infrastructure.
Accordingly, urbanities often have few or no real alternatives when the complex UIs
that always managed well to serve society are disrupted or even removed [36]. While UI
services are taken for granted, it is often the moment when the disruption occurs, such as;
electricity blackout, the server is down, the subway has a strike, or the water pipe ceases to
function that the dependence of cities on infrastructure networks becomes most visible.
Additionally, not only the UI vulnerabilities emerged from natural hazard but also
various inherent hazards which yield on the disrupted and degraded UI system serviceability
following the unavoidable disruption of urban life. As discussed by Oh, E., and Oh et al.
through a basic cell model of the interrelationship between UI system hazard (also refers to
risk) and urban community, the diffusion path of risk impact develops at the advanced stages
increase the complexity for risk mitigation [40, 41].
With increasing community losses due to hazards, more emphasis is being placed on
improved risk management strategies that consider, not only to economic and environmental
loss but also to social loss [40-43]. Because society relies on the continuous agency of UI to
do various daily activities, urbanites often have few or no real alternatives when the complex
UIs that sometimes manage to achieve this are removed or disrupted. Hereafter, the
interrelationship between the UI and associated community is also one of the key
components to understand hazard impact mechanism.
Figure 2-3, depicts the basic notion of UI system hazard and its impact specifically on
the affected urban community. It describes a single disruption that can devastate the urban
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 24
life as they mutually-interrelated with one another. Despite the formidable array of threats
confronting UIs, many problems will occur simply due to the complexity of these systems
[22]. It is noteworthy to mention the disrupted UI will automatically affect its’ serviceability
level which disrupts the city as urban community. This issue has been supported by the fact
that will be discussed thoroughly from past studies.
Urban
Community
Hazardous
event
Trigger
Trigger
Trigger
Trigger
Trigger
Haz
ard
s a
nd
th
reat
s
Prevention
(proactive)
Specific
harm
Initiating
event
Urban
Infrastructure Serviceability
Risk
Impact
Disrupted
serviceabilityImpact
Figure 2-3. The basic notion of hazard and risk impact.
Little, R. G., discussed a range of potentially serious threats to UI [22]. For example; in
addition to natural hazards, experience demonstrates that excessively prolonged service
lives, aging materials, and inadequate maintenance all negatively affect infrastructure.
Graham, S., studied the disrupted cities as a manifest when UI fails to deliver its’ service to
the community [17]. Mei, R., H. Chuanfeng, and L. Liang, developed an analytical framework
with empirical applications to address infrastructure failure interdependencies (IFIs) in the
context of electrical power outages which failure leads not only to failures of other
infrastructure systems but also creates the greatest societal concern [44].
Previous studies have indicated that UIs exposed to many types of hazards which its
vulnerability generates various impacts and consequences both to UIs systems and
dependent community. For this reason, Critical Infrastructure Protection (CIP) has gained
high importance in all nations, with particular focus being placed traditionally on physical
protection and asset hardening [30, 45-47]. To protect infrastructures, it requires modeling
their component fragilities under different hazards and, then, analyzing their system-level
risk and vulnerability.
2.4 Resilient Urban Infrastructure System towards Disturbances
In recent years, lessons learned from some catastrophic accidents have extended the focus
on the ability of infrastructures to withstand, adapt and rapidly recover from the effect of a
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 25
disruptive events and, hence, the concept of resilience [48-54]. As a result, the UI system
should not only be reliable but also able to recover from disruptions [55].The outcomes of
the 2005 World Conference on Disaster Reduction (WCDR) confirmed the significance of the
entrance of the term resilience into disaster discourse and gave birth to a new culture of
disaster response [4].
Following the 2005 WCDR agreement, government policy nowadays also evolves the
efforts that would allow infrastructures to continue operating at some level, or quickly return
to full operation after the occurrence of disruptive events [47]. As the consequence resilience
is a nowadays considered as a fundamental attribute for infrastructure that should be
guaranteed by the design, operation, and management. Accordingly, infrastructure is not just
a matter of the system which provides a service to fulfill community needs but also as a key
towards developing system for community operations and resilience [54].
Resilience comes from the Latin word “resilio” that literary means “to leap back” and
denotes a system attribute characterized by the ability to recover from challenges or
disruptive events [56, 57]. The Merriam-Webster dictionary defines resilience as “the ability
to recover from or adjust easily to misfortunate or change”. Henry, D., and J. Emmanuel
Ramirez-Marquez, discussed word resilience with its origins in the Latin word ‘‘resiliere’’,
which means to ‘‘bounce back” [58].
Resilience is surely a popular buzzword today, yet from a physical, to a sociological
perspective of the common understanding, the concept is to be able to ‘‘spring back after
receiving a hit”. While this concept is reasonably consistent with the meaning of the word
resilience, it is not evident in the concept of resilience as defined, described and applied in
many technical disciplines over the years and especially in Infrastructure Engineering in
recent years [7, 47, 54, 59].
Subsequently, the concept of resilience is developed predominantly and
independently in disciplines like ecology, psychology and physics (specifically in material
science). At the turn of the century, there were several different opinions, definitions, and
classifications of resilience within many disciplines. With extensive globalization and
connectivity, the effects of natural and manmade hazards (intentional and unintentional)
may no longer be restricted to any demographic or political vicinity. Severe disruptions are
also becoming more unpredictable, more frequent, and more damaging.
In this respect, as evidenced by the continuous use of the word resilience in the
systems engineering community, the essence of the resilience concept seems to be an
essential component of systems and enterprises. Resilience is closely linked to the notion of
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 26
‘vulnerability’. In furtherance of building up a resilient system, vulnerability must be
minimized. Furthermore, resilience may be considered as the “quality that enables an
individual, community or organization to cope with, adapt to and recover after an extreme
event” [60]. The concept of resilience, nowadays, used in practice varies by disciplines and
applications [7, 48, 51, 61-63]. Resilience can be understood as [4]:
“The ability of the system to reduce the chance of shock, to absorb a shock if it occurs and
to recover quickly after a shock (re-establish normal performance)”
, and it is characterized by four properties, that is; robustness, redundancy, resourcefulness,
rapidity, and further four interrelated dimensions; technical, organizational, social and
economic. Mainly resilience fundamentally consists of four main properties, which is;
rapidity, redundancy, robustness, and resourcefulness. The four properties can be seen and
described in Figure 2-4 and Table 2-1 respectively.
Robustness
Rapidity
Resourcefulness
Resilience
Redundancy
Figure 2-4. Four main properties of resilience.
Manyena, S. B., defined resilience as the capacity of a system surviving from
aggressions and shocks by changing its non-essential attributes and rebuilding itself [64].
Chertoff, M. (2009), stated a resilience terms as a capacity of an asset, system, or network to
maintain its function during or to recover from a terrorist attack or other incident [65]. Other
discussion brought by Haimes, Y. Y., defined resilience as the ability of the system to
withstand a major disruption within acceptable degradation parameters and to recover
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 27
within an acceptable time and composite costs and risks [66].
Moreover, Cimellaro, G. P., A. M. Reinhorn, and M. Bruneau, viewed resilience as the
intrinsic capacity of a system, community or society predisposed to a shock or stress to adapt
and survive by changing its non-essential attributes and rebuilding itself [9]. In addition, a
recent definition of resilience is given by the Society for Risk Analysis (SRA) glossary [67].
SRA defined resilience as the ability of the system to sustain or restore its basic functionality
following a risk source or an event (even unknown), the sustainment of system operation
and associated uncertainties.
Meanwhile, Woods, D. D., N. Leveson, and E. Hollnagel, defined resilience as a new
paradigm for safety engineering, which proactively integrates several aspects [56]. That is;
(i) The accident preventive tasks of anticipation (imagining what to expect) and monitoring
(knowing what to look for), (ii) The in-accident tasks of responding (knowing what to do and
being capable of doing it) and learning (knowing what has happened); (iii) The mitigative
tasks of absorbing (damping the negative impact of the adverse effect) and the recovery tasks
of adaptation (making intentional adjustment to come through a disruption); (v) Restoration
(returning to the normal state) [56].
Further, Bocchini, P., et al. studied a comparison between infrastructure sustainability
and resilience and concluded that both of them have a vast number of similarities and
common characteristics [68]. The conclusion is based on the findings which they combined
the structural analyses with social and economic aspects. The study also relied on the
techniques for the life-cycle analysis and decision making.
To better understand the implementation of resilience concept in the context of UI
system, a three-stage resilience concept has been put as a core consideration. Figure 2-5 is a
typical three stages infrastructure system performances response curve adopted from
Ouyang, M., L. Duen as-Osorio, and X. Min [69]. As seen, the three-stage resilience concept of
infrastructure system namely; disaster prevention, damage propagation and, assessment
and recovery had been discussed and documented well in a number of studies [7, 48, 51, 69].
The first stage, ( )00 t t , is the disaster prevention stage that spans are normal
operation to the onset of initial failure. The first stage mainly reflects a resistant capacity of
the system as its ability to prevent any possible hazards and reduce the initial damage level.
Two indexes “hazard frequency” and “initial damage level” have together describe the
resistant capacity concept and taken as the resilience that correlates in the first stage of
resilience concept.
The second stage, ( )0 1t t t , is the damage propagation process after the initial
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 28
failures occurred. The second stage reflects an absorptive capacity of the system as the
degree to which it absorbs the impacts of initial damage and minimizes the consequences,
such as cascading failures. The highest impact level ( )1 I− is applied to measure the
absorptive capacity and regarded as the resilience that correlates in the second stage. The
third stage is the recovery process during which system damage information is collected for
assessment, and resources are allocated to reach restore performance.
Figure 2-5. Performance response curve of a system on a disruptive event. (Source: Ouyang, M., L. Duen as-Osorio, and X. Min [69]).
It is important to note that the new steady-state performance level (point B) may be
better or worse than the original performance state. This is reasonable as the steady-state
has a very close relationship which is correlated directly to the robustness of building
disaster prevention strategy which processed in the first stage of resilience concept. Further,
this stage reflects the restorative capacity (i.e., the ability of the system to repair quickly and
effectively). Recovery time and cost together represent the restoration capacity and help to
characterize resilience in the third stage.
The third stage constitutes together a typical infrastructure response cycle to the
disruptions. The first stage of resilience concept is focuses on the local level impacts,
translating hazard into components level failures. The second stage of resilience concept
emphasizes the system-level effects and translating initial local components failures into
system-level consequences. The third stage of resilience concept characterizes the
restoration response, translating external efforts into system recuperation. Accordingly, to
enhance system resilience the improvement strategies can be arranged in a different stage.
Almost every paper that has been written in three-stages resilience concept [7, 61, 66,
69-71], in the same vein, the first stage (resistant capacity) plays crucial roles which
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 29
inevitable affecting both second and third stage. Thus, the first resilience stage effects and
finally shapes the goal of realizing respective infrastructure system resiliency. Loss and
recovery, and thus resilience of infrastructure, does not make practical sense without
consideration of both.
To establish a common framework for resilience, a unified terminology is adapted
from previous studies conducted by Cimellaro, G.P., A.M. Reinhorn [9], and M. Bruneau, and
Cimellaro, G.P. and D. Solari [72]. The discussion towards basic definitions and formulations
of four resilience properties and the simplified recovery function models are explained in the
next sub-section.
2.4.1 Definitions and Formulations
Definition 1. Resilience is defined as a function indicating the capability to sustain a level of
functionality or performance for a given building, bridge, lifeline networks, or community,
over a period defined as the control time ( )LCT that is usually decided by owners, or society
(usually is the life cycle, life span of the system).
Definition 2. The recovery time ( )RET is the period necessary to restore the functionality of
a structure, an infrastructure system (water supply, electric power, hospital building, etc., or
a community), to a desired level that can operate or function the same, close to, or better than
the original one. The recovery time ( )RET is a random variable with high uncertainties that
includes the construction recovery time and the business interruption time and it is usually
smaller than the control time ( )LCT . It typically depends on the extreme events (hazards)
intensities and on the location of the system with its given resources such as capital,
materials and labor, following the major disturbance events.
Definition 3. Hazards resilient infrastructure system is a infrastructure that can withstand
an extreme event, natural or man-made, with a tolerable level of losses, and is able to take
mitigation action consistent with achieving that level of protection.
The resilience is defined graphically as the normalized shaded area underneath the
functionality function of a system (see figure 2-5), defined as Q t( ) . Q t( ) is a non-stationary
stochastic process and each ensemble are a piecewise continuous function, where the
functionality Q t( ) is measured as a dimensionless (percentage) function of time.
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 30
2.4.2 The Four Properties of Resilience
While defining resilience is clearly challenging, identifying the features of organizations and
other social units that make them resilient is even more difficult. Resilience is an important
concept for disaster management of complex system. There are four properties along which
resilience can be improved [9, 72]. These are robustness, resourcefulness, redundancy, and
rapidity. These properties can be better. The definition for each of the resilience property
including with its mathematical representation from Figure 2-5 can be seen in Table 2-1
below.
Table 2-1. The four properties of resilience and its definition.
Property Definition Robustness Robustness referring to engineering systems. It is the ability of elements, systems or
other units of analysis to withstand a given level of stress or demand without suffering degradation of loss of function. It is therefore the residual functionality right after the extreme event (Figure 2-1) and can be represented by the following relation
1Robustness (%)( , );I II m = − (2-1)
where, I is a random variable expressed as function of the mean Lm and the standard
deviation I . A more explicit definition of robustness is obtained when the dispersion
of the losses is expressed directly as follows
1Robustness (%)( );I II m a= − + (2-2)
where, a is a multiplier of the standard deviation corresponding to a specific level of
losses. A possible way to decrease uncertainty in robustness of the system is to reduce the dispersion in the losses represented by I . In this definition, robustness reliability
is therefore also the capacity of keeping the variability of losses within a narrow band, independently of the event itself.
Rapidity It is the capacity to meet priorities and achieve goals in a timely manner in order to contain losses and avoid future disruption. Mathematically it represents the slope of the functionality curve (Figure 2-1) during the recovery-time and it can be expressed by the following equation
0 0Rapidty for ( )
; E
dQ tt t t t
dt= + (2-1)
where, d/dt is the differential operator; Q t( ) is the functionality of the system. An
average estimation of rapidity can be defined by knowing the total losses and the total recovery time to reach again 100% of functionality, as follows
Rapidty (average recovery rate in percentage/time)E
I
t= (2-2)
where I is the loss, or drop of functionality, right after the extreme event occurs. Redundancy It is the quality of having alternative paths in the structure by which remain stable
following the failure of any single elements. In other words, it describes the availability of alternative resources in the process of a system. Further, it is the extent to which elements, systems, or other units of analysis exist that are substitutable, i.e., capable [of] satisfying functional requirements in the event of disruption, degradation, or loss of functionality. Simply, it describes the availability of alternative resources in the loss or recovery process. Redundancy is a very important attribute of resilience, since it represents the capability to use alternative resources, when the principal ones are either insufficient or missing. If the system is resilient, there will always be at least one scenario allowing recovery, irrespective of the extreme event. If this condition is not met by the system, then changes to the system can be made, such as duplicating components to provide alternatives in case of failure. Moreover, redundancy should be developed in the
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 31
system in advance and it should exist in a latent form as a set of possibilities to be enacted through the creative efforts of responders.
Resourcefulness It is the capacity to identify problems, establish priorities and mobilize resources when condition exist that threaten to disrupt some element, system or other unit of analysis. Resourcefulness and redundancy are strongly interrelated. One of the major concerns with the increasingly intensive use of technology in emergency management, is the tendency to over-rely on these tools, so that if technology fails, or it is destroyed, the response falters. To forestall this possibility, many planners advocate redundancy Changes in resourcefulness and redundancy will affect the shape and the slope of the recovery curve and the recovery time. It also affects rapidity and robustness. It is through redundancy and resourcefulness (as means of resilience) that the rapidity and robustness (the ends of resilience) of an entire system can be improved.
For ensuring the adequate protection and resilient of UIs system, vulnerability and
risk must be analyzed and assessed in order to prepare to address them by design, operation,
and management. According to Zhang, P. and S. Peeta, the concept of risk is fairly mature
whereas that of vulnerability is still evolving [73]. The next Chapter briefly recalls the
concept of risk and resilience correlation and relationships, as they are the main
considerations to the context UIs protection.
2.5 Chapter Summary
Collectively, this Chapter outlines a critical role of UI system towards its continuity service to
support urban life. The built environment such as UI system is playing a critical role as a
backbone towards supporting urban community daily life. Importantly, it also provides the
essential physical basis for modern societies. For this reason, the UI systems have multi-
dimensional impact on public safety and economic prosperity at both regional and national
levels.
Past experiences have shown that such systems are exposed to various natural and
man-made hazards. With extensive globalization and connectivity, the effects of natural and
man-made hazards (intentional and unintentional) may no longer be restricted to any
demographic or political vicinity. The resulting damage to the systems may cause human
causalities and disrupt the normal day-to-day life of people. Worse, the damages and its’
consequences may also impose significant direct and secondary economic losses due to the
business interruption that may not ever fully recover [7].
Severe hazards are also becoming more unpredictable, more frequent, and more
damaging. When hazard occurs and strikes particular UI systems, the community affected
requires immediate help and action to survive. Correspondingly, the concepts of ‘risk
management’ have become keywords when dealing with hazardous events especially in UI
system case. In addition, the UI system also requires supporting resources, and efforts to
recover in a short time.
CHAPTER 2-URBAN INFRASTRUCTURE SYSTEM ROLE AND CAPACITY
Page 32
Regarding the UI system giving reliable service to the community, the mutual-
relationship between UI system and community is an important aspect towards managing
the respective system. Subsequently, the literature review presented in this section also
outlines that the affiliation between UI system and the community is pivotal towards the
improvement of UI system serviceability and one of the key components to understand
hazard impact mechanisms.
To withstand various unexpected disturbances, correspondingly, both the risk
management and emerging concept of resilience seems promising to be considered and
applied within the UI management. Predominantly, this Chapter provides important insight
into the preliminary discussion of UI system resilience. Together, several studies have
brought up in this Chapter highlighted and suggested the need for managing UI system in the
face of disturbances.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 33
CHAPTER 3
RISK ANALYSIS AND RESILIENCE RELATIONSHP
CHAPTER HEADINGS Introduction Understanding Risk Concept in UI System Context Risk Characteristic and Impact Mechanism Risk Analysis and Approaches Review Risk and Resilience Assessment Correlation Resilience Assessment Model Review and Evaluation Chapter Summary
3.1 Introduction
This Chapter vividly explores the understanding of hazard and risk in general context. Then
the discussion of hazard and risk shifts into the urban infrastructure (UI) system context.
The characteristic of risk is explored which focus on the dynamic behaviors and mechanisms
of its impact. The sub-Chapter continues to account the ‘social amplification of risk’ concept
as a pivotal aspect towards assessing risk characteristic and impact mechanism in UI system
context.
Further, this chapter continues to review the literature and deliver the investigation
of affiliation between risk and resilience concept. Both risk and resilience analysis
relationship are discussed thoroughly. Following the literature review, an argument built
upon shortages pertaining to conventional risk analysis (RA) models and resilience analysis
(REA) models. Finally, the need for developing risk-based REA framework as well as the
supporting analysis models discusses in the last section of this Chapter.
3.2 Understanding Risk Concept in Urban Infrastructure System Context
To make clear distinction, this research distinguishes the word ‘risks’ from ‘hazards’. Hazard
describes the potential of harm or other consequences of interest. In conceptual terms,
hazard characterizes the inherent properties of the risk agent and related processes. While,
risk, describes the potential effects the hazard is likely to cause on specific target such as
buildings, ecosystems or human organisms and their related probabilities [74]. Moreover,
risk is understood as an uncertain consequence of an event or an activity with respect to
something that human’s value and, is a measure of the potential loss occurring due to natural
or human activities.
The recent definition of risk in Society for Risk Analysis (SRA) glossary is; the
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 34
consequences of a future activity, such as the operation of a UI where the consequences are
with respect to something that human value. The consequences are often seen in relation to
some reference values (planned values, objectives, et cetera) and the focus is normally on
negative, undesirable consequences [4]. Risk, further, is expressed as a combination of the;
likelihood of an adverse event, the vulnerability of people, places, and things to that event,
and the consequences that event occur. Such consequences can be either positive or negative
(e.g., injury, or loss of life, reconstruction costs, loss of economic activity and environmental
losses), depending on the values that people associated with them.
The consequences of UI system failure can range from the merely annoying to the
decidedly catastrophic [75]. Further, risk is a useful analytical concept that gives meaning to
those uncertainties of life that poses a danger to people or things. Potential losses are the
adverse consequences of such activities in form of loss of human life, adverse health effects,
loss of property, and damage to the natural environment. Meanwhile, from an engineering
point of view, the risk or potential loss is associated with exposure of the recipients to hazard,
and commonly can be expressed as a combination of the probability or frequency of the
hazard and its consequences.
Following a study conducted by Jochen Scholl, H. and B. Joy Patin, extreme event
presents the ultimate challenge to life, wellbeing, property, and in particular to response
efforts [53]. Taken for examples; two years after the Tohoku earthquake, tsunami, and
nuclear meltdown catastrophe of 2011, during which 20,000 people lost their lives,
thousands were injured, and an estimated 300,000 persons were displaced not to mention
the enormous infrastructural damage inflicted, the recovery to pre-event levels of life was
the farther away, the closer the distance to the sites of impacts.
Similarly, in New Zealand the Canterbury/Christchurch earthquake of 2009 with
several aftershocks and new shocks within two years slowed down the recovery efforts [53].
This phenomenon leaving vast “red zones” for which recovery and rebuilding were estimated
to take years. Both events among others gave evidence that particular communities in their
planning and preparedness efforts had not considered catastrophic (or extreme) events of
this unprecedented magnitude possible. Hence, the pre-established means of response and
mitigation methods were rendered insufficient.
Following the fact aforementioned, the built environment such as UI system is subject
to a formidable array of both natural and man-made hazards. In the natural realm (e.g.,
earthquakes, extreme winds, floods, snow and ice, volcanic activity, landslides, tsunamis, and
wildfires), as well as the man-made realm (e.g., change pattern of urbanization, poor
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 35
management, communication error, political disputes, economic and financial instability
including the technological failure), all poses some degree of risk to UI systems. Even so,
there is not much literature providing attention towards the inherent UI system risk and its
characteristic specifically for its impact.
Although forensic analysis of past failures improves the urban community’s ability
to; (i) Meticulously forecast and predict UI system serviceability performance, and (ii) To
design and construct the UI systems based on its performance approaches to withstand the
negative effects of various hazards, nonetheless failures can be expected to continue to occur.
Thus, to evaluate the inherent risks in UI system, experts and decision makers (DMs) are
required to understand the complex nature and dynamic characteristic of risk impact.
3.3 Risk Characteristic and its’ Impact Mechanism
This section moves to the discussion towards the characteristics and impact mechanisms of
risk where these issues have been underestimated in the UI risk management and resilience
studies in previous time. There are not many literatures explore and present the discussion
related to the characteristic and mechanism of risk impact. Particularly, engineers, academia
and industry people focused on the discussion of risk impact which is less comprehensive.
Several studies discussed the dynamic characteristic of risk impact, can be seen in [76-80].
Risk impact analysis is usually considered to be “simple and linear” in most literature
(i.e., focus on the risk magnitude measurement that is; probability and severity). Such
analysis output thus, leads to lose crucial information and further unreliable. A number of
studies discussed the UI system risk impact affecting community in the context of
socioeconomic, environment and sociocultural can be seen in [15, 81-83].
Meanwhile, in terms of risk impact, ‘dynamic’ refers to the consequence of risk impact
which affect non-linearly and in non-isolated space (i.e., correlating and affecting other risk
event and community in the form of impact propagation or cascading effect). Both the terms
have gone through less attention in former RA and management studies especially in UI
system context.
3.3.1 The Magnitude of Risk (Risk Priority Level)
The magnitude of risk, or sometimes called by ‘risk priority level’ is one of the main
dimensions towards analyzing risk. This analysis has become very popular in applications,
such as; highway construction RA, office building RA, climate change risk management, and
enterprise risk management (ERM). The application of risk magnitude analysis is currently
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 36
so widespread in important applications.
The risk magnitude analysis is based on a function which translated into risk decision
factors. The risk magnitude has been gained attention in academia field since its easier for
experts to understand the processes and the analysis result. This analysis method is a very
valuable tool for the risk management practitioner. Conventionally, risk magnitude can be
plotted in the risk matrix map. The risk map plots the likelihood of an event against the
impact (or severity) should the event materialize.
Figure 3-1 is an illustration of a simple risk matrix map, sometimes referred to as a
heat map. The risk matrix map is a common method for illustrating the likelihood and impact
of the risk event. The term likelihood is used rather than frequency, because the word
frequency implies that risk event will absolutely occurs, and the map is registering how often
particular event take place. Accordingly, likelihood is a broader word that includes frequency,
but also refers to the chance of an unlikely event happening. While, the vertical axis is used
to indicate risk impact.
Figure 3-1. Example of risk likelihood and severity in a risk matrix. (Source: Komendantova, N., et al. [84]).
The word impact is used rather than the word magnitude, so that the same style of
risk map can be used to illustrate hazard and control risk. Further, severity implies that the
risk event is undesirable and therefore, related to the hazard risk. Accordingly, the risk
matrix map presents a visual two-dimensional display of the “ranking” of risk event in terms
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 37
of a likelihood and impact scale that is relevant to the UI system problem interest.
Accordingly, it helps in interpreting historical experience and translating the expert opinions
in a consistent manner.
In this way, the risk magnitude analysis method allows stakeholders to display the
total risk index ranking of different UI system risk events affecting urban community based
on the expected losses that are quantitatively derived for different sectors (human,
environment, economy, and intangibles). The analysis of risk magnitude allows experts and
DMs to construct a composite impact score for each hazard scenario.
This can be done by the mathematical aggregation of a set of individual impact
indicators that measure multi-dimensional concepts which is usually does not have common
units of measurement. In this way, the analysis towards risk magnitude allows the users to
consider the input for different risk scenarios following various dimensions and indicators.
The risk magnitude analysis is not limited to, for instances; infrastructure (interruption in
fresh water, gas, energy, telecommunications, and transportation systems) and intangibles
(public security, political implications, psychological implications and loss to cultural values).
3.3.2 Risk Impact Connection and Interaction Pattern
Following the report made by the World Economic Forum (WEF) on global risks, the issues
most likely to impact on society, and makes recommendations on actions required is that risk
are becoming more interconnected and frequent [85]. The UI system which seen as a Large
Technical System (LTS) is exposed to numerous interdependent risks with various nature.
Considerably this issue found to burden both expert and decision maker towards managing
UI risks. Another significant concept which inevitably important to risk characteristic, is that;
each of risk event has a connectedness (interrelationship and interaction) with other risk
event in a specific risk network boundary.
The connectedness emerges from the concept of risk causality which affect and
influence other risk events. Such as the causality dynamic and interaction pattern are
phenomena resulted from an “impact escalation”. The impact escalation, resulted not only
the primary but also secondary risk events, triggered by an “escalation vectors”-also known
as the magnitude of the physical effects-originated by the principal scenario. Accordingly,
risk is a highly multi-dimensionality which contextually embedded within many different
processes. Therefore, managing risk inaccurately are constantly leads to the increasing of
risk consequences and negative coping activities. Figure 3-2 depicts the example of risk
interconnected network in a case of electricity infrastructure.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 38
The concept of interconnected risk event has been described well in a number of
studies. For instances; Correa-Henao, G. J., J. M. Yusta, and R. Lacal-Ara ntegui, described the
concept of interconnectedness of risk event and proposed a RA method using risk maps
which tested in the case of electricity infrastructures [80]. The study presented semi-
quantitative assessment strategy that incorporates the creation of risk charts within a risk
management framework engages an intuitive graphical representation in order to identify
the most significant threats affecting infrastructure networks.
Figure 3-2. An example of interconnected risk map in electricity infrastructure. (Source: Correa-Henao, G. J., J. M. Yusta, and R. Lacal-Ara ntegui [80]).
Risk interaction is considered as the existence of a possible precedence relationship
between two risk events nR and m
R . A components relationship (whether functional,
structural or physical) means that risks, which may be related (e.g., product functions, quality,
delay or cost), can be linked since a problem on one component may have an influence on
another. When performing the risk causality and interaction identification, new risk events
may appear for two reasons. Some are a consequence or cause of other risks already present
in the preliminary list; others are seen as intermediary risks. This process is useful to explain
the link between two or more existing risk events which the identification is done on direct
cause–effect relationship.
Fang, C., et al. presented an approach based on network theory to deal with risk
interactions in large engineering projects [86]. A topological analysis based on network
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 39
theory is presented, which aims to identify the key elements of interrelated risks structure
that has potential impact affecting a large engineering project. The application of some
network theory indicators to the project risk management field improves the understanding
of risks and their potential interactions. In their study, the identification of risk interactions
is the step of determining the cause-effect relationship between various risks which is also
playing a significant role for building the project risk network structure.
Further, Vidal, L.-A. and F. Marle, discussed the risks interaction in a large scale project
[87]. The study highlighted the importance of identify and assess the risks interaction of the
identified risk within the project system. Following the underlying risk of positive feedback
and amplification, analyzing risks interaction within the project complexity is suitable to
avoid the negative aspects and seize at the same time the opportunities that risk impact
creates.
In the case of UI system management, the main consequence is that any change in any
components within UI system may thus affect other components in an unpredictable way
because of the risk impact propagation. Several risk map methods have been proposed to
analyze the risks interconnection. The methods allow for a better representation of the
interrelationships among the various risks, and is widely applied for threat identification in
the infrastructure sector cases [80, 86, 87].
Further, an interconnected risk map is a useful tool for decision making because it
simplifies the perception of risks in an integrated manner. The approach assists the discovery
and analysis of the various threats to infrastructures, including the threats that are the most
critical. The construction of the risk map requires the use of descriptive and analytical
instruments to collect data from primary and secondary sources at respective infrastructure
asset owners and operators.
Accordingly, interconnected risk map simplifies the identification of the risk
components by grouping them into categories (e.g., technical and non-technical). Some of
the popular risk map approaches are, for instances; COSO audit maps which is facilitate the
monitoring and auditing of risks in the financial sector; Enterprise risk maps which is
facilitate the categorization of enterprise risk into the defined risk types [15,16,18,19].
Another characteristic of the risk impact is that: the “domino” or “cascading” (or
“propagation”) effect which discusses in the next section. Several definitions are reported in
the literature to identify domino accidental scenarios. In a situation where several key
factors are changing simultaneously in dynamic circumstances, it is misleading to speak of
individual factors disrupting the development of technological system. In the context of RA,
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 40
the term domino effect denotes ‘chain of accidents’, or situations when a single accident
generated by an accident in one unit causes secondary and higher order accidents in other
units.
3.3.3 Risk Causality, Ripple Impact and Propagation Pattern
The following definition of domino effect will be assumed: an accident in which a primary
event propagates to nearby equipment, triggering one or more secondary events resulting
in overall consequences more severe than those of the primary event [76]. In UI system
context, the ripple effect within the system affected not only to the common urban flow such
as; economic, environment and the community whom highly dependent, but also; the
digitality, cultures and politics [36].
The severe ‘domino’ accident that took place in the past made aware of the potential
threat posed by the escalation hazards since the first “Seveso” Directive (Council Directive
82/501/EEC) dealing with the control of major accident hazards [77]. Presently, the
identification and assessment of the possible ‘domino’ scenarios both on-site and off-site are
compulsory for the industrial sites falling under the obligations of the “Seveso-II” Directive
(Council Directive 96/82/EC), as amended by Directive 2003/105/EC.
The severity of an accident where domino effects took place leads to important efforts
for the prevention of the accidental scenario. Technical standards and legislation concerned
with the control of major accident hazard often include measures to assess, control and
prevent domino effects. The three elements characterized a domino event; (i) A primary
accidental scenario which is trigger the domino effect, (ii) A propagation effect following the
primary event due to the escalation vectors effect caused by the primary event on secondary
targets, (iii) One or more than one secondary accidental scenarios.
An example of propagation patterns of the domino effect is depicted in Figure 3-3
below. The domino effect of risk events has been discussed well in several studies [76, 77,
88-91]. Accordingly, the study of domino effects in the literature has primarily been focusing
on proposing and developing the probability or on domino effect frequency estimation.
Further, the probability of occurrence and adverse impacts of such ‘domino’ or ‘cascading’
effects are increasing due to increasing congestion in our world complexes (e.g., increasing
density of human population).
The domino effect happens only if its accident (overall) severity is higher or at least
comparable place, or when an accident in a unit (known as a ‘primary event’) triggers other
accidents by means of escalation vectors [91]. Escalation vectors are the physical effects (e.g.,
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 41
fire impingement, fire engulfment, heat radiation, overpressure, or explosion-induced
projectile fragments) which is depending on various factors such as the type of the primary
event and the distance between the accident epicenter and nearby units.
Figure 3-3. A propagation pattern of the domino effect. (Source: Khakzad, N., et al. [91]).
Further, potential secondary units are those the adjacent units that are more likely
contribute to the domino effect. The inclusion of secondary units in the domino effect not
only intensifies the accident which is causing more severe consequences, but also support
the domino effect to escalate to the next level by impacting tertiary units. The escalation
vectors originating from secondary events in turn trigger other accidents in tertiary units
either by themselves or through synergistic effects.
Meanwhile, the concept of domino effect in the quantitative assessment of escalation
hazard is a key tool to understand the credible and critical scenarios of complex urban life.
Thus, the quantitative assessment result of domino effect is significant towards identifying
the critical hazard events and prioritizing actions in order to address the escalation hazard.
Further, the actions identified also support the prevention and protection in the area of
building risk mitigation and strategy planning.
Nonetheless, modelling and analyzing the domino effects are very challenging
particularly in complex processes depending on the problem context. Most of the past RA
studies deal with accident in a single event impact manner. In reality, accident in one unit can
cause a secondary accident in a nearby unit, which in turn may trigger a tertiary accident,
and so on. Although a remarkable progress in the risk and safety analysis of individual
accident scenarios which is limited to a single unit has been achieved in recent years, domino
accidents have gained less attention in the context of quantitative risk analysis (QRA) both
because of their lower probability and higher complexity [91].
The analysis of potential escalation of primary scenarios leading to severe accidents
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 42
due to domino effect is of utmost importance. A number of studies discussed the domino
effect in various case studies are well documented [76, 77, 88-91]. For instance, Khan, F. I.
and S. A. Abbasi., proposed a systematic method called Domino Effect Analysis’ (DEA) [88].
The method is based on a deterministic model used in conjunction with probabilistic
analysis.
This sub-section concludes that the domino effect element in RA should be applied as
an integral part of all RA initiatives. The next sub-section will go through another risk impact
mechanism that is; risk impact to community. The discussion will firstly deliver a significant
concept of how society responds and affected by risk which is called by “the social
amplification of risk”.
3.3.4 Social Amplification of Risk
Social amplification of risk (SAR) denotes the phenomenon by which information processes,
institutional structures, social group behavior and individual responses shape the social
experience of risk, thereby contributing to risk consequences [81]. The interaction between
risks and social processes makes it clear that, as applied within SAR framework, risk has a
meaning only to the extent that it treats how people think about the world and its
relationships.
Thus, there is no such thing as ‘true’ (absolute) and ‘distorted’ (socially determined)
risk. Rather the information system and characteristics of the public responses that compose
social amplification are essential elements in determining the nature and magnitude of risk.
Figure 3-4 depicts the conceptual framework of SAR which demonstrates the possibility that
social amplification may (quantitatively and qualitatively), increase the direct impact.
The analogy of dropping a stone into a pond is apt here, as it illustrates the spread of
these higher-order impacts associated with the SAR. The ripples spread outward, first
encompassing the directly affected victims of the first group, then touching the next higher
institutional level (a company or an agency) and, in more extreme cases reaching other parts
of the industry or other social arenas with similar problems.
The SAR was one of the most perplexing issues and problems in RA. It is why some
relatively minor risk events, as assessed by technical experts, often elicit strong public
concerns and result in substantial impacts upon society and economy [81]. The main
argumentation is that risk events interact with psychological, social, institutional, and
cultural processes in ways that can heighten or attenuate public perceptions of risk and
related risk behavior.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 43
Risk and risk events
Personal experience
Direct communication
Indirect communication
Source of information
Individual senses
Informal social networks
Professional information
brokers
Information channels
Opinion leaders
Government agencies
News media
Social stations
Cultural and social groups
Voluntary organizations
Attention filter
Intuitive heuristics
Cognition in social context
Individual stations
Decoding
Evaluation and interpretation
Attitude/altitude changes
Organizational responses
Social protest
Institutional and social behavior
Political and social action
Directly affected persons
Company
Industry
Other technologies
Society
Society
Stakeholder groups
Professional groups
Local community
Loss of sales
Financial losses
Regulatory actions
Organizational changes
Litigation
Increase of decrease in physical risk
Community concern
Lose of confidence in institution
Ripple effects ImpactsAmplification and attenuation
Feedback and iteration
Figure 3-4. The conceptual framework of social amplification of risk. (Source Kasperson, R. E., et al. and Kasperson, J. X., et al. [81, 82]).
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 44
The general phenomenon of the SAR is composed by various aspects, that is; the social
structures and processes of risk experience; the resulting repercussions on individual and
group perceptions; and, the effects of these responses on community, society and economy.
The roots of social amplification lie in the social experience of risk, both in direct personal
experience and in indirect, or secondary experience which is through information received
about the risk, risk events and management systems [81].
Meanwhile, when direct personal experience is lacking or minimal, individuals learn
about risk from other persons and from the media. Information flow becomes a key
ingredient in public response and acts as a major agent of amplifications. Attributes of
information that may influence the social amplification are volume, the degree to which the
information is disputed, the extent of dramatization, and the symbolic connotations of the
information.
Understanding this interaction for different risk events, for different social
experiences and for different cultural groups is an important issue in the RA. The UI system
is a complex and crucial asset which regulated, controlled, supported, and also exploited by
various stakeholders (who dependent and affected by the UI system). Departing from the
SAR framework understanding aforementioned, different individual or groups within the
urban community will be eventually associated and affected to risk event dissimilarly.
The issue of community-associated to risks has been documented well in the study
conducted by Yang, R.J. and P.X.W. Zou, [92]. The study is conducted to analyze the
stakeholder-associated risks in green building project. Further, the study emphasized most
risks are interrelated and associated with internal or external stakeholders. Another studies
of the UI system facing disturbances with its impact affecting community (in the context of
socioeconomic, environment and sociocultural) received enormous attention to both
academia and public interests can be seen in [15, 16, 27, 28, 30, 81-83, 93-97].
Figure 3-5 depicts the conceptual model of risk impact affecting community.
Following the SAR framework, the information system may amplify risk event in two major
stages (or amplifiers); (i) The transfer of information about risk event by intensifying or
weakening signals that are part of the information that individuals and social groups
received, (ii) The response mechanisms of society by filtering the multitude of signals with
respect to the attributes of the risk and their importance.
Accordingly, signal arises through direct personal experience with a risk event or
through the receipt of information about the risk event. These signals are processed by social,
as well as individual, amplification ‘station’. For example, scientists or scientific institutions,
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 45
reporters and the mass media, politicians and government agencies, or other social groups
and their members). The SAR will spawn behavioral responses, which, in turn, will result in
secondary impacts. Secondary impact is then perceived by social groups and individuals so
that another stage of amplification may occur to produce the third-order impact.
Risk impact propagation scenario
Hazardous
event
Impact
Impact
Impact
Impact
Trigger
Trigger
Trigger
Trigger
Trigger
Trigger
Haz
ards
and thre
ats
Prevention
(proactive)
Mitigation
(reactive)
Barrier
Specific
harm
Initiating
event
Accident scenario
Risk cause and impacts as a hazardous event trigger
Uncertainty
Affected
community
Figure 3-5. The conceptual model of risk and its impact in UIs context.
Further, the third-order impact thereby may spread, or ‘ripple’, to other parties,
distant locations (or even to future generations). Each order of impact will not only
disseminate social and political impacts but may also trigger (risk amplification) or hinder
(risk attenuation) positive changes for risk reduction. The concept of SAR is, therefore,
dynamic as it takes into account the learning and social interactions resulting from
experience with risk.
A study conducted by Kasperson et al. argued that social amplification can also
account for the observation that some events will produce ‘ripples’ of secondary and tertiary
consequences that may spread far beyond the initial impact of the event [81]. Furthermore,
some events may even eventually impinge upon previously unrelated technologies or
institutions. This rippling of impacts is an important element of risk amplification, since it
suggests that the process can extend (in risk amplification) or constrain (in risk attenuation)
the temporal, sectoral and demographical scales of impacts.
In addition, it also points up that each order of ripple impact, may not only allocate
social and political effects but may also trigger or hinder managerial interventions for risk
reduction. Moreover, a research conducted between Clark University and Decision Research,
which involved a large comparative Geographical analysis of 128 hazard events (e.g., biocidal
hazards, persistent/delayed hazards, rare catastrophes, deaths from common causes, global
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 46
diffuse hazards and natural hazard events), has concluded that social amplification
processes are as important as direct physical consequences in determining the full array of
potential risk consequences [81, 82].
Another qualitative study by conducted by Kasperson and colleagues yielded
complementary findings to the quantitative cross-risk work [81, 82]. The components of the
SAR framework explored included; the physical impacts, information flow, social-group
mobilization and rippling effects. Further, a number of interviews with key participants are
also conducted in each case. Following the literature review mentioned above, in the context
of disturbed UI system, a discussion leads to the following conclusions. The study concluded
that, first, based on the case study the attenuation/intensification of risk impact effects
across various groups and at different scales.
Second, the economic benefits associated with risks appear to be a significant source
of attenuation at the local level. Risk events, when they undergo substantial amplification
and result in unexpected public alarms (or ‘social shock’), often surprise communities. The
extreme attenuation of certain risk events often continuing to grow in effects until reaching
disaster proportions. Despite, the significant consequences for the risk bearers and society
more generally, risk events and its impact virtually unnoticed and untended.
Understanding the amplification dynamics, thus, requires an insight into how risk-
related decisions (i.e., related to organizational self-interest, messy inter-and intra-
organizational relationships, economically related rationalizations, and ‘rule of thumb’
considerations), often struggle with the view of RA as a scientific enterprise. Given the
inherent complexity of risk communication and social processes, it is clear that the
assessment of risk cannot be expected to yield on a simple or direct prediction regarding
which issues are likely to experience amplification/attenuation effect in advance.
The concept of SAR can, in principle, provides the necessary theoretical base for a
more comprehensive and powerful analysis of risk as well as the risk management in modern
societies. Conclusively, the robust and comprehensive RA contribution could be to draw upon
social amplification to improve society’s capability anticipating new or emerging risks. While
examining the UI system and risk impact characteristic as well as the role of community
characteristics, it is clear that most (if not all) of the risk events are associated with
stakeholders. Furthermore, based on the SAR framework, both social amplification and
attenuation through serious disjuncture between expert and public assessments of risk and
varying responses among different publics.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 47
3.4 Risk Analysis and Approaches Review
Risk analysis (RA) has existed for almost four decades and has reached a wide range of
applications. The RA has a purpose of revealing and identifying potential failures modes and
hazards in various systems and operations in order to prevent before they manifest. Further,
the RA goal is that to describe and characterize both the knowledge and lack of knowledge
with uncertainty being a key element of risk [4, 67]. Additionally, RA is the process of
characterizing, managing, and informing others about existence, nature, magnitude,
prevalence, contributing factors, and uncertainties of the potential losses.
Specifically, the RA is a formal and systematic analysis to identify or quantify
frequencies or probabilities and magnitude of losses to recipient due to exposure to hazards
(physical, chemical, or microbial agents) from failures involving natural events and failures
of hardware, software, and human systems. Accordance to the risk impact, in the UI context,
the loss may be external to the system. The loss is caused by the system to one or more
recipients (e.g., humans, organizations, economic assets, and environment). In other hand,
the loss may be internal to the system which is causing damage only to the system itself.
In line with the SRA concept, risk describes the (future) consequences potentially
arising from the operation of UI systems and from community activities as well as the
associated uncertainty [67]. Correspondingly, consequences are usually seen in negative,
undesirable terms with respect to the planned objectives. Meanwhile, accident scenarios are
also a relevant part of risk which is the combinations of risk events potentially leading to the
undesired consequences. The RA has classically been defined to address three key questions,
that is: (1) What can go wrong?, (2) What is the likelihood that it could go wrong?, (3) What
are the consequences of failure? [98].
The first question leads to the identification of undesirable set of scenarios (e.g.,
accident). The second question demands to estimate the probabilities (or frequencies) of the
risk scenarios. While the third question refers to the magnitude of potential losses
estimation. This triplet definitions emphasizes the development of accident scenarios as an
integral part of the definition and analysis of risk. Therefore, in the preliminary processes of
RA, risk scenarios are one of the most important products of RA. Figure 3-6 depicts the
boundary of risk assessment within risk management framework.
The RA process focuses on scenarios that lead to hazardous events. The general RA
methodology becomes one that allows the identification of all possible risk scenarios,
calculation of their individual probabilities, and a consistent description of the consequences
that result from each risk scenarios. Therefore, RA may require a multidisciplinary approach
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 48
since risks may cover a wide range of causes and consequences. Different RA tools and
techniques may be appropriate in different context.
Communication
and consultation
Monitoring and
review
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment
Risk assessment
Figure 3-6. The standard framework of RA. (Source: ISO/IEC, ISO/IEC FDIS 31010:2009, [99]).
Further, the purpose of RA is to provide evidence-based information analysis to make
informed decisions on how to treat particular risks and how to select between mitigation
options. Accordingly, the RA techniques and some of the principal benefit of performing RA
can be seen in Final Draft International Standard (FDIS) [99]. Importantly, RA is the main
risk management input into strategy formulation since it focuses on improved decision
making.
Although RA is vitally important, it is by oneself useful if the assessment conclusions
are used to inform decisions and/or to identify the appropriate risk responses for the type
of risk under consideration. A five important points towards RA has been discussed well by
Cox Jr, L. A., [79]. These five important points of RA emerge in related to; the existing of
complexity characteristics of engineering systems and their models, high RA demand by the
society, the significant role of formal RA for managing and regulating risks, various
categories of risks, and the trends of using RA methods in engineering field.
The UI basic systems are at risk from threats that community may not yet foresee.
Therefore, in the context of ensuring adequate protection and resilience of UI system,
vulnerability and risk must be analyzed and assessed towards preparing to address them by
design, operation, and management. Nonetheless, many professionals, including; emergency
managers, but also extending to elected officials, urban planners, and the like, make
decisions that intentionally or unintentionally influence community resilience, are
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 49
unfamiliar with the existing concept of interrelationships between UI system and urban
community.
The RA and risk management drive major core activities associated with UI
protection and resilience, including executive and managerial decision making for
prioritization of programs and investments. Importantly, risk qualitative measures and
quantitative metrics also needed for supporting the design, deployment and employment of
protection, and resilience management strategies by measuring their effectiveness and
efficiency.
Meanwhile, vulnerability and RA are both foundational concepts and analytic
disciplines solidly rooted in a structured and systematic approach. The concepts and analytic
disciplines should be deeply ingrained in the practical application of UI system protection
and resilience. The reason for their application is straight forward to identify and understand
the hazards and vulnerabilities of UI system. Thus, DMs are able to identify proper measures
to implement for UI system protection and resilience.
Moreover, prudent risk management demands that stakeholders anticipate the
hazards and threats to their physical UI design systems that are inherently safer and more
resilient, and further be prepared to restore the system when they fail [22]. In a UI system
perspective, the goals of vulnerability and RA for informing protection and resilience
decision making are [100]:
- Given UI system and its planned objectives, is to identify the set of events and event
sequences that can cause damages and loss effects with respect to the UI system
serviceability;
- Identify the relevant set of “initiating risk events’ and evaluate their cascading impact
on a subset of elements for the overall UI system.
The ultimate goal of UI system protection and ensuring resilience is to identify
obvious and hidden vulnerabilities to be able to act for managing and reducing impact before
they manifest as failures. On the study conducted by, Zio, E., vulnerability and RA are
considered for their central role to support decision making for proper infrastructure
protection and guaranteeing the UI system resilience [4].
The comprehensive of mitigation and recovery strategy for infrastructure minimizing
risk impact and reaching its normal serviceability state (or similar before the extreme event
occurs, see 1st stage of resilience concept in Figure 2-5) are tightly correlated. This
correlation is based on the great preliminary of RA with long-term plan consideration and
proper participatory of decision making by various stakeholders. In the UI system REA, the
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 50
objective of RA is to deliberate a reliable analysis output towards inherent risks and inform
DMs prior making comprehensive decision. This renders questionable of the suitable
classical RA methods.
3.4.1 Shortage of Conventional Risk Analysis Method
The conventional RA perspective focuses to answer several questions, that is “what can go
wrong?”, “what is the likelihood that it could go wrong?”, “what is the consequences of
failure?”. This research proposed a novel risk criticality analysis method which might go and
cope one step further towards building urban UIs resilience. Accordingly, many types of
conventional RA methods have been developed by applying complex mathematical models.
Further, the models also applied to gauge and define the significant risk events.
There are a number of conventional RA methods, such as; Hazard and Operability
(HAZOP), Hazard Identification (HazId), fault tree and event tree analysis, risk matrix, failure
modes effect and criticality analysis, aggregate exposure and risk model, risk priority scoring,
hierarchical RA [4, 98, 101-107]. As there are various conventional RA methods, however,
this research found a number of shortcomings. For instances; fault tree analysis which is
typically found on a decomposition of the system into subsystems, basic elements and their
subsequent decomposition for quantification [27]. The pre-defined causal chains which are
identified by using event tree analysis seem inappropriate to identify the dynamic risk
impact pattern, and vulnerabilities emerging in an UI system relationship complexity with
the community.
Deshmukh et al. presented a severity assessment tool to determine the reduced
serviceability level of UI, especially after a disaster stage [108]. The proposed model is found
to be able to determine both the social and economic impact on communities and industries
respectively. The advantage of the model is that it can explore and evaluate the reduction in
the serviceability of the respective UI functionality due to impaired UI system. Moreover,
Zhang et al., proposed Fuzzy comprehensive evaluation method for assessing unexpected
accidents and potential latent risks in water supply infrastructure [109].
Other studies which have stressed the development of RA methods in infrastructure
context can be seen in [106, 110-112]. These studies have provided valuable methods in
order to deliver the output information for DMs to support both community and UI system
being resilient. Although a conventional experience-based risk identification and assessment
methods are more practical, however the input data only promotes the representation of the
specific expert group. Such isolated assessment processes without relying on a formal
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 51
quantitative assessment of the probable consequences on the affected communities made
the analysis output incomprehensive.
In the UI case context, the RA still confined only to the technical risks [113, 114].
Conventional RA methods are focus on giving high attention to the magnitude, probabilistic
variable, and weight value consideration to determine the crucial risk event. However, it is
found that the analysis of crucial risks in terms of its priority level impact to urban
community and propagation dynamic are still missing. Without questioning, the analysis of
risk characteristic, negative impact, and adverse effect of UI system to urban community
could be far more complex, unpredictable, and difficult to manage.
Importantly, the critical level of individual risk is not only related to the RA processes
and results, but also to the individual capability, resources availability and other external
factors and constraints [92]. This complexity inevitably rises spontaneously from the
different pattern and behavior of risk ripple impact towards dynamic circumstances
including the urban community. Therefore, it is clear that the risk event is a complex and
dynamic which difficult to obtain long-term forecasting reliable enough.
Accordingly, the traditional risk-based approaches that incorporate risk and
vulnerability analyses need to be extended to a broader scope. The extension of the scope
should give wider consideration than the standard analysis for the identification of hazards
and the probabilistic quantification of their occurrence. The extension must be driven by the
need for more confidence in the treatment of both surprises and black-swan risks. Thus, the
treatment has to put forward through improved understanding of systems and processes,
and the aim of improving the ability to predict what may be coming [4].
Correspondingly, it is considered conventional RA methods in UI system vulnerability
incapable to capture the (structural and dynamic) complexities facing multi-risks. Therefore,
a study beyond the traditional, centralized, and isolated RA methods, which considering
different range of risk profiles including with various risk characteristics, needs to be
developed further to achieve comprehensive risk evaluation. Based on the discussion above,
this research highlights several drawbacks and limitations of conventional RA methods
which described in Table 3-1.
Based on the identified conventional RA shortages, the preliminary conclusion
towards the UI systems RA is that the analysis cannot carried out with conventional methods
of system decomposition and logic modeling. Therefore, the shortage of conventional RA
methods leads to losses crucial information, issues obscurity, and thus cause managerial
uncertainty towards building comprehensive risk mitigation strategy towards developing UI
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 52
system resilience.
Table 3-1. Conventional RA drawbacks summary.
No Conventional RA method drawbacks 1 It does not provide information on the interrelationship existing between the UI system inherent risks
and communities [115]. 2 Conventional RA methods tend to view, analyze, and evaluate risk events in a subjective,
compartmentalized, linear, isolated and fragmented manner, monotonous, and static which turn in capable to deal with the UI system RA complexity issue. Therefore, conventional RA methods need to be extended beyond the casual analysis, such as; event-chain description of impact and consequences (causality).
3 Conventional RA methods lack to consider and accommodate stakeholder engagement and divergent perceptions respectively
to achieve the objective and reliable strategic outcomes since it shortages lie on the insufficient capacity to recognize the importance of community in terms of exchanging information between divergent stakeholder perceptions.
4 It is limited to the use of linear analysis when assessing the risk and its impact on infrastructure development without consider the complex system [116-119]. There is a tendency headed on the inward-looking perspective that treats risks impact in isolation from one another.
5 Conventional RA neglects the higher-order impacts and thus greatly underestimate the variety of adverse effects attendant on certain risk event (and thereby underestimate the overall risk impact from the event).
6 It lacks an integrative method that provide guidelines on how to model and measure; the complex nature and characteristic of risk, and community response to the risk. This results in a reaffirmation of technical RA and provides least definite answer (however narrow or misleading) to urgent UI system risk problems.
7 The inherent tendency to promote the effectiveness and robustness of assessment process and analysis result respectively lacks societal impact consideration.
3.4.2 Knowledge Gaps on The RA Model towards Risk Impact to Community
The UI system consists of huge and complex mechanisms with significant incoherent
connections of numerous dependent infrastructure systems [26]. The interconnected UI
systems is an integrated part for supporting human needs in the urban living circumstances.
It is, thus clear that the relationship between the UI system and community inevitably exists
and inseparable [22, 34-37]. For that the reason, the continuous reliance of urban dwellers
on UI stretched across geography creates its inevitable vulnerabilities [22]. Importantly,
without knowing the individual impacts on stakeholder arising in risk events, resilience
planning is not effective.
The disrupted infrastructures, will automatically affect its serviceability followed by
the unavoidable disruption and various consequences to urban life. Henceforth, the
interrelationships between the UI and associated community is the key components to
understand the risk impact mechanisms. Oh, E., Oh et al., and Bocchini, P., et al, discussed the
interrelationsihp between risks and community through a conceptual model of basic cell [40,
41, 68]. The studies highlighted the diffusion path of risk impact develops at the advanced
stages increase the complexity for risk mitigation.
Risk impact cascades, systemic risks, normal accidents, and trans-boundary risks are
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 53
all terms used to describe risks that arise out of the non-linear and multifaceted interactions
between components within broad, open-ended, and complex socio-technical systems [120].
Accordingly, applying conventional RA paradigm and method that focus solely on single
metric of risk will return on the ‘out-of-dated’ and less comprehensive analysis output.
Several attempts have been made to reduce the risk impact and consequences by breaking
down and simplifying the UI system components. However, this process often ended up
merely shifting risks to different areas and creating new, and even more, catastrophic risks.
Investigating the association of UI system risk and community, thus, have to go
beyond the usual cause-consequences analysis to be able to focus on spill-over clusters of
failures. Accordingly, efforts are increasingly directed toward grappling with complexity and
approaching RA in its entirety. In the light of RA method importance, it is found that the
functionalities of major previous RA methods developments were limited. Such limitation is
due to most of them built on the consideration of linear RA without considering the dynamic
of risk impact (i.e., the risk causality, interaction capacity and impact to urban community).
Particularly, current RA research applies various approaches from a wide perspective
which attempt to move from simple, linear and siloed model toward more holistic one that
embrace complexity. With the increasing of community losses due to the risk consequences,
more emphasis is being placed on improved RA methods and mitigation strategies that
consider social loss [40-43, 121]. In other hand, the discussion towards sequential relation
to community-risk associated problem are not well established and thus poses significant
challenge to the RA method development.
A number of RA methods have been developed by integrating complex mathematical
models to gauge and determine the significant risk event. For instances; fault tree analysis,
which are typically founded on a decomposition of the system into subsystems, basic
elements and, their subsequent decomposition for quantification [27]. The pre-defined
causal chains of risk which is identified by event tree analysis seem inappropriate towards
identifying the hidden risk and vulnerabilities emerging in UI system relationship
complexity with the community.
Correa-Hena et al. proposed semi-quantitative method which leverage both risk maps
and chart for assessing risk in electricity infrastructure [80]. Zhang et al. proposed Fuzzy
comprehensive evaluation method for assessing unexpected accidents and potential latent
risks in water supply infrastructure. As dicussed above, despite the existance of the vigorous
RA methods in the risk management literature, the inherent tendency to promote the
effectiveness and robustness of assessment processes, and analysis result lack of societal
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 54
impact consideration.
To fill these gaps, Deshmukh et al. presented a severity assessment tool to determine
and assess both the social and economic impact on communities due to disturbed and
reduced UI serviceability level after disaster occured [108]. The model has been validated in
the real case research of the 2008 Midwest floods. Following the structured analysis, the
presented tool found to be flaw as it has mainly focused on what the risks are and how they
may impact on the objectives.
People’s perception toward risk events is the product of individual intuition which
reflects their self-vulnerability point of view in both the pre-and post-disturbance periods.
It is particularly, reflects the different individual (or groups) within the community
associated who has affected by risk impact will be influenced differently as per by their social
and cultural environment.
Henceforth, former RA cannot be expected to yield on a direct prediction regarding
what risk event is significant to the community. It is thus, necessary to highlight the pattern
of stakeholder-risks relationship to promote the comprehensiveness of effective decision
making towards the dynamic and complex of risk impact characteristics. This complexity
rises spontaneously from the different pattern and latent behavior of risk impact towards
community.
On this ground, Yang and Zou, proposed a theoretically innovative and practically
applicable ‘stakeholder-associated risk’ analysis from a social network perspective [92]. The
one-mode network analysis is applied to analize the risks and their interactions in the
complex green building projectsbased on network topology. The study measured network
tie strength using risk decision factors between different risk events nodes as well as
associated impact to another nodes. As the study proposed a RA in a novel way, nonetheless,
this research found several shortages such as; the input data only promotes the limited
representation of expert groups judgments.
Further, such an analysis process lack of a formal quantitative assessment of the
probable consequences on the affected communities made the analysis ouput less accurate.
The application of one-mode network analysis method applied is lack of comprehensive
dichotomize processes towards mimicing the interrelationship behavior between risk
impact and the community. Such analysis processes has tended towards inward looking
perspectives that treats risks in isolation from one another. Thus, it leads to information loss
and extensiveless analysis output.
In practice, there is no ‘silver bullet solution’ to the problem of analyzing the risks in
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 55
terms of its impact affecting urban community. Rather, a novel RA model necessary need to
be developed which in certain degree allows to structuraly measure, analyze and determine
the significant risk based on the social relationships between risk and individual (as a part
of urban community). This relationship important as it reflects the understanding of how
various UI system risk events affecting community (individualy) differently. Therefore, a
model which capable of capturing complexity connections between risks and stakeholders
individually will be highly realistic for addressing the knowledge gap.
3.4.3 Knowledge Gaps on Risk Causality and Interaction Pattern Analysis Model
In the UI system context, the risk impact dynamic within the system affected not only to the
dependent community but also to the common urban flow, such as; economic, environment,
digitality, cultures and politics [36]. The risk characteristics (i.e., the causality dynamic and
interaction pattern) are phenomena resulted from an “impact escalation”. The impact
escalation is emerged from not only the primary but also secondary risk events, and thus
triggered by an “escalation vectors”. The escalation vectors also known as the magnitude of
the physical effects, originated by the principal risk scenario.
This phenomenon has increased the exposure to systemic risk, characterized by
cascading of failures which can have significant impacts at the UI system scale. The
unexpected absence UI system function works to underline the very (albeit useless)
presence of the vast stretched out system that usually remains so invisible. To date there are
various efforts increasingly being directed toward grappling with complexity and dynamic
towards risk identification, analyses, and management approach in its entirety. The concept
of risk causality, propagation sequence and interaction pattern has been studied well.
For instances; Vidal and Marle, proposed a method to analyze risk interconnections
using risk map [87]. The method allows for a better representation of the interrelationships
among the various risks to avoid the negative aspects of its impact. It is, however, this
research found that the method has a shortage as the method lack of an analysis processes
towards appraising the interaction links proportion or scale between risk events. To fill the
previous study gap, Lindhe, A., et al. developed an integrated probabilistic RA method by
adopting the event tree analysis method and validated onto the drinking water systems case
[122].
The study offers a useful overview of how risk emerge and the impact probability
towards influencing other risks can be assessed. Nonetheless, risk event tree analysis
method has a shortfall in capturing the messy entanglement between roots (initial) and
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 56
branches (secondary) of particular risk. It is based on a linear inductive thinking on the chain
of events resulting from an accident initiator. This can be a way to implement the concepts
of predictability and unpredictability within the uncertain space and time, with respect to
‘common-cause variations’ (predictable in view of historical experience and knowledge) and
“special-cause variations” (unpredictable because beyond experience and knowledge) [4,
123, 124].
Following the shortcoming that has been found from the study conducted by Lindhe,
A., et al. [122]; Fang, C., et al. fill the gap by presenting network-based RA approach to deal
with the risk causality and interactions characteristic [86]. The approach aims at identifying
both key and secondary elements in the structure of interrelated risks. Another study in
relation to analyze the risk causality and propagation pattern sequence is conducted by
Khakzad, N. [125]. The study proposed a probability-based risk causality and propagation
sequence analysis method. The proposed method adopting the Bayesian network (BN)
method to model both the spatial and temporal evolutions of domino effects, and also to
quantify the most probable sequence of accidents.
John, A., et al. presented a model approach that employs Bayesian belief networks to
model various disruption risks interactions as influencing variables in a seaport system
[112]. Further, Yuan, Z., et al. developed a methodology for the probability estimation of dust
explosion domino effect based on BN method [126]. By applying on the flexibility structure
and robust reasoning engine of BN method, the likely propagation route of potential domino
effects along with the probabilities can be assessed. Although BN has been applied
extensively in the academia nowadays, however the method complexity made its application
less popular and difficult into real world problem.
Another shortfall is that, BN method inadequacy to accommodate community
participation towards giving divergent input data. Underestimate the data collection leads to
produce simulation and analysis miscue. Particularly, analyzing risk causality and
propagation pattern using social network analysis (SNA) approach receives more attention
recently. The SNA is relatively straightforward perhaps best known as an approach for
analyzing groups of people. Moreover, SNA has applied to understand how hazards spread
and interact with each other.
For instance; LaRocca, S. and S. Guikema, employed the network theoretic approach
for RA in complex infrastructure system [127]. Ongkowijoyo, C. and H. Doloi, developed an
integrated method for assessing UI system risks where network analysis applied to analyze
the risk impact propagation [128]. Moreover, Clark-Ginsberg, A., demonstrated how the tools
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 57
of network analysis can be employed to develop network maps using participatory data set
and discussed the utility of such displays in designing interventions to reduce risk
consequences [120].
Although SNA has been applied in various RA studies, nonetheless, the application of
SNA in analyzing the risk causality, impact propagation, and interaction pattern in the
context of UI system is still an unexplored area. Furthermore, towards obtaining the input
data, SNA lacks of defining the boundaries of the set nodes in which to be included in the
network [129]. Moreover, another issue which still missing is that SNA method lacks the
interrelationship weight value between the risk impacts and interactions with other risks.
Based on above discussion, this research also intends to remedy the conventional RA
model omissions towards the assessment of single risk event with respect to its dynamic
causality, propagation pattern and connectedness with other risk events. Therefore, building
a novel RA method which capable to capture and model the phenomena of a risk impact
characteristics and mechanism dimension mentioned previously is the importance of this
research.
Based on the literature review discussed thoroughly, it can be concluded that
conventional RA method cannot be expected to turnout on a simple result regarding which
risk event in UI system is likely significant. Accordingly, a major challenge is to define the
critical risk based on the understanding of how the dynamic of risks characteristics and its
impact mechanisms affects UI system and community. Based on the identified critical risk,
thus the UI system robustness then can be assessed comprehensively.
The previous paragraph ended the discussion towards responding the first research
question stated in the first Chapter (RQ1, can be seen below as a reminder). In this research,
it is concluded that risk impact characteristic that need to be considered as the element to
define critical risk, is that; (i) The magnitude of risk which formed by various decision factors,
(ii) The risk causality and interaction capacity with other risks, and (iii) The impact of risk
affecting community-individually.
RQ1: What the risk characteristic and impact mechanism that are significant in defining the
critical risk?
3.4.4 The Logic for Developing Critical RA Model
Assessing UI system risk can be daunting as the UI, which usually seen in a traditional
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 58
perspective, cannot be observed in a single technical element. This due to the UI systems
create a social value downstream by serving a wide variety of end-users (as an individual or
group) who rely on access to the system and another system. Forasmuch as, certain
assessment techniques are required to involve individuals and further require a particular
approach to undertaking RA. It is important that the adopted approach is consistent with the
culture of the community and the problem context.
Based on literature review sections previously, it is clearly that, assessing inherent
risks in UI systems is inevitably crucial to the development of both UI system and community
resilience. Therefore, assessing UI system risks in a real world using single conventional RA
method is inadequate to accommodate the complexity and dynamical of both UI system flow
and risk impact characteristics (and mechanism). As a number of latent risk impact
characteristics have been discussed previously, further discussion goes to some challenges
toward assessing UI system risks that have emerged and need to be considered.
This research pays several issues toward several challenges of developing UI system
RA method. These challenges are; First, dynamic risk impact in real-life environment.
Following the risk impact characteristic and mechanism discussed previously, it is clear that
conventional RA point of view (predominantly focus on the calculation of risk decision factor
to measure risk) is old-fashioned and incapable to deal with the UI system risk impact
characteristic and mechanism. Conventional RA is, therefore, unable to produce robust
analysis result. Modifying conventional RA processes which can simulate risk impact
characteristic and mechanism in current changed real-life circumstances would be of the
advantage.
Second, public perceptions towards risks. Better UI management decisions can be
resolved and made when the needs, preferences, and desires of the community are fully
examined. The importance of the stakeholder engagement in the decision making processes
regarding the complex system of UI and its’ risks is absolutely necessary [93]. The broad
stakeholder opinions are important as it is delineating the technical risk estimation based
on the only conventions of an elite group of professional risk assessors. This isolated
deliberation may leads to the claim of no more validity degree than competing estimates of
the lay public [84, 105, 130].
From here, challenge emerges as different individual have their own perceptions
toward risks within the assessment processes. Community perception towards risk, its’
impact, risk reduction measures and the role of public institutions in UI system risk
preparedness are vital for the successful development and implementation of risk mitigation
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 59
strategies, measures and policies [105]. As the UI sector supporting urban flows, the decision
making towards building risk evaluation and mitigation strategy plan should importantly
consider both expert and laypeople thinking and perception which will enhance UI risks
mitigation response.
The effective implementation of the UI system protection plan depends on the degree
to which government and private sector partners engaged in a systematic, effective, and
multidirectional information sharing. Thus, deciding and managing crucial decision making
requires a joint learning process, comprehensive collaboration between different
institutions and organizations. Importantly, the collaboration has to be compelled by multi-
stakeholders to support the development of joint agendas and spreads new ideas.
However, the consequences are associated with special concerns that individuals,
social groups or different cultures may attribute to the RA process and output. The strength
of a non-technical dimension account for aspects of societal and psychological risk
experience, and perception knowledge supporting the RA. Thus, it is become an additional
dimension of the RA processes that alerts and makes aware the DMs towards the RA quality,
and the confidence that can be placed in its results [4].
Public perceptions towards risk represent what people observe in reality and forged
through the experience of actual harm (the consequence of risk). Both perceptions and
experience turn up in the sense that human lives are lost, health impacts can be observed,
the environment is damaged or buildings collapse. Further, public perception is the product
of intuitive biases, economic interest, and reflects cultural values of more generally. The
public perceptions (both experts and lay people) towards risks have been gaining a lot of
attention in academia field.
A number of studies discussing the people perception of risk, both in the psychology
and sociology point of view have been studied well, For instance; Aven, T., and B. S. Krohn,
proposed a new perspective on RA which add the description and/or measurement of the
strength of the people knowledge [131]. Another studies towards this issue can be seen in
[81, 82, 132-134]. The experience of risk therefore, is not only an experience of physical
harm, but also the result of processes by which groups and individuals learn to acquire or
create interpretation of risk.
Departure from this understanding, risk experience can be properly assessed only
through the interaction among the physical harms attached to a risk event and the social, and
cultural processes. In addition, this interaction shapes the interpretations of that risk event,
secondary and tertiary consequences that emerge, including the actions taken by DMs and
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 60
publics. Following the SAR framework, the characteristic of both a risk and risk events have
become portrayed through various risk signals (images, signs and symbols). These signals in
turn interact with a wide range of psychological, social, institutional or cultural processes in
ways that intensify or attenuate perceptions of risk and its manageability [63, 81].
Past studies have been shown the existence of a controversy and debate which
exacerbated the divergences assessment between expert and public, and often erode
confidence in the RA and decision process. Based on the above explanation, making the
practice of RA more sensitive to issues aforementioned is thus one of the most challenging
tasks confronting the societal risk management. Henceforth, the development of RA methods
need further attention in its scientific elements to accommodate the information exchange
in a community-wide conversation that leads to different viewpoints of understanding the
risk.
Third, build an advance model which can imitate and simulate solidly the uncertainty
and stochasticity of risk impact behaviors and mechanisms. Following the risk impact
characteristic and mechanism discussed previously, as far as author acknowledged there is
no study ever attempt to propose an RA method which integrates three risk impact
characteristics and mechanisms (i.e., risk magnitude, risk causality and interaction pattern,
and the risk impact effect to community), altogether within single framework.
A difficulty emerges, perhaps due to the; shortage of knowledge towards risk impact
characteristic and mechanism and the community perceptions towards risk in previous time,
as well as the limitation of the RA modeling and simulation techniques. Modeling and
analyzing the risk by reductionist methods are likely to fail to capture the behavior of the
complex systems that make up the UI system. Therefore, a novel approach is needed that
able to look into UI systems from a holistic viewpoint to provide reliable RA outputs for
enhancing REA and control.
3.5 Risk and Resilience (Analysis) Relationship
The resilience s distinguished from risk in several ways. Principally, risk is used to determine
negative consequences of potential undesired events, and to mitigate the exposure of
undesirable outcomes. Further, risk is a measure of potential loss of any type and is
associated with the uncertainty about and severity of the consequences of a disruptive
activity [10]. On the other hand, resilience is an endowed or enriched property of a system
that is capable of effectively combating (absorbing, adapting to or rapidly recovery from)
disruptive events.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 61
The resilience approach emphasizes an assessment of the system’s ability to; (i)
Anticipate and absorb potential disruptions; (ii) Develop adaptive system to accommodate
changes within or around the system; and (iii) Establish response behaviors aimed at either
building the capacity to withstand the disruption and, or recover as quickly as possible after
disturbed. Resilience could also be viewed as the “intrinsic capacity of a system, community
or society predisposed to a shock and, or stress event to adapt and survive by changing its
non-essential attributes and rebuilding itself” [51, 57, 112].
Furthermore, emphasizing the concept of UI system resilience, means to focus on the
quality of community life at risk and to develop opportunities to enhance a better outcome.
Nevertheless, the challenge lies in a process to integrate both quantitative analysis between
resilience analysis REA and RA beyond conventional perspective (models and techniques)
for endowing a system with necessary capabilities to cope with disturbance events.
Interestingly, risk and resilience approaches share four key characteristics, that is; (i)
They provide a holistic framework for assessing systems and their interaction, from the
household and communities through to the sub-national and national level, (ii) They
emphasize capacities to manage hazards (or disturbances), (iii) They help to explore options
for dealing with uncertainty, surprises and changes, (iv) They focus on being proactive [11].
Figure 3-7 depicts the relationship between risk and system robustness.
However, little known that risk and resilience concepts have very close relationship.
Some studies have examined UI resilience strategy for improving UI system involvement,
however, a few studies have investigated the important role of RA involvement in defining
the UI system resiliency specifically. On the other hand, other previous studies have been
quantitative in nature and conducted from a technical and empirical perspective, providing
no insight into the role of risk management knowledge in defining the UI resilience.
From here, it is undoubtedly that the REA for UI system has to go beyond conventional
approach. Likewise, the existing quantitative models to measure and assess UI system
resiliency are also not consistent with the concept of risk management. While resilience has
clearly attracted as both unifying concept and vision with political currency in uncertain
times, achieving positive outcomes will require policy makers and practitioners to fall back
on more familiar concepts with practical experience. Correspondingly, both risk and risk
management provide familiarity and similarity, to allow a cross-disciplinary and cross-issue
discussion.
The advantages of adopting RA elements within the REA leads to strengthening the
analysis outcomes by providing a cross-comparable metrices. The metrices have the scope
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 62
related to the overlaps and opportunities identification for integrated diverse disciplinary
and policy approaches towards managing UI system risks. On this ground, the success of
building UI system resilience plan and strategy lies on the comprehensive RA [4, 69].
Conventional RA methods commonly focus on the assessment of hazardous event and
scenario where has been identified and determined (conditional) in the present time where
the extreme event has not been actually occurred.
EconomicalTechnical and
OperationalSocial
Impact to the community
Hazard event and uncertainty within every aspects of urban water supply infrastructure system.
Ro
bu
stn
ess
Risk Criticality
End User Governmental
Commercial & Industrial Information exchange within multi-
level multi-sector stakeholder
Ris
k I
mp
act
Mit
iga
tio
n p
lan
an
d d
eci
sio
n m
ak
ing
str
ate
gy
Figure 3-7. Risk analysis correlation with UI system robustness.
On the other hand, the infrastructure resilience concept has emphasized that the
preparedness strategy in the context of RA need to go beyond the traditional paradigm. Less
comprehensive RA, thus yields on the poor and ineffective REA and decision making
respectively. It is therefore, RA plays pivotal roles as the foundation of REA. Notwithstanding,
previous studies on resilience system analysis lack of considering the RA dimension within
the REA processes. This issue prevents the development of a metric to measure resilience in
a comprehensive and consistent manner. Such a risk metrics element within REA would
greatly support the deep analysis output.
Therefore, enable to promote the development of resilient UI systems by; producing
a resilience strategies comparison and support of resilience related decisions during design
and operation. Thus, conventional RA methods must be expanded and complemented with
methods for probing surprising events which can potentially emerge from the UI and risk
complexity, once triggered by an initiating event. The integration between those two analysis
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 63
models would give comprehensive UI system analysis result in the pre-and post-hazard
performance of the system.
Risk assessment in the current state
(before the disturbance occurs)
Figure 3-8. Assessing critical risk in further potential uncertain condition.
The ability to portray, model and simulate the effects of disturbances in UI system
case is an important aspect of robust RA processes and further recovery planning.
Correspondingly, the plan will significantly affect the building of both UI system and
community resilience improvement. One strategy for developing UI systems resilience better
than before is to apply the “adjoint” approach and simulation method. The method may be
particular interest for generating deductive (anticipatory, backwards) scenarios, where the
analysis starts from a future imagined event/state of the total system facing the disturbance
and thus question what is needed for the system to recover reaching the normal state.
Mitchell, T. and K. Harris, highlights some of the advantages of adopting a risk
management lens to strengthening resilience [11]. However, the test and validation using the
case study provided are illustrative rather than exhaustive. Moreover, context specificity is
paramount to determine which set of risk management options are required in any given
context. It may be that one set of management options for addressing risk may be entirely
inappropriate for another given time and/or place.
Correspondingly, an advanced model and analysis techniques, and simulation
methods are inevitably needed for supporting the decision making towards building the UI
system protection plan and strategy. Therefore, improving the resiliency of UI system against
systemic failures. The integration between RA model and REA, can be the tool for the UI
system resilience quantification. This tool allows for the evaluation and comparison of the
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 64
different protection and recovery strategies effectiveness that are proposed to avoid and
reduce the adverse consequences of disruptive events.
3.6 The Resilience Analysis Model Review and Evaluation
Literature from a wide range of disciplines in which REA models and techniques in the
context of UI systems will be reviewed in this section. It should be noted that this review is
limited to literature that contain a metric and/or formula for measuring system resiliency.
The shortcomings of previous REA models will also be explored as a discussion platform
towards obtaining knowledge gaps in the context of UI system REA. The REA framework
from previous studies mainly have been developed to quantify the resilience of various
systems against natural hazards or the intelligent actions of adversaries.
A number of studies have discussed the development and implementation of REA
frameworks. For instances, Cimellaro, G. P., A. M. Reinhorn, and M. Bruneau, presented the
quantitative evaluation towards disaster resilience and proposed the unified terminology for
a common reference framework [9]. The evaluation of disaster resilience is based on
dimensionless analytical functions related to the variation of functionality during a period of
interest, including the losses in the disaster and the recovery path.
Henry, D. and J. Emmanuel Ramirez-Marquez, proposed generic metrics and formula
for quantifying system resilience [58]. The paper also described the key parameters
necessary to analyze system resilience such as; disruptive events, restoration components,
and overall resilience strategy. Ouyang, M., L. Duen as-Osorio, and X. Min, proposed a new
multi-stage framework to analyze infrastructure resilience [69]. For each stage, a series of
resilience-based improvement strategies are highlighted, and an appropriate correlation of
resilience identified. These strategies, then combined to establish an expected annual
resilience metric for both single hazards, and concurrent multiple hazard types.
Francis, R. and B. Bekera, proposed REA framework and its metrics for measuring
resilience [8]. The proposed framework consists of several aspects, that is; system
identification, resilience objective setting, vulnerability analysis, and stakeholder
engagement. Subsequently, both the framework and metrics are promoting the development
of methodology investigating “deep” uncertainties in REA. The methodology is also retaining
the use of probability for expressing uncertainties about highly uncertain, unforeseeable, or
unknowable hazards in design and management activities.
Meanwhile, Shafieezadeh, A. and L. Ivey Burden, proposed a probabilistic framework
for scenario-based REA of infrastructure systems [7]. The method accounts for uncertainties
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 65
in the analysis process. Such as; the correlation of the earthquake intensity measures,
fragility assessment of structural components, estimation of repair requirements, the repair
process, and the service demands. Furthermore, Ouyang, M. and Z. Wang, adopted an existing
REA framework for single system to interdependent systems [51]. The study also focused in
modelling REA of multi-systems’ joint restoration processes.
The purpose of this literature review is to explores and present various REA methods
are currently applied. The majority approaches and methods available to measure resilience
system, particularly to systems aforementioned, reflect strongly the diversity of disciplines
and sectors that have appropriated the term. Much of the works on infrastructure resilience
have draws on understanding of the system vulnerability and seeks to measure the
vulnerability levels rather than resilience itself.
Meanwhile, the exercises of measuring resilience in previous studies are also highly
variable, depend on the understanding and weight given to concepts (e.g., coping, capacity,
vulnerability and adaptive capacity). Nonetheless, this research found a significant
shortcoming from the previous REA methods. The shortcoming is that the method lack of
consistency in its quantitative approach. The intended shortcoming is that; previous REA
methods lack of quantitative approach to consider the complex risk characteristics and
dynamic impact mechanisms which leads to produce a severe and inaccurate analysis output.
The context-specific nature of risk, the dynamic nature of change and the complexity
of capacities associated with UI system resilience are making the systemic measurement
challenging and leading to a simpler frame for evaluation to be considered. Correspondingly,
this research concludes that; REA and RA are complementary and suggests that both should
be integrated in a unify perspective. Thus, there is a need for developing a novel and robust
UI system REA model which capable to capture the complex risk characteristics and impact
mechanism dynamics that would be useful for developing an effective recovery strategies
[58].
3.7 Chapter Summary
Understanding the risk characteristics and impact mechanisms as well as reducing the level
of risk impact pertaining to an UI system in general are the major tasks in infrastructure risk
management. In this section, the latent risk characteristics and impact mechanisms assigned
to show that risk impact not only affecting single urban life aspect, such as; community
health, safety and cost, but also in a perspective of socioeconomic, psychological and
sociocultural as a whole.
CHAPTER 3-RISK ANALYSIS AND RESILIENCE RELATIONSHIP
Page 66
Departing from the literature review and discussion abovementioned, this research
concludes that; in the situation of disturbed UI system, the unbounded nature, characteristic
and impact mechanisms of risks imperatively should be considered and seen as a unified and
integrated dimension in both RA and REA. Following this finding, nonetheless, conventional
RA methods are having several limitations and no longer capable to cover and analyze those
issues.
Specifically, conventional RA methods are mainly fragmented and isolated which
incapable to consider the integration between different range of risk profiles, characteristics
and impact mechanism. The ability to portray, model and simulate the risk dynamic
characteristics and its impact mechanisms in UI system is crucial towards building robust
RA and REA. To this, a framework is needed to build and integrated method which capable
to view the risk problem from resilience perspectives which suitable for coping with the high
complexity of the UI system and the related uncertainties.
Accordingly, there is an urge need to initially develop a novel integrated RA method
which includes a variety analysis method which can systematically capture and interpreted
such complexities from different characteristic perspectives into complete data,
understandable and reliable expediting the risk evaluation processes. Henceforth, methods
of “adjoint” simulation may be the particular interest for generating deductive (anticipatory,
backwards) scenarios. The scenario where research be able to start both RA and REA from a
future imagined event/state of the total system and question what is needed for this system
to recover.
For the REA method development purposes, the point is that the conventional RA not
sufficient to identify and quantify efficiently the complexity of risk in the context of UI system.
Additionally, the analysis cannot be carried out only with the classic methods of system
decomposition and logic analysis. From this point, there’s an overarching need to propose a
holistic risk-based REA framework which in certain degree capable to; (i) View the
complexity problem from different perspectives (topological and functional, static and
dynamic under the existing uncertainties), (ii) Portray, analyze and evaluate the crucial risk
issues in particular UI system (both in static and dynamic manner, both in the present and
future of time-prediction), (iii) Promote the comprehensiveness of risk mitigation plan as
well as the resilience action.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 67
CHAPTER 4
RESEARCH DESIGN AND METHODOLOGY
CHAPTER HEADINGS Introduction Research Design Employing Mixed Method Approach Case Study Approach Research Ethics and Conduct Applied Approaches and Strategies to Data Collection Population Arrangement and Sampling Methods The Time Dimension Design Empirical Analysis Methods and Techniques Applied Chapter Summary
4.1 Introduction
This Chapter explains theoretically the research design and methodology applied for this
research. The research design built within this research will be explored in the step-by-step
explanation. Research design is an action plan for getting from ‘here’ to ‘there’, where ‘here’
refers to the; research aim (RAI), research objectives (ROs) and initial set of research
questions (RQs) to be answered, and ‘there’ is some sort of conclusion (answer) about these
questions. Between ‘here’ and ‘there’, this research applied a number of major steps,
including;
- The development of conceptual framework and analysis models
- Relevant data collection processes and initial data processing
- Simulation and analysis of relevant data, and
- The discussion and findings
- Conclusion summarization towards answering the RAI, ROs and RQs.
This Chapter explains the research strategy applied in this research. Here, research
strategy can be defined as the way in which the research objectives can be questioned. There
are two types of research strategies, namely ‘quantitative research’ and ‘qualitative research’.
Quantitative research is designed to empirically identify the presence and magnitude of
differences between individuals and/or groups of individuals [12]. Further, it is also typically
designed to test predetermined hypothesis that are formed based on existing theory
(deductive process).
While, qualitative research is typically more focused on sense-making in a purer
sense. It is often functions to develop theory from the data that are collected (an inductive
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 68
process). Further, qualitative research tends to focus more on rich description of a
phenomenon than on its quantification. Thus, instead of relying on numbers, counts, and
frequency-type data, qualitative research will often involve the collection and analysis of
detailed observations, stories or narrative histories, sounds, pictures, or video.
Additionally, qualitative methods often bring a new or fresh perspective to existing
research in fields of science that have been dominated by quantitative methods. Deciding on
which type of research to follow depends on the purpose of the study and the type and
availability of the information that is required. Accordingly, this research adopted the
combination of those two research strategies, that is; ‘mixed-method research’ [135]. Mixed-
methods research can be seen as [136];
‘the type of research in which a researcher or team of researchers combines elements of
qualitative and quantitative research approaches (e.g., use of qualitative and quantitative
viewpoints, data collection, analysis and inference techniques) for the broad purposes of
breadth and depth of understanding and corroboration.’
A more important implication is that the combination of quantitative and qualitative
methods benefits researchers in multiple ways, providing the researchers with improved
information and richness of detail that is not obtained when singular methods are utilized.
To start, this Chapter firstly examines and explores the research design flowchart. Second,
this Chapter explains the mixed method approach in-depth. Then, the case study approach
and appointed UI sector as the main case study is explained thoroughly, followed by the
approaches and strategies to data collection.
The discussion continues to the arrangement of population and sampling methods.
Further, the time dimension frame design for this research is also discussed. The last section
deliberates approaches and strategies towards empirical analysis methods and techniques
applied in this research. The Chapter summary section ends this Chapter by giving a general
summarization and discussion of the research design and methodology applied in this
research.
4.2 Research Design
This research began with the introduction to explain the problems and gaps of conventional
UI system are REA models. The research commenced with reviewing the existing literature
to compile background knowledge and identify research gaps, which led to a main research
aim. The main research aim then leads to the emergence of research objectives. The research
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 69
objectives were then subsequently interpreted for the purpose of developing the research
questions.
The next part is the literature review which plays a major role in order to explore and
describe; the basic theory and background of the UI system, its important role in the urban
flow and community who are highly dependent on those systems, as well as the risk and
resilience concept in UI systems. Then, the literature review shifts to discuss the existing
concept of RA and REA in the UI system. Following the risk and resilience concept in the UI
system context discussed previously, the literature review goes to explore the risk within the
UI system, the characteristic of risk and its impact.
The deficiencies of conventional RA in UI resilient context and the need for developing
a novel robust RA model are then explored. Moreover, the risk and resilience assessment
general model, and the concept towards the development of UI system resilience are
discussed as the basis for the risk-based REA model. The sequence of this research continues
to explain theoretically the research design and methodology applied.
The research design encompasses the strategies, plans and steps adopted to answer
the research questions [12, 135, 137]. It is important to form a basis for meeting the
established ROs, which in turn helps to answer the RQs. Furthermore, the setting towards
conducting the research is also a main aspect need to be decided. This decision will
substantially affect the research design and methodology develops and applies respectively.
Figure 4-1 presents the research design flowchart that was designed to achieve both this
research aim, objectives, and questions.
In addition, the choice of research setting is affected by the potential costs of the
setting, its convenience, ethical considerations and the research question that this research
is trying to address [135]. Generally, research design involves a series of choices. The two
most fundamental choices are, what is being studied and how to determine the best
approach to do so [138]. Other important decisions include the type of sample and methods
of data collection to be applied, how to measure the variables, and how best to analyze the
research concepts.
Based on the knowledge gained from the literature review parts, the next step is to
develop the conceptual framework. The building of a conceptual framework consists of
several RA models, which finally applied to support the UI REA. Various empirical analysis
contained within the framework and several techniques applied are discussed in detail in
the section 4.9. To validate the framework, specific UI system case study is chosen. The
validation is follow the mixed-method design as mentioned earlier.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 70
In-depth Literature Review
Preliminary lit. review and problem identification
Defining knowledge gap
Introduction
Research Design and Methodology
Framework Validation
Data Processing, Simulation and Analysis
Findings and Discussion
Summary and Conclusion Remarks
Research aim
Research objectives
Research questions
Case study
Data collection
Initial data processing
Dissertation writing
Data simulation
Experts Interviews
Empirical Framework and Analysis Models Development
Data collected from fieldwork
Figure 4-1. The research design framework.
This research follows the embedded mixed methods design, integrating a wide survey
using design-based questionnaires administered in face-to-face interviews. The data
collected is then processed computationally. Additionally, the analysis section applies several
empirical methods and the quasi-experiment using computational simulation. The
discussion towards case study results are then continued and interpreted.
A number of findings, both in the context of the proposed method and the case study
round up the respective section. Finally, research conclusion and research value (significant),
are discussed. The research limitation and recommendations for future research are
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 71
explored as well in the very last part of this research. Finally, the research report was
prepared.
4.3 Employing Mixed Method Approach
As mentioned above, this research adopts the embedded mixed method research design in
which quantitative data plays the primary role. The notion of combining research methods
was first suggested by constructivists Lincoln and Guba in 1985 [139]. Since then, mixed
method approaches have become increasingly accepted and applied due to their value in
widening the range of research and delivering better results of the subject under
investigation [140].
The validation process of the evaluation tool developed in this study was conducted
within the context of a case study. Case study is an inquiry strategy in which the researcher
explores in-depth a program, event, activity, process of one or more individuals [140].
Creswell et al. (2007) also added that cases are bounded by time and activity, and researchers
collect information using a variety of data collection procedures over a sustained period
[141].
Using case study as a research approach requires employing more than one source of
data, which makes it appropriate for this research to adopt a mixed-method approach. Thus,
in this research, both quantitative and qualitative approaches are used to implement the
study’s specific ROs and answer the RQs. Furthermore, Creswell and Plano Clark, defined
mixed method research as [141]:
‘Deal[ing] with theoretical suppositions as well as ways/ processes of investigation to steer
the route of gathering and analyzing data by blending qualitative and quantitative techniques
in various stages of the study to carry out a better study of the issue compared with the use
of single methodology only.’
Further, Creswell and Plano Clark noted that mixing quantitative and qualitative
methods positively influences the research and is better than employing one method type
alone [141]. Mixing two methods allows the strengths of each type to cover the limitations
of the other. For instance, the detail provided by the qualitative approach can lend support
to the quantitative data. In addition, mixing method in research is more realistic, as it allows
participants to use both numbers and words in their perspectives and responses. Therefore,
in social science research problems specifically, both quantitative and qualitative data are
required for best outcomes [142].
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 72
4.3.1 Mixed Method Design Classification
Creswell and Plano Clark, through their comprehensive review of previous studies, aimed to
classify mixed method designs, identified the six most used mixed methods designs are
provide a useful framework for researchers attempting to design their studies [140].
Accordingly, Creswell and Clark recommend researchers to select a design that best matches
their research problems to ensure that the outcome of their study design is ‘rigorous,
persuasive and of high quality’. They introduced six mixed method designs, that is; the
convergent parallel design, the explanatory sequential design, the exploratory sequential
design, the embedded design, the transformative design, and the multiphase design.
In the convergent parallel design, the researcher uses quantitative and qualitative
approaches in parallel during the same phase of the research process. Both approaches have
the same importance to the research. In this approach, the analysis is independent for each
approach and the result from each approach is mixed during the final interpretation. The
explanatory sequential design involves the researcher first collecting and analyzing the
quantitative data that has priority for answering the RQs. Based on the outcome, the
qualitative phase is designed, followed by collection and analysis of the qualitative data. The
researcher then interprets how the qualitative results explain the quantitative results.
In contrast, in the exploratory sequential design, the researcher starts with collecting
and analyzing the qualitative data that has priority, to build up the results. Based on the
result of this phase, the quantitative phase is designed, followed by collecting and analyzing
the quantitative data to test the qualitative results. The researcher then interprets how the
quantitative results help to generalize the findings. Further, the embedded design sees the
researchers collecting and analyzing both quantitative and qualitative data within a
traditional quantitative or qualitative design approach.
In this approach, either the quantitative or qualitative data can be prioritized,
depending on the major design approach. In the qualitative design, or a minor qualitative
approach within the main quantitative design, the approach is to enhance the overall design
and support the findings of the main strand in some way. In addition, the approach can be
added before, during or after the main approach.
Meanwhile, the transformative design involves the researcher using a theoretical-
based framework. The design goes beyond the above four basic mixed method designs.
Researchers use the transformative design when seeking to address issues of social justice
and calls for change. The priority approach in this design could be quantitative, qualitative,
or equal, either in parallel or sequentially timed. The multiphase design goes beyond the first
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 73
four basic mixed method designs. This design can mix all four basics mixed method designs
over its duration. Each mixed method design can stand alone as a study, feeding into a
subsequent study. The multiphase design is usually used in long-term, large-scale research.
While discussing six basic mixed method designs, this research applied the embedded
mixed methods design which mainly depends on quantitative data, with qualitative data
playing a secondary role in supporting this research. Creswell, described the embedded
design approach as ‘giving less priority’, the secondary method (quantitative or qualitative)
is embedded, or nested, within the predominant method (quantitative or qualitative) [140].
This embedding may mean that the secondary method addresses a different question than
the primary method.
The purpose of the embedded design is to provide broader insights into the subject
of investigation than would be possible using the predominant method alone. Using the
embedded design, the researcher can collect two types of data simultaneously in a single
data collection phase [140]. This design is usually adopted when the researcher is
comfortable with the research being driven by one type of data as the primary orientation,
and does not have adequate resources to place equal priority on both types of data [141].
This research attempted to apply the embedded mixed method approach, where the
quantitative method was the primary approach, and the qualitative method was the
embedded approach, for enhancing, supporting and understanding the quantitative data.
Quantitative data was collected using design-based questionnaires and semi-structured
interviews. During this approach, some qualitative data was embedded to support and
explain the reasons behind the quantitative data. For instance, respondents were asked to
indicate their degree of awareness with the level of risk detectability by selecting a number
on a Likert type scale.
During the interviews, respondents were express asked to the reasons behind their
selection. These reasons constitute the embedded qualitative data to provide insight into
respondents’ quantitative judgements. While the quantitative data are the main data for the
analysis, the qualitative data helps to understand the phenomena behind respondents’ low
or high level of awareness and perceptions. The next phase of this research is the explanation
of the case study approach, to test and validate the developed conceptual framework and
analysis models. This following section explains the case study approach.
4.3.2 External Validity
The general design of this research is experimental where two important (often conflicting)
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 74
attributes needed to be considered carefully, that is; internal and external validity. The ability
of the research design to adequately test hypotheses is known as its internal validity.
Essentially, internal validity is the ability of the research design to test the hypothesis that it
was designed to test. Meanwhile, a study has external validity to the degree that its results
can be extended (generalized) beyond the limited research setting and sample in which they
were obtained.
Mook, noted that a the purpose of collecting data in the laboratory is to predict real-
life behavior in the real world [143]. Further, Mook pointed that much of the research
conducted in the laboratory is designed to determine one of the following:
- Whether something can happen, rather than whether it typically does happen.
- Whether something we specify ought to happen (according to some hypothesis)
under specific conditions in the lab does happen there under those conditions.
- What happened under conditions not encountered in the real world.
In each of these cases, the objective is to gain insight into the underlying mechanisms
of behavior rather than to discover relationships that apply under normal conditions in the
real world. Following the understanding from discussion above, this research adopts the
concept of external validity as part of the research design. In contrast, Bordens, K. S. and B.
B. Abbott, discussed the threats to external validity (Table 4-1) [135].
Table 4-1. Factors affecting external validity.
Factor Description Reactive testing Occurs when a pretest affects participants’ reaction to an
experimental variable, making those participants’ responses unrepresentative of the general population.
Interactions between participant selection biases and the independent variable
Effects observed may apply only to the participants included in the study, especially if they are a unique group.
Reactive effects of experimental arrangements
Refers to the effects of highly artificial experimental situations used in some research and the participant’s knowledge that he or she is a research student.
Multiple treatment interference Occurs when participants are exposed to multiple experimental treatments in which exposure to early treatments affects responses to latter treatments.
The question of external validity may be less relevant in basic research settings that
seek theoretical reasons to determine what will happen under conditions not usually found
in natural settings or that examine fundamental processes expected to operate under a wide
variety of conditions. The degree of external validity of a study becomes more relevant when
the findings are expected to be applied directly to real-world settings. In such studies,
external validity is affected by several factors. Using highly controlled laboratory settings is
one such factor. Nevertheless, data obtained from a tightly controlled laboratory may not
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 75
generalize to more naturalistic situations in which behavior occurs.
4.4 Case Study Approach
By using case study as a research design approach, researchers can explore and explain a
program, event, activity, process or one, or more individuals [144]. Schramm, defined case
study as an attempt to clarify ‘a decision or set of decisions’, why they were taken, how they
were implemented and with what result [145]. Yin, in turn, defined it as practical research
that examines an existing phenomenon in its authentic context, and which is particularly
useful when the borders between the phenomenon and its context are not apparent [146].
Yin also noted that case study is ‘a comprehensive research strategy’.
Furthermore, Babbie, stated that the most important reason for using case study as
the research design approach is that it is descriptive [138]. For this research, the case study
approach was used to explain how empirical framework and analysis models were
developed to assess and measure the level of UI system robustness capacity. Handling the
concept of stakeholders’ involvement in defining the UI system RA and REA elements results
in a better understanding of why risk is highly correlated with the level of UI system
robustness.
Currently, it is impractical to conduct an analysis for all elements of resilience due to
knowledge and time constraints. Therefore, the conceptual framework and analysis models
for evaluating the level of UI system robustness was tested through single UI sector case
study. To use case study as a form of research design, it is necessary to justify the case study
approach, the number of cases and the criteria for selecting those cases. The case study
approach can help to find replication logic in the research. The case study intends to test and
verify the applicability of the conceptual framework and analysis models proposes in this
research.
Moreover, the application to a real UI system case enables the usefulness and
practicality of the conceptual framework and analysis models to be tested. There are various
UI sectors which were noticed as crucial to the urban flow (refers to critical infrastructure-
CI). For instance; some of the UI sectors are; electricity, gas and oil, transportation and traffic,
water and sewage, energy, emergency services, finance and insurance, jurisdiction, space,
buildings, and food.
While there are plenty of UI systems, this research appointed the urban water supply
(UWS) infrastructure system as the case problem. The UWS system is the most valuable part
of the public infrastructure worldwide [147]. Urban utilities and municipalities are
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 76
entrusted with the responsibility of managing and expanding them for current and future
generations. Infrastructures inexorably age and degrade, while society places increasing
demands for levels of service, risk management and sustainability. The UWS infrastructure
as a case study which is in Indonesia (focus on Surabaya city) were selected non-randomly
to represent the problem boundary.
Specifically, the proposed empirical framework and model analysis applied to the
case of the Surabaya city (the second largest metropolitan city in Indonesia) water supply
infrastructure was used to test the method usability, applicability and reliability. In this
research, notably, the water supply infrastructure system in Surabaya city has been chosen
as a single case study in this research. The selected case study was expected to bring more
interpretations and results towards the research objectives and questions.
Despite being awarded as the leading public utility sector (water supply) in Indonesia,
the problems and challenges that the Surabaya water supply infrastructure system
confronted has been discussed in previous studies [148-152]. With the aforementioned
discussion, research aim and objectives, this research selected Surabaya UWS system as a
single case study based on the following criteria:
- It is the well-known fact that no development of any kind of infrastructure system and
urban flow can occur without water.
- Compared to other UI sectors, the study towards water supply infrastructure system
in urban areas is oftentimes underestimated and less noticed.
- The case of UWS infrastructure system, especially for Surabaya city, has high
community structure (stakeholder) complexities, which make stakeholder-risk
associated analysis more meaningful due to the relatively complex stakeholder
interests.
- There has not been any study previously attempted towards assessing the assessment
of risk in the context of impact especially for the case of Surabaya water supply
infrastructure system.
- There has not been any study previously conducted towards analyzing the UWS
system resilience based on the RA as the analysis foundation.
- Accessibility to collect the data necessary.
- Convenience and openness towards collecting the information beyond the survey.
Based on the criteria aforementioned, Surabaya city water supply infrastructure was
selected as the case study for the purpose of testing and validating the proposes conceptual
framework and analysis models. This case study is discussed detail in Chapter 6.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 77
4.5 Research Ethics and Conduct
Before conducting data collection in the field, this research sought approval between the
Institutional Research Board (IRB) and the ethical code of the University of Melbourne. The
size and complexity of an IRB varies depending on the size of the institution and the type of
research that is conducted. In here, the IRB is composed of researchers, research panel
members, faculty and department board, and other professionals who understand the legal
and ethical standards that guide research.
As per the University of Melbourne policy, all research projects involving humans are
subject to prior review and approval by The University of Melbourne Human Research Ethics
Committee (HREC). Research involving human subjects cannot and must not proceed until
clearance and approval have been obtained. The researcher, who aimed to conduct research
involving humans as participants, submitted an application to the Melbourne School of
Design (Faculty’s) Human Ethics Advisory Group (MSD HEAG) for review, endorsement, and
approval.
Following these policy and rules, the researcher submitted a detailed description of
this research (research proposal) and conducted the ‘research confirmation’ by presenting
and answering a series of questions. The members of the IRB further reviewed the material
and then informed the researcher that this research may proceed. In the University of
Melbourne, for ethics purposes, research projects are classified as being either 'high risk' or
'low risk' depending on the nature of the enquiry being undertaken and the nature of the
participants.
As a general indication, projects involving children, persons undergoing medical
treatment or any person likely to be seen as vulnerable will be 'high risk'. Nonetheless, in
some cases, high-risk research which using specialized procedures, unique populations and,
or high-hazards risk assessed by the HREC requires special assessment. Meanwhile, research
projects involving consenting adults with non-controversial subject matter will be 'low-risk'.
Low-risk research projects generally take less time to approve than high-risk. This
research proposal was classified and passed the assessment by the HREC as a low-risk
research project which required a minor modification to parts of the research to protect the
rights of the participants. Once all things were considered appropriate, the fieldwork fund
was granted from the university for the researchers to do the data collection (Figure A-1).
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 78
4.6 Approaches and Strategies to Data Collection
As with all research, the selection of specific procedures represents a balancing act between
the need for information and the feasibility of the procedure. What follows is a review of the
data collection techniques this research applied. This section provides the reader with a
detailed description of how this research collected the data [135]. The goal of writing the
data collection approach and strategy section is to allow the reader to evaluate the
appropriateness of the data collection techniques this research adopted.
Importantly, this information will help the reader understand how the data relates to
research objectives and questions, and how the internal and external validity of this
research’s conclusions can be evaluated. Most method sections have three subsections in
which it is described; (1) How researchers identified and obtained the sample they studied,
(2) The materials, equipment, and measures researchers used to collect the data, and (3) The
specific procedures researchers followed during the research (e.g., permit/application letter
in Bahasa which depicts in Figure A-2).
Furthermore, another important aspect is the necessity of voluntary informed
consent which is the hallmark of all research involving human participants. Researchers
cannot coerce or force people to participate in any research. For all human research, the
researcher must show that the people who participate in the study did so of their own free
will. In addition, the participants must understand that they are free to withdraw from study
at any time and for any reason without penalty [12]. Unlike other research forms which apply
and delivery an informed consent contract to the participant candidates, this research offers
all of the participants the Plain Language Statement which is discussed below.
4.6.1 Plain Language Statement (Cover Letter)
Since this research needs to construct and apply the design-based questionnaire to obtain
the data needed, the next step is to write the Plain Language Statement (PLS) to accompany
the questionnaire. The PLS is a clear and succinct description of the research project and the
nature of participation. Furthermore, a PLS is essential to enable participants to make an
informed decision on whether they will take part in the project. The letter should explain the
purpose of the questionnaire in order to encourage a high response. The content of the
covering letter is particularly in postal questionnaires because it is the only way to persuade
the subjects to respond the questionnaire. Nachmias and Nachmias [153], wrote:
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 79
‘A cover letter must succeed in overcoming any resistance or prejudice the respondent may
have against the survey. It should; (1) identify the sponsoring organization or the persons
conducting the study, (2) explain the purpose of the study, (3) tell why it is important that
the respondent answer the questionnaire, and (4) assure the respondent that the
information provided will be held in strict confidence.’
Researchers generally need to obtain the prior informed consent of participants
before involving them in this research project. Prospective participants are given
information about this research in the form of the PLS, and their consent is recorded by their
signature on a consent form.
In this research, a PLS was written in plain, simple language in a style appropriate for
the intended participants. A generic PLS template has been designed by the University of
Melbourne to assist researchers in preparing their own statement. Nonetheless, this
research modifies the template to reflect the needs of this project. The PLS developed in this
research can be seen in Appendix A within this dissertation. The developed PLS follows the
standard PLS guidelines;
- Clearly identify the University of Melbourne (i.e., by prominent placement of the
University’s logo) and the department(s)/ school(s)/faculty(-ies) involved. If printed,
the PLS should be on a University of Melbourne letterhead.
- Clearly identify the title of the project, and the name(s) and contact details of the
Principal Researcher and Other Researchers.
- Clearly explain the purpose of the research project.
- Clearly explain what participants will be asked to do and provide an estimated time
commitment.
- Clearly explain any risks arising from participation, as well as any procedures or
measures in place to minimize such risks.
- Describe any expected benefits to the wider community. If applicable, also describe
any expected benefits to participants.
- State that involvement in the project is voluntary and that participants are free to
withdraw from participation at any time. Explain any implications of withdrawal,
including whether it will be possible for participants to withdraw any data already
collected from or about them.
- Describe the arrangements in place to protect the confidentiality of participants’ data
and advise participants of any legal limitations to such confidentiality. If the sample
size for the project is small, advise participants that this may make them identifiable.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 80
- The project HREC number (which is the ethics ID number assigned by Themis) and
the date and version number of the PLS must appear on the PLS. If the PLS is printed,
put this information in the footer.
- Explain what will happen to participants’ data after the research project ends (i.e.,
how long it will be retained, whether it might be used again for future research and if
so who would have access).
- Include the following statement:
“This research project has been approved by the Human Research Ethics Committee of The
University of Melbourne. If you have any concerns or complaints about the conduct of this
research project, which you do not wish to discuss with the research team, you should contact
the Manager, Human Research Ethics, Research Ethics and Integrity, University of Melbourne,
VIC 3010. Tel: +61 3 8344 2073 or Email: [email protected]. All
complaints will be treated confidentially. In any correspondence please provide the name of the
research team or the name or ethics ID number of the research project.”
If any participants will be in a dependent relationship with any of the researchers,
state that decisions about participation will not affect the dependent relationship. Another
specific requirement applies in the PLS developed for this research:
“The project will have nothing to do with your carrier.”
In some contexts, a PLS may need to vary from the expected format to accommodate
recruitment of cultural groups with different ethical expectations and assumptions. Prior to
the data collection, the developed PLS is attached into the first page of questionnaire set. The
PLS built and applied for this research can be seen in Figure A-3 and A-4.
4.6.2 Confidentiality and Anonymity of Participants
All information/data that this research collected is confidential. Confidentiality means that
the identity of all participants remains a secret. In most cases, confidentiality is easy to
preserve. To maintain confidentiality, this research used a unique but meaningless number
to identify each of the participants (see Appendix B for the questionnaire both in English and
Bahasa). In addition, this research publishes its result by typically presenting the data as
averages across (stakeholder) groups rather than highlighting the performance of individual
people along with their names and home addresses.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 81
Confidentiality is required by this research interest and IRBs (HREC) for research
with human participants. It is important to realize, however, that confidentiality and
anonymity are not the same thing. Whereas confidentiality refers to the protecting of
information provided by your research participants, anonymity refers to the participants
identity protection. This research applies the anonymity towards the data collection.
Meanwhile, true anonymity is rare, and is only achieved when the research project collects
no personally identifying information from participants. Such information could include
names, personal data (such height, weight, age, sex), and even personality characteristics.
4.6.3 Questionnaire and Interviews Design Arrangement
Although the general research objectives should be generated before choosing the specific
research technique or data-gathering procedure, it is often the case that the data collection
method chosen will influence the way the researcher ask the questions. For this reason, the
question this research asked can be open-ended or close-ended question design, allowing
respondents to tell us as much or as little as they wish. The design-based questionnaire
developed in this research adopts the ‘closed-response question’ design.
The primary feature of the closed-response question is that the researcher supplies
the responses options for the participants in the field [12]. The questionnaire developed in
this research consists of four main parts. In the first part, the respondent will be asked to
provide general data needed, such as; the demographical information (age, education level,
occupation, institution name and related position, work experience, phone number and
email). In the second part of the questionnaire, the numerical responses question format is
adopted.
The numerical responses format (often referred to as the Likert format) is one of the
most popular options for the closed-response format questionnaire for two primary reasons
[12]. First, it offers a clear and unambiguous ordinal scale of measurement. Second, this type
of question format can be used to the same format for many different questions. Therefore,
researchers can combine the responses to multiple questions to yield an overall or average
score [12]. In this research, participants are asked to rate the risk decision factors
measurement determined previously (occurrence, severity and detectability) for each of the
risk events using the Likert scale (between 1-10) by circling the Likert scale for each risk
decision factors available.
In the third part of the questionnaire, participants asked to choose their best position
as the stakeholder in the context of the UI system discussed in this research. The third part
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 82
of the questionnaire adopts the ‘category response question format’. In here, the category is
the UI system stakeholder groups identified and determined previously. The answer options
for this category represent a stakeholder groups category that each participant represents.
In this research, the question treats the options as mutually exclusive and forces the
participants to select only one category.
In the last section of part three, participants are given a chance to describe another
stakeholder group and its technical function which they represented but was not stated
within the questionnaire. The fourth part of the questionnaire is composed of two subparts
which each of them interrelated. In the first subpart, participants were asked to make a
choice of what kind of risk event would threat or even affect them personally (the risk
occurred previously or might occur in the further time). For this question, the participant
can give their preferences by giving a tick in the blank box sheet (√) provided.
For the second subpart question, participants were asked to state; ‘what stakeholder
group would be affected by each of the risk that participants have chosen in the first subpart
question previously’ by giving a tick (√) in the stakeholder groups category provided. In the
end of the questionnaire section, participants are given a chance to express their thoughts
towards this research and the questionnaire following the open-ended question design. The
design-based questionnaire discussed and applied in this research can be seen in Appendix
A. Furthermore, another approach to data collection applied in this study was interviewing
the participant.
There are many ways of interview strategies within the research processes, ranging
from face-to-face interviews to questionnaires sent through the mail or administered over
the internet. This research employs the personal interview, especially face-to-face interviews.
The face-to-face interview was adopted since it tends to encourage a high degree of
cooperation by participants. In addition, people are likely to answer an interviewer’s
questions instead of checking the ‘Don’t know’ box on a questionnaire. This should not be
terribly surprising, after all, it is difficult to skip or ignore a question when other participants
ask a direct question.
Other advantages of this method of measurement are that the interviewer
(researcher) can ensure that the participant understands the questions and asks follow-up
questions to clarify participants’ responses. In summary, personal interviews can yield a
great deal of rich information. There is no single format for the personal interview.
Interviews can be highly structured or unstructured. Similarly, the interview may be limited
to two people or may involve a small group [12]. The questionnaire designed and used for
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 83
collecting data from the participants for this research can be seen in Appendix B in this
dissertation.
4.6.4 A Pilot Study
Whenever construct a questionnaire for research, it is advisable to complete a pilot study
before collecting the final data from the whole sample. A pilot study provides a trial run for
the questionnaire, which involves testing the wording of the question, identifying ambiguous
questions, testing the technique applied to collect the data, measuring the effectiveness of
the standard invitation to respondents, and so on. Bell, described a pilot study as [154];
‘Getting the bugs out of the instrument (questionnaire) so that subjects in your main study
will experience no difficulties in completing it and so that you can carry out a preliminary
analysis to see whether the wording and format of questions will present any difficulties
when the main data are analyzed.’
Bell (ibid.) went further and noted that you should ask your guinea pigs the following
questions: (1) “How long did it take you to complete?”, (2) “Were the instructions clear?”, (3)
“Were any of the questions unclear or ambiguous? If so, will you say which and why?”, (4)
Did you object to answering any of the questions?”, (5) “In your opinion, has any major topic
been omitted?”, (6) “Was the layout of the questionnaire clear/attractive?”, (7) “Any
comments?”.
This research conducted the pilot study prior to disseminating the final design-based
questionnaire to the whole population. A number of prospective participants were asked to
fill the preliminary design-based questionnaire and interviewed towards the questionnaire
they answered. Around five participants consisting of both experts and laypeople agreed to
do the pilot study. Following the comments, the design was in some way revised and modified
in order to build a better format and better content for the questionnaire.
4.6.5 Public Verification and Systematic Observation
Public verification is another important feature of empirical research. Using the empirical
method requires this research to rely on researcher senses when gathering data. If designing
the research so that it can be publicly verified, then this research is measuring things in a
way that others can replicate with similar results. Therefore, public verification implies that
anyone who uses the same procedure should be able to observe the same general outcome.
Public verification also means that anyone with the appropriate equipment can repeat an
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 84
experiment.
The facet of public verification is extremely important. The ability to repeat or
replicate experiments gives the researcher greater confidence in the general applicability of
the results. The more times the researcher (or concerned people) can repeat an experiment
and obtain similar results, the more likely this research is pivotal and not just due to chance.
Further, systematic observation refers to the way we go about collecting information.
In the data collection, this research intends to make the observations under specific
conditions, ruling out alternative explanations for the outcomes this research analysis might
be observing. Finally, the overarching goal of systematic observation is to examine a
particular phenomenon under as many relevant situations as possible. In this research, once
the analysis and output were produced, the author conducted another interview to the
determined experts (and lay people) to discuss and obtain more interpretations of the result.
In addition, interview can be one of the most important sources of information for research
that adopts a case study approach [146, 155].
Yin, mentioned that semi-structured interviews are often used to maximize the
flexibility of the interview and provide the capability to shape the interview to suit
individuals [155]. Semi-structured interviews allow the researchers to follow interesting
and unexpected points raised by participants to collect further information on those points.
This style of interview also enables the researcher to seek explanations to findings from
earlier-administered quantitative questions. Moreover, semi-structured interviews are
guided by pre-formulated written questions that are designed to extract information of
research interest, with participants’ answers recorded following specified protocols [156].
4.7 Population Arrangement and Sampling Methods
Sampling is a critical component of any research project [135]. Consequently, researchers
need to define the sampling population and the procedures for creating the sample. The
purpose of a research usually dictates the characteristics of the sample that researchers
should describe. At very least, researchers need to indicate the number of men and women
in the study as well as the average age of the participants. If the research depends on specific
subject variables (e.g., ethnicity, level of education, annual household income), then
researchers should summarize those characteristics as well.
In addition to indicating how the research recruited and selected the participants,
researchers should describe whether and how to compensate or reward them. Similarly, the
research should indicate whether and why researchers lost the data for any member of the
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 85
original sample. Mistakes happen. Sometimes the equipment does not work, the researchers
makes a mistake, or the participant does not understand the instructions or refuses to
complete the study. Report errors like these if they occur. As with human research,
researchers should then describe additional subject variables that related to the purpose of
respective research.
4.7.1 Sampling Strategy Applied
Creswell, differentiated between two general types of sampling strategy: random and
purposeful [140] . Random sampling fits better with a quantitative research approach aimed
at generalizing findings to a population, as it attempts to seek for statistical generalization
through the selected individuals. Conversely, purposeful sampling is not random;
researchers intentionally select participants and/or specify the fields in which certain
phenomena can be studied.
Purposefully sampling is defined as selecting a participant or a group of participants
according to the specific inquiries or objectives of the study, and in accordance with
participants’ profiles [157]. Purposeful sampling, also known as judgmental or selective
sampling [158, 159], is used in this research. This is the most common sampling strategy for
this type of research, with the researchers selecting the most productive sample to answer
the research questions [158].
Marshall, M. M., also stated that ‘this can involve developing a framework of the
variables that might influence an individual’s contribution and will be based on the
researcher’s practical knowledge of the researcher area, the availability literature and
evidence from the study itself’ [158]. Purposeful sampling allows the researcher to
intentionally choose participants who can provide information about a certain fact to be
studied. It is suitable for research that uses a case study approach in an attempt to seek
analytical generalization, as is the case in this study.
Although purposeful sampling is classified for use with the qualitative approach [140,
157], based on the logic that the sample size will be small compared to if traditional
qualitative sampling strategies were used, it was found that this sampling method was
appropriate for all phases of the research. Nonetheless, random sampling would prohibit a
focus on the target demographic and prevent collection of the data necessary to achieve the
aim of this research [160]. Thus, participants were selected non-randomly, by virtue of their
position, work experience and background knowledge, using purposeful sampling and
snowballing strategies.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 86
4.7.2 Judgmental or Purposive Sampling
Because the populations in this research are extremely large (UI system stakeholder, which
is urban community), it is impractical or impossible to truly sample from the population.
Consequently, this research uses a sample drawn from a sampling frame or subset of the
larger target population. Ideally the sampling frame would be a complete list of every
member of the population, but in the real world it is usually a subset of the target population
to which the researcher has or can gain access.
The final sample itself in this research is a random selection from this sampling frame
or another subsample of the population that is based on convenience. The sample that a
researcher settles on is a representative subset of individuals drawn from the sampling
frame, which is a representative subset of the more general population. The logic of sampling
applied in this research is deceptively simple. First, take a representative sample from the
sampling frame. The representative sample should be manageable in size and share the same
characteristics as the sampling population. However, in this research, this requirement is
insurmountable to be met.
Next, conduct the study and collect the data. In this research, the sample is assumed
to be the population representative. Thus, it can be concluded that ‘what is true of the sample
will be true of the population’. The description of using samples in this research to generalize
about the population sounds simple and straight forward. Apart from the size of a sample, to
be useful, samples must also actually represent the population. Because this research intends
to generalize the population, a sampling design need to ensure that the sample is an accurate
model of the population.
4.7.3 Convenience and Snowball Sampling
Another sampling method applied in this research is convenience sampling, which is the
most common type of nonprobability sampling. In contrast to probability sampling,
convenience sampling means that the researcher uses members of the population who are
easy to find. Interviewing lay people who know each other or people who walk by a
particular street corner are examples of convenience sampling. In this case, this research
allows the individual’s behavior to determine who will, and more importantly who will not,
be a part of the study participants.
For convenience sampling, the individuals’ behaviors determine whether they could
become part of a study’s sample. Consequently, convenience sampling can bias the results
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 87
and interpretation of the data [12]. Despite these drawbacks, however, there are times when
a convenience sample may be the only way to collect the data. Many good research studies
have been done using a convenience sample. However, the specific results of any one
particular study may be an artifact of the sample.
The growth of science is dependent on a body of knowledge that builds on preexisting
research. This is especially true for convenience samples, and the results of individual
studies should be examined in light of existing and future research. Since the stakeholders of
particular UI system (which is determined as case study) consists of both experts and lay
people from different level and institution, therefore applying convenience sampling in the
data collection processes is less appropriate and difficult to obtain important participants.
This reason emerges because of the lack of researchers’ capacity to reach and identify
important stakeholders, and to meet them in order to do the survey and the interview.
Moreover, the participants in this research, which is referred to as a cohort, can sometimes
share a particular feature. Sometimes the members of a cohort are difficult to find and recruit
for research. The members of the cohort may wish to remain anonymous, or there is no list
identifying the members of the cohort. In this research, the researcher wishes to access a
population to which he or she would not normally have access.
In such situations, thus, this research uses the snowball sampling [12]. To sample
from the cohort, this research needs to find a member of the cohort and use him or her
(respective participant) to find other members of the cohort. In this research, further,
Snowball sampling has been applied successfully to study human behavior in populations as
diverse as gangs, employees of specific business, and illicit drug users.
4.7.4 Survey Participants
The sample is the consequence of the procedure this research uses to collect the data. A
sample can be determined as representative of a population by examining the methods used
by the researcher to collect the data. As mentioned earlier, the population for this research
is the individual within the stakeholder groups of the specific UI system determined as a case
study to be analyzed in this research. Following the selected case study mentioned in
previous Chapter, thus the population of this research is indeed the whole Surabaya city
people who nominated and grouped within the stakeholder groups determined. However, it
is impractical to do fieldwork in which the participant comes from all of the Surabaya city
people.
Therefore, this research applied the non-probabilistic sampling which also considers
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 88
the aspect of ‘cluster sampling’ procedures to towards the data collection processes. Cluster
random sampling is another variation on simple random sampling [12]. Simple random
sampling is the most basic of the sampling procedures. Simple random sampling occurs
whenever each member of the population has an equal probability of selection. The steps
involved in conducting a simple random sample are clear-cut. First, estimate the size of the
population. Next, generate random numbers to determine which members of the population
to select. In the final stage, collect the data and conduct the study.
Further, cluster sampling is defined as a sampling technique in which the population
is divided into already existing groupings (clusters), and then a sample of the cluster is
selected randomly from the population. The term cluster refers to a natural, but
heterogeneous, intact grouping of the members of the population. Technically, random
numbers are independent of each other. Independence means that each number has an equal
chance of selection and the selection of one number has no effect on the selection of another
number.
This research wishes to include a sample of each stakeholder group in the sample. In
order to not bias the sample, the size of the subgroups in the sample should equal the relative
size of the subgroups in the population. Nonetheless, this research exempted the
requirement as it is impractical in the field. To conduct the cluster sampling, first step is to
identify the specific stakeholder groups in the population and attempt to estimate their
relative size. Next, the researcher can use simple random or sequential sampling within each
subgroup. The result is a representative sample. Notably, however, the size of the stakeholder
groups in the sample will not be the same relative size as the population.
4.8 The Time Dimension Design
This research followed the embedded mixed methods design as its research strategy, with
case study applied to test and provide explanation, and validation towards the proposed
empirical framework and analysis models. In this section, the time-related options that pass
over all the previous considerations concerning the research design and strategies are
discussed. Time plays a significant role in the research design and execution. Importantly,
mixed-method strategies differ in two major aspects: the time sequence of data collection
and the type of data (that is quantitative or qualitative).
To identify the appropriate approach to investigate the research problem,
consideration towards two aspects aforementioned should be clear. Regarding the time
sequence of data collection, research design is classified into cross-sectional sequential
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 89
design and longitudinal design [12, 135, 138]. A cross-sectional sequential design involves
collecting data at one point in time. This design is suitable for researchers conducting large-
scale surveys on many variables and from participants who are demographically dispersed.
On the other hand, a longitudinal design is suitable for researchers conducting in-depth
interviews and observations. This design becomes cumbersome in quantitative studies
which use large-scale surveys.
Due to time constraints, research objectives and researcher limitations, this research
applied the cross-sectional sequential design; as longitudinal design requires data to be
collected over a long period which was not appropriate for current research. The cross-
sectional sequential design is an alternative method that allows the researcher to examine
developmental transitions over a shorter period of time. In addition, an advantage of the
cross-sectional design is that it permits researcher to obtain useful developmental data in a
relatively short period of time.
In this research context, even though UI system risk may or may not have happened
during its’ life time, this research aimed to develop a conceptual framework which consist of
various analysis models which are useful as evaluation tools for measuring UI system
robustness within the specific range of time. Specific point of time was chosen in the data
collection, risk, robustness and recovery analysis models conducted. This due to at this point
(it is assumed) experts and DMs need to decide the mitigation plan and resilience strategy
towards developing the UI system back better. Therefore, this research collected data cross-
sectionally at the ‘non-specific’ UI system life time phase. During the data collection,
stakeholders asked to state their perception towards risk events impact level at that point in
time of the UI system provides its serviceability to urban community.
4.9 Empirical Analysis Methods and Techniques Applied
Empirical analysis involves gathering of data by observation and experimentation with the
goal of learning something. One important characteristic of empirical analysis is that is
involves measurement, or the converting of observations into numbers. There are different
types of measurement, but just about all can be grouped as either self- or other observation,
in which researchers use his own senses or someone else uses his or her own senses to
collect information on how community interact with their environments.
Empirical methods are not the only way to gain insight into challenging questions.
Within the social science, just about everything people “know” has come from scientists’
efforts to observe and experience the phenomena of interest. Mathematicians, for example,
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 90
do not use empirical analysis, but instead discover new ideas using deduction and formal
proofs [12].
This research utilized and integrated a number of analysis approaches following with
the modeling and simulation methodologies, such as; Failure Mode Effect and Criticality
Analysis (FMECA), Fuzzy-set theory and Social Network Analysis (SNA). The FMECA applied
to calculate and measure the risk magnitude based on the determined risk decision factors.
Then, the Trapezoidal Fuzzy Number (TFN) applied within the processes of FMECA method
with the intention of accommodates the divergent perceptions and judgments made by
people (both experts and lay people) towards valuing risk decision factor.
Further, as several novel RA models also develops, this research applied the SNA
method in order to model, simulate and analyze several issues of risk impact mechanisms
mentioned in Chapter 3 previously, that is; the risk impact causality and interaction pattern,
and the impact of risk to the urban community. By applying the SNA method, the simulation
can theoretically illustrate, exhibit and clarify towards risk events dynamic behavior. This
can be obtained based on how risk events affect and interact with others by its impact within
specific risk network. The theoretical and discussion towards those methods in general can
be seen below.
To conduct the UI system REA (which focus on the system robustness analysis), this
research applied the empirical experiments (computational simulation) in the last phase of
the conceptual framework. The value of the true experiment is that it allows us to control
and remove potential threats to internal validity. Specifically, the true experiment allows
researchers to ensure that the independent variable comes before the dependent variable,
that the independent and dependent variables are related, and that this research can account
for alternative explanations.
Three critical features set a true experiment apart from other research methods: (1)
The independent variable is a manipulated variable under the researcher’s control, (2) The
researchers use random assignment to place individuals into the different research
conditions, and (3) The researchers can create one or more control conditions. The hallmark
of a true experiment is that the researcher directly controls or manipulates the level of the
independent variable. In the other research designs, the researcher might use subject
variables that he or she cannot control as the independent variable under study.
By contrast, in the true experiment, the researcher can select a truly controllable or
manipulable independent variable that can be applied over different experimental
conditions to examine its effects on an outcome of interest. This research adopts a
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 91
quantitative independent variable which is a variable represented by an ordinal or more
sophisticated type of measurement scale. Therefore, this research has an ability to control
over the treatment condition that participants experience. Random assignment is another
necessary component of the true experiment. Random assignment occurs when each
participant in an experiment has an equal chance of experiencing any one of k-number of
possible research conditions.
4.9.1 Failure Mode Effect and Criticality Analysis Method
To measure the risk magnitude, this research applied one of the most recognized RA method
called Failure Mode Effect and Criticality Analysis (FMECA). In some studies, the method has
appeared under different names and with somewhat different content. The FMECA is a
complex engineering analysis methodology used to identify potential failure modes, failure
causes, failure effects and problem areas affecting the system’s or product’s mission success,
hardware and software reliability, maintainability, and safety [161]. The method is based on
a session of systematic brainstorming aimed at uncovering the failures that might occur in a
system of process [162].
The FMECA also provides a structured process for assessing failure modes and
mitigating the effects of those failure modes through corrective actions [163]. Moreover,
FMECA is an analysis technique for defining, identifying and eliminating known and/or
potential failures, problems, errors and so on from system, design, process and/or service
before they reach the customer. The strong points of the FMECA are that it gives a systematic
overview of the important failures in the system and that it forces the designer to evaluate
the reliability of their system. In addition, it represents a good basis for more comprehensive
quantitative analyses, such as fault tree analyses and event tree analyses.
Moreover, the main objective of FMECA is to identify potential failure modes, evaluate
the causes and effects of different component failure modes, and determine what could
eliminate or reduce the chance of failure. The results of the analysis can help analysts to
identify and correct the failure modes that have a detrimental effect on the system and
improve its performance during the stages of design and production. Nonetheless, FMECA
gives no guarantee that all critical components failures have been revealed. Through a
systematic review such as FMECA, most weaknesses of the system as a result of individual
component failures will, however, be revealed.
The FMECA procedure starts by analyzing all of the systems step by step; that is, by
examining the system and sub-system functions. The system elements of FMECA and its
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 92
description including;
• Potential failure modes and causes: The failure (or risk) of particular system of UI sector
should be defined clearly.
• Potential effect of failures: The consequence of each failure mode (risk events) should be
carefully examined and recorded.
• Failure detections and compensation: All of the failures, risk events should be corrected
to eliminate the cause and to maximize reliability.
• Assigning severity, occurrence and detection: The current research risk event ranking is
developed based on the risk decision factors.
Furthermore, the main advantage of FMECA method is that is capable producing the
magnitude level of risk in the numerical value so that DMs can easily interpreting the result
confidently and build the further risk mitigation strategies. Another advantage is that FMECA:
it is widely used and easy to understand and interpret; provides a comprehensive hardware
review; suitable for complex system; flexible such that the level of detail can be adapted to
the objectives of the analysis; systematic and comprehensive. The method represents a
systematic analysis of the components of the system to identify all significant failure modes
and to see how important they are for the system’s performance.
FMECA divides up into design and production. Potential latent problems can be
analyzed, possible defects can be pinpointed before they are passed on to the customer, their
effects on the overall system can be studied and the right control decisions can be taken, in
either of these two stages [162]. However, FMECA method can be unsuitable for analyzing
systems with much redundancy (several components that can perform the same function
such that failure of one unit does not result in system failure). In such systems, it will not be
so interesting to analyze individual components failures, since these cannot directly affect
the function of the system.
Following the UI system complex problem circumstances in the real world, further,
the interest is then focused on combinations of two or more events that together can cause
system failure. The analysis of multi-risks using FMECA method has been applied to many
study areas. For instances; Wall, M., et al. explained how to utilize FMECA for Floating
Production, Storage and Offloading (FPSO) of vessels and other Floating Storage Units (FSUs)
[164]. Vinnem, J. E., et al. after classifying FMECA as a qualitative RA, gave many examples of
offshore accidents lessons learned from past experiences [165]. Another studies applied
FMECA method to analyze the risk or failure event can be seen in [162, 166-168].
In addition, the study on assessing the risk in the context of UI system still received
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 93
little attention in the academia field. According to FMECA, the risk priorities of failure modes
are generally determined through the Risk Priority Number (RPN), which assesses based on
risk decision factors. Nevertheless, based on the literature review previously, assessing risk
based solely on its magnitude (which is measured by its risk decision factors) is definitely
not enough and too rough, affecting further decision output.
The traditional observation of FMECA based on crisp RPN is not supportive and
robust enough in priority ranking of failure modes. Of the shortcomings described in the
reviewed literature, the ones that have received significant attention from the literature can
be seen as being risk factor and RPN related issues. For instance, the relative importance
among the three risk decision factors, that is occurrence (O), severity (S), and detection (D),
is not considered. Different combinations of O, S and D may produce the same value of RPN;
and the risk decision factors are difficult to be precisely estimated.
Further, there’s no study that even standardized the combination of the risk decision
factor to measure the RPN. This research determined to apply the three risk decision factors
aforementioned. The occurrence factor measures the likelihood of a failure mode being
occurred. The severity is the expected consequence of the failure. The ability to realize the
error before its consequences affect the costumers, is measured by the detection factor
(detectability).
Various scoring guidelines exist, and in this research, the RA model uses the 10-point
linguist scale for evaluating the O, S and D factors, as suggested and applied in many
applications of FMECA [105, 161, 167-171]. The ability to realize the error/ failure/
disturbance before its consequences affect both the system and community is measured by
the detection factor. Then, the RPN is conventionally defined as;
( ), ,f O S D
O S D
=
=
RPN
(5-1)
Even though FMECA has been seen as robust method towards analyzing failure on the
respective system, a number of FMECA limitation has attracted many authors in the research
fields. Liu, H.-C., L. Liu, and N. Liu, reviewed 75 FMECA papers published between 1992 and
2002 in the international journals and categorized them according to the approaches used
to overcome the limitation of the conventional RPN method [172]. Perhaps the main
disadvantage of using the FMECA method is that; first, all components are analyzed and
documented, also the failures of little or no consequences.
Another drawback of FMECA is the method just considers subjective judgment when
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 94
single expert deliberates his/her opinion towards judging the risk decision factor. To
comprehensively analyze the UI system risk, it is impractical to homogenize all experts and
decision makers (DMs) approach and policy [38]. The analysis of UI risks considering multi-
experts (both lay people and experts) engagement is of great issue which need to take in
order to produce reliable output. Even using the mean value to accommodate multi-experts
judgments, nonetheless, the analysis output is insufficient and unreliable [79, 173].
To deal with the issue of divergent stakeholder perceptions and judgments when they
assess risk decision factors, some studies proposed and applied other substitute methods,
such as; Fuzzy theory [172, 173]. Currently, the Fuzzy methods and linear programming
method have been proposed as an effective solution for the calculations of Fuzzy RPNs [168].
Based on the observed and surveyed literature, Fuzzy rule-base system is the most popular
method for prioritizing the failure modes [172].
Following the previous discussions, this research therefore utilized and applied the
Fuzzy theory within conventional FMECA processes towards accommodating divergent
stakeholder judgments. Considering the subjective aspect of the decision risk factors valued
by stakeholders, this research adopts a Fuzzy assessment for each risk decision factors (O, S
and D elements) using a specific scale for each risk decision factors. The Fuzzy-based
methods proposed in the FMECA improves the accuracy of the failure criticality analysis by
compromising the easiness and transparency of the conventional method. The detail
explanation of Fuzzy-set theory and further Fuzzy-based FMECA is deliberated in next sub-
sections.
4.9.2 Fuzzy Theory
People perceptions and judgments towards valuing risk decision factors is the main and
crucial input within the process of RA in order to produce robust RA output. Nonetheless, it
should be noted that people’s perception and judgment are dissimilar and divergent due to
influence by their sociocultural aspects. The assessment on how the information gathering
and exchange objectively can support recognizing the resultant mix of risk perceptions.
To accommodate people judgments towards giving adjustment of risk decision factor
this research has applied Fuzzy-set theory. According to Pedrycz, Ekel, and Parreiras, the
Fuzzy set theory is one of the most fundamental concepts of science and engineering,
because it can manage inaccurate information by manipulating mathematical terms [174].
The notion of Fuzzy sets is quite intuitive and transparent as it captures the essence of how
things are perceived and described in everyday life.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 95
The concept of a Fuzzy set manages the representation of classes/categories that has
boundaries that are ill-defined or flexible by means of characteristic functions taking values
in an ordered set of membership values [175]. Therefore, Fuzzy set A is, by definition, the
membership function that maps the elements of the universe X to the unit interval [0,1], as
follows [175]:
0 1: [ , ]A X → (5-2)
A Fuzzy set A in X is therefore characterized by a membership function ( )
Af x
,
which associates each point X with a real number in the interval [0,1] with a value of ( )
Af x
representing the association level of X with the set A . Therefore, the closer to one the
value of ( )
Af x
is assumed to be, the greater the membership of the element X is to the set
A [175]. Assuming that A reflects a preference for the values of a variable x in X and
because x is a decision variable and the Fuzzy set A is an elastic constraint characterizing
the feasible values and the DM’s preferences, ( )
Af v
denotes the degree of preference in favor
of v as the value of x . This interpretation prevails in Fuzzy optimization and decision
analysis [174].
The form of the membership functions reflects the problem at hand for which the
Fuzzy sets are constructed. It is also essential to assess the type of Fuzzy set from the
standpoint of its suitability for managing the ensuing optimization procedures [174]. The
most commonly used categories of membership functions all defined in the universe of real
numbers are: triangular, trapezoidal, Gaussian, and Exponential-like membership functions.
A trapezoidal Fuzzy number A , which is used in this research, can be described according to
its membership function as follows:
( )
1
1
1 1
1 1
1 2
2
2 2
2 2
2
0 if
if
1 if
if
0 if
,
,
,
A
x a
x aa x b
b a
x b x b
x ab x a
b a
x a
− −
= −
−
(5-3)
where, A can also be represented by ( )1 1 2 2
, , ,A a b a b= as depicted in Figure 4-2
below.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 96
Figure 4-2. Trapezoidal Fuzzy set of number A . (Source: Figure from: Silva, M. M., et al. [161]).
If 1 2,
MA b b a= = = A is a triangular Fuzzy number:
( ) ( )1 2 1 2, , , , ,
M M MA a a a a a a a= =
.
Further, basic operations of Fuzzy set theory can be reviewed below. They are extensions of
the corresponding crisp numbers, supporting the determination of the Fuzzy number. For
more details, see [174, 176, 177]. Let ( ) ( )1 1 1 2 2 2 3 3 4 4
and , , , , , ,A a b b a A a b b a= = be two non-
negative trapezoidal Fuzzy numbers then:
( ) ( )
( )1 2 1 1 2 2 3 3 4 4
1 3 1 3 2 4 2 4
+
, , , , , ,
, , ,
A A a b b a a b b a
a a b b b b a a
+ =
= + + + + (5-4)
( ) ( )
( )1 2 1 1 2 2 3 3 4 4
1 3 1 3 2 4 2 4
, , , , , ,
, , ,
A A a b b a a b b a
a a b b b b a a
− = −
= − − − − (5-5)
( ) ( )1 1 1 2 2 2 2 1 1
, , , , , ,A a b b a a b b a− = − = − − − − (5-6)
( ) ( )
( )1 2 1 1 2 2 3 3 4 4
1 3 1 3 2 4 2 4
, , , , , ,
, , ,
A A a b b a a b b a
a a b b b b a a
=
(5-7)
As presented in the previous subsection, the model proposes in this research uses the
10-point linguist (Likert) scale for evaluating the O, S, and D factors. Considering the
difficulty of precisely evaluating the three risk factors, they are evaluated by experts using
determination linguistic variables. According to Pedrycz et al. the notion of linguistic
variables can be regarded as variables that have values that are Fuzzy sets and assume values
consisting of words or sentences expressed in a certain language [174], or in Zadeh’s words ;
“variables whose values are not numbers but words or sentences in a natural or artificial
language” [178].
Further, Zadeh, notes that the main contribution of Fuzzy logic is a methodology for
computing with words, which is a necessity when the available information is too imprecise
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 97
to justify the use of numbers and is useful when there is a tolerance for imprecision that can
be exploited to achieve tractability, robustness, a low solution cost, and a better rapport with
reality [179]. For the reasons presented, the use of Fuzzy theory and, more precisely, the use
of linguistic variables can be justified.
Notably, another crucial drawback of Fuzzy-based FMECA to assess UI system risks is
the method is too incomplete and inappropriate to be applied and considered as a single
method. This drawback emerges as Fuzzy-based FMECA is not comprehensive to be applied
to develop risk mitigation plan and strategy for evaluating risk event considering its’
dynamic impact characteristics as mentioned in previous Chapters 3. Therefore, for this
issue, this research integrates and applies the Fuzzy-based FMECA with network and
topology analysis to assess the risk impact. The network and topology analysis method
applied in this research is SNA which describes below.
4.9.3 Social Network Analysis
The SNA is a methodology used to identify the conditions of social structures by analyzing
the interactions and interrelationships between a set of actors [180-186]. Conceptually, SNA
emphasizes the relational measures among components rather than their individual
attributes. According to Wasserman, S. and K. Faust, a social network is a social structure
made of actors (nodes) that are connected by one or more specific type of relations (ties),
such as friendship, firm alliance, or international trade[187]. Since introduced, the
superiority and a number of SNA advantages has been applied and discussed well in several
past studies [183-185, 188-192].
For instance, SNA has been applied to investigate various relationships among
various entities (e.g., individuals and organizations) and knowledge diffusion in the social
sciences, engineering and economics [184]. Lee, specifically compared development
patterns between the automobile industry and the semiconductor industry from the
network perspective using SNA [193]. Several network studies have also been conducted in
the construction domain. Wambeke, B., M. Liu, and S. Hsiang, applied the SNA to generate a
series of 14 social networks for the trades involved within a construction project [183].
In addition, Wong et al. examined the differences in robust project network designs
between domestic and global projects [194]. Meanwhile, Taylor et al. and, Taylor and
Bernstein, suggested a hybrid approaches that connected social network theory with
learning dynamics and building information modeling (BIM) practice [195, 196]. Prell, C., K.
Hubacek, and M. Reed, presented a case study from the Peak District National Park in the
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 98
United Kingdom, where the study applied SNA to inform stakeholder analysis. The
information on the study analysis helped the experts to identify which individuals and
categories of stakeholder played more central roles in the network and which were more
peripheral.
Further, Chai, C. L., et al., applied SNA, to study human interactions and to analyze
characteristics of the CI network [197]. Another study in CI fields using SNA was conducted
by Zhang, W.-J., et al. [97]. The study applied SNA to identify and analyze the vulnerability of
CI system. Lienert, J., F. Schnetzer, and K. Ingold, investigated the fragmentation in water
infrastructure planning, to understand how actors from different decision levels and sectors
are represented, and which interests they follow [186]. It is found that the SNA successfully
confirmed the present of strong fragmentation by concluding that there’s a little
collaboration between the water supply and wastewater sector, and few ties between local,
cantonal, and national actors.
Moreover, there also a number of studies which gave a great emphasize and attention
towards SNA method application to assess risk in the context of risk impact network,
relationships, correlation and interconnection. For instances; Fang, C., et al. presented a
network topology analysis based on network theory which aims at identifying key elements
in the structure of interrelated risks potentially affecting a large engineering project [86].
Further, Yang, R. J. and P. X. W. Zou, which developed a SNA based stakeholder-
associated RA method to assess and analyze the risks and their interactions in complex green
building projects [92]. Accordingly, based on SNA method structure, the network analysis
can be conducted by either one-mode or two-mode network analysis. The discussion for one-
mode and two-mode network analysis method are discussed in the next sub-section.
4.9.3.1 One-mode and Two-mode (Affiliation) Network
In SNA studies, usually an event-event or actor-actor relationship can be modeled by using a
node-node connection. This is known as one-mode network data since the basic data consist
of one types of node in which there are only connection between them (see Figure 4-3a).
Nonetheless, several studies have focused on data in which they have ties among a single set
of events, and the ties are measured directly. Further, as touched on elsewhere, our real world
often has the situation where we cannot collect ties among the same events directly. However,
it can infer or predict ties based on belonging to the same groups.
Therefore, some basic data consist of two types of nodes in which there are only
connections between the two types and not within. This is known as two-mode data
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 99
(affiliation data or bipartite data, see Figure 4-3b) [190]. The one-mode and two-mode data
distinction are crucial towards the further analysis processes that will need dissimilar
understanding and some restrictions. With the large number of SNA advantages in
measuring the relationship between nodes, this research thus utilized and applied the SNA)
method.
Figure 4-3. (a) An example of one-mode network and (b) Two-mode network.
The method has the ability to portray, model and simulate both the dynamical of risk
nature, risk events relationship and community behavior towards response to the risks
impacts affected them. As far as author knowledge, this research is the first attempt applied
SNA methodology within the assessment of risk-based REA in the context of UI system. To
better understand the concept, the understanding and the application of SNA suited for this
research, the sub-Chapters bellow describes a step-by-step process of SNA methodology.
4.9.3.2 Building Network Structure and Visualization
In SNA method, to measure a relationship between nodes (it can be actor or event), a tie can
be divided into two types: non-directional (symmetric) and directional (non-symmetric). Fig.
4-4a shows that a node (dark circle) is directly connected to its three neighbors. It is also
indirectly connected to its other four neighbors through its two neighbors. In cases where
there are directional relationships among nodes, a relationship could be classified as either
inward or outward. Fig. 4-4b shows an actor with an in-ward tie (input) and two outward
ties (output).
A directed network is useful when directional relationships between an active and a
passive actor are worth investigating (e.g., prime contractor–subcontractor, knowledge
diffusion–acquisition, among others). To build the network, a primary step is to build the
correlation matrix, in here refers to matrix structure to portray the relationship between
each node. Depending on the network data set analysis, whether it is a non-directional or a
directional network, the matrix structure always follows the basic rules of building the
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 100
matrix.
Figure 4-4. (a) Non-directional and (b) Directional relationship tie. (Source Park, H., et al. [184]).
To show the connectivity between nodes in the undirected network, the symmetric
adjacency matrix consists of binary number (binary matrix), either 0 to show if there’s no
relation between nodes or 1 to show if there’s a relation between nodes with the condition
of X→Y = Y→X. For directed data, however, the adjacency matrix is not necessarily symmetric,
and the row and column sums may be different. The matrix for directed network has the
same structure except with the condition of X→Y ≠ Y→X. The example matrix for both
undirected and directed network can be seen in Figure 4-5 (which in this research called as
Risk Structure Matrix, RSM).
A valued network will be applied as well within this research in some points within
the processes of RA and will be described in a further sub-Chapter. This network direction
understanding is pivotal towards building the network structure which ultimately effect on
the network visualization. Further, the total number of nodes in a network graph is equal to
the number of elements in N , that is, | |V N= . Correspondingly, the number of edges in a
graph is equal to the number of elements in , that is, W K= [127].
A B C D A B C D
A 0 1 0 1 A 0 1 0 1
B 1 0 1 1 B 0 0 1 1
C 0 1 0 0 C 0 1 0 0
D 1 0 1 0 D 1 0 1 0
(a) (b)
Figure 4-5. (a) Non-directional and (b) directional matrix structure.
Any given graph can be uniquely represented by an N N adjacency matrix. If there
exists an edge from some vertex i to vertex j , then the element N is 1; otherwise, it is 0.
Undirected graphs always have symmetric adjacency matrices. In some applications, it is
useful to not only specify whether an edge exists, but to assign the edge a value, typically a
number in the range [0,1] [127, 181, 182, 198].
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 101
One of the first things most people want to do with network data is construct a visual
representation of it-in short, draw a picture. Seeing the network can provide a qualitative
understanding that is hard to obtain quantitatively. A network diagram consists of a set of
points representing nodes and a set of lines representing ties. Various characteristics of the
point and lines, such as color, size and shape, can be used to communicate information about
the nodes and the relationships among them [198].
It is crucial to distinguished between network elements and their graphical
representation-that is, between nodes and the points that represent them, and between ties
and the lines that represent them. A study discussed the spatial orientation of nodes and
things that are considered important in visualizing properties, and attributes of nodes and
edges or ties in network graphs followed by a series of examples illustrating some possible
ways to address some visualization issues can be seen in [198].
The ability to visualize a social network is one of the attractive features of SNA. When
done correctly, visualization allows the researchers to obtain a simple qualitative
understanding of the network structure. The use of good layouts to emphasize properties of
the network is key, graphical layout algorithms are highly effective and widely used. In
addition, the use of shape, size and color to capture nodal attribute properties can further
enhance the effectiveness of any visualization. In a similar ways, color, thickness and line
style can be used to emphasize properties of edges.
Exploring a network structure by calculation is much more concise and precise than
visual inspection [183]. Each of the networks mathematically can be represented by a graph
( ),G N K , in which (depends on the networks discussed) the identified actors/events are
mapped intoN nodes (or vertices) connected by K weighted arrows (or edges, or links) [86,
92]. For directed networks, the elements of K are ordered pairs of distinct vertices, while
for undirected graphs, the element of K are unordered pairs of distinct vertices.
4.9.3.3 Network Topology Decipherment Measurements
Network topology can be described by a variety of measures. This section explores in detail
several basic network topology within SNA method utilized in this research. For instance, the
network characteristic, the network measurement in the context of centrality which is the
most widely used concepts in SNA, a partition and a method to assess a complex and large
network. Depending on the nature of the network ties within the RA processes, each of the
SNA measurements can be interpreted in a variety of ways. Then modification and
adjustment for each of SNA measurement formula is further needed.
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 102
Table 4-2. The general network topology indicator applied.
Meas. Description Equation Network measures.
De
nsi
ty
It is defined as the ratio of existing ties in a network to the maximum number of ties possible in everyone in the group is connected with everyone else. Density can be interpreted as the probability that a tie exist between any pair of randomly chosen nodes; however, the absolute number can be hard to access [198]. Further, density is an indication of how knitted a network is [86, 92, 197].
( )Density( 1)
KG
N N=
− (4-8)
where, N is the number of node. In principle,
the advantage of density over the simple number of ties (or total tie strength) is that it adjusts for the number of nodes in the network. Roughly saying, density is simply the number of ties in the network, expressed as a proportion of the number possible.
Co
he
sio
n
The idea of cohesion is connectedness or ‘knittedness’. Depending on the nature of ties in the network, the term ‘cohesion’ may not necessarily correspond to sociological cohesion. Cohesion measures “the distance, or the number of links, to reach nodes in a network”, and is based on the shortest path [92, 198]. The cohesion is a measure of the complexity of network based on network reachability. The cohesion defined in Eq. (4-9) is a measure of the complexity of network based on network reachability. This measure is based on the definition of adjacency matrices (AdjM). The AdjM defines how many paths of length 1 there are from each node to each other node. In general, it can be shown that the powers of the
AdjM, give the number of walks of length z from each node to each other node. The higher the cohesion, the more complexity of the risk network is.
( )
,
, ;
AdjM
Cohesion ( )1
zi j
i j i IG
N N
=
−
(4-9)
Node/ link measures
De
gre
e o
f C
en
tra
lity
(D
C)
The DC measures the number of ties of a given type that a node has. A node’s degree can be calculated without having information about the full network in which they are embedded. As such, it could be argued that it is not really a measure of a centrality, which defined above as a property of a node’s position in the network. In
terms of the adjacency matrix X of an undirected matrix, DC is simply the row (or
column) sums of the adjacency matrix. If id is the
DC of actor i and ijx is the ( )i j, entry of the
adjacency matrix. An advantage of DC is that it is basically interpretable in all kinds of networks, including disconnected networks. On contrary, a disadvantage of DC is that it is a relatively coarse measure of centrality [198].
DegCi ij
j
x= (4-10)
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 103
Ou
t-D
eg
ree
an
d,
In-D
eg
ree
It counts the number of outgoing ties (arcs) whereas; In-Degree counts the number of incoming ties. Depending on the social relation in question, we might interpret Out-Degree as the ‘gregariousness’ or ‘expansiveness’ of the node and the In-Degree as the ‘prestige’ or ‘popularity’ of the node. Degree of nodes provides an indication of the immediate connectivity characteristic. ‘In-degree’ refers to incoming relations (impacted by) and ‘out-degree’ to out-coming relations (impact to). The degree of each node is the weight sum of links which are incident from the node. They are presented in Eqs. 4-11 and 4-12 and indicate the links
between risk * nS R and its neighbors. Eq. 4-13
shows the difference between the in-degree and out-degree values of one risk. The higher the difference, the stronger impact of the risk to others comparing to the impact received by the risk [92].
,=InDeg SRMi j i
j G
(4-11)
,OutDeg = SRM i i j
j G
(4-12)
=GapDeg OutDeg InDeg i i i− (4-13)
Be
twe
en
ne
ss C
en
tra
lity
(B
C)
BC is a measure of how often a given node falls along the shortest path between two other nodes [198]. It reflects the amount of brokerage each node has between all other nodes in the network. More specifically, it is calculated for a given focal node by computing, for each pair of nodes other than the focal node, what proportion of all the shortest paths from one to the other pass through the focal node. These proportions are summed across all pairs and the result is a single value for each node in the network. The formula for the BC of node j can be stated as (4-14). Betweenness
reaches its maximum value when the node lies along every shortest path between every pair of other nodes. BC is typically interpreted in terms of the potential for controlling flows through the network-that is, playing a gatekeeping or toll-taking role. Nodes with high betweenness are in a position to threaten the network with disruption of operations. More generally, high-betweenness nodes are in a position to filter information and to color or distort it as they pass it along.
BetCijk
jiki k
g
g
= (4-14)
where, ijkg is the number of geodesic paths
connecting i and k through j , and ikg is
the total number of geodesic paths connecting
i and k . A node’s betweenness is zero when it
is never along the shortest path between any two others. This can occur when the node is an isolate, or when every alter of a node is connected to every other alter.
Eig
en
ve
cto
r C
en
tra
lity
(E
C)
Eigenvector centrality can be described from a number of different perspectives. Eigenvector centrality can be interpreted as a measure of popularity in the sense that a node with high eigenvector centrality is connected to nodes that are themselves well connected. Here, eigenvector centrality can be presented as a variation of degree centrality in which the number of nodes adjacent to a given node counted (similar to degree centrality) [198], but weight each adjacent node by its centrality. The formula for the eigenvector centrality of node j is given by;
EigenVi ij j
j
x e= (4-15)
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 104
Clo
sen
ess
Ce
ntr
ali
ty (
CC
) Closeness is an inverse measure of centrality in the sense that large numbers indicate that a node is highly peripheral, while small numbers indicate that a node is more central [198]. In a flow context, closeness centrality typically interprets in terms of the minimum time until arrival of something flowing through the network. A node that has a high normalized closeness score is a short distance from most order, so information originating at a random node can potentially reach the central node very quickly. Since the diffusion process tends to introduce distortion, the information received by central nodes expected to have higher fidelity on average. Thus, a high normalized closeness would seem a significant advantage for a node (in the case of something useful being transmitted). The formula for the closeness centrality of node
i is given by equation (4-16).
,
1Close =
i ji j d (4-16)
Sta
tus
Ce
ntr
ali
ty (
SC
)
Status centrality (Katz centrality) computes the relative influence of a node within a network by measuring the number of the immediate neighbors and also all other nodes in the network that connect to the node under consideration through their immediate neighbors [92] (Eq. 4-17). The in-status centrality indicates the extent to which a node is affected by others; whereas, out-status centrality indicates the extent to which a risk can affect the others. Regarding the influence of a risk, the out-status centrality is used as the outcome measure. The higher the out-status centrality values the greater the impact of the node.
( )1
,1 ;
StaC = AdjM d di
i jd j G i j
−
= (4-17)
4.9.4 True Empirical Experiments (Computational Simulation)
The risk criticality analysis is the main model and gate towards assessing the UI system
resilience. While the UI system robustness analysis also considered risk-critical as the base
model, deciding optimum recovery strategy in the form of various variables is a daunting
task. A variety of reasons to simulate rather than conduct research in the real world is
decided in the UI system robustness analysis. This research chooses a scenario-based
simulation because the behavior of interest could not be studied ethically, and impractical in
the real world.
Further, a simulation may be used because studying a behavior under naturally
occurring conditions is expensive and time consuming. In a simulation, this research attempt
to re-create (as closely as possible) a real-world situation in the virtual-world. Carefully
designed and executed simulation may increase the generality of results. Because this
strategy has been used with increasing frequency lately. This research simulates the sixth
phase of the conceptual framework, that is recovery analysis, for practical reasons. By
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 105
conducting a simulation, this research gains the advantage of retaining control over variables
while studying the behavior under relatively realistic conditions.
Accordingly, the more realistic the simulation, the greater are the chance that the
results will be applicable to the simulated real-world phenomenon. As far as possible, a
simulation should be as realistic as possible. However, a simulation may not have to be highly
realistic to adequately test and validate the conceptual framework in this research. The
importance of the “realism” of a simulation depends in part on the definition of realism that
this research adopts. Meanwhile, the term mundane realism refers to the degree to which a
simulation mirrors the real-world event [12, 135]. In contrast, experimental realism refers
to the degree to which the simulation psychologically involves the participants in the
experiment.
For reaching highest robustness capacity (value) for respective UI system and
improving the generality of scenario-based simulation; the variable, formula, and equation
boundary must be properly designed by observing the actual situation and study it carefully,
identify the crucial elements and then try to reproduce them in the computational simulation.
This research determined five recovery scenarios to be simulated. Empirically, the recovery
strategy formed in the application of random number applied within the system robustness
variables.
The simulation conducts for every scenario over time-period boundary. Notably, the
scenario-based simulation, thus, will produce dissimilar UI system robustness level over
time. The dissimilar robustness level obtained between five simulations will then discuss in
the end part of analyses section. The computational simulation processes for the five
recovery strategies in this research refer to the ‘Quasi-experimental design”. This research
design is discussed in the next sub-section.
4.9.5 Quasi-Experimental Design
In some circumstances, a true experiment is either impractical or unethical. Further, there’s
a condition in which data collection not be able to randomly assign participants to different
treatment conditions although this research can randomly select one (or several) group of
participants to receive a treatment while the other group acts as a control group. In other
cases, it is unethical to subject people to same treatment condition or fail to provide them
with treatment. But fateful events occur naturally that allow us to determine how people
react to specific conditions. There are two of the more common quasi-experimental
techniques, the nonequivalent control-group design and the interrupted time series [12].
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 106
The term quasi-experimental literally means that the research resembles an
experiment. In a quasi-experimental there is an independent variable and a dependent
variable, and the researcher wants to determine whether introduction of the independent
variable produces a change in the dependent variable. In addition, there is a control group of
individuals who do not experience the independent variable. Consequently, the researcher
can compare the difference in outcome between the treatment and control groups. The
missing component from this research is the random assignment of participants to the
treatment conditions.
Furthermore, the primary advantage of the quasi-experiment is the lack of random
assignment that means that researcher can never fully rule out alternative explanations for
the effect this research observe [135]. Another advantage of the quasi-experiment is that
researcher can collect useful information that will allow this research to examine the effects
of the independent variable on the dependent variable. Moreover, quasi-experimental design
allows this research to evaluate the impact of a quasi-independent variable under naturally
occurring conditions.
The quasi-experiment is another useful tool that the researcher can select when the
circumstances of the research prohibit the conventional true experiment. In the recovery
analysis model development within the system-of-interest resilience overtime context,
instead of applying the time series quasi-experimental design, this research applied the
interrupted time series quasi-experimental design. The research made repeated measures
of the frequency or rate of behavior in a sample of participants before and after a critical
event (disturbance point).
Similar to most quasi-experiments, this research may not be able to control when the
critical event occurs but can use its presence to examine interesting aspects of human
behavior. In this case, the research manipulating the independent variable and simply take
advantage of a naturally occurring event. Therefore, the research needs to establish a clear
causal relationship among variables. However, quasi-experimental research does have
drawbacks that affect the internal and external validity of the research [135].
4.9.6 Assumptions of Science Applied
No computer program or Geographical procedure can create gold from straw; the quality of
any empirical analysis depends on both the analysis model and the quality of the original
data. Unfortunately, many people treat the computer and geographies as magical machines
that somehow tell the truth. The phrase, “garbage-in-garbage-out” means that the output of
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 107
any computer program is no better than the data you ask it to analyze. These observations
mean that user need to proceed with caution when using software packages [12]. All sciences
make the same basic assumptions about their subject matter.
This research adopts several assumptions within the analysis models develop which
some also discussed in Chapter 5. Several assumptions decided and applied within the
analysis models describes in-depth below;
- Entire participants (individual stakeholders) is equal and has identical importance
weight. Thus, this research exempted the application of weight value within the
empirical analysis processes.
- There are several concepts towards analyzing UI system risks (e.g., consequences lead
to; system deprivation, cost loss and environmental harm). Nonetheless, this research
only considers the risk impact characteristics, that is; risk magnitude, risk causality
and interaction pattern, and risk effect to urban community.
- The identified risk events assumed has the same significant (or importance) weight.
Thus, this research exempted the application of weight value within the empirical
analysis processes.
- Although the risk characteristic and nature are dynamic and stochastic, the
conceptual framework and analysis models proposes in this research is deterministic
design.
- The threshold value for dichotomizing the preliminary input for one-mode risk
matrix is decided in an ad-hoc way by the author.
- The data collection, processing and simulation are performed in the non-continuous
(discrete) time manner.
- Although it is true that UI system has various stakeholder groups which need to be
identified, however because of research time and author capacity limitation this
research cannot cover all of the stakeholder groups in the respective case study.
- The scenario-based recovery strategy variable simulation formed in the application
of random number determined in an ad-hoc way by the author.
4.10 Chapter Summary
The primary theme if this Chapter was designing a research method that reduces the effects
of unwanted sources of error and bias towards achieving the research aim as well as its
objectives. Because research is a uniquely human enterprise, there are many opportunities
for the researcher’s behavior to bias the participants’ behavior as well as the researcher’s
CHAPTER 4-RESEARCH DESIGN AND METHODOLOGY
Page 108
interpretation of the UI system risk and its impact characteristic as well as the UI system
resilience. Therefore, this section examined the sequence of important events for the
research process, from defining the purpose of the study to the final interpretation of the
data to examine where and how bias can enter the research process.
The goal of the research design is to provide sufficient detail so that interested
readers can evaluate not only the quality of the research background and the data collection
procedure but also the overall research quality. This section describes in detail the sequence
of significant events experienced during the research. Further, the research design section
describes on how this research assigned participants to various conditions of the research
as well as researcher to control procedures.
This Chapter also outlined the research methodology used along with the research
design, research approaches, research strategy and activities, and finally the data analysis
and interpretation strategy. The structure of the research process, including the major steps
taking to conduct the research, were explained alongside a flowchart depicting the research
process. A specific instruction towards the design-based questionnaire gives to the
participants also explored and discussed where the procedure section consists of an
important series of stages that required careful description.
Next the leading to a rationale for selecting the embedded mixed methods design,
with the primary approach being quantitative, and the qualitative method being the
secondary, embedded approach, for enhancing, supporting and understanding the
quantitative data. The conceptual REA framework develops in this research could be
explained and validated on all types of UI types and sectors. However, due to time and
knowledge constraints, the case study approach was selected for this purpose. The use of the
UWS infrastructure system in Indonesian context as a case studies and a cross-sectional
survey approach were also justified.
This Chapter, further, explained how the developed research questions would be
answered. In addition, this Chapter also discussed the empirical methods applied, such as;
FMECA, Fuzzy theory and SNA techniques, as used in this research towards achieving both
the research aim and objectives. The reasons for selecting various empirical methods and
techniques and the logical techniques for data analysis were explicated. This Chapter also
presented and discussed the methodology and strategies towards the relevant analysis
undertaken in the research. The empirical framework and analysis model development are
discussed in more detail in the next Chapter,
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 109
CHAPTER 5
CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
CHAPTER HEADINGS Introduction Conceptual Framework Development Phase 1-Risk Magnitude Analysis Phase 2-Risk Causality and Interaction Pattern Analysis Phase 3-Risk Impact to Community Analysis Phase 4-Risk Criticality Analysis Phase 5-System Robustness Capacity Analysis Phase 6-System Recovery Analysis Assumptions Applied Chapter Summary
5.1 Introduction
The importance of UI system to urban flow, the inherent UI system hazards affecting both its’
system and community in the concept of SAR, as well as several RA and REA methods have
been reviewed in preceding Chapters. An evaluations and arguments have also been
developed towards exposing both conventional RA and REA methods shortages as they are
constantly regard as two disparities in previous studies. On the other hand, however,
building UI system and community resilience are requiring comprehensive RA as the basis
for further REA. This Chapter spotlights the conceptual assessment framework, which
consists of several analysis models, develops in this research towards filling the knowledge
gaps mentioned previously.
The analysis models develop within the conceptual framework are, described
sequentially in the six phases. This section provides an extra information for the logic,
methods and techniques behind the conceptual framework proposes. The conceptual
framework develops intent to feel the gaps towards existing RA and REA models that are
insufficient for responding both the research aim and key questions. Furthermore, the
conceptual risk-based REA framework assists the understanding of the correlational
patterns of interconnections across ideas, methods, models and observations.
5.2 Conceptual Framework Development
Following the nature of study, this research set out the stages supporting the building of risk-
based REA conceptual framework through an action moves from beginning to end
(i.e., answering the research aim and key questions). The overall purpose of developing
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 110
conceptual framework is to make research findings meaningful and generalizable. A
conceptual framework develops in this research explain narratively and graphically the main
concepts, and the relationship among various concepts mentioned in previous Chapters. The
proposed conceptual framework flowchart shown in Figure 5-1 below.
Phase 1:Risk magnitude
Phase 2:Risk causality and interaction pattern
Phase 3:Risk impact to community
Stress impact
Phase 4: Risk criticality model development
Shock impact
2-Mode SNAFuzzy-based FMECA
1-Mode SNA
System-of-Interest Resilience Analysis
Urban In
frast
ructu
re S
ystem
Urban Comm
unity
Inherent Hazards
Ris
k Impact
Interrelated
Pro
ble
m B
ou
nd
ary
Pro
ble
m B
ou
nd
ary
Function elements
integration
Maximum Function
Max. robustness level
Expected robustness level
Scenario-based resilience action
Optimum recovery strategy
Yes
Simulation domain
System robustness capacity model development
No
Comparison and analysis
Phase 6: Recovery function development
Data processing
Simulation and analysis
Initial Phase
Data collected
Fieldwork
Phase 5: Robustness assessment model development
Figure 5-1. Empirical framework development.
The proposed framework consists of one preliminary phase and another six main
phases. The preliminary phase intends to establish the context. While, the six main phases
including; (i) Risk magnitude analysis, (ii) Risk causality and interaction pattern analysis, (iii)
Risk impact to community analysis, (iv) Risk criticality model development, (v) Robustness
analysis model development, and (vi) Recovery function and analysis model development.
To avoid definition ambiguity and make clear distinction, this dissertation will use ‘risk’
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 111
word instead of ‘hazard’ word. Note that, in further discussion, there will be any ‘hazard’
words applied that actually refers to ‘risk’.
The conceptual framework proposes is essential by taking into consideration the
stakeholders point-of-view and experience in giving their perception towards risk as an
input data. Further, the conceptual framework proposes will help to guide the decision
makers making choices about UI system RA and REA on the basis of their interrelationship.
Prior to initiate Phase-1, the conceptual framework is started with the ‘preliminary phase’
which focuses on the four aspects stated in the outer circle of the Figure 5-1 (i.e., UI system,
urban community, inherent risks and its impact).
5.3 The Preliminary Phase
Accordingly, the preliminary phase consists of; (i) Defining the UI system and the problem
that will be discussed, (ii) Identifying the urban community as the UI system’s stakeholder,
(iii) Determining the inherent risk events within the determined UI system and, (iv)
Understanding and analyzing the characteristics and mechanisms of the risk impact. In
addition, the preliminary phase is crucial stage to determine specific UI sector as a case study.
Note that, the preliminary phase will affect and influence the further phases development
and analysis process. Heretofore, the four elements within preliminary phase are explored
in paragraphs bellow.
5.3.1 Establishing the Context
The first step in preliminary phase of the conceptual framework is establishing the context.
In here, the establishment of context refers to the problem scope determination that this
research intents to assess. This step is significant since it is the process towards deciding
structurally the specific UI sector as a case study and, defining the problem and analysis
boundary (i.e., identifying the inherent UI system risk events and appropriate stakeholders,
and settling the risk decision factors).
In this research, events which interrupt the normal function of particular UI system,
and may result in harm, are referred as disruptive events (refers to risk events). Further, an
event without consequences may be referred as an ‘incident’, or more informally as a “near
miss” or “close call”. In the UI system RA, the risk identification should cover the full portfolio
of risks, for instance; risks of natural and technological hazards, the risk of conflict and
violence, the effects of economic shocks, and the flow on effects of global and regional shocks.
Furthermore, risk identification should include one-off big events (intensive risk) as
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 112
well as regular smaller scale events (extensive risks). The risk identification in this
preliminary phase should facilitate and support the further analysis towards the
identification of; commonalities and interlinkages between different possible events, the
sequencing of events, the potential for one event to trigger new risks and multiply exposures,
and possible flow-on impacts across borders and between communities.
The risk events identification is the next step within preliminary phase. The RA aimed
at determining (risk) events which can affect the performance of a determined UI system
objectives negatively [199]. Risk event identification is usually the first important step for
common RA, aimed at discovering the major types of event that exist within an UI system
which could affect urban community (as an object) positively or negatively [86]. There are
several approaches that can be taken for identifying UI system risk events, such as; analogy-
based, heuristic-based or analytic-based [86]. The result of these analyses is the stable lists
of risk events.
Nonetheless, it is impractical identifying thousands of inherent risk events in UI
system context. Therefore, a problem and discussion boundary towards determining UI
system risk events is required. Once the UI system risk events are identified and determined,
the identification need to be carried out to determine specific UI stakeholders. In this
research the stakeholder refers to the person, groups or organizations, with varying degrees
of responsibility and authority that are affected by or can support the continuity of
respective UI system serviceability.
Following the expert group working paper ‘joint risk analysis-the first step in
resilience programming’ [200], four key groups of stakeholders that matter to be considered
and involved in the RA process:
- Those who are capable to provide inputs data (including academics, local and
international scientists, experts, development actors, think tanks, operators of critical
infrastructure, and the broader private sector)
- Those using the results to prioritize and guide policy, and programming decisions
(including development, humanitarian and climate change actors, and government)
- Risk owners who are responsible for managing the impacts of each risk (including
individuals, communities, private sector, and state institutions)
- Stakeholders whose lives, assets or resources that are exposed to risks.
Furthermore, in the case of UI system RA which related to community roles, the lead
should be a person who is perceived to represent the range of interests of the community. In
exceptional circumstances, the leadership role could also be played by a prominent actor in
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 113
the international community [200]. Nonetheless, in fact, there is no specific method towards
identifying and determining the stakeholder of specific UI sector.
Stakeholder, in this context, is a main part of the urban community. The urban
communities in circumstance are created when group of people affected by the same
incident or have a common immediate need, such as the terrorist attacks of the London
transport system in July 2007, or major industrial accidents [85]. These groups of individuals
are unlikely to have the same interest but may form a community in the aftermath of risk
event. Although the sense of community may be temporary, however, some community
circumstances grow and sustain in the long term following a disturbance (or disaster).
In this research, the UI stakeholders employs both expert and laypeople from variety
of levels and professions. In addition, each of them have its own cultural perspective and
associated ontology and epistemology of risk [113]. Importantly, the stakeholders will affect
the key decisions regarding; ‘who to involve in the RA exercise and process’ (e.g., to shape
data collection and input data). In some way, RA can be undertaken by either top-down or
bottom-up approach which is considering the importance of stakeholder engagement in the
RA and making decision processes towards building UI system more resilient.
5.3.2 Determine Risk Measurement and Input Data Process
The next step is determining risk measurements (parameters). In this research, the risk
measurements are referred as ‘risk decision factor’ [114, 170, 171, 201-203]. Importantly,
the variation of risk decision factors need to be determined firstly as the basic measurement
and formula applied during the RA. Additionally, the standard risk formula have been
involving in the past decades [105]. Previous studies applied various risk decision factors,
for instance; frequency, probability, likelihood, severity, consequences, exposure,
detectability, community perception, vulnerability, cost impact, threat, and so on [16, 79,
204].
Depends on the analysis and research context, nonetheless, there’s no fixed rules
regarding to the decision on choosing and applying the specific (combination) risk decision
factors. One option to determine risk decision factors can be done in an ad-hoc approach.
Nonetheless, previous studies discussed the shortage of conventional RA which mainly
measured solely its two risk decision factors (i.e., likelihood and severity) [105]. To fill this
knowledge gap, this research applies third risk decision factors as a complementary to
measure and compute the risk magnitude, that is; ‘Detectability’ (D).
Based on the established risk decision factors, further, data needs to be collected that
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 114
accurately captures the objective perceptions (from relevant stakeholders) towards
particular risk events. Primarily, the conceptual framework proposes in this research is
incorporating a variety of analysis models to identify and analyze risks in the initial phase of
REA. The analysis models are based on the people perceptions towards risk in the form of
risk decision factor within the whole processes towards assessing risk.
Thus, identification and determination of the particular UI system stakeholder groups
will present the competing evidence based upon their own perceptions, experiences and
social agenda. Nonetheless, this process can be a very daunting task as researchers need to
understand the nature, structure and supply chain of the respective UI system. This task can
be done by conducting literature review, interviewing various types and levels of experts
who involved in the particular UI sector, and draw a conclusion based on the data collected.
Further, it is important to note that, there are many of stakeholder groups involved
within single UI sector since different region (either country, state, or city) will have
dissimilar policy towards managing particular UI system. The last step within preliminary
phase is to collect the data. This process intends to qualitatively obtain the people’s
perception towards UI system risks. To achieve this, the development of a design-based
questionnaire is essential.
The design-based questionnaire is a significant far developing the platform to
facilitate people’s perception and knowledge towards UI system risks into an analysis. Note
that, the design-based questionnaire has to understandable such that clear to be interpreted
by participants. The data are then initially processed and transformed numerically using
several scientific methods. The initial data processing is discussed in the next sub-section.
Moreover, the methods and framework processes applied and developed are explored in the
next section (Phase 1-5).
5.3.3 Initial Data Processing
In the initial data processing, respondents were identified and coded as iS , where i is the
total respondent who participated in the questionnaire which had been disseminated in the
field. As many as 126 questionnaires were successfully obtained representing the 126
respondents. From this, the stakeholder identification number was coded as 1 126~S S . It
should be noted that, 126 respondents are part of eight stakeholder groups defined as g
iS
where g specifies the stakeholder groups determined based on the Surabaya water supply
infrastructure system (i.e., G1, G2, …, M3). The example of the list of participants can be seen
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 115
in Table 5-1 below.
Table 5-1. The example of participants list with its identity.
Participant ID Group (g) Geographical data
1S … …
…. … …
126S … …
Hereafter, the identified risk events are also coded as nR , where n refers to the total
number of identified risk events. In this research, 30 risk events were identified and
determined as the problem boundary. Thus, 30n = where risk events can be coded as
1 30~R R . The data variables are very crucial towards making a clear distinction between the
analysis sequences and its meaning within the conceptual framework develops in this
research. The example list of risk events can be seen in Table 5-2 below.
Table 5-2. The example of risk events list with its identity.
Risk ID Risk event Category
1R … …
…. … …
30R
…
…
After, stakeholder groups and participants as well as the risk events identified,
following the framework develops, the next step (Phase 1) is to analyze the risk magnitude.
The Phase 1 and another Phases are discussed in the further sections.
5.4 Phase 1: Risk Magnitude Analysis
First phase intends to analyze the risk magnitude. In previous period, the conventional group
decision making model and process may not be able to provide participants preferences for
alternatives to a certain degree. This is due to the lack of precise or insufficient level of
knowledge related to the problem, or even the difficulty in explaining explicitly the degree
to which one alternative is better than others. Thus, this research adopts the well-known RA
method named Failure Mode Effect and Criticality Analysis (FMECA) [167, 168, 170, 171].
The FMECA further, integrated with Fuzzy Theory [176, 177], to accommodate the
dissimilarity of stakeholder perspectives.
Figure 5-2 shows the flowchart of the Fuzzy-based FMECA model. The Fuzzy-based
FMECA output is the risk priority number (RPN) where the normalized value is called as risk
priority value (RPV). Based on both RPNs and RPVs, the risk events ranking can be assigned
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 116
and determined. In this research, the main risk decision factors as the risk magnitude
function can be derived as equation 5-1 below.
( )
( ), ,
f
f O S D
Risk magnitude= Likelihood, Severity, Detectability
= (5-1)
Identify and determine
the stakeholder groups
Identify and determine
the hazards events
Design-based
questionnaire
Preliminary stepSpecific urban infrastructure
system case study boundary
Data processing
Applying Fuzzy linguistic terms to
measure the risk decision factors
Crisp defuzzification decision matrix F(x)
Determine risk decision factor and matrix
Data collection
Establish comparative series (xi) Establish standard series (x0)
Different series developed (D0)
Compute relation coefficientIntroduce the group
weight of risk factor
Determined degree of relation
Risk ranking
Risk Priority Number (RPN)
Risk Priority Value (RPV)
Normalize
Descending order
Figure 5-2. Flowchart of Fuzzy-based FMECA.
The likelihood of occurrences (O) is the probability, which is a form of the uncertainty,
the risk event being occurred. While, the impact/severity (synonymous to vulnerability) (S)
refers to the extent of risk impact on communities and industries [108, 115]. In some
evidently, disaster events, the risk impact and consequences are surprisingly greater than
what it was expected. This is because of the community’s lack of knowledge in terms of facing
and treating the specific risk. Than the next decision factor is the detectability (D), that refers
to the specific risk being detected by community putting their awareness and knowledge
[161, 170, 205, 206].
Furthermore, the Likert scale approach is applied to measure the risk decision factors
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 117
for risk magnitude analysis that have been determined previously as per the judgement of
the participants. However, this research found that former data collection and data
processing approach in RA is improper or insufficient due to inaccuracy in results. This is
due to the vagueness, ambiguity and uncertainty existing in the evaluating process of the risk
decision factors generated from different stakeholder perspectives [167, 171, 173].
A risk perception is characterized by the intuitive judgment of individual and groups
on risks in the limited and uncertain information context. To construct an objective
experience-based RA, this research apply the Fuzzy-rules to represent and accommodate the
assessments of an expert, sector or representative, associated with his/her level of
confidence [28]. Fuzzy logic systems are knowledge-based or rule-based systems
constructed from human knowledge in the form of Fuzzy IF–THEN rules [167, 173].
The Fuzzy-based FMECA model is carried out in the integrated manner with the use
of Fuzzy-set theory [176, 177], Grey theory [123, 171, 207], and conventional FMECA. This
integration is required for accommodating and embracing the divergent perceptions and
opinion from both expert and laypeople. The Fuzzy methods have been proposed as an
effective solution for uncertain preferences condition within the group decision making [162,
170-173]. An important contribution of Fuzzy-set theory is that it provides a systematic
procedure for transforming a knowledge base into non-linear mapping.
5.4.1 Determined Fuzzy Linguistic Rules
The initial stage of Fuzzy-based FMECA model is to set up the membership function in a
linguistic term representing the risk decision factors (i.e., occurrences (O), severity (S) and
detectability (D). To generate the Fuzzy rule base for generating RPNs, the respondents are
asked to mention the various combinations of the risk decision factors considered using the
linguistic term. In this study the Trapezoidal Fuzzy Number (TFN) rules applied to represent
the rating scale of linguistic term (see; Tables 5-3 to 5-5, and Fig. 5-3) [105, 167, 168, 171].
Table 5-3. Traditional ratings for occurrence (O).
Prob. of Occurrence Possible failure rate Rating TFN Almost certain ≥1/2 10 (8,9,10,10) Very High 1/3 9 (7,8,9,10) High 1/8 8 (6,7,8,9) Moderate high 1/20 7 (5,6,7,8) Moderate 1/80 6 (4,5,6,7) Moderately low 1/400 5 (3,4,5,6) Low 1/2000 4 (2,3,4,5) Slight 1/15.000 3 (1,2,3,4) Remote 1/150.000 2 (0,1,2,3) Almost never 1/1.500.000 1 (0,0,1,2)
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 118
Table 5-4. Traditional ratings and TFN for severity (S).
Effect Severity of effect Rating TFN
Hazardous without warning
Failure is hazardous and occurs without warning. It suspends operation of the system and/or involves noncompliance with government regulations
10 (8,9,10,10)
Hazardous with warning
Failure involves hazardous outcomes and/or noncompliance with government regulations or standards
9 (7,8,9,10)
Very high Product is inoperable with loss of primary function. The system is inoperable
8 (6,7,8,9)
High Product performance is severely affected but functions. The system may not operate
7 (5,6,7,8)
Moderate Product performance is degraded. Comfort or convince functions may not operate
6 (4,5,6,7)
Low Moderate effect on product performance. The product requires repair
5 (3,4,5,6)
Very low Small effect on product performance. The product does not require repair
4 (2,3,4,5)
Minor Minor effect on product or system performance 3 (1,2,3,4) Very minor Very minor effect on product or system performance 2 (0,1,2,3) None No effect 1 (0,0,1,2)
Table 5-5. Traditional ratings and TFN for detectability (D).
Detectability Criteria (Detection-%) Rating TFN
Absolutely uncertainty
Design control will not and/or cannot detect a potential cause/mechanism and subsequent failure mode; or there is no design control (0-5)
10 (8,9,10,10)
Very remote Very remote chance the design control will detect a potential cause/mechanism and subsequent failure mode (6-15)
9 (7,8,9,10)
Remote Remote chance the design control will detect a potential cause/mechanism and subsequent failure mode (16-25)
8 (6,7,8,9)
Very low Very Low chance the design control will detect a potential cause/mechanism and subsequent failure mode (26-35)
7 (5,6,7,8)
Low Low chance the design control will detect a potential cause/mechanism and subsequent failure mode (36-45)
6 (4,5,6,7)
Moderate Moderate chance the design control will detect a potential cause/mechanism and subsequent failure mode (46-55)
5 (3,4,5,6)
Moderately high Moderately high chance the design control will detect a potential cause/mechanism and subsequent failure mode (56-65)
4 (2,3,4,5)
High High chance the design control will detect a potential cause/mechanism and subsequent failure mode (66-75)
3 (1,2,3,4)
Very high Very High chance the design control will detect a potential cause/mechanism and subsequent failure mode (76-85)
2 (0,1,2,3)
Almost certain Design control will almost certainly detect a potential cause/mechanism and subsequent failure mode (86-100)
1 (0,0,1,2)
1 2 3 4 5 6 7 8 9 10 Rating
Membership
1.0
0
1 2 3 4 5 6 7 8 9 10Traditional rating
Figure 5-3. Trapezoidal Fuzzy membership of the traditional rating for O, S and D.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 119
5.4.2 Risk Decision Matrix Development
The risk decision matrix has to be developed first for every identified risk event (Eq. 5-2).
The matrix shows the risk and the linguistic terms describing each decision factor of the risk
evens, 1 1 1 2 2 2( ) ( ) ( ) , ( ) ( ) ( ) ,RF , ,..., , ,...,k k k k k k k rr r r r r r R= , where ( )n kr denotes the k decision
factors of risk event denoted by nx . The risk decision factors information series described
below.
1 1 1 1
2 2 2 2
(1) (2) ( )
(1) (2) ( )
(1) (2) ( )n n n n
r r r r k
r r r r kr
r r r r k
= = (5-2)
5.4.3 Defuzzification Process
The next stage requires a formulation of crisp number to represent each of the linguistic
terms assigned. The application of the Fuzzy sets combined with Grey theory requires the
‘defuzzification’ of the membership functions (Fig. 5-3). This research applied the common
defuzzification method for obtaining the Fuzzy set crisp number [167, 171]. The equation is
stated below.
( )
( ) ( )0
0 0
( )
n
iin n
i ij i
b cF r
b c a d
=
= =
−=
− − −
(5-3)
As an example, considering the linguistic term of ‘Moderate’ for the (D) as shown in
Figure 5-4, the defuzzification ( )F r to produce a crisp value is shown below respectively.
0 1
0 1 0 1
6 0 5 0 =0.458
6 0 5 0 3 10 4 10
( )b c b c
F rb c b c a d a d
− + −
− + − − − + −
− + −
− + − − − + −=
=
1 2 3 4 5 6 7 8 9 10 Rating
Membership
1.0
0
c=0 d=10b0=6a0=3 a1=4 b1=5
Moderate
Figure 5-4. Trapezoidal Fuzzy membership of the linguistic term moderate.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 120
The value ofc and d will remain the same for the defuzzification of all linguistic
terms. The values 0a and 0b are rating values at the extreme limits of each linguistic term
where the membership function is 0 and, 1a and 1
b are the two maximum rating values when
the membership function is 1. Further, the Fuzzy risk decision matrix can be defuzzified to
generate a crisp belief decision matrix which is shown as follows:
1 1 1
2 2 2
1
2
(1) (2) ( )
(1) (2) ( )( )
(1) (2) ( )n n n
r
r
n
Fr
Fr
Fr
r r k
r r kF r
R R R k
= = (5-4)
5.4.4 Defining Comparative, Standard and Different Series Matrix
The defuzzified values of decision risk matrix are used to generate the comparative series,
which is represented in the form of a matrix. In this stage, the standard series for the
variables are generated by producing the optimal level of all risk decision factors in the form
of a matrix. The difference between the standard and comparative series is then calculated,
thus the results are used to determine the Grey relation coefficient. Using the value of the
Grey relation coefficient for all risk decision factors variables, the degree of Grey relation of
each event can be calculated.
A comparative series reflects the various linguistic terms and risk decision factors of
the study. (e.g., Low, Moderate, High, etc). In addition, the comparative series can be
represented in a form of a matrix as shown in Eq. (5-5). An information series with k
components of risk decision factors can be expressed as, ( )(1), (2),..., ( ) ,i i ii r r r k rr = where
( ), 1,....,ir k k K= denotes the risk decision factors of ir . For the application of this matrix,
the value of ( )ir k represents the defuzzified crisp number describing each linguistic variable
considered for the identified risks.
1 1
1 1
(1) ( )
(1) ( )
(1) ( )
i
i
i
i i i
r r kr
r r krr
R R R k
= = (5-5)
For instance, consider three risk events, A, B and C, where the linguistic terms have
been assigned for the three variables of decision factors considered as shown in Table 5-6.
Note that, the values in brackets represent the defuzzified value for the values of the
associated linguistic term.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 121
Table 5-6. Example of comparative series.
Hazard Occurrence Severity Detectability A High (0.708) Moderate (0.521) Very high (0.208) B Moderate high (0.625) Low (0.458) Absolutely impossible (0.869) C Slight (0.291) Hazardous with warning (0.791) Remote (0.708)
The information in Table 5-6 can be represented in a matrix form to reflect the
comparative series, as seen below:
0.708 0.521 0.208
0.625 0.458 0.869
0.291 0.791 0.708
High Moderate Very high
Moderate high Low Absolutely impossible
Slight Hazardous with warning Remote
A
B
C
=
=
The next stage is building the standard series which is an objective series that reflects
the ideal or desired level of all the risk decision factors. The standard series for the risk
decision factors are generated by following the optimal level of all decision factors for the
risk events. From a safety point of view, the lowest level for all the risk decision factors is
desired, that is; the lowest level of the linguistic terms describing the risk decision factors
0 0 0 0( ), ( ),..., ( ) Almost never, None, Almost certainr r k r k R k
= = . This term can be expressed as a
matrix below.
0
0 00
0 00
0 0 0
, 1,...,
(1) ( )
(1) ( )
(1) ( )
k K
r r kr
r r krr
R R R k
=
= = (5-6)
When the linguistic term ‘Almost never’ is defuzzified, the crisp number obtained is
0.130. This information is represented in the same way as the comparative series (in a matrix
form). As an example, the standard matrix for each of the risk decision factor can be formed
as below:
0
0
0
0.130 0.130 0.130
0.130 0.130 0.130
0.130 0.130 0.130
Almost never, None, Almost certainAlmost never, None, Almost certainAlmost never, None, Almost certain
A
B
C
==
The difference between the comparative and standard series 0D , is calculated and
reflected in a form of a matrix which is equated as below:
01 01 01
0
(1) (2) ( )
(1) ( )n n
k
D
k
=
(5-7)
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 122
where, 0 0( ) ( ) ( )ij k r k r k −= and 0 ( )r k are the standard series, while ( )ir k is the comparative
series. For example, from the above calculation, the difference of the comparative and
standard series can be estimated as below:
0
0.130 0.708 0.130 0.521 0.130 0.208
0.130 0.625 0.130 0.458 0.130 0.869
0.130 0.291 0.130 0.791 0.130 0.708
0.578 0.391 0.078
0.495 0.328 0.739
0.161 0.661 0.578
D
− − −
− − −
− − −
=
=
5.4.5 Calculating Grey Relation Coefficient
In Grey theorem, the information, such as; operation, mechanism, structure, and behavior
are neither deterministic nor totally unknown, but are partially known. The Grey theorem
explores system behavior using relation analysis and model construction. It also deals with
making decisions characterized by the incomplete information. After the difference between
two series0D is estimated. The next stage is calculating the Grey relation coefficient which is
obtained using Eq. (5-8).
( )0 0
00 0
min min ( ) ( ) max max ( ) ( )( ), ( )
( ) ( ) max max ( ) ( )
i ii k i k
ii i
i k
r k r k r k r kr k r k
r k r k r k r k
− + −=
− + − (5-8)
where, 0( )r k is the minimum or maximum value from the standard series, and ( )ir k is the
minimum or maximum value from the comparative series. Further, is an identifier,
( )1,0 , which is only affecting the relative value of risk without changing the priority. In
this research, it is assumed that 0.5 = . The Grey relation coefficient estimation from the
example applied previously is stated below. Following Eq. 5-8 for event A, the O is given as:
0 0
0 1 0
min min ( ) ( ) max max ( ) ( )
( ) ( ) max max ( ) ( )
0.078 (0.5)(0.739)0.472
0.578 (0.5)(0.739)
i ii k i kO
ii k
r k r k r k r k
r k r k r k r k
=
− + −=
− + −
+=
+
Similarly, the Grey relation for the other linguistic variables of another risk decision
factors (i.e., Severity S and Detectability D ), can be further estimated. The results of these
calculations, including for risks events B and C, are summarized in Table 5-7 below:
Table 5-7. Example of Grey relation coefficient.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 123
Risk O S D
A 0.472 0.588 1.000 B 0.517 0.641 0.403 C 0.843 0.433 0.472
5.4.6 Degree of Relation Determination
The degree of relation from a group of stakeholders, ( ),i jr r denotes the relationship
between the potential causes and the optimum value of the decision factors. The degree of
relation for each risk can then be calculated following Eq. 5-9.
( ) 1
, ( ), ( ) , 1,...,K
n ni j i jk
r r r k r k k K=
= = (5-9)
For instance; the Grey relation for event A can be calculated as:
( ) 0.472 0.588 1.000 2.060,A i jr r + + = = . Accordingly, the degree of Grey relation for events B
and C are calculated in the same way. Finally, the degree of Grey relation value is normalized
using Eq. 4-10.
, 1, 2,..min
n
nn n N
n
= Norm Γ (RPV)Γ
Γ (5-10)
The normalization intends to produce a RPV for respective risk event. Importantly,
the RPV will be used as an important element of RA in the further phases of the conceptual
framework. This entails that the RPVs with the highest value gets the highest priority for
attention. Based on the analysis result derived from Fuzzy-based FMECA model, the
identified risk events then ranked according to the descending order of the RPVs. The
summary of the results for the example applied is shown in Table 5-8. From Table 5-8, it can
be seen that risk event B would be at the top of the list for priority then followed by risk
events C and A.
Table 5-8. Grey relation coefficient and degree of Grey relation information.
Risk O S D Grey relation (RPNs) RPVs Ranking A 0.472 0.588 1.000 2.060 0.757 3 B 0.517 0.641 0.403 1.561 1 1 C 0.843 0.433 0.472 1.748 0.893 2
5.5 Phase 2: Risk Causality and Interaction Pattern Analysis
This phase examines how single risk event associates to another risk events. This phase also
realizes the risk relationships in the context of a threat of one risk event affecting, triggering,
or influencing another risk events. To analyze how risk propagating its impact, affecting both
other risk events, this phase applies Social Network Analysis (SNA). The SNA is concerned
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 124
with the “structure and patterning” of the relationship and seeks to identify both the
relationship cause and effects [92]. Meanwhile, the social network theory views an UI system
as a systems environment which is supported by various relationships of aspects (e.g., social,
environmental, and economical).
The purpose of applying SNA is to examine how the behavior and relationship
structure of risk impact which is affecting not only to the community (actor) but also to other
risk events. This research, however, found the shortage of conventional SNA method as it
applies the expected value to measure an interrelationship between each event using
conventional Likert scale approach which generates a similar problem with FMECA method
discussed previously. Therefore, this study proposes Fuzzy-based SNA by integrating a
former SNA method with Fuzzy-rules to accommodate various stakeholder perceptions
towards the measurement of node interrelationship.
The proposed method focusing on the community participation towards assessing
risk impact, consequences and relationship variation. The main empirical method applied in
this study is the SNA. The SNA is an interdisciplinary endeavor which incorporates
mathematical, geographical, and computing methodologies which evolved from sociology
and anthropology. The advantage of SNA is its capability to captures, models and simulates,
and analyses the complex relationship between various nodes [208].
The method has been demonstrated by the high frequency of application in various
areas, not only in social science [184, 188, 189, 192, 209-211] but also in engineering field
[97, 183, 184, 186, 188, 191, 212-214], and risk management area [86, 92, 97, 127, 215].
Nonetheless, the application of SNA in UI system RA model development towards analyzing
the risk causality and interaction pattern is still an unexplored area. Further, another
challenge is that; the SNA is either not designed to capture the risk causality impact or
interconnections pattern that shape RA robustly.
Therefore, to examine the way of ‘structuring and patterning’ the risk causality and
interaction pattern robustly, therefore, this study applied a modified-participatory method
towards capturing the complex relationship of risks in datasets during the SNA processes.
To obtain community perceptions and preferences towards UI system risks, the data
collected, then processed into the preliminary matrix before finally used to simulate and
produce the risk network maps and topology decipherment respectively. The data
processing also includes calculating and defining the weight value for risks interrelationship.
Participatory methods describe a “….family of approaches, methods and behaviors to
enable local people to share, enhance and analyze their knowledge of life and conditions, and
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 125
to plan, act, monitor and evaluate” [216]. Participatory data is developed through interactive
processes that involves discussions, exercises, and other types of facilitated activities.
Development professionals often use participatory tools to help understand risks [120]. The
risk causality and interaction pattern analysis model flowchart are depicted in Figure 5-5.
The flowchart stages are discussed in the following sub-sections.
R2
R3
R4Rn
R1 S1R1
S1R2
S1R3
S1R4S1Rn
S1-Hazard associated affecting S2
S1
Hazard event related (affecting) to single expert (S1)
R7
R10
R12
Rn
R5
S2R5
S2R7
S2R10
S2R12
S2Rn
S2
Hazard event related (affecting) to single expert (Sn)
S1-Hazard associated affecting S*
Stakeholder group
boundary
Stakeholder group
boundary
….Stakeholder group
boundary
S*
Risk-Risk network matrix
S1 judgment
boundary
Local S.R-S.R network matrix
Dichotomize
S 2 R 5 S 2 R 7 S2R 10 S 2 R 12 S 2 R n ●●● S * R #
S 1 R 1 1 1 1 1 1 . .
S 1 R 2 1 1 1 1 1 . .
S 1 R 3 1 1 1 1 1 . .
S 1 R 4 1 1 1 1 1 . .
S 1 R n 1 1 1 1 1 . .
●●● . . . . . . .
S * R # 1 1 1 1 1 . .
Global S.R-S.R network matrix
S 2 R 5 ●●● ●●● S * R #
S 1 R 1 … … … …
●●● … … … …
●●● … … … …
S * R # … … … …
Large scale adjacency matrix
Collide and unified all of the local matrices
data into single global matrix
Rij=1, if there’s any relation between
one Rn with another Rn.Otherwise, Rij=0
Global R-R adjacency matrix
1 2
1
2
n
n
R R R
R
R
R
1 2
1
2
0 1 1
0 0 0
0 1 0
n
n
R R R
R
R
R
Network analysis and discussion
Identify and determine
the stakeholder groups
Data collection
Identify and determine
the hazards events
Targeted respondents
Design-based
questionnaire
Preliminary stepSpecific urban infrastructure
system case study boundary
Network visualizationTopology measurement- Degree (link)
- Degree centrality
- Closeness centrality
- Betweenness centrality
- Eigenvector centrality
Model Simulation
Risk picture, analysis and evaluation
Data processing
Figure 5-5. Risk causality and interaction pattern analysis model flowchart.
5.5.1 Stakeholder and Risk Event Identification
The first stage refers to the preliminary phase of the conceptual framework. Any social
network study requires to begin with defining who and what is the actor, and event
respectively in the research scope [185]. In addition, it also requires to considers the tie
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 126
between nodes and sub-nodes, as well as the boundary of the network in question. Further
step is to identify the risk events in the specific UI sector determined which could affect
urban community negatively [86]. The result of this step is the stable lists of UI risk events.
The next step is to identify and determine the stakeholder groups. Stakeholders in UI
system refers to either individual or organization who has a role and affected by the
achievement and of respective UI serviceability. Following this preliminary step,
nonetheless, the challenge in SNA is that there’s no specific method in order to identify and
determine the stakeholder of specific UI sector [86]. The problem arises because social
networks do not have a natural frontier to define the set of actors boundaries which is need
to be included in the network [129]. Accordingly, the stakeholders might be expanded from
the initial identification as the targeted respondent (during the data collection) might
provide an input and, or advice to the author towards other relevant stakeholders.
Methodologically, it is therefore important to firstly decide where to draw the
boundaries [217]. Ideally, more stakeholders should be involved and considered to increase
the accuracy of RA. To overcome this issue, this research applied bold process to
comprehensively determine and scope the boundary of stakeholders who can be identified
and involved respectively within the UI sector discussed. This process is to explore the
supply chain of respective UI system in the context of how the system delivering its service
to the whole users. Once the initial step has been done, the stakeholder group can be
identified and classified.
5.5.2 Collecting The Data from Community
The data collection intends to capture the actual perceptions of relevant stakeholders
regarding two questions, that is; (i) ‘What risk events do you think affect you?’, (ii) ‘What
stakeholder groups do you think affected by that risks also have affected you?’. Participants
that grouped in a particular stakeholder groups, need to specify what risk events are
associated with them, in terms of being affected or unsecured. Then, participants asked
further to nominate what stakeholder groups that might probably clashed and affected by
each of the risk events that participant has chosen in the previous question. The relationship
takes into account on how participants perceived those UI system risk events.
Although an increasing emphasis has been placed on stakeholder participation, many
communities especially the disadvantaged ones, are still on the margins within decision-
making processes [208]. Therefore, instead of moderating the divergence perceptions (by
asking several seniors or representatives to be responsible for group judgments, this study
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 127
exempts this issue by asking participant individually and independently regarding their
affectedness and relation against various determined risk events. Correspondingly, the data
collected from different individuals does not need to be combined or averaged to produce
the global result.
5.5.3 Preliminary Matrix Development
Risk causality and interaction pattern (interconnections) are numerous and would be
difficult to convey with a narrative. Consequently, the data obtained from survey is then,
processed, and the preliminary matrix named ‘local stakeholder-risk associated (S.R)’ matrix
[S.R]’, constructed. The [S.R]’ is developed to inform and facilitate the identification of
relations among ‘stakeholders-risk associated’ based on stakeholder groups boundary. The
[S.R]’ follows and extends the concept of matrices applied within the network studies [86,
92, 218, 219]. The equation 5-11 below applied to develop the [S.R]’.
1
0 otherwiseg gi n j m
g g
i n j mn N m M g G
i n j m S R S R
S R S RS R
→
=
,( , )( , ) ,
.,
(5-11)
In this research, a qualitative scale of entries from Boolean domain B 0,1= issued
for assessing the interactions and interrelationship of (S.R). The value of 1 indicates that
respective individual stakeholder i (from particular group g ), which is associated or
affected with specific risk event n g
i nS R
, express that their risk events affects other
stakeholder groups and 0 is vice versa. Subsequently, the global S.R matrix [S.R]’’ can be
developed using equation 5-12 bellow. The [S.R]’’ is a matrix referred to as a ‘one-mode
incidence matrix’ or an ‘affiliation matrix’ which shown a non-tie directly between (S.R)
nodes, only ties connecting (S.R) to (S.R).
, , , ,( , )( , ) ,
1.
0 otherwise
,,G Gi n j m
g g
i n j mi I n N g G j J m M g G
i n j m S R S R
S R S RS R
→
=
(5-12)
Once the [S.R]” formed, the next step is to build the global risk matrix (GRM) using
equation 5-13. The GRM is described by a rectangular matrix ,
.,,
GRMn m
nm R RR R = . The GRM
is the logic matrix (or relation/disjoint K ) of the network which shows the preliminary risk-
risk connectivity and interaction. In GRM structure, the risks interaction is considered as the
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 128
existence of a possible precedence relationship between two risk events and n m
R R .
The UI system risks are the product of a complex set of networked processes. Hence,
a relationship component (whether functional, structural or physical) means that risks,
which may be related can be linked, since a risk (risk events or disturbances) on one
component may have an influence on another. Nevertheless, GRM cannot used as a main data
set to the network simulation and topology analysis. This due to the GRM element is the
result of summarized various participants perception towards their associated risk events
and the impact which is affecting other specific stakeholder groups.
, , , ,
,,
,, , , ,
,,. ,
,,n m
I J N M Gg g
nm nm i n j m nmR Ri j n m g
R R R S R S R R= = → (5-13)
The GRM is a matrix that shows, approximately, how risk events are related. Since risk
events can be represented as nodes, and connections as edges, the GRM (which is an
adjacency matrix) offers the essential foundation to perform network analysis. Many current
network models have ignored the interaction strength between nodes and assume that each
link is equivalent. Nonetheless, in real world, many networks are intrinsically weighted.
The nodes and links have different weights, and the variations of their interaction
strength are significant for carrying out their basic analysis functions. Henceforth, this
research develops model to define the nodes interaction weight value for the GRM. By
applying the nodes interaction weight value, the risk network can be analyzed more precise
by weighting how risk events influenced each other.
5.5.4 Produced Global Matrix with Weight Relation Link
To deal within the issue mentioned in previous sub-section, this research applied the
dichotomize method prior to the network simulation. In this step, the GRM .nm
R R is
dichotomized to obtain a value for each matrix sheet, regarded as a weighted interaction link
between risk events. Although there are several dichotomize methods in network studies
[220, 221], unfortunately, there is no silver bullet towards appointing the most effective
dichotomize method.
Above all, one of the problem with dichotomizing the respective matrix prior to do
the network simulation, is that; there can be a loss information [198]. Hence, this research
proposes a novel dichotomize model to determine the interrelationship link weight value of
UI system risk events. The dichotomize equation is defined as equation 5-14 bellow.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 129
( ) 1
,. .
,,n m
nm nmnm R RR R R R R −= = (5-14)
where; ( ),, ,max .
,,n m
nm R Rn N m M n mR R
=
denotes the risk events interaction capacity defined
as the weighted link with specific threshold. While, is a coefficient pointed as 0.2 which is
determined in an Ad-Hoc approach. Notably, this research assumed that risk impact does not
affect itself. In the GRM structure, hence, each risk event does not has link with itself (loop
impact and interaction link). Following this assumption, therefore 0nn mm
R R= = .
Table 5-9. The network indicator in the context of risk causality and its interaction.
SNA indicators Description Degree (DEG) Indicates the number of risk events that particular risk associated and/ or
influenced. This network indicator indicates the immediate connectivity characteristic of particular rick event (as a node).
Degree Centrality (DC) Exposes the potentiality of a specific risk propagate its impact and connectivity to other risk events through the network.
Betweenness Centrality (BC) Reveals the incidence with which given risk node falls between two other risk nodes. It represents the node as a gatekeeper or a toll-taking role for controlling risk impact flows through the network. Particular risk events with high BC value have potential capacity and power towards threaten to stop transmitting, making other risk event use less efficient paths to spread its impact and affect one another within the network.
Closeness Centrality (CC) Point out the distance of a risk event to connect with others by focusing on the shortest paths. Particularly, CC specify the capacity for risk event disseminating its impact to whole risk events. A risk event node that has a high CC score can also potentially reach and affect the central risk network very quickly.
Eigenvector Centrality (EC) The EC takes into consideration the centrality of the other trades to which one is connected. This network measurement appraises the risk event popularity in the sense that a node with high EC is connected to nodes that are themselves well connected.
Status Centrality (SC) Computes the relative influence of a node within a network by measuring the number of immediate neighbors and also all other nodes in the network that connect to the node under consideration through their immediate neighbors
The final GRM is then applied to model and simulate in an one-mode network analysis
which then used to generate the risk network topology representations. Further, a
topological analysis is performed on this network, with the aim of giving complementary
information and prioritizing some risks in relation to their structure and position in the risk
network. Several network topology representations are utilized to decipher the structural
configurations of the risk events nodes relations by calculating a number of SNA indicators.
The SNA indicator applied in this research is; degree (DEG), degree centrality (DC),
betweenness centrality (BC), closeness centrality (CC), eigenvector centrality (EC) and status
centrality (SC). The basic description for each of the network topologies applied can be seen
in [180, 186, 189, 191]. Specifically, the SNA indicators and its descriptions for the risk
causality and interaction pattern analysis shown in Table 5-9. The higher centrality score
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 130
indicates that certain risk event nodes, through their numerous link to others, are emerging
as key figures in holding this network together.
5.6 Phase 3: Risk Impact to Community Analysis
Communication between stakeholder groups in the UI system context is paramount to the
UI system’s reliable service. Thus, involving stakeholders in the process of assessing risks
makes a lot of sense. The stakeholders will have a good understanding of their boundary
area and the risks involved. When identifying risks and controlling hazards it is necessary to
understand the importance of involving different parties during the process. Different
stakeholders have different roles within the development of UI system and are likely to differ
in the way they like to have information communicated to them.
To examine the significant risk events by way of ‘structuring and patterning’ the
relationship between actors (individual) and the events (risks), this research applied two-
mode SNA. This phase extends these areas and applies them in the field of UI system RA.
Moreover, study pertaining to the social network in the context of analyzing the dynamic of
UI risks interrelationship and impact affecting community is still an unexplored area. The
advantage and superiority of the two-mode SNA can be seen in [190, 198]. The model
develops in this phase is based on gathering and assembling the exchange of perception-
based information towards stakeholder-risk associated.
The model follows general steps of standard SNA, including: (1) Identifying the
boundary of the network; (2) Assessing meaningful and actionable relationships; (3)
Visualizing the network; (4) Analyzing the network data; and (5) Presenting the analysis
results. The two-mode SNA-based RA model flowchart is depicted in Figure 5-6. Similar to
the previous phase, any social network study requires to begin with defining who and what
is the actor and event respectively in th research scope, what should be considered as a tie
between nodes and sub-nodes, and what should be the boundary of the network in question
[185].
Following the flowchart in Figure 5-6, the preliminary step is to identify the risk
events in the specific UI sector discussed which could affect urban community negatively
[86]. The result of this step is the stable list of risk events. The next step is to identify and
determined the stakeholder groups towards determined UI sector as a problem boundary.
Similar like the previous phase, stakeholders in specific UI sector can be stated as either
individual or organization who has a role and affected by the achievement and of UI
serviceability system.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 131
Identify and determine
the stakeholder groups
Data collection
Identify and determine
the hazards events
Input data (0,1)
Targeted respondents
within the specific
stakeholder groups
Design-based
questionnaire
Network visualization
Convert to
Bipartite
matrix
Risk picture and evaluation
Data processing
Preliminary step
Result analysis- Global network topology analysis
- Risk event ranking based on each of the topology measurement
- Output comparison with conventional RA
1 2 3
1
2
3
(...) (...) (...) (...)
(...) (...) (...) (...)SRM
(...) (...) (...) (...)
(...) (...) (...) (...)
n
j
R R R R
S
S
S
S
=
0 0 (...) (...)
0 0 (...) (...)
(...) (...) 0 0
(...) (...) 0 0
S R
S
R
Bipartite matrix
Topology measurement- Degree (link)
- Degree centrality
- Closeness centrality
- Betweenness centrality
- Eigenvector centrality
Stakeholder-Risk affiliation matrix
Model Simulation
Concentric map
- Main input data set
Specific urban infrastructure
system boundary
Figure 5-6. Risk impact to community analysis model flowchart.
Nonetheless, the challenge is there’s no specific method in order to identify and
determine the stakeholder of specific UI sector [86]. The problem arises because social
networks do not have a natural frontier to define the boundaries of the set of actors in which
to be included in the network [129]. Methodologically, it is therefore important to decide
where to draw the boundaries [217]. Ideally more stakeholders should be evolved and
considered to increase the accuracy of risk impact to community analysis.
To overcome, this research applied a bold processes in order to scope the boundary
of stakeholders who involved and can be identified within the discussed UI system. The
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 132
process is to explore the supply chain of respective UI in the context of how the system
delivering its service and product to the whole users. Once the initially step has been done,
the stakeholder can be identified and classified in a group formate.
5.6.1 Data Collection from The Community
The next step is data collection. This phase, adapts the participatory method to capture the
interrelationsihp dynamics between risk events with individual in datasets. Participatory
method describes as;
“……family of approaches, methods and behaviours to enable local people to chare, enhance
and analyse their knowledge of life and conditions, and to plan, act, monitor and evaluate”
[222].
Accordingly, participatory method also structured in a way that is particularly well-
attuned for engaging with complex problems. Bear in mind, as complexity increases it
becomes more difficult to explain the world with broad and centralised frameworks.
Participatory tools shift knowledge downward while, through the support of facilitators, still
maintaining a broader macro perspective, thai is; a knowledge combination that is vital for
understanding complex system [120].
Following the data collection method in previous phase, participants need to specify
what risk events are associated with them. This association refers to what risk events are
affecting or associating with each participant. This process intends to capture the actual
perceptions of the relevant stakeholders (participants) regarding; ‘who’ associated and
affected with ‘what’. There is no literature limiting the number of participant involved in the
data collection processes, however, the more people participating the better risk impact to
community analysis.
5.6.2 Developing Stakeholder-Risk Affiliation Matrix
The data obtained from survey processed and the stakeholder-risk associated (SRM) matrix
constructed to inform the identification of relations among stakeholders and risk events. The
SRM follows and extends the concept matrices in the network study applied in previous
studies [86, 92, 218, 219, 223, 224]. Proportionately, the SRM is represented by a two-mode
matrix which shown a non-tie directly between actors, nor would there be ties between
events, only ties connecting actors to risk events.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 133
Since both events and actors can be represented as nodes, and connections as edges,
the SRM offers the foundation to perform network analysis. The SRM can be expressed by a
rectangular matrix SRMni
in S Rsrm
=
which is the logic matrix (or relation/disjointK ) of
the network. In this research, a qualitative scale of entries from Boolean domain B 0,1=
issued for assessing the interactions of stakeholders and risk events interrelationship. Based
on Boolean domain, the value of 1 indicates that respective stakeholder ( )iS related/affected
with particular risk events ( )nR , and 0 is vice versa (see equation 5-15).
( )1 , K
0 otherwisein
i nsrm
=
(5-15)
Although an increasing emphasis is placed on stakeholder participation, many
communities especially the disadvantaged ones, are still on the margins in decision-making
processes [208]. In this research, instead of moderating the divergence perceptions, this
study exempts this issue by asking participant individually and independently regarding
their affectedness and relation against various UI system risk events. Therefore, the data
collected from different individuals does not need to be combined and, or averaged.
Following the developed SRM, reading vertically by column can helps to identify the
risk events that affect stakeholders, or what is often referred to as risk ‘impact-ability’; those
affected negatively the community. These risk events are analogous to impact vector, ripple
impact that can transmit negative consequences and disturbances to stakeholders.
Importantly, impact vector is a key strategy for community security intervention; likewise
addressing these overarching risks can be a mechanism for reducing UI risk impact on
community [120].
Importantly, the two-mode data can be analyzed in distinct way. The most commonly
used methods are either converting to one-mode data or analyzing it directly as a bipartite
graph [182, 198]. Nonetheless, one of the problem with converting the affiliation matrix to
one-mode is that some information can be loss [198]. This research, therefore applies the
bipartite analysis approach [190, 225, 226]. The SRM converts into a bipartite matrix
structure in which the rows consist of both stakeholders and risk events, and the columns
also consists of both risk events and stakeholders.
The bipartite matrix [SRM] is then applied to model and simulate the bipartite
network visualization which then further used to generate the network topology
representations [198]. Visualizing the relations between stakeholders and risk events as a
network provides a much more accurate representation of complexity. The SRM network
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 134
visualization, thus, can be used to quickly understand the processes of divergent nodes
interaction. Further, a topological analysis is performed on the network, with the aim of
giving complementary information and prioritizing some risk events in relation to their
structure and position in the network.
A number of network topology representation utilized in this phase to decipher the
structural configurations of the risk events nodes relations (affect community), such as;
degree (DEG), degree centrality (DC), betweenness centrality (BC), closeness centrality (CC)
and eigenvector centrality (EC). The description for each of the network topologies applied
can be seen in [97, 180, 182, 186, 189, 191]. The standard construct and description of SNA
indicators applied in this phase is stated in Table 5-10 below.
Table 5-10. The network indicator in the context of risk affecting community.
SNA indicators Description Degree (DEG) Refers as the number of links incident upon a node (i.e., the number of
individual stakeholders they associated and affected).
Degree Centrality (DC) Shows the potentiality of a specific risk event leaven its influence and connectivity to other risk events, as well as its impact affecting stakeholders through the network.
Betweenness Centrality (BC) Represent the node as a gatekeeper or a toll-taking role for controlling impact flows through the network. Risk events with high BC value have power towards threaten to stop transmitting, making other risk use less efficient paths to spread its impact and affect one another.
Closeness Centrality (CC) Emphasize the distance of a risk events to connect with others by focusing on the shortest paths. In other words, CC specify the capacity for disseminating its impact to whole stakeholders. A risk event node that has a high CC score can also potentially reach and affect the central network very quickly.
Eigenvector Centrality (EC) Measure the popularity of risk event in the sense that a node with high EC is connected to nodes that are themselves well connected. The EC takes into consideration the centrality of the other trades to which one is connected.
Further, in this research, the simulation for each of the network topology mentioned
above also come along with the concentric map. The concentric map intends to show that
the more centralized the specific node is, the more important the node will be. In this
research, the concentric map of risk events provides latent information towards the behavior
of risk impact affecting community. The information will be stand as the basis of main output
analysis. Further, the risk events ranked based on each network topology measurements.
Once the network topology values and ranking have been developed, the final step is
interpreting and presenting the analysis results.
Based on the understanding for each of the analysis built upon the previous three
phases, the next step is building the risk criticality analysis model. The risk criticality
analysis model development is conducted by modifying and integrating a number of RA
results from the first, second and third phase of the conceptual framework. The detail
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 135
explanation towards the development of the risk criticality analysis model development
(phase four) describes in the next section.
5.7 Phase 4: Risk Criticality Analysis
Prior to conduct the UI system robustness analysis, the ‘criticality of risk’ analysis model and
its equation must be defined and developed respectively. Although there is a strong
capability for the communities to assess UI system vulnerabilities, however without a better
understanding of the critical risk concept the robustness output will be less comprehensive.
This due to the fragmented RA which only represents part of total UI systems solution
towards the risk events. In this phase, the analysis model aims to assess quantitatively the
UI risks based on the three substantial elements (i.e., three RA mentioned in previous
phases).
Specifically, risk criticality refer to the level of risk impact by looking at its impact
characteristics, that is; (i) Risk magnitude, (ii) Risk causality and interaction pattern, and (iii)
Risk impact affecting the community [128]. The risk criticality model allows the
understanding of the integration between three risk impact characteristics. Therefore, a
broad structure of the risk and its impact can be respectively assessed and explored deeper.
Following the RPVs, (R-R) network and (S-R) network topology decipherment, the equation
to define the risk criticality is described in equation 5-16.
( )
R-R S-R
Top( ) Top( )
[R-R] [S-R]
Top Top, 0,1 , 0,1
( ) ( ), ,
( ) ( ) ( ) ( ) ( )
n nn n R R
n n n n nn N n Nn N n N
R f R
R R R R R
+
=
= (5-16)
, where
[R-R]
Top, 0,1
( ) ( )n nn N n N
R R
;
( ) ( ) ( ) ( ) ( )
[R-R]
DC OCC BC OSC EC
[R-
DC OCC BC OSC EC, 0,1 , [0,1] , [0,1] , [0,1] , [0,1]
RPV( ) ( ) ( ) ( ) ( ) ( )
( ) ( ) ( ) ( ) ( ) ( )
n n n n n nn N n N n N n N n N n N
n n n n n nn N n N n N n N n N n N
R R R R R R
R R R R R R
=
+ + + +
= + + + +
R]
, and
[S-R]
, 0,1
( ) ( )n Top nn N n N
R R
;
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 136
( ) ( ) ( ) ( )
[S-R]
DC CC BC EC
[S-R]
DC CC BC EC, 0,1 , [0,1] , [0,1] , [0,1] , [0,1]
RPV( ) ( ) ( ) ( ) ( )
( ) ( ) ( ) ( ) ( )
n n n n nn N n N n N n N n N
n n n n nn N n N n N n N n N
R R R R R
R R R R R
=
+ + +
= + + +
where, ( )nR is the risk n magnitude resulted from the first phase analysis, ( )[R-R]
DC ( )nR
denotes the normalization of the R-R network DC, ( )[R-R]
OCC( )nR denotes the normalization
of the R-R network OCC, ( )[R-R]
BC ( )nR denotes the normalization of the R-R network BC,
( )[R-R]
OSC ( )nR denotes the normalization of the R-R network OSC, ( )[R-R]
EC ( )nR denotes the
normalization of the R-R network EC, ( )[S-R]
DC ( )nR denotes the normalization of the S-R
network DC, ( )[S-R]
CC ( )nR denotes the normalization of the S-R network CC, ( )[S-R]
BC ( )nR
denotes the normalization of the S-R network BC, ( )[S-R]
EC ( )nR denotes the normalization of
the S-R network EC, [ ]
Top ( )n
n N
R•
denotes the sum of the defined risk event n network
topology.
Accordingly, the risk criticality model analysis develops in this phase justified the
second research question (RQ2) as stated in Chapter 1. To remind the reader, the RQ2 is;
RQ2: How to conceptually model the variables and functions, and empirically quantify the
critical risk based on the risk characteristic and impact mechanism?
5.8 Phase 5: System Robustness Analysis
The UI systems are at risk from threats that urban community may not yet foresee. Prudent
risk management demands that community could anticipate the threats to whole aspects of
UI design systems that are inherently safer and more resilient and be prepared to restore
them when they fail. The resilient model develops in this research aim to assess
quantitatively the robustness capacity of the defined UI system facing specific risk event
(disturbance). The robustness capacity analysis model flowchart is depicted in Figure 5-7.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 137
Identify and determine the hazards events
Identify and determine the stakeholder groups
System identification
Risk criticality model development
Develop stress capacity and impact model
Develop shock capacity and impact model
Defining system-of-interest resilience over time model
Develop system robustness capacity
analysis model
Determine the scenario-based
recovery strategy
Model simulation
Model integration and adjustment
Conceptual model development
Analysis and discussion
Input data and assumption applied
Syst
em r
obu
stn
ess
anal
ysi
s
Data processing
Data collection
Design-based questionnaire
Targeted respondents
Shocked impact modelStress impact modelExpected recovery scenarioRecovery model sce.1Recovery model sce.2Recovery model sce…..Recovery model sce.n
Figure 5-7. Robustness analysis conceptual model flowchart.
5.8.1 System of Interest Definition
Let S be the system of interest for the resilience study (in this research refers to the defined
UI system). When considering resilience, the system experiences three distinct states; (i)
Original state, 0S , (ii) Disrupted state, dS , and, (iii) Recovered state, fS . Further, the system
also experiences three transitions; (i) System disruption (from original state to the disrupted
state), (ii) System withstand (from disrupted state to the pre-recovery state) and (iii) System
recovery (from the pre-recovery state to the recovered state). In addition, there are two
events that trigger and enable the last two transitions, that is; a disruptive (risk) event and
resilience action.
Figure 5-8 illustrates that initially the system exists in a stable original state 0S . A risk
event then occurs that triggers system disruption (due to internal and/or external factors).
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 138
As a result, the system enters a disrupted state dS . In response, the resilience action is taken,
which triggers recovery processes, enabling the system bouncing back to a recovered state
fS . It must be noted that the recovered state fS could be the same, similar or different from
the original state of the system 0S .
Figure 5-8. Delivery function transition in resilience.
5.8.2 Figure-of-Merit or System Function
It is important to note that, to quantify system resiliency, the risk affecting the system is
synonymous with the unambiguous identification of a quantifiable and time-dependent
system level delivery function. In the system resilience study, this definition also can be
defined and symbolized as ‘Figure-of-merit’ (FOM) and ( )F • respectively [48, 51, 112, 227,
228]. Importantly, the ( )F • is the basis for the computation of system resilience. The
common use representations of this function can be network, connectivity, flow or delay as
applicable to the system under consideration.
Any state of S is characterized by a corresponding value of ( )F • , and it is assumed
that the two events (i.e., disruptive event and resilience action) directly affect its value. It is
important to mention that Figure 5-8 is the representative of a FOM for which increasing
values are considered better (e.g., reliability, flow, connectivity paths, etc). For the case where
the decreasing values are preferable1
( ) ( )G F−
• = • should be considered.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 139
As described in Figure 5-8, 0( )F t describes the delivery function value of the system
corresponding to state 0S . This state remains constant until the occurrence of the disruptive
event at time hzt . Then, it transits to the final disrupted state of the system dS at time het ,
where its value ( )he
F t is lower than its original value 0( )F t . Further, the system remains in dS
with disrupted delivery function value ( ) ( )he hd
F t F t= until it comes to the so called ‘Slack time’.
The ‘Slack time” refers to the maximum amount of time after disturbance occurred
for community to initially recover with remaining resources, that is acceptable before actual
recovery action ensues. In other words, during the period of hdt t t an initial set of
actions have been taken to stabilize the system at some intermediate state before substantive
recovery action started at time t . Finally, as a result of the recovery action, the system
recovers to a recovered state fS with delivery function ( )f
F t value at time ft .
It should be noted that; the two events viz; disrupted event and resilience action that
trigger the transitions system disruption and system recovery respectively, need not be a
one-time step events. Rather, both the events could vary as a function of a time, and the
resulting transitions could also have different variations with time and not necessarily a
linear one. Figure 5-8 is an illustration to describe the overall variation of the delivery
function or FOM of system facing disturbance over time during resilience analysis. Further,
it is also possible in some cases for the system disruption to continue until the recovery
action is initiated, that is; the time steps het and hdt could coincide with no steady disrupted
state dS .
Though this phase discusses only a single FOM, in real world, it is common for
multiple FOM to be considered for a single system under consideration. Hence, for a holistic
analysis of system resilience, the analysis should respect to all FOM that are relevant and
important. Finally, the final state, fS , does not necessarily have to coincide with the original
state of the system. That is, in terms of the FOM and based on the recovery actions, ( )f
F t can
be; (i) Equal to 0( )F t , (ii) Greater than 0
( )F t or, (iii) Smaller than 0( )F t .
5.8.3 Disruptive Event
In Figure 5-8, S enters a disruptive state due to a disruptive event that involves the reduction
of the delivery function value. While there are many events that could affect S , this alone is
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 140
not sufficient for the event to be considered disruptive. An event considered disruptive if and
only if it affects the system S in such a way that the value of the FOM ( )F • is reduced.
Considering the illustrations in Figure 5-8 above, a disruptive event is one that affects S such
that the original value of the FOM is reduced to as 0( ) ( )
dF t F t . Moreover, only then can a
system in state 0S enter a disrupted state dS .
In system where multiple FOMs are considered, an event could be disruptive with
respect to one FOM but not disruptive with respect to one FOM. Let E represents the set of
all disruptive events, 1 2, ,..., nE e e e= . Then, the set of disruptive events R can be defined as
0( ) ( )j jdR e E F t e F t= . It should be noted that the system-of-interest resilience
over time explanation above does not cover all the detail mathematical instruments and
indicators. It is, rather, designed to facilitate general understanding for readers towards
developing the risk-based robustness analysis model for UI system in this research.
5.8.4 Recovery System Action as a Function of Time
A successful recovery action is one that restores the system to stable recovered states fS from
a disrupted state dS . Mathematically, the system stable recovered states can be obtained by
improving the system robustness capacity value of ( )F • from ( )d
F t to ( )f
F t , between time st
and ft , as illustrated in Figure 5-8 . The robustness function captures the effect of the
disaster, but also the result of responses and recovery, the effect of restoration and
preparedness. To increasing the value of ( )F • , it is pivotal to firstly understand the UI
system behavior and capacity encounter both the main shock and stress events which is
triggered by critical risk impact.
The UI system behavior and capacity level need to be analyzed before the recovery
strategy and actions plan developed towards enhancing the UI system robustness capacity.
The UI system robustness analysis metric proposes in this research incorporates two
disturbance capacities state models, that is; shock and stress events. The models are in
accordance to previous efforts to defined basic system-of-interest resilience over time [7, 51,
56, 68, 69, 229], in that it describes how the system delivery function collapse or changes
due to a disruptive event and how the system ‘bounce back’ from such distress state to
normalcy.
Unfortunately, most of the recovery models available in the literature, including the
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 141
“PEER equation framework” developed at the Pacific Earthquake Engineering Research
Center (PEER) [187], are loss estimation models that focus on initial losses caused by
disaster, where losses are measured relative to pre-disaster conditions. The temporal
dimension of post-disaster loss recovery is not part of that formulation. As indicated in
Figure 5-8, the recovery time and the recovery path are essential for evaluating resilience, so
they should be estimated accurately.
Most of the common loss models, evaluate the recovery path and time in static
(undynamic) behavior and crude terms, and assume that within one year, everything returns
to normal. However, as shown in Figure 5-8 the system considered may not necessary return
to the pre-disaster baseline performance. It may exceed the initial performance, when the
recovery process ends, in particular when the UI’s system may use the opportunity to fix pre-
existing problems inside the system itself.
On the other hand, the system may suffer permanent losses and equilibrate below the
baseline performance. These considerations show that the recovery process is complex and
influenced by time dimensions, spatial dimensions and by interdependencies between
different economic sectors that are interested in the recovery process. Therefore, different
infrastructure types that belong to the same community, but are located in different
neighborhoods (location), have different recovery paths.
Concisely, the recovery process shows disparities among different geographic regions
in the same community, showing different rates and quality of recovery. Modeling recovery
of a single urban infrastructure type system or of an entire community is a complex subject.
These two processes are intercorrelated and cannot be assumed to be independent.
Information on comprehensive models that describe the recovery process is very limited.
5.8.5 Main Shock Function Transition Model Development
In this research, there are two aspects of resilience action that need be defined a priori: (1)
The component recovery mechanism and, (2) The resilience plan and strategy. These two
aspects are crucial within the development of system robustness analysis model proposes in
this phase. Computationally, when analyzing large complex system especially for UI system,
it may not be possible to consider every possible failures/ disruptive event. Therefore, a
worst-case scenario approach and average scenario approach may have to be considered in
order to develop a resilience strategy for the critical risk event.
To define the component of recovery mechanism, this research firstly develops a main
shock capacity model. The main shock refers to the highest disturbance impact made by
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 142
specific risk event affected the system-of-interest until its capacity collapsed. In other words,
it also defines the maximum UI system capacity to withstand the disturbance impact to
maintain its serviceability in steady condition ( )0 to hzt t
. The shock graph model is depicted
in Figure 5-9.
Figure 5-9. Main shock function transition over time.
Following the figure 5-9, the main shock refers to the specific risk impact ( nR
occurred at time hzt ) totally affecting the system-of-interest reaching failure state at time het.
In other word, the UI system capacity and serviceability are collapse and dull respectively. In
the condition after disturbance occurred, the delivery function of the system ( )F t is null ( )het
.
This state remains constant since there is no recovery action ( ) to he ft t
. Further, the main
shock model, for each of the risk events SHOCK CAP.( )
nF R , can be calculated via equation 5-17
below.
( ) ( ) ( ) ( )
( )
0
SHOCK CAP. 0
[R-R] [S-R] [R-R] [S-R]
Top( ) Top( ) Top( ) Top( )
Top(
( ) ( ) ( )
( ), , ( ), ,
( ),
fhz
n n n nn n
he
nn
n he
tt
n R R n R RR R
t t
n RR
F R F t F t
f R dt f R dt
f R
= −
= −
=
( )[R-R] [S-R]
) Top( ), 0
( ), 1, 2,...,
nR
nR n N
−
= =
(5-17)
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 143
where, ( )n
R is the risk event n magnitude, ( )[R-R]
Top( )nR denotes the network topology
indicators for the respective risk event within (R-R) network, ( )[S-R]
Top( )nR denotes the
network topology indicators for the respective risk event within (S-R) network. Further, the
main shock for respective risk event ( )n
R , SHOCK CAP.( )
nF R , need to find the objective below;
SHOCK CAP.max: ( )nF R
where, obtain the above objective need to satisfy the three conditions below;
C1. max , 1,....,nR n N =
C2.
[R-R]
DC
[R-R]
BC
x[R-R] [R-R]
Top( ) OCC ,
[R-R]
OSC
[R-R]
EC
max
max
max max , R-R R-R where; 0,
max
max
nnm
N N
R n m nmRR n m
= = =
C3.
( )
( )
( )
( )
[S-R]
DC
[S-R]
CC x[S-R]
Top( ) ( , )( , ) ,[S-R]
BC
[S-R]
EC
max
maxmax = , S-R S-R
max
max
ni n
I N
R i I n N S R
=
The objective above indicates three main conditions need to be maximized, that is; (i)
Risk magnitude, (ii) Risk causality and interaction pattern (R-R), and (iii) Risk impact to
community (S-R). To obtain the SHOCK CAP.maximum: ( )
nF R , the input parameters has to fulfil
requirement below.
x
( , )( , ) ,
x
( , )
( , , ), ( , , ) [1,10], 1,....,
max ( ) S-R S-R , ( , ) 1
R-R R-R
Rn
i n
I N
n i I n N S R
N N
n m
f O S D O S D n N
R i n
=
=
= , ( , ) 1, where; otherwise 0nmR
n m n m
5.8.6 Main Stress Function Transition Model Development
The stress model development considers the real value of risk criticality for respective risk
event ( )n
R . The UI system stress transition over time is illustrated in Figure 4-10 below. The
equation to compute the stress capacity of respective risk event described as below;
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 144
STRESS CAP.( ) ( ), 1, 2,...,
n nF R R n N= = (5-18)
Figure 5-10. Main stress function transition over time.
Following both the shock and stress capacity analysis model defined previously, the
system robustness capacity analysis model can be subsequently developed. Meanwhile,
robustness referring to engineering systems is, “the ability of elements, systems or other
units of analyst to withstand a given level of stress, or demand without suffering degradation
or loss of function [8, 58, 69]. It is therefore the robustness also explaining the residual
functionality right after the extreme event. Following the general understanding of system
robustness mentioned above, thus the generic system robustness equation towards
particular nR at the time hdt can be calculated using equation below:
( ) ( ) ( ) ( )
( ) ( )
1 1
ROB.
1
( ) ( ) ( ) ( ) ( )
1 ( ) ( )
1 ( ), 1,2,...
n n n n n
n n
n
F R R R R R
R R
R n N
− −
−
= −
= −
= − =
(5-19)
where, ( )n
R , ( )n
R , ( )n
R denotes to the main shock, stress and the normalized stress
capacity based on main shock value determined previously. The normalized stress capacity
is the element of [0,1] and ROB.( ) [0,1]
nF R .
The phase 5 of the empirical framework develops in this research justified the third
research question (RQ3) questioned in the Chapter 1 previously. To re-mind the RQ3 is
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 145
stated in the box below. The risk criticality developed is applied as the basis model to the
system-of-interest REA and transform it into both shock and stress capacity as a function of
time. The equations developed in conjunction towards RQ3 are described in the Eqs. 5-17 to
5-19.
RQ3: How to empirically derive the risk-criticality analysis model into system-of-interest
robustness analysis as a function of time?
Following the fifth phase discussed previously, this research further develops a
“system recovery analysis model” as explained in phase 6. The recovery analysis model
intends to assess various possibility recovery strategies and scenarios. The analysis model is
based on the simulation-based resilience actions towards obtaining the optimum strategy
maximizing the UI system robustness capacity. By increasing UI system robustness capacity,
the system losses and resilience thus can be minimized and maximized respectively in the
period and post-of disturbances.
5.9 Phase 6: System Recovery Analysis
While the system resilience can be characterized by many system’s features and attributes,
the system recovery and its role are a vital element of strategies to improve resilience. The
dynamic aspect of REA refers not only to the disruptive event timing, but also to the resilience
strategies selected and actions conducted timing. Concisely, the recovery process shows
disparities among different geographic regions in the same community, showing different
rates and quality of recovery. Modeling recovery of a single urban infrastructure type system
or of an entire community is a complex subject. These two processes are intercorrelated and
cannot be assumed to be independent.
On the other hand, information on comprehensive models that describe the UI system
recovery process from extreme events is very limited. A rigorous risk-based recovery
analysis model would then significantly act and dictate an appropriate recovery action to be
taken. These actions could be reinforcing a system’s resistance to shock and stress events,
reorganizing resources and making structural adjustments to accommodate likely changes
or enhance preparedness for recovery operations [8]. The recovery model of system-of-
interest over time depicts in Figure 5-11.
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 146
Figure 5-11. Recovery function transition over time.
The conceptual graph in Figure 5-11 illustrates the restoration and recovery function
transition over time towards enhance and achieve highest respective system-of-interest
robustness level. It is importantly to note that, among the key challenges when responding
during and after an extreme event or catastrophic incident is the direction and coordination
of response efforts. This issue is requiring an up-to-date situational awareness and
operational picture, which, however, might not become available within the first 24-72 hours
of an extreme event in the making [53, 230, 231].
Therefore, this phase adopts the concept of ‘post-disruption condition’ faced by the
system which is named as ‘Slack time period’. This ‘Slack time period’ refers to the way of
system-of-interest attempted to reach its delivery function capacity back to (partially)
similar condition when the disruption has not taking place. Accordingly, in the event of
disruption, effort to enhance the UI system robustness level from its disrupted state mainly
affected by the recovery and restoration strategies and actions which planned and decided
respectively.
Nonetheless, in the real environment the nature of the UI system recovery dictated
primarily by various pre-determined policies, capacity and capability readiness, and
available facilities for restore and recover. Given the resilience metrics, however, only help
compute the resilience of the system, the time for resilience and the total cost of resilience.
Therefore, to make the analysis boundary clear in this phase, a number of assumptions and
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 147
interpretations approach identified and determined in this research.
The purpose of the analysis model develops in this phase is to integrate the
information from different metrics into a unique system-of-interest robustness function. The
robustness function which is leading to results that are unbiased by uniformed intuition or
preconceived notions of risk. The UI system robustness capacity corresponding to a specific
FOM evaluated at a specific time under disruptive event can be calculated using equation 5-
20 below.
( ) ( )
( )
( )( ) (100% ) ( ) ( )
( )
1 ( ) ( ) , ( ) [0,1]
f
hd
f
tt
f n n
t t
t
n f
t
RF t R dt R dt
R
F t R dt F t
= − − +
= − +
(5-20)
where,𝛼 refers to the coefficient applied in this research towards increases capacity of
system-of-interest during the ‘Slack time’ period ( hdt tto ). In this research 𝛼 is determined
as 2.5%. Meaning that, the system-of-interest increasing its robustness capacity during Slack
time by 2.5% based on the robustness level at time hdt .
Following a disruption in the performance of UI system that is caused by either
natural or man-made hazards or accidents, recovery efforts begins to bring system
performance to an acceptable level. In this research, the recovery analysis model focuses on
the various recovery strategy scenarios built for the UI system to recover consider several
significant requirements. The requirements considered in this research is that; the optimum
recovery strategy towards achieving highest robustness capacity value of UI.
Moreover, a procedure for involving and controlling the various variables which
consider stakeholders point of view as an input, in defining the risk impact, UI system
robustness level, and recovery strategy was required. To obtain the most appropriate and
optimum recovery strategy towards obtaining highest UI robustness capacity, the scenario-
based robustness analysis is applied through the equation 5-20. The objective function
towards searching the highest UI system robustness capacity after disturbance occurred can
be seen below.
max : ( )fF t
( ) ( )( ). . (100% ) ( ) ( ) ( )
( )
f
hd
tt
n n f
t t
Rs t R dt R dt F t
R
− − +
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 148
( )1 ( ) ( ) ( )
( ) 0, ( ) [0,1]
( ) [0,1] 0.025
for all
,
ft
n f
t
f f
n
F t R dt F t
F t F t
R
− +
=
where, the objective function constrains formulated as below:
C1. ( ) , , , ( , , ) [1,10], 1,....,nR f O S D O S D n N = =
C2.
[R-R]DC
[R-R]BC
x[R-R] [R-R],Top( ) CC
[R-R]EC
[R-R]SC
, R-R R-R ( , ) , where; 0, n nm
N N
n m nmR Rn m R n m
= = =
C3.
[S-R]DC
[S-R]xBC[S-R]
( , )( , )Top( ) [S-R] ,CC
[S-R]EC
, S-R S-R ( , )n
i n
I N
i I n NR S Ri n K
= =
It is important to note and clarify that max : ( )fF t is a non-linear objective function
which can be solved using multi-objective optimization. However, following the research
aims mentioned earlier, this phase is not intending to discuss and develop both the
optimization case and engaging metaheuristic methods respectively to find the optimum
objective function following its constrain. Furthermore, it should be kept in mind that the
resilience of UI system is always with respect to a specific time dependent FOM.
Proportionately, it is always possible for the system exhibit resilience for one FOM
and not for another FOM. It is, therefore, important to make this distinction because only
then can a comparison of system resilience be considered for different scenarios or
disrupted states. Moreover, to accommodate several analysis model limitations towards
resembling the real-world environment, the time dimension and metrics for REA is assumed.
As stated as the last phase of conceptual framework, this sub-section remarked the
fourth research question (RQ4). Importantly, by developing the UI system robustness
analysis function model, the UI system robustness capacity level over time in the further time
can be predicted. A quasi-experiment using computational simulation and optimization
approach can be applied towards predicting the UI system robustness capacity over time.
The quasi-experiment analysis produces several recovery scenarios which support
(empirically) crucial recovery action decision making, enhance the UI system robustness
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 149
level post-disturbance.
RQ4: How the system-of-interest robustness capacity against particular risk can be
empirically assessed and enhanced over post-disturbance period?
5.10 Assumptions Applied
In RA, apart from technological failures, the threat is often an element of great uncertainty
requiring assumption and/or different scenarios to study [93]. Therefore, this research
applied several assumptions which is applied within analysis models. The assumptions
applied is;
- It is impractical to assess all risks relationship with community, thus the second phase
of conceptual framework assumed that the risk associated to specific stakeholder
group also affects and interrelates to all risks which associated to other respective
stakeholder group aimed.
- Participants (stand within stakeholder groups) presents sufficiently stable social
entities with a manageable number of actors, which is could be identified and
positioned at various scales. In this research, stakeholder groups assumed have NO
weight value. The various stakeholder groups assumed to have the same weight value
or have a same level of position (power, right and authority), in terms of giving their
perception/opinion, within the RA and REA processes.
- The determined risk decision factors have the same weight value applied within the
analysis processes.
- The characterization of risk event depends on the degree of difficulty towards
establishing the cause-effect relationship between a risk agent and its potential
consequences. The degree of causality and relationship pattern with regards to; what
risk actually mean for those affected, and the values to be applied when judging risk
impact amplification, is totally based on the participants perception.
- There’s no universal standard or rules to dichotomize a value in network matrix to
obtain a clear risks relationship value. Therefore, this research applied an ad-hoc
rules of dichotomize rules as mentioned in sub-section 5.5.4.
5.11 Chapter Summary
This Chapter has brought together the concept from various existing theories associated
CHAPTER 5-CONCEPTUAL FRAMEWORK AND ANALYSIS MODELS
Page 150
with theory building. The conceptual framework proposes in this research disembark from
various variables towards measuring and analyzing quantitative work. This research
conducts several literature reviews and builds a critical argument towards previous studies
knowledge shortcomings, including: ‘related theory’ (i.e., concepts and/or relationships that
are used to characterize the world), ‘related research’ (i.e., how other researchers have
tackled similar problems) and ‘other theory’ (i.e., lines of research and theory that not
directly relevant used).
Further, this Chapter also explores and discusses several UI system risk and resilience
assessment techniques and methods including its variables, mathematical formulas,
computational and simulation techniques. Both the methods and techniques applied in this
research intents to capture, model and simulate the impact characteristic of risk as well as
the resilience analysis in UI system that has explored and discussed in-depth within six main
phases of conceptual framework.
The conceptual framework develops is based on the main risk-criticality analysis.
While, risk-criticality is composed from the three preliminary RA phases, that is; (i) Risk
magnitude which observes its risk priority numbers and values (RPNs and RPVs); (ii) Risk
causality and interaction pattern investigates ‘how each risk propagating its impact and
affecting other risks (interaction)’, and (iii) Risk impact to community examines ‘how risk
impact affecting community’. Except the first preliminary RA, both the analyses apply the
network visualization and topology decipherment which is utilized to investigate the risk
impact characteristic and its behavior.
Further, several assumptions applied within the analysis models to imitate and
accommodate real-world environments and the model limitations respectively. The UI
system REA assembled by the critical risk capacity determined previously, compiled by both
shock and stress capacity analysis. The numerical solution to obtain optimum recovery level
is modelled as a non-linear objective function which could be solved using multi-objective
optimization.
Given the research aim, the discussion and development of the optimization case, and
engaging metaheuristic methods respectively towards searching the optimum recovery
strategy have not been included. Instead, this research develops the recovery analysis model
to assess and obtain highest robustness capacity level that particular UI system might
attained. It must be kept in mind that the resilience of the system is always with respect to a
specific time dependent FOM. To validate and exemplify the usefulness of the conceptual
framework, the next section discusses the application to a case study.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 151
CHAPTER 6
FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
CHAPTER HEADINGS Introduction Case Study Background Stakeholder Group Identification Risk Events Identification Data Collection Process and Respondent Profile Chapter Summary
6.1 Introduction
This Chapter starts with explaining the background of UWS infrastructure and its system in
Indonesian context, and then focusing on Surabaya city. Following the proposed research
design and methodology discussed in previous section, the stakeholder groups of Surabaya
water supply infrastructure system are identified and described. The determined risk events
which categorized in five categories are identified and explored rigorously.
Based on the determined stakeholder groups and risk events, further, the data
collected via design-based questionnaire are analyzed and disseminated. Prior to collecting
the data in the field, it is important to understand the background of the UWS infrastructure
system both in the context of Indonesia and Surabaya city. Accordingly, collected data need
to reflect the demographical information accurately. Data processing and analysis are
discussed in the next sub-section.
6.2 Case Study Background
The UWS infrastructure is one of the core CI sectors which provides significant services in
order to maintenance the vital societal functions, health, safety, security, economic and social
well-being [232]. Any interruption on this results in significant disruptions to the society.
Importantly, the risk issues on UWS infrastructure is the most complex and difficult to face
because of the high cost and the difficulty in providing the service in complex urban
environment [116, 233-235].
Complexity arise from the interconnected nature of the risks and potential influences
at multiple scales. Many scholars have published about the difficulties, relates to risk and
assessment methods in water sector [119, 204, 233, 236-240]. However, the discussion on
RA of UWS infrastructure sector affecting communities and the decision making considering
judgments from various types and levels of stakeholders perceptions have not been well
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 152
studied [96].
Moreover, UWS infrastructure system has been received little attention and tend to
be underestimated within the Large Technological System (LTS) debate even though they
bear most, if not all, of the principal characteristics of LTS. The UWS infrastructure is a
complex system consisting of physical artefacts (e.g., pipes, valve, processing plant),
organizations (utility companies, planning bodies) and, regulatory structures (legislative
framework, contractual obligations).
This system evolved in response to the increasing complexity and problems of control
relating to clean water needs in city. Typical of many LTS, UWS infrastructure networks are
engaged in regulating the input and output of resources on a large scale. The development
of UWS infrastructure networks is not determined purely by technological progress but also
by the interplay between technologies, institutions and-above all-actors.
Following the studies conducted by Moss, T., the progress of the three schemes of
water recycling in the Berlin region confirms that, besides the availability of a particular
technology, other financial, organizational, regulatory and political forces shape the
direction and speed of development [21]. The study further demonstrates the need to
consider the interaction of local factors, historical precedents, actors’ motives and natural
features that shape the fate of a scheme.
6.2.1 Indonesia UWS Infrastructure System and Regulation
Indonesia is not water scarce as it has enough water to satisfy the needs of its population
and economy. Uneven distribution, poor management and lack of infrastructure however,
have left parts of the country with insufficient access to water. Taking an example; increased
private investment in Jakarta water supply infrastructure system has failed to significantly
improve access to clean and affordable water supply [241]. Returning water resources and
infrastructure to public management will only lead to favourable outcomes if the necessary
funds are made available. Without considerable investment, water supply security in
Indonesia will remain tenuous and subject to rapid deterioration.
Water supply (and sanitation) in Indonesia is characterized by poor levels of access
and service quality. Over 40 million people lacks access to an improved water source and
more than 110 million of the country’s 240 million population has no access to improved
sanitation [1]. Furthermore, policy responsibilities are fragmented between different
ministries. Since decentralization was introduced in Indonesia in 2001, local governments
(province and districts) have gained responsibility for water supply (and sanitation).
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 153
Nonetheless, this has so far not translated into an improvement of access or service
quality, mainly because devolution of responsibilities has not followed by adequate fund
channeling mechanisms to carry out this responsibility. Local utilities remain weak. The
provision of clean water has, unfortunately, not yet been taken up as a development priority,
particularly at the provincial government level. Accordingly, the lack of access to clean water
and sanitation remains a serious challenge, especially in slums and rural areas.
This is a major concern because lack of clean water reduces the level of hygiene in the
communities and it also raises the probability of people contracting skin diseases or other
waterborne illnesses. A failure to aggressively promote behavioral change, particularly
among low-income families and slum dwellers, has further worsened the health impact of
Indonesia’s water and sanitation situation [4]. In Indonesia context, the UWS infrastructure
system (see Fig. 6-1) generally can be divided into two main system; first raw water from
source to water treatment plant (WTP), and clean water from WTP to consumer.
1. Source:- Surface water- Ground water
2. Water sources catchment
3. Raw water catchment
4. Water Treatment Plant
Ra
w w
ate
r
Raw water, from source to WTP
4. WTP
5. Clean water catchment
6. Transmission network
7. Distribution network
Cle
an w
ater
Clean water, from WTP to consumer
8. Consumer
Figure 6-1. General UWS infrastructure system in Indonesia.
The general water supply system in Indonesia explained as follows [242]. The
resource for water obtains from two main sources which is surface water and ground water.
The usual form of catchment for the surface water source is; river, swamp, lake, dam and
reservoir. The ground water sources are; groundwater basin (confined and unconfined
aquifer) and springs. Indonesia has a clear water resource law regarding the management of
water resource based on the boundaries of administrative regions.
Further, following various cross-border regulations, administration, agreements and
coordination between different level and type of governments in terms of water resources
zoning, management and preservation (e.g., state-owner enterprise in water source
management, province and regional level government, province level public work
department, national river basin agency and regional level government) the raw water
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 154
finally transmitted to WTP in specific urban administrative region.
The main operator who has an authority to transmit the raw water to WTP is the
state-owned water resource enterprise named Perusahaan Umum (Perum) Jasa Tirta. Then,
the roles and responsibility of treating raw water, producing good quality clean water and
distributing to costumers (includes giving both physical and non-physical service to the
infrastructure system and public) can be handled by private company, public company or
even applying public-private partnership system (under specific Indonesia concession
regulation, i.e., Built-Own-Operate-Transfer).
In the urban administrative region (city or district), the part of treating, producing
and distributing water mainly handled by the regional-owned enterprises (Badan Usaha
Milik Daerah-BUMD) named regional water company or Perusahaan Daerah Air Minum
(PDAM). Since PDAM is a level 2 BUMD, thus each PDAM in different administrative region
has their own governance and policy to serve people’s water demand. As a consumer, the
water users are responsible to pay the water bill based on how much they utilize the water,
the maintenance and services. In addition, the profit that PDAM gained and managed,
become one of the sources of income for regional government as PDAM is the regional owned
enterprise.
6.2.2 Surabaya Water Supply Infrastructure System
Surabaya is Indonesia’s second-largest metropolitan city as well as the capital of East Java
province. It is located on the northern shore of eastern Java at the mouth of the Mas River
and along the edge of the Madura Strait (Figure 6-2). Surabaya has become one of the largest
cities in Southeast Asia being the center of main seaport, industrial, commercial and
maritime center in the eastern region of Indonesia [243]. Further, the city occupies coastal
terrain and has a land area of 327 square kilometers with a population surrounding rural
area houses at least seven million and density about 8,458 inhabitants per km2 [244]. With
the population reaching 2.8 million inhabitants makes the development of UI and public
facilities inevitable important.
As the second largest city in Indonesia, Surabaya has achieved remarkable
development success over the past decade. The Surabaya water supply municipality is
considered among the top performers in nation [150]. This remarkable achievement is
echoed by its water utility, PDAM-Surya Sembada. Unlike most PDAMs, Surya Sembada has a
good reputation in the market and is in a strong financial position with no arrears on its debt.
In 2009, the utility annual operating and maintenance costs were 34 million US$ and
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 155
the total revenue was more than 55 million US$. Its current service coverage is 83 percent.
With approximately 450.000 domestic and commercial connections, PDAM Surya Sembada
is the biggest water supply enterprise in Indonesia. Meanwhile, the supply of raw water for
Surabaya city mainly comes from the ‘Surabaya river’ (surface water source) which is the
tributary part of the ‘Brantas river basin’.
Republic of Indonesia
East Java province
Surabaya city
Figure 6-2. Surabaya city position in Indonesia.
The Brantas basin is a national strategic basin in East Java, comprising two major
cities, Malang and Surabaya. Three consecutive plans that have been prepared for the
Brantas basin focused on irrigation development (1975), on flood management (1985), and
on environmental aspects and conservation (1995). These plans assisted in developing a
clear direction for the investments and in achieving a significant part of the goals
(construction of dams and reservoirs as well as flood-mitigating facilities). The Delta Brantas
river network system and the split streams of Brantas river can be seen in Figure 6-3.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 156
Brantas river basin map
The split streams of Brantas river
Figure 6-3. Brantas river basin map and the split streams of Brantas river.
The Brantas basin is one of the developed river systems which have a pivotal and
crucial function in Indonesia [242]. The Brantas river basin functions as the most important
source of water specially in East Java province, for instance; electricity generation, irrigation,
brackish water fishponds, domestic water supply and industrial water supply. The Delta
Brantas river network splits into two major rivers (located in Mojokerto district). First,
Mlirip river weir as a regulatory structure for river flow entering Surabaya river and second,
Lekong barrage as a regulatory structure for river flow entering Porong river.
The Brantas river basin is the second largest river basin in Java Island, located in the
East Java Province at 110°30’ East Longitude to 112°55’ East Longitude and 7°01’ South
Latitude to 8°15’ South Latitude. The Brantas River extends to ± 320 km in length and it has
a catchment area extending to ± 14,103 km² which covers ± 25% of the total area of East Java
Province or ± 9% of the total area of Java Island. The average rainfall reaches 2,000 mm/year,
around 85% occurring during the rainy season.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 157
The average surface water potential per year is 13,232 billion m³, with utilized
amount of around 5-6 billion m³/year. The Brantas river basin consists of the Brantas
watershed, which extends to 11,988 km², and more than 100 small watersheds that flow into
the south coast of Java island, including the Kali Tengah watershed, Ringin Bandulan
watershed, Kondang Merak watershed, and other small watersheds with a total area of
around 2,115 km². The Surabaya river is the major water source for Surabaya city fulfilling
society’s demand for the water supply, beside ‘Umbulan’ water source (Umbulan village,
Winongan sub-district, Pasuruan district).
Following governmental agreement between Surabaya government, Pasuruan
district government and East Java province government, the Umbulan water source
transmitted to the water storage plant in Surabaya using cross-district long-span water
piping network system. In the context of transmitting the Umbulan water resource to
Surabaya city, the agreement between different type and level of authorities is very
important considering the Umbulan water resources transmitted across different
administrative region boundaries.
The utilization of water in Surabaya river has been performed for more than 30 years
as a raw material of drinking water for citizens of Surabaya. Currently, Surabaya city has a
population of 3 million and own 6 drinking WTPs. The entire drinking WTPs are derived into
3 units in Karang Pilang and 3 others in Ngagel. The drinking WTPs are operated with
6 𝑚3𝑠−1 total debit taken from the Surabaya rivers.
6.3 Stakeholder Groups Identification
The problem of managing the transition to local percolation in Surabaya urban development
sites has also revealed the importance of closer interaction between the utility and the other
key stakeholder groups to reach agreement on the redistribution of responsibilities under
the new law. Therefore, it is important to explore the stakeholder (actor) group of Surabaya
water supply infrastructure system. To identify and determine the stakeholder groups, it is
an important path to first explore the Surabaya city water supply infrastructure system
supply chain.
Particularly, this research comprehensively explored the supply chain of Surabaya
water supply infrastructure system in the context of how water has been processed and
distributed, from the beginning (raw water being extracted, stored and transmitted) until it
reached end users. This research then initially identified and determined the stakeholder
groups who stood and classified based on supply chain explored previously. The
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 158
stakeholders of Surabaya water supply infrastructure cover all parties who are dependent
and are affected by the infrastructure system. However due to the time and regulation
constraints, the data collection processes cannot embrace all parties to be the participant.
To confirm the supply chain structure, the author has conducted a comprehensive
literature review and interviewed several experts from various level, scope, and institution.
Once the initial step has been done, the stakeholders were classified in a group format.
Ideally, more stakeholders should be evolved and considered to increase the accuracy of RA.
To overcome this issue, this study applied process to comprehensively scoping and
determining the boundary of stakeholders who can be identified and involved respectively.
To obtain richness picture and involvement of stakeholder groups, interviews were
conducted with a number of experts from different institutions. The second step was
conducted in order to complement the first step with respect to establishing the stakeholder
groups. Defining all the supply chain components of the respective infrastructure system is
a useful process to provide a way of analyzing the role of actors and agents. Furthermore, it
also supports the process of developing the urban environment and allows for an unravelling
interaction that forms a key characteristic of modern urban life.
The general structure of the supply chain of Surabaya water supply system and its
stakeholder groups is depicted in Figure 6-4. Notably, the detail of discussion of the supply
chain of Surabaya water supply is not shown in this research. Readers may refer to some
related literatures [150-152, 242, 244]. Based on the general water supply infrastructure
systemin Surabaya, it is worth to understand ‘who is authorized as what’, as the basis for
identifying and determining the stakeholder of Surabaya water supply infrastructure.
The stakeholder of Surabaya water supply infrastructure are the people, in different
levels and roles (including; organization and institution), and whosoever has an interest, was
affected by the presence of water supply infrastructure system. As an important city which
has taken various crucial roles in east part of Indonesia, various stakeholders of UWS
infrastructure from different sectors and levels are well situated in the Surabaya city. To
confirm the supply chain structure, the author also conducted a comprehensive literature
review and interviewed a number of experts applying snowball method from different
government institutions. The next sub-section describes the initial stakeholder group and
category.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 159
Mojokerto district
Sidoarjo city
East Java (province) public work department
Industry
Surabaya river
Porong river
The split streams of Brantas river
Watershed management
Jagir damWonokromo floodgate
Gunungsari dam Gubeng rubber weir
Ngagel WTP 1, 2, 3Karang Pilang WTP 1, 2 , 3
Umbulan water source (pump house)
Water treatment, distribution and services
Water allocation agreement
Water allocation and supply
City/ district boundary
Malang, East Java.
Regional owned enterprise/ Badan Usaha Milik Daerah
Line of coordination
Line of coordination
Distribution system
Surabaya city governmental boundary
Technical and non-technical services
Line of coordination Line of coordination
Co
nsu
me
r/
Use
r
Line of coordination
Line of coordination
Commercial
Domestic user
Surabaya city governmentJasa Tirta-1 public corporation
National river basin management agency Regional water supply company
Brantas river
Figure 6-4. The supply chain of Surabaya water supply and its’ stakeholder groups.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 160
Importantly, discussion with infrastructure decision makers (DMs) can have three
advantages, that is; (1) It may yield information; (2) Identify uncertainty about which criteria
have been and should be used, and (3) More awareness and thoughtfulness about gainer and
losers from infrastructure decisions in the community. Notably, the stakeholders identified
and discussed in next sub-sections do not cover all the stakeholders, but rather is designed
to facilitate initial and core stakeholder identification for this study. The description of eight
stakeholder groups determined based on the supply chain of Surabaya water supply
infrastructure are described in Table 6-1.
Table 6-1. Summarized stakeholder groups.
Stakeholder group Description Brantas river basin management agency (G1)
Technically, the national Brantas river basin management agency (Balai Besar Wilayah Sungai-BBWS) formed under the Directorate General of water resource responsibility. The BBWS is one of the governmental institution for water resource management in the context of managing ‘only’ the national strategic river (Brantas river stated as one of the national strategic river in Indonesia) which is based in the East Java province. The ‘national strategic river area’ means that the Brantas river has become the right and responsibility of the central government of Indonesia in terms of the management and supervision [242].
Further, BBWS has a duty to manage the water resource in terms of basin region which also cover; planning, construction, operation and maintenance, in the context of; conservation and utilization of water resources, controlling water damage to the rivers, lakes, reservoirs, dams and other types of water reservoirs, irrigation, ground water, raw water, marsh, ponds and beaches. The BBWS Brantas is categorized as a type-A large river basin organization which organizational structure consists of: (i) Administration department, (ii) Program and evaluation division, (iii) Water source network implementation division, (iv) Water utilization implementation division, (v) Water resources operation and maintenance division.
State public works department (G2)
The state public works service (Dinas Pekerjaan Umum-PU) has a duty of; management, assessment and makeing significant decisions regarding the development of; (i) Building infrastructure (Cipta Karya dan Tata Ruang), (ii) Roadway infrastructure (Bina Marga) and (iii) Irrigation and watering infrastructure respectively in the province (state) level (Pematusan). Furthermore, PU has a responsibility to coordinate, assess and work together with other PU department as well as with the Surabaya city government towards the development of water supply infrastructure system. The state PU has several missions, which is:
- Realize the layout as a reference spatial dimension of national and regional development and integration of public works infrastructure construction.
- Arrangement of space-based settlement in the framework of sustainable development.
- Organize effective management of natural resources and to improve the sustainability of natural resources function utilization.
- Reduce the risk of destructive force of water. - Improve accessibility and mobility within the region to support economic
growth and improve the welfare of the community by providing a reliable road network, integrated and sustainable.
- Improve the quality of neighborhoods livable and productive through fostering and facilitating the development of an integrated settlement infrastructure, reliable and sustainable.
- Conducting competitive construction industry by ensuring the integration of the management of the construction sector, the implementation of good construction and make the perpetrators of the construction sector to grow and thrive.
- Organizing research and development, and implementation: science and technology, norms, standards, guidelines, manuals and / or supporting criteria
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 161
PU and settlement infrastructure. - Carrying out functional management support and resources accountable and
competent, integrated and innovative by applying the principles of good governance.
- Minimize irregularities and corruption practices in the state PU department to improve the quality of inspection and professional supervision.
Jasa Tirta-I Public corporation (P1)
Jasa Tirta-1 Public Corporation (PJT-1) provides several important service, such as; (i) Bulk water for industry, agriculture, flushing, port, electric power generation and others, (ii) Water power to generate electricity for the state electricity company, (iii) Generate and distribute electric power and clean water, perform consulting in water resources fields, heavy equipment rental and water quality laboratory services, and (iv) Develop other water-related services including piped domestic supply at specified scales. Importantly, PJT-1 and BBWS has a tight relationship towards managing the water resources.
Based on the three consecutive plans of Brantas basin development that have been discussed in previous sub-section, the implementation clearly benefited from the fact that the plan was prepared by the ‘user’ to be implemented by a separate ‘provider’. The ‘user’ was the entity operating the major facilities in the river, which is PJT-1 [245]. They formulated the framework of activities (as a Terms of Reference) to be implemented and financed through the ‘provider’, the national Brantas Project Organization, whose role has now been taken over by BBWS Brantas.
These separate responsibilities highly contributed to a clear role distribution, avoiding overlapping interests and ensuring a transparent process regarding quality assurance, with PJT1 acting as user/client and Brantas project as provider. The design for Brantas was prepared in 2006 by BBWS and endorsed by the Minister of Public Works in 2010. Presently, BBWS is finalizing the procedures for endorsing the ‘plan’, as formulated in 2011/2012. The task of allocating roles to the user and the provider is now taken over by the Basin Council as the user, with PJT-1 as one of the most active members, and the BBWS Brantas as the provider.
Surabaya city government (G3)
According to city mayor regulation No.90/2008 towards the duties and functions of Surabaya city technical institution (government bodies), the main task of Surabaya government is to: (i) Implement the coordinated programs following the planned budgets and build the agency reports, (ii) Coach and manage the organizational stand under the umbrella of Surabaya government body, (iii) Personnel administration management. Furthermore, the Surabaya city government has a function to:
- Formulate a technical policy in the field of staffing training - Providing support for the implementation of regional government in the field of
personnel and training - To be a Guidance and execution of tasks in administration management context - Implement the other duties given by the head of the district in accordance with
the duties and functions The Surabaya city government is an important stakeholder for Surabaya water
supply infrastructure either as the owner of regional water supply enterprise (PDAM Surya Sembada), clean water user, public counseling, licensing services, public information providers, and the DM related to the Surabaya community interest. Importantly, Surabaya city government plays a crucial role for the Surabaya city development in building a good connection and coordination with BBWS, several state government of PU departments, PJT-1, and the regional water supply enterprises towards the development of UI.
Regional water supply enterprise (P2)
The Surabaya water supply handled by PDAM Surya Sembada, which is a regional-owned enterprise (owned by the Surabaya city government). To fulfill Surabaya’s demand on clean water, PDAM has a number of WTPs which is; ‘Ngagel’ WTP (1-3), ‘Kayon’ WTP, ‘Karang Pilang’ WTP (1-3, and 4 under construction) and, another water supply directly from Umbulan water source-Malang city. Substantially, the PDAM Surya Sembada has a responsibility to continuously supply a reliable a high-quality water for the society.
The responsibility includes, but not limited to; treating bulk raw water to be a high quality clean water, distribute the clean water to the society, plan and build a water distribution network system (including maintenance, e.g., checking the water meter for every user and another non-technical service). Accordingly, PDAM has the responsibility to maintain the level and ability for supplying clean water continuously to society with affordable quality and prices includes satisfying service provision.
As the main water supply enterprises in Surabaya, PDAM Surya Sembada has
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 162
two functions, that is; (i) Social oriented, which is providing a professional service in terms of both technical and non-technical matters in the context of produce, supply and distribute clean water to all regular customers as well as another stakeholder; and (ii) Profit oriented, which is aiming to gain profits used as an operational and technical fund and local income.
Industry and business entity (M1)
The stakeholder group who has a high dependency towards the big quantity supply of clean water in order to sustain their business. This industry group refers to the state-owned, joint venture, public-owned or even private business entity whose rely heavily on the continuity of inviolable domestic water services (massive quantity) to promote their business. For instances; manufacture industry, construction industry, service industry, food and drink industry, chemical industry, and et cetera. While, industrial and commercial sector.
Commercial and, or public space (M2)
A general, public space or commercial sector which managed by public or private institution and stand as both regular clean water customer and user. For instance; park, public toilet, worship place, public squares, public library, university, department store, school and office building, swimming pool, single management-based housing (apartment and condominium), hotel, restaurant, and exhibition hall.
Domestic end-user (M3)
The domestic end user group is either an individual or group in respective residence or dwelling area in Surabaya city as a regular customer towards clean water end user to support their daily activity. This stakeholder group is the society and, or group of laypeople who rely on the domestic UWS infrastructure service to support their daily life. In Surabaya city, water generally gets to community homes in one of two ways. Either it is distributed by PDAM, or people supply their own water, normally from a well. Water delivered to homes is called "public-supplied deliveries" and water that people supply themselves is called "self-supplied" and is almost always from groundwater.
The term 'domestic water use' as it applies to the area of water can be defined as 'water used for indoor and outdoor household purposes, such as drinking, food preparation, bathing, washing clothes, dishes, and dogs, flushing toilets, and watering lawns and gardens. A major actor group, which is largely absent from LTS studies, is the domestic end users, who are treated as passive recipients of system-builders’ products. The importance of user groups may still be marginal in some aspects of network management, but their degree of involvement is growing rapidly in selected parts of the networks.
6.4 Risk Events Identification
Assessing the risk of UWS infrastructure in relation to deliver of water in a safe, efficient,
economical and reliable manner is a difficult task. Some of the technical and non-technical
problems pertaining to UWS infrastructure that Surabaya faced has been described well in
several previous studies [151, 152, 243]. Nonetheless, the issue of assessing the risk in
Surabaya water supply infrastructure system based on various stakeholder perceptions has
not received sufficient attention in any other studies.
This research initially determined the risk events from selected research literatures
including the descriptions for each risk events. In previous works, data regarding the affected
infrastructure can be interpreted as impacts on industries and communities in terms of
technical, social and economic aspects [204, 239]. However, in UWS infrastructure sector,
another aspect as political, operational and environmental aspect is significant to be
included within the RA processes.
Conclusively, Surabaya water supply infrastructure risk events were determined
following by a number of important classification (i.e., social, natural/environmental,
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 163
political, technical and operational, financial and economic). To identify various risk events
in Surabaya water supply infrastructure, author conducted the literature review in both
global and local context. A number of libraries in Surabaya (i.e., city library, 10th November
Technology Institute library, Petra Christian University library and state library), and
desktop study (i.e., Indonesia research institute website) were conducted in order to reach
some archives and past research documents.
The conceptual model of risks scheme articulating the relationship between Surabaya
UWS infrastructure and the supported community is depicted in Figure 6-5. The literature
resulted in the identified risk events and stakeholder groups for Surabaya water supply
infrastructure system. In this research, as many as 30 risk events were identified based on
the literature review (see Figure 6-6). The risk events are considered as hazardous events
that can adversely affect the performance of the UWS infrastructure, which includes both
natural and human-related risks. Risk categorization can usually be performed in several
ways.
Technical & Operational
Economic & Financial
Community network
Political
Hazards and Threats
Natural Hazard
Human-made
Hazard
SocialEnvironmental
- Surabaya River (95%)- Pandaan Water Spring (±2.5%)- Umbulan Water Spring (±2.5%)
Water Resources
- Ngagel Water Treatment Plant I-III- Kayon Water Treatment Plant- Karang Pilang Water Treatment Plant I,II
Water Treatment
Water pumped to aerator system → Pre-sedimentation tank → Water treatment plant
Water Storage
Water Distribution
Purified water accommodated within the reservoir and ready to be distributed
Water distributed to the whole community
Hazard and threat affecting both the
infrastructure system and the community
Surabaya UWS processing system
UWSinfrastructure
aspects
Risk and hazard
Figure 6-5. The conceptual model of UWS system risks affecting community.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 164
Nature
Social
R1. Climate change
R2. Natural disasters
R3. Water scarcity (shortage)
R4. Idle land exploitation
R5. Polution And contamination
R6. Uncertain water demand (and supply) trends
R7. Water misuse
R8. Limited access to clean water
R9. Payment problem
R10. Community rejection
R11. Population growth and urbanization problem
R12. Sabotage to physical infrastructure
Technical and
Operational
R17. Insufficient non-technical service provision
R18. Water quality defective
R19. Trouble in water transmission and distribution network
R20. Mechanical (physical) component failure
R21. Under rate maintenance
R22. Physical infrastructure decay (Aging)
R23. Lack of technical service provision
R24. Water loss (NRW)
R25. Disturbance from another supporting infrastructure
Risk event category Risk eventsInfrastructure system
Political
R13. Uncertain political behavior
R14. Limited public participation
R15. Changes in government policy
R16. Obscurity on government legal and regulatory
Economic
R26. Interest rates instability
R27. Foreign exchange rates instability
R28. Poor infrastructure investment
R29. Inflation hazard
R30. Uncertain water price
Surabaya water supply
infrastructure system
Figure 6-6. Identified risk events for Surabaya water supply infrastructure system.
One approach is to categorize the risk based on the technical and non-technical
threats [20]. Threats arising from malicious individuals (involving inherent risks to the
operation of the value chain) are different from the threats posed by natural phenomena.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 165
Technical threats induce relate to financial and operational risks. Other technical threats are
caused by people, systems and procedures that negatively impact the infrastructure. Non-
technical threats included environmental risks, strategic risks and resource allocation risks.
While, other non-technical threats are posed by external factors such as; natural disasters,
socio-political situations, third- party actions, and policies and regulations.
Although there is no standard classification of risk events, this research categorizes
the risk into six categories which can be described as:
- 6 risk events of natural/environmental
- 9 risk events of social
- 5 risk events of political
- 10 risk events of technical and operational
- 6 risk events of financial and,
- 4 risk events of economic.
In Surabaya water supply infrastructure, natural risk refers to the non-manmade risk
affecting the system service ability. The risks in this category are usually beyond the ability
of human control. The social risk category relates mainly with the societal and ethical issue
contexts which affecting the serviceability level of the Surabaya water supply infrastructure
directly or indirectly. Further, the political risk associated with the uncertain and fluctuating
political behavior mainly triggered and affected by the uncertain policy making by the high-
level people (authority) in the infrastructure governance. This category is also related to
regulations and standard [92].
The technical and operational risks are related to the product quality, information and
technical barriers, and working quality (including both technical and non-technical issue).
Further, the economic risks are related to the global financial issue and, cost increase and
return which affect the Surabaya water supply infrastructure system. It should be noted that
this categorization does not cover all the risk groups, but rather designed to facilitate risk
identification for the practitioners and researchers. The description for each risk event,
based-on the literature review which supported by the expert point-of-view, can be seen in
Table 6-2 below.
Table 6-2. Determined risk events and the description.
Risk events Description R1. Climate change
The climate change refers to the change in regional climate patterns, in particular a change apparent from the mid to late 20th century onwards and attributed largely to the increased levels of atmospheric carbon dioxide produced by the use of fossil fuels. In Indonesia context potential regional impacts of climate change could include; increased frequency and magnitude of droughts and floods, and long-term changes in mean renewable water supplies through changes in precipitation, temperature,
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 166
humidity, wind intensity, duration of accumulated snowpack, nature and extent of vegetation, soil moisture, and runoff [246-256].
R2. Natural disasters
Natural disasters (act of god) can be describes as the non-man-made risk. The things that beyond human control which can be quantified such as; earthquake, flooding-river, flash, dam break, wind-hurricanes, waterborne disease, drought, other severe weather-cold, heat, high winds, lighting, prolonged dry and rainy season (which affecting the river water runoff from other upstream region) [106, 246, 251, 254, 257-259].
R3. Water scarcity (shortage)
Two dimensions of water scarcity; demand-driven water stress where there is a high usage compared to the availability of water and, population-driven water shortage: where there are many people dependent on the availability of water. In Surabaya city context, the water scarcity happened during the dry season which gives constraints to the water treatment processes and thus reducing the supply volume of clean water to the community [106, 246-248, 250, 254, 260].
R4. Idle land exploitation
The dynamic of modern society has been forced for urban water supply service to provide a vast and safe water supply services. The service includes expanding the water supply infrastructure within specific region and, thus allowing the risk of difficulty in controlling the land. The urban water supply infrastructure will mostly, utilize the region’s both underground and ground by which touch the environmental aspect [246, 251, 261].
R5. Pollution and contamination
As settlements quickly expanded, society grew into catchments and close to water sources, eventually polluting the supply and forcing a search for newer supplies of potable water beyond the town limits. In Surabaya city context, a pollution and contamination are a major environmental issue. In fact, pollution and contamination not just generated from industry waste but also community is self, such as; littering, treating river as communal space for washing and bathing which aggravates the condition and quality of Surabaya river [246, 251, 261].
R6. Demand uncertainty
Variations of supply and demand depends on many factors whose laws of variation are uncertain, for instance the increase in population (Supplies were in precarious balance with demand which affected by the water losses, leakage and wastage risks; The changing and increasing of domestic and non-domestic leads on consumption and demand behavior for public water). Fuzziness of water rights and unclear water accounting is linked to a tendency of over-allocating water to satisfy more water users, because of unclear pictures of supplies; Unrealistic planning with disaster requirements beyond the reach of local government [233-235, 246, 247, 250-252, 254, 262].
R7. Water misuse
Water misuse has been known for long time in some regions as a crime action. The example of water misuse in Surabaya city, such as; an illegal activity building water connection without proper license; manipulate water meter instrument; and, arbitrarily, improper and excessive use of water. Another effect and consequences of this risk is that, this risk not only affect the fire pressure (water loss) of the water and services within one network region of community, but also contribute to the deteriorating of the physical infrastructure and urban development deprivation [233, 251, 254, 263].
R8. Limited access to clean water
In Surabaya city context, access to the water may be uneven due to socio-economic inequalities. In keeping with its high levels of coverage, most areas of Surabaya are already served by the piped water system, and many households have individual connections. However, there are still some pockets of un-served areas that belong to the lowest income brackets. Many of these poor households are unable to afford the steep connection fee, which includes the cost of tertiary network expansion. In addition, some segments of the urban poor population are unable to furnish the legal documentation required by the utility for the provision of individual connections. In the absence of piped supply, these households relying on a combination of water from neighbors, purchased from vendors or small scale independent providers, and free well water. However, much of the water from these sources is expensive and contaminated [150, 243, 246, 251, 263, 264].
R9. Payment problem
Unpaid water service creates on the water market, financial and economic risk. Willingness to pay for water still low for some region (delay payment and further not paying). Some people are becoming more reluctant to pay the necessary changes. In some area, the ability to pay and the desire for good services are underestimated. In Surabaya city, the common case happened in terms of payment problem is more like; late payment made by the consumer/customer, and the water use bill problem [233, 235, 246, 251-253, 261, 265-267].
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 167
R10. Community rejection
In many countries, customer have experienced several attempted reforms in which tariffs were increased, but service did not improve. Complexities within UWS system (especially in Surabaya city case) involved with obtaining community acceptance of alternative water supply solutions. In some cases, community reluctant or event reject the solution of specific problems provided either by the regional water supply company or other government agencies [235, 261, 263, 267-272].
R11. Population growth & urbanization problem
As a metropolitan city, population growth and urbanization contribute to the uncertain of supply and demand trends in Surabaya, incriminating the water supply infrastructure system. The population growth (and the dynamic of urbanization pattern) leads on water consumption rose, both in total amount needed and in per capita demand. Further, this risk leads to the changes of society behavior on how to treat the water demand. This risk event is tightly related with uncertain water demand (and supply) trends risk event [234, 235, 237, 258, 261, 262, 265, 266, 273].
R12. Sabotage to physical infrastructure
In Indonesia, water supply infrastructure system protected by the constitution law. Physical attack or sabotage in Surabaya water supply infrastructure can be classified as criminal act. The example of sabotage to physical infrastructure of water supply in Surabaya; vandalism act towards water supply system, illegal act by adding chemical or biological agents into water treatment (including post-treatment facilities) and distribution systems, technical system destruction, unexplained cutting of utility fences and damage to storages and water contaminants on utility property. Further, a number cases such as water meter, other fittings and tools theft often occurred [106, 247, 251, 274, 275].
R13. Uncertain political behavior
This risk refers to the water supply service disturbances which occurred due to; the dynamic of both local and national political movement, obscurity happened on the cooperation agreement and tasks among various agencies, and bad decision making as well as low commitment among various agencies towards laws and regulations that applied. Further, this risk refers to the conflict which leads to the delay in the development of water supply infrastructure system, lack of requirements specification and low priority given to society interest [110, 234, 235, 246, 251-253, 260, 261, 269].
R14. Limited public participation
Since water supply infrastructure in Surabaya solely handled by the regional water supply company, the public participation in decision making are not taking place at all. Based on interview obtained from various stakeholder groups, the limited public participation caused by several factors, such as; there is a barrier between community with authorities/ high-level politician in terms of communication. The public interest is not prioritized by the authority, the public interest and authority point of view is disparate, the decision making decided by the politician (and the authority) are not clear and lack of transparency and accountability. Further, the decision making towards infrastructure development usually conducted without involving community consideration [234, 237, 246, 251, 260, 261, 265, 273, 276, 277].
R15. Changes in government policy
The water supply sector has a legal and regulation to run the appropriate work under the government policy and rules where the term of contract management stand as the basic and core value to the way of delivering safe and clean water to community. However, the existence of policy uncertainty leads to the water quality standards shifting, the obscurity towards the allocation of clean water quantity distribution, lack of authority accountability which results on the declining of public confidence towards the government policy changes (e.g., changes in customer tariffs, an administration and non-administration rules) [238, 250, 269, 278].
R16. Obscurity on government legal and regulatory
Typical risk event which are taken into consideration here refers to the mediocre governance of the existing legal and regulatory framework for the provision of water supply by the government, the incoherence of national and regional legal method of resolving disputes, such as those related to the enforceability of legal provisions. Another example for this risk, such as; the ambiguous towards the basic framework of laws, regulations and provisions which applied towards the water supply empowerment, treatment and distribution to the community. Importantly, this risk emerges because of the incoherence between methods and implementation of law and regulation by the authorities and agency bodies in terms of dispute resolution [238, 258, 263, 278].
R17. Insufficient non-technical service provision
The example of this risk event can be described as; the decreasing of non-technical service provision in terms of delivering solution towards public demand and complaints on the water supply service, the customer service division irreverent and lack of competency (unable) dealing with customer complaints, public problems and
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 168
complaints are handled very slow, long process and complicated (tricky) [106, 234, 246, 253, 261, 262, 265, 266, 268].
R18. Water quality defective
The problem with water quality can be described as; a poor quality of distributed clean water by the regional water supply company, the color of clean water is not clear (turbid), unearthly clean water taste and an odor within the water. It is also found that the water supplied to the community contained with residual disinfectant, microbial growth, sediment, substances and dirt [106, 110, 234, 252, 258, 261, 266, 275, 279].
R19. Trouble in water transmission and distribution network
This risk event refers to; the disorderly condition of elements of water distribution networks, limited transportation capacity of the system in relation to real needs (i.e., the needs which exceeding/overwhelm the planned distribution system capacity). Unless the distribution systems improve, the water may still have questionable taste, odor, color, sediment, and corrosivity [110, 254, 258, 262, 269, 273, 278, 279].
R20. Mechanical (physical) component failure
The failure of individual mechanical network components related to the water treatment processing, storage, and distribution to the community. For instances; pumps, pipes, connections and joints, meters, panels and valves, and another component accessories [106, 235, 247, 248, 251, 253, 254, 269, 273].
R21. Under rate maintenance
Under rate maintenance refers to the physical infrastructure not being maintained following the undue period. The problem of the maintenance including; the calibration and replacement of physical checking carried out under the standard regulation, maintenance does not get any priority and lack of attention (tend to be underestimated)[113, 262, 280].
R22. Physical infrastructure decay
This risk refers to an old and vulnerable physical infrastructure due to the aging factor (deterioration). In fact, Surabaya water supply physical infrastructure mainly has been built in the Dutch colonial era (some of the physical system approaching 100 years old). Surabaya water supply physical system (pumps, pipes, connections and joints, meters, panels and valves) have exceeded the anticipated “useful life-time” (the permitted limit time) [106, 246, 252, 253].
R23. Lack of technical service provision
The customer service and technical service department of authority or government agency takes very long to respond to customer’s problems and complaints. The origin and example of this risk event can be explained as; the technical service department of authority lack of technicians in the field, the technician lack the ability to understand the problem on site and thus cannot take the proper action, lack of investing on the modern technology to perform technical service and maintenance tasks, and technicians still prefer to do the task using traditional methods and technology rather than modern technology. Further, the authorities lack of finding solutions in terms of accessing the inaccessible areas for developing the water supply infrastructure system.
R24. Water loss (NRW)
Water loss or Non-Revenue Water (NRW) is one of the major issues in water supply management studies. The NRW problem cannot be easily assessed, however the NRW occurs because of several things, such as; a leakage within distribution pipe (premiere, secondary and tertiary), leakage within piping connection or joint system, water theft by the customer or non-customer.
R25. Disturbance from another supporting infrastructure
In terms of treating, processing and delivering water to the community, respective authority relies or depend on another ‘supporting’ infrastructure (e.g., transportation, banking and finance, gas and oil, information and technology and electric power). A single disturbance on supporting infrastructure to water supply infrastructure system resulting in service interruption. For instances; without gas and transportation infrastructure PDAM cannot transmit the water by using water tankers to several water-problem (or non-piped water) areas in Surabaya, a disruption on electricity infrastructure system PDAM hampered the processes (mainly rely on the electricity and information technology) of treating and distributing clean water to community [30, 94, 281].
R26. Interest rates instability
Interest is the cost of borrowing money. It is a function of the unrepaid principal and is expressed as a percentage per year. Interest rates instability affecting many aspects. For instance; based on regional water supply company (Perusahaan Daerah Air Minum-PDAM Surya Sembada) experts acknowledges the process of treating water is affected by the interest rate instability. The wide range of chemical materials required to treat the raw water into clean water which cannot be easily obtained has a sensitive price following the interest rate value. Thus, the price of various chemical materials is affected by the changes of interest rate. Unpredictable variation in interest rates results in an unstable and susceptible economy [234, 235, 238, 246, 253, 258, 267, 282, 283].
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 169
R27. Foreign exchange rates instability
Exchange rate risk comes from unpredictable variation in the exchange rate. Currency risk affects the value of the business through several mechanisms, which are; operational costs, maintenance and construction costs, and finance costs. Unpredictable variation in exchange rates results in an unstable and susceptible economy. One impact of this risk in Surabaya water supply infrastructure system is the increment of water supply fare which charged to the community [235, 238, 246, 253, 258, 267, 282, 283].
R28. Poor infrastructure investment
The shortage of investment towards Indonesian infrastructure system development in the case of urban water supply system has been acknowledged by a number of studies. This means that infrastructure system upgrades get deferred and the backlog of investment needs grows. The cause of poor infrastructure investment in Indonesia can be explained as follows, but not limited to; lack of adaptive and long-term planning towards constructing and developing the Surabaya water supply infrastructure system by the authorities, lack of coordination and complexity between various public institutions in terms of developing infrastructure system, distrust of both domestic and foreign investors toward making decision to invest in Indonesia infrastructure development program [233, 261, 265, 268, 269, 278, 279].
R29. Inflation hazard
Almost all of the water supply sectors in Indonesia have been funded under massive loan agreement. The inflation hazard gives entirety impact not just to economy and financial aspect but also to the service provided by the regional water supply company (Perusahaan Daerah Air Minum-PDAM Surya Sembada) delivering reliable, continuous, reasonable and affordable price, and high quality clean water to the customers. Further, the inflation hazard affects whole of the stakeholders in the form of different impact levels. The inflation hazard related to Indonesian urban water supply infrastructure system can be seen in [238, 269, 278].
R30. The failure of price stabilization
In Indonesia context, the regional water supply enterprises are owned by the local government (Badan Usaha Milik Daerah-BUMD Surabaya). This means, that every single region (mainly city/district) has their own regional water supply company which have the authority to form the policies and rules (including the water price adjustment) in terms of providing water supply service and management. Even though the water price in Surabaya city is relatively stable, nonetheless, this hazard issue is considered as big issue that should get an attention from various scholars [233, 235, 246, 250, 252, 253, 265, 270, 278, 284].
6.5 Data Collection Process and Respondent Profile
The collection and analysis of information is fundamental in defining needs and risks, and in
designing and measuring appropriate resilience building operations. In this research, the
data collection relies on large numbers of design-based questionnaires and non-structured
interviews, used to gather; contextual data about participants, a situation and the
experiences of participants towards Surabaya water supply risks and its impacts. The
questionnaires designed (attached in the Appendix B) can collect simple data, by asking
participants to check boxes, such as; to provide demographic data, as well as data of greater
complexity, by asking participants to code their responses to questions using Likert.
Importantly this allows the researcher to transform and process the computerized
data, which can then be subjected to numerical measures to provide insight into the
relationships among the variables, and data analysis. On the other hand, for the qualitative
approach, the data collection relying on instruments such as observation of participants,
interviews, focus groups of language-based approaches. To increase the validity of the results,
Yin, noted that this type of research should rely on multiple sources of evidence [146].
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 170
The research relied on three main sources to support the analysis result, that is:
archives, questionnaires and interviews. Specifically, regarding the interviews, this research
conducted a ‘face-to-face’ and non-structured interviews constitute the main data source.
Prior to the data collection, ethics approval was sought from the Faculty of Architecture,
Building and Planning Human Ethics Advisory group at The University of Melbourne,
Australia (Ethics ID 1443598.1., see Appendix A). All participants were given a PLS at the
start of the data collection using the design-based questionnaire. The PLS include an
invitation, research summary, what participants would be asked to do and for how long. It
also addressed confidential issues.
To obtain the perception of risk from the participants, a design-based questionnaire
needed to be developed in such way both experts and lay-people can understand and give
their perceptions and opinions. There’s no limitation towards how many participants within
data collection processes needed. However, as this study intends to obtain specific UI
stakeholder perception objectively towards identified risk events, it was important to obtain
many participants perceptions from different stakeholder groups determined. Following the
research ethics methodology of the University of Melbourne, around 250 sets questionnaire
were sent and distributed to various respondent candidates.
Because of some difficulties and barriers that author faced towards gathering the data
from various stakeholders, the whole data collection processes took about four and a half
months in Surabaya, Indonesia. Around 150 respondents from various stakeholder groups
expressed their willingness and agreed to fill up the 10 pages design-based questionnaire
provided. However, only about 126 questionnaires were successfully collected (see Figure 6-
16).
7 Resp.
Total=126 respondents
G1. Brantas river basin management agency
G2. State government of public works
P1. Jasa Tirta-1 public corporation
G3. Surabaya city government
P2. Regional water supply enterprise
M1. Industry
M2. Commercial and, or public space
M3. Domestic end user
13 Resp.
5 Resp.
8 Resp.
10 Resp.
24 Resp.
27 Resp.
32 Resp.
Figure 6-16. Total respondents from eight stakeholder groups.
The data collection intends to assemble the stakeholder perceptions regarding the
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 171
UWS infrastructure risk magnitude, dynamic impact and propagation mechanism. The
questionnaire was disseminated face-to-face meeting. The 126 respondents number is
considered sufficient for this research as the input data used in the conceptual framework.
The reason is that the RA and REA models within conceptual framework develops in this
research is applying various analysis methods. Specifically, the SNA method typically do not
have an unambiguous notion of sample size [285].
In this research the sample size was considered sufficient to represent Surabaya’s
stakeholder participation from various sectors and levels in the Surabaya water supply
infrastructure. This consideration, moreover, also supported by several number of former
studies applied the network analysis in which the sample size applied range between 14-389
respondents [86, 92, 184-186, 189, 208, 209, 286]. The 126 respondent demographical data
and details are explored in Table 6-3 to 6-6.
Table 6-3. Respondents number.
Stakeholder groups Sum Percentage (%) Brantas river basin management agency (G1) 7 5.6 State government of public works (G2) 13 10.32 Jasa Tirta-I public corporation (P1) 5 3.96 Surabaya city government (G3). 8 6.35 Regional water supply enterprise (P2) 10 7.9 Industry (M1) 24 19.05 Commercial and, or public space (M2) 27 21.43 Domestic end user (M3) 32 34.13
Total 126 100
Table 6-4. Respondents demographic data based on the age group.
Age group Sum Percentage (%) 23-30 Years old 52 41.26 31-38 Years old 27 21.42 39-46 Years old 21 16.67 47-53 Years old 22 17.46 54-60 Years old 4 3.17 > 61 Years old 0 0
Total 126 100
Table 6-5. Respondents demographic data based on the education level.
Education level Sum Percentage (%) Undergraduate 82 77.35 Master/Graduate 28 22.22 Doctorate 1 3.84 Other 15 11.71 N/A 0 0
Total 126 100
As mentioned in research design section (Chapter 4), this research applied the cluster
sampling but conducted in a non-probabilistic sample method. The proportion of eight
groups of stakeholders as a participant in this research can be seen in Table 6-2. Since the
author faced a number of challenges and difficulties towards inviting and reaching
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 172
government people and experts as well as lay people to participate into this research, the
percentage of stakeholder groups number was not same. To deal with this issue, the author
also applied the snowball sample techniques to open new horizon and reach latent
participant, especially government people, which in the preliminary period of data collection
was not known.
Table 6-6 Respondents demographic data based on working experience.
Working experience Sum Percentage (%) < 5 Years 34 26.98 5-10 Years 38 30.15 11-15 Years 19 15.08 15-20 Years 35 27.78
Total 126 100
The participants are the person who are in the range of 23-30 years old with
undergraduate level of education background compiled by their 5-10 years working
experience. The detail of their demographic data including their working background,
institution name, position and participant ID number can be seen in Appendix B in the last
section of this dissertation. The data processing, simulation and analysis are discussed in the
next Chapter.
6.6 Chapter Summary
This Chapter outlined detail of the case study and data collection procedure and respondent
demographics. The Surabaya water supply infrastructure system which has been chosen as
the main case study for this research. This case study appointed towards testing and
validating the conceptual framework proposes. Eight stakeholder groups and thirty risk
events in the Surabaya water supply infrastructure system are identified and discussed in-
depth. Following the university ethics and fieldwork permitting processes, around 250 sets
questionnaire were disseminated by face-to-face approach.
Out of 250 targeted participants, 126 participants agreed to participate into this
research by filling the questionnaire. Data were obtained through design-based
questionnaire and aided by face-to-face semi-structured interviews administrated in
Indonesia with expert in Surabaya water supply infrastructure and relevant stakeholders.
Furthermore, following the research strategy, face-to-face semi-structured interviews with
the aid of structured questionnaires also conducted by the author.
The data collection activities, instruments, respondents’ profile and research
objectives outcomes were also detailed. Purposeful and convenience sampling was selected
as the appropriate sampling strategy for the data collection phase. Moreover, respondents
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 173
were selected based on their job position, work experience and background knowledge in
the case of experts, or stakeholder category, age and level of education in the case of
stakeholders.
Although the sample size was small, but this does not invalidate the data processing
and analysis; it is adequate for this type of research. This is because the study uses the Fuzzy-
based FMECA and SNA, which are not traditional quantitative data analysis methods and the
statistical sampling is not the issue in all circumstances. Furthermore, this Chapter
presented the profiles of the respondents for the case study. Regarding the aggregation of
the stakeholder groups preferences, the analysis models which explored in Chapter 4 and 5
were deemed most suited for this research, as each participating individual can provide his
or her own perspective towards Surabaya water supply infrastructure system risks.
CHAPTER 6-FRAMEWORK VALIDATION: APPLICATION TO A CASE STUDY
Page 174
-This page intentionally left blank-
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 175
CHAPTER 7
DATA PROCESSING, SIMULATION AND ANALYSIS
CHAPTER HEADINGS Introduction Initial Data Processing Phase 1-Data Processing, Simulation, and Analysis Phase 2-Data Processing, Simulation, and Analysis Phase 3-Data Processing, Simulation, and Analysis Phase 4-Data Processing, Simulation, and Analysis Phase 5-Data Processing, Simulation, and Analysis Phase 6-Data Processing, Simulation, and Analysis Chapter Summary
7.1 Introduction
This Chapter consists of analysis model simulations and output discussions, including; risk
magnitude analysis, risk causality and interaction pattern analysis, risk impact to community
analysis, critical RA, system robustness analysis, and the system recovery analysis using
scenario-based metric data. After collecting the data, this research is ready to analyze the
results to determine the direction of the study. Following the data collection in the field and
the literature review conducted, the research resulted in a large amount of information,
which cannot be presented easily in its entirety.
The research summarizes the data which highlights the main trends and differences
in the most appropriate manner. Initially, this Chapter presents the initial data processing
which is then used as an input data towards the proposed analysis models. The step-by-step
method of processing the input data obtained from the fieldwork is discussed first in this
Chapter. The output of computation and simulation are discussed separately for different
phases of analysis.
Based on the output analysis discussions, findings and computations are discussed in
the last part of this Chapter. This Chapter will cover the following:
- Initial data processing and the variables
- Global risk magnitude analysis using Fuzzy-based FMECA method
- Significant risk event in terms of the impact on the community
- Significant risk event in terms of its’ causality capacity affecting other risk events
- The critical risk events based on its criticality variable
- Exploratory data analysis (archives and non-structured interview)
- The shock and stress effect analysis of risk events
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 176
- The robustness level of UI system facing various risk events
- The UI system recovery analysis in terms of enhanced robustness level by applying
the scenario-based simulation
7.2 Initial Data Processing
After both stakeholder and risk events have been identified and determined (discussed in
previous Chapter), the next step is to process and simulate the input data. The data
processing and simulation follows the analysis models discussed previously in Chapter 5 and
5. Prior to conducting the data processing and simulation for whole phases, several variables
and mathematical symbols adopted can be seen in the Table 7-1 below.
Table 7-1. Variables and mathematical symbols adopted.
Risk impact mechanism Measurement (indicator) Math. symbol
Risk magnitude
Occurrences (O) O
Severity (S) S
Detectability (D) D
Risk Priority Number ( ),n i jx x
Risk Priority Value ( )nn R
Risk causality and interaction
pattern R-R
Top( )nR
Risk interaction nmR
Degree Centrality (DC) [R-R ]
DC( )
nR
Betweenness Centrality (BC) [R-R ]
BC( )
nR
Closeness Centrality (CC) [R-R ]
CC( )
nR
Eigenvector Centrality (EC) [R-R ]
EC( )
nR
Status Centrality (SC) [ R-R ]
SC( )
nR
Risk impact to communityS-R
Top( )nR
Stakeholder-associated risk * #
g
i nS R S R
Degree (DEG) -
Degree Centrality (DC) [S-R ]
DC( )
nR
Betweenness Centrality (BC) [S-R ]
BC( )
nR
Closeness Centrality (CC) [S-R ]
CC( )
nR
Eigenvector Centrality (EC) [S-R ]
EC( )
nR
Critical risk ( )R-R S-R
Top( ) Top( )( ), ,
n nn R R
f R ( )n
R
Stress impact - ( )
nR
Normalized stress impact value ( )n
R
Shock impact - ( )n
R
Robustness level ( )( ), ( ), ( )n n n
f R R R ROB.( )
nF R
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 177
7.3 Phase 1-Data Processing, Simulation and Analysis
After finishing the data processing, the analysis of risk magnitude can be conducted
following the model analysis flowchart in Figure 5-2. Applying the Fuzzy-based FMECA, the
global analysis of risk magnitude output is presented in Table 7-2 below. Global analysis
refers to the risk magnitude analysis, where the input data comes from all parties involved
within the data collection (unified input data). Local analysis refers to the output of risk
magnitude analysis which is generated based on different stakeholder groups.
Following the research objectives and questions, this research only discusses the
global analysis result. Local analysis output and discussion are considered insignificant for
this research. Following Table 7-2, ten significant risk events are explored and discussed. The
ten most significant risk events in the terms of their magnitude is R5 followed by R22, R1,
R24, R19, R11, R18, R20, R4, R21. These significant events are explained below.
Table 7-2. The risk magnitude output based on local and global analysis.
Risk ID
Risk magnitude Risk ID
Risk magnitude
Global score (RPN) Risk rank Global score (RPN) Risk rank
R1 1.720 3 R16 1.911 21 R2 1.830 14 R17 1.901 19 R3 1.920 23 R18 1.767 7 R4 1.785 9 R19 1.754 5 R5 1.598 1 R20 1.778 8 R6 1.916 22 R21 1.804 10 R7 1.807 11 R22 1.708 2 R8 1.950 27 R23 1.821 12 R9 1.930 25 R24 1.743 4
R10 2.058 29 R25 1.845 16 R11 1.765 6 R26 1.865 17 R12 2.087 30 R27 1.943 26 R13 1.925 24 R28 1.827 13 R14 1.904 20 R29 1.869 18 R15 1.843 15 R30 1.950 28
Note: The definition for identified risks (R1 to R30) refers to the section 6.4.
- Pollution and contamination (R5); The existence of a river crucially supports community
activities. Thus, washing, toilet necessities and even more as a source of drinking water.
Pollution and contamination is a major problem in Surabaya city. River pollution also
spoils the scenery of Surabaya city. The source of river pollution can be from both
industrial discharge and domestic waste. To mitigate this risk, it is important to
understand various sources of river pollution comprehensively. Surabaya river pollution
is marked by the absence of fish in Surabaya river.
- Physical infrastructure decay (R22); In fact, Surabaya city water supply’s physical
infrastructure system was mainly built a long time ago, with some reaching 100 years
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 178
old. This risk also leads to increased leakage level, water main breaks, and service
disruptions.
- Climate change (R1); The water sector is one of the most important sectors to be
influenced by climate change impacts. The projected climate change will likely impose
water shortage in several regions in Indonesia. Based on climate projections, most
regions in Indonesia will suffer from a gradual decrease of water supply due to
temperature increase and rainfall changes that will affect the water balance. This finding
is also supported by the national level of climate risk study [148, 287]. It is found that
areas which possess high risk of water shortage stretch in some parts of the Java-Bali
region, especially in a few locations in the northern and southern part of West Java,
middle and southern of Central Java and East Java.
- Water loss-NRW (R24); This analysis output is supported by expert opinions, mainly
from the PDAM stakeholder group. PDAM Surya Sembada has been seeking to suppress
the rate of water loss due to theft, through a meter replacement program for home
connections. To mitigate this risk, the PDAM has targeted community water meters for
replacement. However, another problem emerges as PDAM has failed to achieve its water
meter replacement target. This was due to several reasons, including the situation where
the customers’ water meters were buried under ceramic tiles or inside houses that had
been renovated (community rejection-R10). Based on the interview, this risk could affect
PDAM financial losses by around IDR. 2 billion (approx. AU$ 200.000-using current
currency).
- Trouble in water transmission and distribution network (R19); In the Surabaya water
supply infrastructure system, the problems normally faced in water
supply transmission and distribution system are; (i) Un-accounted for water (Leakage
and Wastage of water), (ii) Degradation of quality of water, (iii) Reduction in carrying
capacity, and (iv) Inadequate pressures at tail ends of the system. Moreover, R19 also
refers to the leakage which is common in the Surabaya water supply infrastructure
system. The causes for the leakage in the pipeline could be attributed to various factors,
such as; (i) The use of sub-standard pipes and fittings leading to imperfect jointing,
causing leakage in joints, (ii) Selection of pipe material without considering the
corrosives of the soil in which the pipes are to be laid and the quality of water the pipe
has to carry, which eventually may lead to corrosion of the pipes and fittings, (iii) Lack
of quality control in jointing of pipes during installation, which may result in leaks in
joints when there is settlement of the supporting soil, (iv) Non-conducting or improper
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 179
conducting of hydraulic pressure testing of pipeline and joints at the time of installation,
(v) Soil movement particularly when the pipes are laid in swelling soils like clay, due to
change of moisture content, which may cause disturbance to the pipes and joints
ultimately resulting in leakage, (vi) Water hammer pressure disturbing the joints,
resulting in leakage, (vii) Not detecting and rectifying the badly leaking joints regularly.
- Population growth and urbanization problem (R11); The increased demands for water
in Surabaya as a consequence of the population growth and economic development have
been accelerated from year to year. Combined with estimated population growth rates,
increased water demand will cause severe water shortages to occur, especially in Java
and Sumatra for the period of 2020-2030. The spatial and temporal variability of human
induced hydrological changes in a river basin could affect quality and quantity of water.
The challenge is that the water supply infrastructure system should cope with complex
issues of water in order to maximize the resultant economic and social welfare in an
equitable manner, without compromising the sustainability of vital ecosystems.
Population growth and an expanding manufacturing sector will increase demand for
water.
- Water quality defective (R18); The R18 refers to the decreasing of water quality being
distributed to community. This issue has been gaining high attention to experts,
industries and lay people. The water quality defect emerges due to various causes such
as, highly polluted raw water (Surabaya river), water supply transmission and
distribution problem and criminal acts (destruction and desecration of the pipeline).
- Mechanical component failure (R20); This risk usually occurrs due to infrastructure
aging and exceeding the load capacity due to uncertain conditions; leaks occur from
valves and distribution pipes. Further, mechanical component failure caused by the
intrusion of tree roots into the distribution pipeline is often a major cause of distribution
leakage.
- Idle land exploitation (R4); Following the study conducted by Nurhidayah, L., there is a
trend that development in big cities in Indonesia has neglected the principle of an
environmentally sustainable city [148]. The problems faced by big cities in Indonesia are:
air and water pollution, land degradation and lack of green space areas. This condition
is indeed not only jeopardizing the present but also the future generations. Surabaya, the
second largest city after Jakarta, has not implemented environmentally sustainable city
principles due to several reasons. These include: the local government favouring
economic benefit over environment protection, weakness of enforcement mechanisms
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 180
and. institutional deficiencies.
- Insufficient maintenance (R21); The insufficient maintenance disturbs the process of
delivering safe water to the community, and also shortens the life time service of the
physical component of urban water supply infrastructure. This risk causes a physical
loss where the water is actually lost through leakage and wastage. Leakage refers to the
water lost from storage reservoirs, transmission mains, service reservoirs, and
distribution system and house service connections through leaks from cracks, holes or
joints of pipe lines and due to corroded pipes and fittings in house service connections.
On the other hand, there are also another five risk events categorized as least
significant, such as; ‘limited access to clean water’ (R8), ’sabotage to physical infrastructure’
(R12),’ community rejection’ (R10), ‘foreign exchanges rates instability’ (R27), and ‘prize
stabilization failure’ (R30). Although R30 is considered as the least significant risk event,
with a lower magnitude level, the discussion towards R30 still needs to be considered.
Following expert narratives, the inefficiency of the water price setting could disrupt water
demand regulation.
In the Surabaya water supply infrastructure system, water use is heavily subsidized,
and prices are set without proper consideration of scarcity at an inefficiently low level.
Therefore, inefficient price level causes fluctuations in the balance between supply and
demand. This issue is further exacerbated by the overuse of water resources. Thus, failure to
find a balance between tariffs and service standards that consumers consider reasonable
contributed to the arrangement’s failure. Moreover, there is a lack of clarity regarding the
regulation and fixing of water tariffs which disrupt the supply of the water system.
7.4 Phase 2-Data Processing, Simulation and Analysis
A matrix of risk interconnections developed by following equation 5-11 to 5-14. Since both
local and global S.R matrix are complex and time consuming, this research exempts the
preliminary data processing explanation. The GRM,
.,,
n mnm
R RR R
and dichotomized GRM
.nm
R R can be seen in Figure B-1 and B-2 respectively (Appendix B). The dichotomized GRM
.nm
R R , which is a 30 x 30 size adjacent matrix, shows the weighted network value of risks
interaction using scale of 0 (no impact) to 5 (primary cause).
Cutter (2016), mentioned the importance of specificity when characterizing risks
[57]. In this instance, weights reflect the impact of the specific incidents on the outcome as
they affect another risk event. The final matrix of risk interconnections shows a weighted
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 181
number between risk events ( )nR , defined whenever the occurrence of one event (an event
as an ‘incident’) shapes another event (an event as an ‘outcome’ of another event).
Table B-2 (see Appendix B) makes it clear that many risk events serve dual temporal
roles in the context of the Surabaya water supply infrastructure system. Reading each row
can help identify risk events that cause (or influence) other risk events, or what is often
referred to as risk drivers; those caused by humans (which can be an example of negative
coping). While, reading vertically by column, shows the multiple ‘pathways’ that create a risk
event. Along with showing connection between risk events, Table B-2 makes it possible to
see how each risk event contributes to other risk events. Therefore, this helps to reveal the
breadth of impact a particular risk event.
Furthermore, reviewing these pathways helps understand some of the ways for
addressing various risks. Water shortage (R3), for example, can be addressed by improving
water transmission and distribution network, lifting and building the physical structures,
improving network system maintenance and technology applied. Such a dispersed number
of pathways can make water supply risk reduction challenging. The reason behind this is that
problems might be deeply embedded within the economic, technical and operational matter,
requiring a range of interventions and coordination across institutional structures.
On the other hand, there are numerous incidents that have only a small effect on other
risk events. These have been marked with a zero. Some have a more substantial outcome and
have been marked with a two (or one). A few are a primary cause and are marked with a five
(some marked with four). In regard to the levels of impact, the resulting weighted matrix
offers a more granular view of how events affect each other. The row totals have been tallied
from the matrix to show more clearly the vectors of how specific incidents contribute to
other incidents. The column total shows the pathways to address a problem.
From this matrix, it becomes clear that R5, R18, R3, R2 and R19, with row total of 83,
76, 68, 65 and 57 respectively, are some of the main contributing risk events to Surabaya
water supply infrastructure system problems. Efforts to address Surabaya water supply
infrastructure system problems should perhaps focus on these issues. Moreover, the
pathways section shows many of these events to be highly interlinked, meaning that they
require a broad number of interventions to address.
This provides clear demonstration of the importance of a multi-sectoral approach to
risk reduction, either through integrated programming within one institution (or
organization), or through a network of stakeholder specialized in different areas. Stepping
back and establishing the broader context of the risk shows that risks are not simply the
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 182
products. Accordingly, weighting lends greater precision to which interventions might
requires coordination within another risk events.
For instances; R2, R3, R5 and R18, have high pathways so are more likely to be
affected by other interventions. While risk events with fewer pathways are more ‘closed off’
so might need direct intervention within a specific mitigation program. Further, the matrix
shows how specific events directly connect with each other, but indirect connections are less
intuitive. For example, the matrix shows how R5 directly contributes to R18, but the reader
must (periodically) trace how R5 contributes to R18 since an increase in river pollution is an
outcome of both R18 and R19. Importantly, network visualization adds clarity to this matrix.
Visualizing the matrix as a network can be used to quickly understand processes of
interaction and see how each node fits in within a broader system. Networked visualization
also helps to understand the types of interventions necessary for risk reduction. To simulate
and obtain the network visualization, the adjacency matrix aforementioned is then used as
the basic matrix to run the risk interaction network simulation. To run the simulation and
computation, this research employs the Excel Spreadsheet and commercial software named
NetMiner 4.0. [288].
Once the adjacency matrix is converted into a useable format it can be uploaded to
develop a network map. Network visualization and topology decipherment offer important
clues that provide greater detail on what those coordination structures should look like.
Table 7-3 shows the risk network topology measurement output, and Figure 7-1 to 7-10
shows the risk interaction network as well as their concentric maps.
Risk network topology and visualization shows that there are a number of risk events
with considerable capacity and influence which contributes to several problems, such as; R1,
R2, R3, R5, R8, R15, R17, R18, R19, R20, R21, and R30. These risk events indicate a need for
coordinated or integrated interventions. The clues aforementioned would be much less
visible without the tools of network visualization. These maps together help assess UWS
problems in Surabaya as a network, visually showing how various risk events are
contextually embedded as a part of other interrelated challenges.
Coordination and governance by various actors (stakeholder groups) is thus a critical
component of addressing these risks which have high connection capacity. Moreover,
spatializing these risks as a network also provides a way of capturing the idea that risks, their
impact, and interrelationship are not unidirectional and linear, but rather highly
interconnected, with importance arising from degree of connection with other risks.
Assessing UWS infrastructure risk from an interconnected perspective reveals that
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 183
R5 is a central and main consideration to tackle as part of addressing other risks. For instance;
R5 exacerbates and is exacerbated by many other risks, from R1, R2, R3, and R17 to R18. The
R5 is therefore, not an issue to solve on its own but rather one that needs to be addressed
holistically through a variety of interventions falling under a diverse range of sectors and
scales. This finding that might not be captured with more linear representations of
conventional RA.
Table 7-3. R-R network topology decipherment simulation output
Risk ID
DEG DC CC BC EC
SC In Out In Out In Out In Out
R1 22 24 0.759 0.828 0.795 0.853 0.022 0.239 1.182 1.232 R2 23 27 0.793 0.931 0.819 0.935 0.045 0.246 1.224 1.319 R3 24 27 0.828 0.931 0.845 0.935 0.055 0.246 1.260 1.319 R4 6 3 0.207 0.103 0.541 0.527 0.000 0.077 0.373 0.190 R5 28 29 0.966 1.000 0.966 1.000 0.168 0.249 1.391 1.375 R6 9 6 0.310 0.207 0.575 0.558 0.000 0.113 0.546 0.373 R7 15 12 0.517 0.414 0.659 0.630 0.000 0.178 0.864 0.717 R8 20 22 0.690 0.759 0.751 0.806 0.010 0.230 1.102 1.165 R9 14 12 0.483 0.414 0.644 0.630 0.000 0.169 0.814 0.717
R10 4 1 0.138 0.034 0.520 0.509 0.000 0.052 0.253 0.064 R11 12 10 0.414 0.345 0.614 0.604 0.000 0.147 0.710 0.606 R12 14 12 0.483 0.414 0.644 0.630 0.000 0.169 0.814 0.717 R13 2 2 0.069 0.069 0.501 0.518 0.000 0.026 0.130 0.128 R14 4 2 0.138 0.069 0.520 0.518 0.000 0.052 0.253 0.128 R15 20 23 0.690 0.793 0.751 0.829 0.012 0.235 1.102 1.201 R16 13 12 0.448 0.414 0.629 0.630 0.000 0.159 0.765 0.717 R17 19 20 0.655 0.690 0.731 0.763 0.005 0.219 1.056 1.095 R18 27 29 0.931 1.000 0.932 1.000 0.133 0.249 1.357 1.375 R19 23 24 0.793 0.828 0.819 0.853 0.027 0.239 1.224 1.232 R20 20 23 0.690 0.793 0.751 0.829 0.012 0.235 1.102 1.201 R21 20 20 0.690 0.690 0.751 0.763 0.006 0.219 1.102 1.095 R22 14 15 0.483 0.517 0.644 0.674 0.000 0.178 0.814 0.874 R23 14 18 0.483 0.621 0.644 0.725 0.000 0.204 0.814 1.008 R24 18 19 0.621 0.655 0.711 0.744 0.003 0.211 1.008 1.053 R25 8 6 0.276 0.207 0.563 0.558 0.000 0.101 0.489 0.373 R26 4 2 0.138 0.069 0.520 0.518 0.000 0.052 0.253 0.128 R27 2 0 0.069 0.000 0.518 0.000 0.000 0.026 0.130 0.000 R28 9 5 0.310 0.172 0.575 0.547 0.000 0.113 0.546 0.313 R29 14 11 0.483 0.379 0.644 0.617 0.000 0.169 0.814 0.662 R30 14 20 0.483 0.690 0.644 0.763 0.001 0.219 0.814 1.095
Note: The DEG refers to how many stakeholder (out of 126) associated and affected by respective risk events. The bold and underline character refers to the top five highest rank and lowest rank respectively.
Furthermore, the risk maps created by this case are the result of a unique
combination of interdependent processes. Because of their interdependence, changes in that
combination-the removal of a node, strengthening or weakening of an edge-can reverberate
across these maps. In this case, for instance R5 and R18 were highly connected through a
direct and diverse combination of other nodes. In other contexts, this might not be the case.
This indicates the need for an empirical review of each risk situation rather than making
generic statements on the way events affect risk.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 184
A variety of processes led to R5 for the Surabaya city, however, most of those causal
factors were the product of the slum residents and illegal waste activities by various
industries. Further, it also the product of an external agent within the city (e.g., the city
government, regional water supply enterprises and river basin bureau) or in the case of
climate change, across the world. This makes the root causes of UI risk creation an issue of
good governance, indicating the need to approach infrastructure resilience from an overtly
political manner focused on developing equitable governance structures supportive of all
urban elements.
However, a variety of pathways also provides several opportunities for addressing a
problem, meaning leaving fewer chances for a problem to become insurmountably stuck. For
problems with few interconnections targeted, specific interventions (e.g., R10, R13, R14, R27)
might actually be ‘quick fix’ that could solve problems in their entirety. Nonetheless, less
targeted generic interventions may not be effective for addressing problems, and roadblocks
may arise that could create intractable choke points.
The degree of centrality (DC) is a measure of influence of nodes on a network. Nodes
with high measures of centrality are well connected to other nodes in a map (Figure 7-1 and
7-2). A high level of DC indicates an event that plays a major role in a problem based on its
combined function as an incident and outcome. Such an event could be a root cause for the
risk in question. The DC consists of another two centralities, that is; in-degree centrality (In-
DC) and out-degree centrality (Out-DC). Out-DC is showing how risk events act as vectors
contributing to other outcomes. While, In-DC provides a visualization of which events are
affected by other events.
In terms of risk significant, this study only focuses on the Out-DC. The R3 and R18,
has a high Out-DC as indicated by its large size with R5 being the largest node overall
compared to the other nodes in the risk network map. This makes R5 a central problem to
the Surabaya water supply, meaning that addressing R5 could be a means of addressing a
main problem in Surabaya water supply infrastructure system, and vice versa. Since R5 has
the greatest impact on other events, it should be addressed to alleviate the risk system
creating water supply disturbance.
Unlike the Out-DC, the R3 and R18 as well as the R19 are also prominently impacted
by R5 and its related factors. Mitigating river pollution (in this case study is a multi-
dimensional problem) and its other causes will help address these events. This type of layout
is useful for assessing causality between components shaping UI risks. The R3 and R18
nodes are located near each other, indicating a close relationship. Indeed, respondents
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 185
described R3 as directly related to R18 on the water supplied in a specific range of period to
community-since people considered poor water quality cannot be used nor meet community
needs-as it meant supplied water and other matter which related to the UWS system
faltering and could not work properly.
Figure 7-1. Risk causality and interaction pattern network topology based on DC.
Figure 7-2. Risk causality and interaction concentric map based on DC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 186
Figure 7-3. Risk causality and interaction pattern network topology based on BC.
The betweenness centrality (BC) defines the risk event which has the role as a
gatekeeper for controlling impact flows through the risk network. The network graph and
concentric map based on BC can be seen in Figure 7-3 and 7-4 respectively. In BC context,
interestingly, R5 stands solely as the risk with highest BC score by showing the biggest node
size compare to other risk events. This finding provides an explicit guidance towards
building mitigation plan and strategy, such as; concretely building an intervention plan to
interfere R5. This would decrease the impact and influence capacity of other risks within risk
network.
Further, major risks (e.g., R2, R3, R4, R10, R13, R15, and R23) have a very small role
in the BC context (low characteristic towards bridging another risks impact flow). Surabaya
water supply infrastructure system risks are mainly independent and isolated which the
impact effect is emerged by its own capacity where without R5, their influence on other risks
is very small and builds a connection among other risk events.
The closeness centrality (CC), is a network measure of the risk capacity for
disseminating its impact (influence) to whole risks. Risk events with high CC potentially
reach and affect the central risk network very quickly. Differing from both DC and BC, in CC
there are several risk events which have a bigger node size compared to other risks. Based
on the CC network measure, theoretically, risk events that are tightly connected have a heavy
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 187
influence on each other, so should be addressed concurrently, perhaps within the integrated
interventions. The network graph based on CC can be seen in Figure 7-5 and 7-6.
Figure 7-4. Risk causality and interaction concentric map based on BC.
Figure 7-5. Risk causality and interaction pattern network topology based on CC.
In this case, stakeholder groups especially the authority bodies might consider two
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 188
types of interventions, for instances; a specific intervention directed at emphasizing the city
regulation towards the environment law specifically to river protection legislation and the
waste disposal policy, and an integrated program that focuses on providing campaign and
educational assistance for the community.
Figure 7-6. Risk causality and interaction concentric map based on CC.
Figure 7-7. Risk causality and interaction pattern network topology based on EC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 189
Similar understanding to the DC, the eigenvector centrality (EC) is a measure of the
influence of a risk on a network. It assigns relative scores to all risks in the network based
on the concept that connections to high-scoring risks contribute more to the score of the risk
in question than equal connections to low-scoring risks. Because it relates risks to their
overarching position, EC can be considered a more ‘embedded’ view of influence than DC.
The risk network topology and concentric map based on EC is depicted in Figure 7-7 and 7-
8 respectively.
Following Figure 7-1 and 7-2 similar DC, R5 and R18 are the contributing factors
underlying the water supply problem in Surabaya. However, unlike DC, which emphasizes a
strong relationship between R5 and R18, R1, R2, R15, R19, and R20 are very prominent in
EC. The EC is a deeper representation of underlying root causes compared to DC, and thus
reveals problems systemically imbedded within the Surabaya water supply problem. These
are difficult yet critical to address.
Figure 7-8. Risk causality and interaction concentric map based on EC.
The status centrality (SC) defines the relative influence of a risk event by measuring
the number of the immediate neighbours and also all other risks in the network that connect
to the risk event under consideration through their immediate neighbours. Regarding the
influence of a risk, here Out-SC is used as the outcome measure. The higher the Out-SC values
the greater the impact of the respective risk event. According to Figure 7-9 and 7-10, R5 has
the highest Out-SC compare to other risk events. Particularly, R5 has a tight relationship to
almost of the risk events except with foreign exchanges rates instability (R27). This shows
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 190
that there is no causality nor relationship between R5 and R27.
Figure 7-9. Risk causality and interaction pattern network topology based on SC.
Figure 7-10. Risk causality and interaction concentric map based on SC.
Again, R5 still plays an important role by disseminating its impact and influencing
almost the whole of the network. This is in line with previous discussion and another
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 191
network topology. In this case R5 can be stated as a significant risk by showing its causality
and highest interrelationship capacity towards whole network measurement. It can be seen
from all Figures above that each has some connection to R5 as the central risk which has
highest capacity within risk network, either as an incident exacerbating or as an outcome of
clean water supply to the community.
This finding is also supported by the expert opinions in the field. Based on the
interview, R5 is often linked to other risks, either as a source or an effect. For instance, high
pollution level in Surabaya river make it difficult for PDAM to process and produce clean
water. Thus, results in a quality decrease of the clean water produced (refer to R18).
Interestingly, it is also found that low quality water distributed to the community also relates
to both R19 and R3, which can be explained as follows.
The decreasing of the water quality leads to the disturbed distribution network. This
finding is also identical with the reality that the Surabaya water supply distribution network
has numerous blockages which consist of dirt and mud. This problem, further, resulted in
water scarcity faced by the community (both in quantity side and quality aspect). The
pollution, particularly garbage, that blocks some of the city water systems leads to flood,
natural disasters (R2) and spread of various diseases.
7.5 Phase 3-Data Processing, Simulation and Analysis
The building of Stakeholder-Risk Matrix (SRM)-[S-R] is based on the identification of both
risk events and individual stakeholders. Based on the identified risk events and stakeholders
(participants), and the data collected from the fieldwork, these risks events and their
associations with the stakeholders [S-R] form 126 rows ( )i and 30 columns ( )n in a matrix
which can be seen in Appendix B. The SRM is then converted into a bipartite matrix with
[126(+30) x 30(+126)] size. During the simulation, it is important to mention that the blue
square refers to the identified risk events and the red circle refers to the stakeholders.
Figure 7-11 shows the bipartite network visualization of stakeholder-associate risk
events based on the DEG. Furthermore, Figure 7-12 to 7-17 depicts the bipartite network
and concentric map visualization based on the DC, BC and CC respectively. While, Figure 7-
18 depicts the S-R network concentric maps based on EC. Furthermore, to analyze and
explore the simulation output comprehensively, this research presents the risk magnitude
assessment result computed in Phase-1 as a comparison to the Phase-3 simulation result.
Table 7-4 shows the simulation output of risk magnitude using the conventional method and
the four forms of network centrality.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 192
Table 7-4. Risk magnitude and normalized S-R network topology decipherment.
Risk ID
F-FMECA Deg.
DC BC CC EC RPV Rank Value Rank Value Rank Value Rank Value Rank
R1 0.929 3 70 0.556 6 0.047 6 0.640 6 0.219 6 R2 0.873 14 73 0.579 5 0.061 4 0.654 5 0.230 5 R3 0.832 23 76 0.603 3 0.063 3 0.669 3 0.232 4 R4 0.895 9 33 0.262 25 0.007 24 0.506 25 0.125 25 R5 1.000 1 93 0.738 1 0.112 1 0.767 1 0.262 1 R6 0.833 22 36 0.286 24 0.006 25 0.514 24 0.147 23 R7 0.884 11 51 0.405 14 0.020 14 0.563 14 0.181 15 R8 0.819 27 63 0.500 8 0.036 8 0.610 8 0.204 8 R9 0.828 25 46 0.365 18 0.016 17 0.546 18 0.162 19
R10 0.776 29 28 0.222 27 0.003 30 0.492 27 0.123 27 R11 0.905 6 44 0.349 21 0.014 20 0.539 21 0.159 21 R12 0.765 30 48 0.381 16 0.014 19 0.553 16 0.179 16 R13 0.83 24 26 0.206 29 0.004 27 0.486 29 0.108 29 R14 0.839 20 28 0.222 27 0.005 26 0.492 27 0.113 28 R15 0.866 15 65 0.516 7 0.038 7 0.618 7 0.212 7 R16 0.836 21 45 0.357 19 0.013 21 0.543 19 0.168 18 R17 0.840 19 57 0.452 11 0.025 11 0.586 11 0.193 11 R18 0.904 7 85 0.675 2 0.085 2 0.718 2 0.254 2 R19 0.911 5 75 0.595 4 0.053 5 0.664 4 0.237 3 R20 0.898 8 60 0.476 9 0.033 9 0.597 9 0.203 9 R21 0.885 10 58 0.460 10 0.025 10 0.589 10 0.202 10 R22 0.935 2 47 0.373 17 0.017 16 0.549 17 0.173 17 R23 0.877 12 51 0.405 14 0.019 15 0.563 14 0.182 14 R24 0.916 4 55 0.437 12 0.023 12 0.578 12 0.193 12 R25 0.866 16 38 0.302 22 0.008 23 0.520 22 0.153 22 R26 0.856 17 29 0.230 26 0.004 28 0.494 26 0.125 26 R27 0.822 26 23 0.183 30 0.003 29 0.478 30 0.097 30 R28 0.874 13 37 0.294 23 0.009 22 0.517 23 0.138 24 R29 0.855 18 45 0.357 19 0.014 18 0.543 19 0.161 20 R30 0.819 28 54 0.429 13 0.021 13 0.574 13 0.188 13
Note: The DEG refers to how many stakeholder (out of 126) associated and affected by respective risk events. The bold and underline character refers to the top five highest (significant) rank and lowest (insignificant) rank respectively.
Based on both risk magnitude and S-R network simulation, this research found that
risk with high magnitude does not necessarily indicate that respective risk is significant
towards affecting the community. For instance; R22 ranked as 2nd and perceived highest
value for its magnitude. However, based on the S-R associated analysis context using
proposed method, R22 is considered as a non-significant risk event by showing a mediocre
network topology measurement score. Further, this finding also applies to other risk events
such as R24.
Contrary to the previous discussion, interestingly there are also a number of risk
events which possessed a low magnitude but have high network topology output. For
instance, R3 with risk magnitude ranked 23rd, has a high score and ranking for all of the
network topology measurement. This clarifies that even risk with low magnitude needs to
be considered as a significant risk considering its ripple impact deployment behavior within
the network affecting community.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 193
Figure 7-11. Risk impact to community network visualization based on DEG.
Figure 7-12. Risk impact to community network visualization based on DC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 194
Figure 7-13. Risk impact to community concentric map based on DC.
Figure 7-14. Risk impact to community network visualization based on BC.
Following these findings, a face-to-face interview conducted by the author with the
experts also reveals that ‘water shortage’ (R3) does not arise because of highly correlated
(or impacted) by other risk events (e.g., natural disaster-R2 and, pollution and
contamination-R5). Instead, R3 emerges due to the existence of social inequality and uneven
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 195
services by authorities, which results in the lower quantity of supplied water. Even worse,
some precincts have difficulty obtaining water (no water supply in a certain number of
periods). Therefore, it is not surprising that R3 has profound influence on the community.
Figure 7-15. Risk impact to community concentric map based on BC.
Figure 7-16. Risk impact to community network visualization based on CC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 196
Although in fact Surabaya city rarely faces water shortage, however people assess R3
higher than the issue of ‘natural disasters’ (R2), and ‘trouble in water transmission and
distribution network’ (R19). Furthermore, participants perceived high inter-correlation
between R2 and R3 (i.e., unexpected both long rain season or drought, storm and sea water
intrusion to the city) as they generated an enormous impact and influence on the quantity,
quality and the whole processes of the clean water being processed, produced and supplied
to the community.
Phenomenally, there are a number of risk events with low magnitude score but high
BC score and ranked top five among the other one (Table 7-11). Specifically, both ‘natural
disaster’ (R2) and ‘water quality defective’ (R18) are the examples for low magnitude-high
BC risk events. This also clarifies that low magnitude risk has the capacity to control (change
the path) or even discharge a ripple impact flow through the network. In this case, BC output
might help policy and decision makers to identify the key risks which are prominent in the
network based on their virtual ties impact capacity affecting the community.
There is also a low magnitude-high CC risk. In this research, ‘limited access to clean
water’ (R8) is considered the only risk events which has low magnitude and high CC capacity.
This result defines that low magnitude risk events have a latent high impact capacity to affect
(connect) with others based on the shortest paths. In other words, R8 has high capacity for
disseminating its impact and influence very quickly to whole nodes (affecting community in
common). This finding is in line with the result of interview and expert justification in the
field.
Furthermore, (R8) perceived as less significant since this risk occurred very rarely
and is considered by the majority as a latent risk. Even though the Surabaya city water supply
system is considered well developed, there is still around 3%-5% population that face
difficulty in getting a supply of clean water. In a number of interviews with experts, R8 is
considered quite common in low-income communities. One of the reasons is that low-
income community in residential areas are hard to reach by the authority to develop the
water supply network. Moreover, high CC arises because its consequences emerge from
other risk resource (impact) and ultimately hinder the community’s ability to perform daily
activities significantly.
Although the risk magnitude and network measurements ranking in Table 7-4 are
slightly dissimilar, it can be clarified that ‘pollution and contamination’ (R5) is the most
significant and crucial risk for the community. In all of the network topology measurements,
R5 has been described as the most significant risk event. This indicates that R5 has a high
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 197
capacity to reach and affect the central network as well as the community. This finding is also
supported by a number of expert opinions since the Surabaya city clean water resource is
originally from the Surabaya river which is processed and managed by PDAM.
Figure 7-17. Risk impact to community concentric map based on CC.
Moreover, the issue of R5 in Surabaya is a multi-dimensional challenge to the
Surabaya city government where the sources of R5 are both natural (e.g., climate change-R1,
uncertain rainfall, river flow fluctuation, river sediment and submission dirt from upstream)
and man-made error (e.g., lack of awareness, littering and conducting illegal activity in the
river, illegal industry waste disposal). Consequently, it will burden PJT-1 and PDAM towards
processing the raw water which probably decreasing the quality of clean water produced.
From this discussion, R5 can be expressed as one risk source of ‘water quality defective’
(R18).
Specifically, not only do R5 and R18 (and R1 as mentioned above) have a high causal
relationship with each other, but also with other risk events which are highly ranked. The
high correlation between these risk events commonly affects the community. This can be
explained as follows; ‘water scarcity’ (R3) is one of the natural risk (e.g., persistent drought)
which affects and results in water transmission and distribution system problems (R19). In
fact, R19 occurs due to water pollution and contamination (R5) which encumber the system
that processes and delivers the water to the community. Based on both simulation and expert
opinion, this finding also confirmed the existence of highest EC score for R5.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 198
Figure 7-18. Risk impact to community concentric map based on EC.
Although a number of risk events have already been identified as the most significant
risk according to magnitude and network topology measurements, in contrary there is also
a plethora of risk events which hold as less significant risk. For instance; community
rejection (R10), uncertain political behavior (R13), limited public participation (R14),
interest rates instability (R26) and foreign rates stability (R27) are the least significant risk
events, contributing to only a minor impact on the community.
Based on the most significant and less significant risks aforementioned, it can be
explained that significant risks mainly lie within natural, technical and operational
categories. This implies that significant risks affecting the community have high correlations
with the fundamental technical issues such as; extracting the raw water, processing the bulk
water, transmitting and distributing clean water to the user. On the other hand, a number of
less significant risks are arrayed within political, economic and social categories. Further,
both DC and EC in the concentric map (Fig. 7-13 and 7-18) shows that the less significant
risk events mentioned are located on the periphery of the risk concentration.
Uncovering the strength of node can suggest which risk events are more likely to
impact the community and influence one another, which ones are more likely to hold similar
views, which ones are marginalized, and which play a brokering role. In order to investigate
the attachment behavior of risk events in the context of UI system, disturbance and
interfering community flow, this research examined whether central positions, roles and
criticality in the connectedness network of community impact generate further effect and
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 199
influence other nodes.
7.6 Phase 4-Data Processing, Simulation and Analysis
Following the previous analyses in Phase 1-3, the application of equation 5-16 leads to the
risk criticality simulation output. To discuss deeper, this research compares the risk
criticality simulation result with conventional risk magnitude output calculated in Phase-1
previously. The comparison between them can only possibly be made once both risk
magnitude and risk criticality have been through a normalization process so that their value
lies in the range [0,1]. Therefore, the comparison between them is not based on the real
magnitude nor critical value but based on each of their normalized values and ranking order.
Table 7-5 shows both risk magnitude and risk criticality simulation results as well as
their risk events ranking. In this research, the simulation output comparison between
conventional method applying Fuzzy-based FMECA and risk criticality methods do not
search for the best or worst result, nor right or wrong simulation result. Instead, the analysis
explores the dissimilar output background which greatly affects further analysis, (Phase-5),
decision making processes and action-plans made by experts towards mitigating particular
Surabaya water supply infrastructure system risk events.
As seen in Table 7-5, risk criticality ranking order is highly dissimilar compared to the
conventional risk magnitude risk order. While almost all of the risk ranking order is
dissimilar, nonetheless, five out of thirty risk events have similar ranking order. The five risk
events are as follows; climate change (R1), pollution and contamination (R5), community
rejection (R10), under rate maintenance (R21) and inflation risk (R29). However, applying
the Fuzzy-based FMECA, the most significant risk event is pollution and contamination (R5),
followed by physical infrastructure decay (R22), climate change (R1), water loss-NRW (R24)
and trouble in water transmission and distribution network (R19).
The critical RA does not only consider the variables of the conventional RA model
offered, the analysis also considers two main important analysis, that is; risk causality and
interaction pattern, and risk impact to community by providing various variables from both
one-mode and two-mode network analyses. Interestingly, the application of risk criticality
analysis model considers and reveals latent variables mentioned previously.
For instance, applying the risk magnitude analysis, the physical infrastructure decay
(R22) ranked 2nd highest compared to other 30 risk events. On the other hand, by applying
the risk criticality model analysis, interestingly R22 ranked 14th among the 30 risk events.
This explains that R22 is not the significant risk event and thus the DM should be able to
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 200
arrange priority and strategy towards the R22 mitigation plan and strategy.
Table 7-5. Risk magnitude and risk criticality simulation outputs.
Risk ID Magnitude Criticality
Order Value Norm. Rank Value Norm. Rank
R1 1.720 0.929 3 1.979 0.747 3 ● R2 1.830 0.874 14 1.952 0.737 5 ↑ R3 1.920 0.832 23 1.819 0.687 6 ↑ R4 1.785 0.895 9 0.728 0.275 25 ↓ R5 1.598 1.000 1 2.650 1.000 1 ● R6 1.916 0.834 22 0.796 0.300 24 ↓ R7 1.807 0.884 11 1.236 0.467 16 ↓ R8 1.950 0.820 27 1.512 0.570 11 ↑ R9 1.930 0.828 25 1.078 0.407 20 ↑
R10 2.058 0.776 29 0.470 0.177 29 ● R11 1.765 0.905 6 1.138 0.429 17 ↓ R12 2.087 0.766 30 0.930 0.351 21 ↑ R13 1.925 0.830 24 0.554 0.209 28 ↓ R14 1.904 0.840 20 0.584 0.220 27 ↓ R15 1.843 0.867 15 1.717 0.648 8 ↑ R16 1.911 0.836 21 1.089 0.411 19 ↑ R17 1.901 0.841 19 1.475 0.557 12 ↑ R18 1.767 0.905 7 2.256 0.852 2 ↑ R19 1.754 0.911 5 1.964 0.741 4 ↑ R20 1.778 0.899 8 1.784 0.673 7 ↑ R21 1.804 0.886 10 1.614 0.609 10 ● R22 1.708 0.936 2 1.445 0.546 14 ↓ R23 1.821 0.878 12 1.465 0.553 13 ↓ R24 1.743 0.917 4 1.633 0.616 9 ↓ R25 1.845 0.866 16 0.855 0.323 22 ↓ R26 1.865 0.857 17 0.613 0.231 26 ↓ R27 1.943 0.822 26 0.647 0.114 30 ↓ R28 1.827 0.875 13 1.840 0.324 23 ↓ R29 1.869 0.855 18 2.482 0.438 18 ● R30 1.950 0.820 28 3.262 0.575 15 ↑
The sign of ↑ and ↓ refers to the risk ranking order change ascending and descending respectively. While, ● sign refers to the unchanged ranking order between two outputs.
Similarly, by applying the risk magnitude analysis the R24 ranked 4th is one of the
most significant risks. While applying the risk criticality model analysis, R24, which was
ranked 9th, is considered to be insignificant. Accordingly, experts and DMs can focus and
allocate more resources to mitigate the actual significant risk events by considering various
aspects and variables affecting the empirical analysis processes. Conversely, it is also found
that there are a number of conflicting results from the simulation mentioned previously.
For instance, using the risk magnitude analysis model, natural disaster (R2) is ranked
14th and categorized as a non-significant risk event. However, applying the risk criticality
model analysis, R2 is ranked 5th and considered as a significant risk. Similarly, water quality
defective (R18) is ranked 7th based on the risk magnitude analysis. However, upon applying
risk criticality analysis, R18 is ranked 2nd and considered as a significant risk event. This
occurs due to the nature of R18’s impact characteristics.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 201
The different ranking between conventional RA and the risk criticality analysis is due
to the conventional RA being solely focused on the triplets of risk decision factors rather than
taking into consideration the risk impact to the community, and its causality capacity and
interaction pattern. Following both RAs simulation output, R5 is suggested to be the most
significant and critical risk by showing its highest normalized magnitude score (1.000). As
the most critical risk, R5 is considered not only because of its high magnitude capacity but
also the impact which severely harms the community (with its consequences) as well as its
dynamic causality impact and propagation affecting other risks.
The second most critical risk is R18 which was ranked 7th in the risk magnitude
analysis. In here, the R18 experienced a sharp increase in its ranking order from 7th to 2nd.
This finding shows that both the [S-R] network topology and [R-R] network topology
analysis plays a very significant role which affects the simulation and output interpretation.
From the expert point of view, R18 not only has a high magnitude but also impacts the
community and influences other risk events. R18 affects almost the whole of the Surabaya
water supply infrastructure system, especially to the supply chain processes. From this, the
community realized that they are under threat of not having a clean water supply.
The third ranked critical risk is R1, which also ranked third in risk magnitude analysis.
This result shows that participants assess R1 as significant since the first analysis (risk
magnitude) stands within the top five significant risks. Further, the fourth critical risk is R19
which is also stated within the top five significant risks (ranked 5th in risk magnitude
analysis). It is found that the R19 ranking order between the two analyses is slightly changed.
Accordingly, based on both analyses, R19 is considered crucial as it is ranked 4th in the risk
criticality analysis. Accordingly, following the experts point of view, R19 emerges from the
failure to maintain cross-connections control (distribution losses).
Furthermore, R19 also emerged from the decreasing of water flow and water
pressure because of distribution system disorder (e.g., temporarily shut by the authority due
to physical system maintenance, a leakage and, or uneven water flow pressure) within
distribution pipes. The fifth critical risk is R2 which, surprisingly, ranked 14th in risk
magnitude analysis. This shows that participants see this risk as less important and crucial
due to the low respective risk ranking order. Since R2 is stated as the fifth most critical risk
among other thirty risk events, experts (and lay people) need to put more attention to the
physical infrastructure maintenance issue. In the Surabaya water supply infrastructure
system case, communities give less attention towards urban utilities physical maintenance.
This issue leads to services disruption which occurred in several occasions.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 202
7.7 Phase 5-Data Processing, Simulation and Analysis
Phase 5 focuses on the input data manipulation, simulation and analysis of the shock impact,
stress impact and system robustness capacity level. Following the equations 5-17 to 5-19,
the risk criticality analysis simulation output from Phase-4 is applied as a basis and
benchmark for the Surabaya water supply infrastructure system robustness analysis. Both
the shock and stress impact over time is assessed prior to assessing Surabaya water supply
infrastructure system robustness capacity level. The system shock and stress impact analysis
over time is discussed in the next sub-sections.
7.7.1 Shock Impact Analysis Model and Simulation
To develop and simulate shock impact for particular risk events SHOCK CAP.( )
nF R , the input
parameters have to fulfill requirements as follow; (i) Maximum capacity of risk magnitude,
(ii) Maximum capacity of particular risk causality impact affecting all risks, and (iii)
Maximum capacity of particular risk affecting whole community. Each risk decision factor in
the risk magnitude function f O S D( , , ) input is determined by point of 10 using Likert-scale.
This simulation will result in the highest risk magnitude analysis output (3.000) where the
normalized score is 1.000.
Further, to reach the maximum risk impact capacity affecting all risks, this research
applies the SNA method to simulate and calculate the [R-R] network topology following the
determined network topology indicators determined in Chapter 4. Accordingly, this research
inputs the [R-R] matrix sheet as 1 which form the matrix in equation 7-1 below. Then the [R-
R] matrix is a matrix of ones or all-ones matrix over the real numbers where every element
is equal to one. Notably, the diagonal of the [R-R] matrix is 0 since it is assumed that the risk
causality impact behavior and its influence is not a loop model.
1 2
1
2
0 1 1
[R-R]= 1 21
1 1
1 1 0
n
n
R R R
R
n NR
R
=
, , , ... (7-1)
Meanwhile, similar to [R-R] matrix input, the [S-R] will have the same structure as
stated in equation 7-2. Then the [S-R] matrix is a matrix of ones or all-ones matrix over
the real numbers where every element is equal to one. The next step is to account these
matrixes as an input for simulating and analyzing the network following all of the network
topologies. The network simulation was conducted in 1-mode and 2-mode for [R-R] and [S-
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 203
R] respectively.
1 2
1
2
1 1 1
[S-R]= 1 2 1 21
1 1
1 1 1
n
i
R R R
S
n N i IS
S
= =
, , , ... , , , ... (7-2)
The shock capacity analysis data input mentioned above intends to explain that each
of the risks has the highest likelihood to happen with high consequences as well as less
possibly to be detected. Risk also affecting whole community can be analyzed by developing
[S-R] as an all-ones matrix. Further, input data on [R-R] matrix also describes that a
particular risk has high impact and propagation affecting other risks within the risk network
boundary. As discussed previously, in [R-R] the diagonal is always 0 as in this research it is
assumed that risk does not recognize and have no impact loop, which is indicated by
0 nmR n m= =, .
Figure 7-19. Risk causality and interaction network based on DC, BC, CC, EC and SC.
Applying the SNA method, following the same way of simulation previously, the
simulation output for [S-R] and [R-R] networks topologies (both network graphs and
concentric maps) can be seen in Figure 7-19 to 7-24. After obtaining the
( )nF RSHOCK CAP.maximum: (see section 5.7.5), the simulation result for shock impact can be
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 204
seen in Table 7-8. By applying the equation 5-19, the robustness capacity level of Surabaya
water supply infrastructure system towards each of the risk events can be seen in Table 7-9.
Notably, the shock capacity value for all of risk events need to be normalized reaching value
of 1.000.
Figure 7-20. Risk causality and interaction concentric map based on DC, BC, CC and EC.
Figure 7-21. Risk causality and interaction concentric map based on SC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 205
Figure 7-22. Risk impact to community network based on DEG, DC, BC, CC and EC.
Figure 7-23. Risk impact to community concentric map based on DEG, DC, BC, and CC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 206
Figure 7-24. Risk impact to community concentric map based on EC.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 207
Table 7-6. Shock impact and network topology simulation output.
Risk ID
Fuzzy-FMECA S-R network topology R-R network topology Risk criticality
RPN Norm. DC BC CC EC Out-DC Out-CC Node BC EC Out-SC Score Norm.
R1 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R2 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R3 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R4 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R5 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R6 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R7 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R8 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R9 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R10 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R11 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R12 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R13 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R14 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R15 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R16 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R17 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R18 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R19 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R20 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R21 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R22 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R23 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R24 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R25 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R26 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R27 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R28 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R29 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
R30 3.000 1.000 1.000 0.022 1.000 0.183 1.000 1.000 0.000 0.183 1.000 5.387 1.000
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 208
7.7.2 Shock and Stress Impact Analysis Model and Simulation
It is important to note that in equation 5-18, the stress effect value follows the risk criticality
output, while the normalized stress value ( )n
R is estimated based on the shock effect score
as the benchmark. Table 7-7 accounts for four main analysis attentions, which is; (i) The
shock effect value, (ii) Stress effect value, (iii) The impact effect value where is the percentage
of stress effect over shock effect score, and (iv) The system robustness level, which is UI
system resilient facing the various risk events in the context of its capacity to withstand the
respective risk impact.
Table 7-7. System robustness capacity level simulation output.
Risk ID
Shock effect Stress effect Impact effect (%)
System robustness (%) Score Norm. Score Norm. (*)
R1 5.387 1.000 1.979 0.367 36.7 63.3 R2 5.387 1.000 1.952 0.362 36.2 63.8 R3 5.387 1.000 1.819 0.338 33.8 66.2 R4 5.387 1.000 0.728 0.135 13.5 86.5 R5 5.387 1.000 2.650 0.492 49.2 50.8 R6 5.387 1.000 0.796 0.148 14.8 85.2 R7 5.387 1.000 1.236 0.229 22.9 77.1 R8 5.387 1.000 1.512 0.281 28.1 71.9 R9 5.387 1.000 1.078 0.200 20 80
R10 5.387 1.000 0.470 0.087 8.7 91.3 R11 5.387 1.000 1.138 0.211 21.1 78.9 R12 5.387 1.000 0.930 0.173 17.3 82.7 R13 5.387 1.000 0.554 0.103 10.3 89.7 R14 5.387 1.000 0.584 0.108 10.8 89.2 R15 5.387 1.000 1.717 0.319 31.9 68.1 R16 5.387 1.000 1.089 0.202 20.2 79.8 R17 5.387 1.000 1.475 0.274 27.4 72.6 R18 5.387 1.000 2.256 0.419 41.9 58.1 R19 5.387 1.000 1.964 0.365 36.5 63.5 R20 5.387 1.000 1.784 0.331 33.1 66.9 R21 5.387 1.000 1.614 0.300 30 70 R22 5.387 1.000 1.445 0.268 26.8 73.2 R23 5.387 1.000 1.465 0.272 27.2 72.8 R24 5.387 1.000 1.633 0.303 30.3 69.7 R25 5.387 1.000 0.855 0.159 15.9 84.1 R26 5.387 1.000 0.613 0.114 11.4 88.6 R27 5.387 1.000 0.647 0.051 5.1 94.9 R28 5.387 1.000 1.840 0.153 15.3 84.7 R29 5.387 1.000 2.482 0.203 20.3 79.7 R30 5.387 1.000 3.262 0.259 25.9 74.1
Meanwhile, Table 7-7 defines the maximum risk impact the Surabaya water supply
infrastructure can withstand by putting a shock effect score as 5.387 (normalized as
maximum score which is 1.000). By accounting the stress impact effect into the total capacity
of the respective UI system, both the impact effect and system robustness capacity can be
analyzed. In this case study, Surabaya UWS infrastructure system is very vulnerable towards
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 209
the pollution and contamination (R5) by showing its system vulnerability reaching 49.2%
and robustness score is only 50.8% (Figure 7-25).
Figure 7-25. The UI system robustness capacity towards R5 effect over period of time.
Further, following Table 7-7. Surabaya water supply infrastructure system is also
vulnerable to the water quality defective (R18) followed by climate change (R1), trouble in
water transmission and distribution network (R19), and natural disasters (R2) with their
robustness level percentages being 58.1%, 63.3%, 63.5% and 63.8% respectively. On the
other hand, Surabaya water supply infrastructure has a good resistance to withstand a
number of risk events, such as; foreign exchange rates instability (R27), community rejection
(R10), uncertain political behavior (R13), limited public participation (R14) and interest
rates instability (R26) by showing its robustness capacity as much as 94.9%, 91.3%, 89.7%,
89.2% and 88.6% respectively.
This outcome suggests that in the case of the Surabaya water supply infrastructure
system, monetary and fiscal matters, as well as political issues have not had a substantial
effect. Instead, Surabaya water supply infrastructure system is unquestionably vulnerable to
the risks related with technical and operational issues of how water is delivered to
community. Particularly, as discussed previously, these issues are related fairly towards the;
(i) Quality of the water (i.e., odor, taste and color) and, (ii) Aspects that support the continual
service of supplying the water to community.
Importantly, even R26 is considered as a less critical risk. However, it also leads to
monetary crisis. Further, unpredicted interest rates within the unstable economic
circumstances leads to vulnerable national economy affecting the respective UI system. For
instance; user tariff increases, obstacles to the development process of respective
infrastructure. At the same time, it is highly expected by the community that Surabaya water
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 210
supply infrastructure system reach 100% (or more) and defending its robustness level for
each of risk events the system encounter.
Nevertheless, based on the simulation (Table 7-7 and Figure 7-25), the Surabaya
water supply infrastructure has no any 100% robustness level achievement towards
withstanding various risk events. In this case the maximum robustness capacity level
achieved is 94.9% when the system in encountering R27. The discussion clarifies that,
among 30 risk events determined and analyzed, Surabaya water supply infrastructure
system need further resilience strategies to make the infrastructure system less vulnerable
and better when facing various risk events.
Furthermore, the infrastructure system robustness analysis is able to deliver a
thorough analysis and explanation while both conventional and critical RA are incapable of
exploring the latent phenomenon mainly because of the UI system resilience. Back to the RAs
discussed in previous Chapter, Table 7-7 tabulates the risk magnitude, risk criticality, impact
effect and system robustness. Interestingly, there is one risk event where the analysis shows
dissimilar outcome which is pivotal to be considered and analyzed.
The physical infrastructure decay (R22), is the significant risk which ranked 2nd
highest compare to other risk events. R22 is acknowledged by its high magnitude. However,
R22 only affects the Surabaya water supply infrastructure system by 26.8% over 100% of its
infrastructure system maximum capacity. This suggests that applying the conventional RA
with less measurement and variables considered within the UI system robustness
assessment leads to improper prejudiced results. This improper result ultimately leads to
imprudent management and resource allocation decision making made by both the
authorities and experts.
Another example for this phenomenon can be seen for the water loss-NRW (R24)
where this risk is considered as significant by ranking 4th in the risk magnitude analysis.
Notwithstanding, R24 only affects the Surabaya water supply infrastructure system by
30.3% and left the system robustness level on the point of 69.7% (out of 100%) based on its
stress effect. This analysis also implies that R24 is considered as less significant to the system
and differs from what the risk magnitude analysis output generated.
While all several analyses from phase 1-5 was conducted in various ways by applying
a number of analysis methods and models, R5 was generated consistently as the most critical
risks impacting the Surabaya community, Surabaya water supply infrastructure risk and its
system extensively. The explanation of this analysis output is described below.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 211
7.7.3 Critical Risk-River Pollution and Contamination (R5)
In the case of Surabaya water supply infrastructure system, Surabaya river pollution not only
harms the community health but also other ecosystems, such as marine biota. Compared to
previous period, it is clear that the river condition is substantially changed. Industrialization
has become an important factor to the development of Surabaya’s economy, through the
establishment of plants and factories. However, the waste or by-products discharged from
them are severely disastrous to the environment consisting of various contaminants of the
surface water, ground water and soil.
There are a number of reasons the waste is not safely treated. One of the reasons is
mainly due to the lack of highly efficient and economic treatment technology. Unfortunately,
community awareness level towards urban environment is decreasing with the increasing of
Surabaya population, making the Surabaya rivers lose its important role in supporting
community activities. Therefore, there is inevitably a comprehensive, integrated and
sustainable solution towards pollution and contamination risk which need to be developed.
Furthermore, an active participation between both industry and lay people to control
their activities by putting a high priority to preserve Surabaya river is definitely needed. For
instance; applying the integrated waste management and processes, and significantly
reducing the source of pollution. The river pollution and contamination are multi-
dimensional problem in Surabaya city. The main reason is that, there are various
stakeholders which allegedly abuse the functions of rivers.
The discussion above also supported by the study conducted by Razif, M. and S.F.
Persada [149]. The study found that the load of contamination in Surabaya rivers caused by
industrial waste was BOD = 25336.54 kg/day, by domestic and farming waste were BOD =
65496.69 kg/day. These values indicate that the major contributors which dump the waste
into Surabaya rivers were from farming and domestic sectors. In accordance with the
development of Surabaya city, the farming activity has significantly reduced. Thus, the
biggest contributors of waste are from domestic and industrial waste and it has the majority
of organic and an organic material.
Surabaya rivers are the raw material for the WTP. Hence, the bad quality water river
will affect the process and quality of the resulting water. Furthermore, the entire WTP in
Surabaya city uses the conventional system. This situation results in bad water and harms
the citizens’ health. Particularly, R5 also affects the whole process of producing and
distributing clean water to the Surabaya community. Based on the experts point of views and
the literatures, the development of major cities where the Surabaya river flows through has
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 212
resulted in an increase in clean water and raw water requirements.
Figure 7-26. River pollution in Surabaya caused by the industry wastage.
On the other hand, the increasingly high concentrations of inhabitants and industries
in urban areas have given rise to several problems such as the emergence of slums along
riverbanks, decreasing water quality and floods due to disrupted water flow because of a
large number of garbage, siltation, or reduced river width. The dominant pollutants of
Surabaya river are as follows:
- Industrial waste. In Surabaya river, there are hundreds of industries that have the
potential to dispose their waste into the river basin (Figure 7-26).
- Domestic waste. Domestic waste (households, hotels, restaurants, and so forth) is the
biggest source of pollution.
Furthermore, the issues encountered in the efforts of controlling pollution in the
Surabaya river include the following:
- The controlling of sources of pollution has only been implemented on industrial
waste.
- Law enforcement against polluters is still weak since social, economic, work
opportunity and other aspects are still taken into consideration.
- There are many industries where waste WTP capacities are lower than the produced
waste and therefore the waste disposal does not meet the established quality
standards.
- Water pollution control is a complex issue that requires a large amount of funds and
time, as well as the commitment of all parties concerned.
- Many settlements are established in riparian areas, resulting in large amounts of
garbage and domestic waste that are directly disposed into the river.
- Lack of public awareness to participate in providing positive (active-constructive)
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 213
social control.
Following the previous discussion towards the most critical risk event in this case
study, this research highlights river pollution and contamination issue in Surabaya water
supply infrastructure system, which needs further understanding in the resilience context.
7.8 Phase 6-Data Processing, Simulation and Analysis
This section particularly gives attention to the recovery analysis aimed towards increasing
the level of Surabaya water supply infrastructure robustness capacity when bearing R5. In
this section, the shock and stress impact capacity (Table 7-7) used as a benchmark of
recovery analysis. To give more understanding, following the equation 5-20 in phase 6 of the
conceptual framework proposed in Chapter 5, six scenario-based resilience actions and
expected resilience action simulation and output are deliberated and can be seen in
Appendix C (Table C-1 to C13) in the last part of this dissertation.
Modeling the UI system with a specific risk event impact scenario and evaluating the
consequences of the vulnerability and resilience of the system have a central role in the
model developed. To exemplify the proposed robustness model, this research focuses on the
‘pollution and contamination’ risk (R5) which was found to be the most critical risk event
among another risk events.
7.8.1 What is Included within the Recovery Scenarios
The following were considered in the scenario-based robustness action strategy;
- Risk type, primary and secondary risk
- Occurrence-the likelihood of the risk events occurred
- Intensity-how strong is the event, and what could amplify it.
- Detectable-the possibility that respective risk events could be detected.
- Who and what is affected directly.
- Interdependencies and spill-overs-what and who could be affected indirectly.
- The dynamics of various UI aspects (e.g., restoration and recovery cost, political
behavior, environmental index, technical and operational matter and human-error
factor) within UI and community in a point-of-time basis is ignored.
7.8.2 Recovery Analysis towards Enhancing Robustness Capacity
Figure 7-26 depicts eights Surabaya water supply infrastructure system resilience analysis
simulations facing R5 over time (i.e., shock capacity, stress capacity, expected recovery, and
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 214
five different scenario-based recovery strategies). The five scenario-based recovery
strategies applied the semi-linear recovery function. The reason the semi-linear recovery
function was applied in this research is that; the semi-linear function model is generally
applied when there is no information regarding the preparedness, resources available and
societal response [9].
To compare the scenario-based recovery analysis developed with the expected
recovery action output, the expected recovery function applied the trigonometric recovery
function [9]. All values of resilience are normalized with respect to the Surabaya water
supply infrastructure system facing the shock impact of R5 and assumed equal to the largest
capacity value. All values of resilience are comparable because all recovery strategies (i.e.,
searching the most optimum objective value) are equally effective in improving the resilience
of the Surabaya water supply infrastructure facing the R5.
Table 7-8 shows the UI system robustness analysis simulation output in the context
of Surabaya water supply infrastructure system facing the R5 as the main disturbance. The
simulation output describes in detail the Surabaya water supply infrastructure system
condition within the various important main event, such as; shock and stress, expected
robustness level in the period of pre-and post-disruption event, and another robustness level
resulting from five different recovery strategies simulations.
The shock event scenario shows that the respective UI system reached its lowest
resilience state when R5 occurred with its devastating impact. The shock scenario is
intended to show that the R5 magnitude and impact is enormous, and affects both the
community and other infrastructure system inherent risks (refers to the most critical risks
[128]). This can be seen by respective infrastructure system FOM collapse in the time of
to hz he
t t from 1.000 into 0.000. Then, there is no resilience action (recovery strategy) applied,
which is shown by its’ null ( )F t value from to he f
t t .
The stress scenario shows the UI system reaching its actual robustness capacity when
R5 occurred. The stress scenario intends to show how the respective UI system is robust in
the period of disturbance. The respective UI system FOM deteriorates in the time period of
hzt to he
t from 1.000 into 0.509 resilience state. This justifies that Surabaya water supply
infrastructure system robustness is 0.491 which is less than 50% of the total its’ resilience
capacity. Then, since there is no recovery action applied, its’F t( ) is kept steady in the state of
0.509 within the time period of het to ft .
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 215
Figure 7-26. Resilience analysis for pollution and contamination risk (R5).
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 216
Table 7-8. System-of-interest F t( ) facing R5 simulation output.
1 2 3 4 5 6 7 8 9 10 11 12
t 1 t 2 t 3 t 4 t 5 t 6 t 7 t 8 t 9 t 10 t 11 t 12
1.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000
1.000 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509 0.509
Expec. 1.000 0.509 0.509 0.518 0.542 0.588 0.650 0.720 0.790 0.853 0.904 0.943 0.968 0.984 0.993 0.997
Sc.1 1.000 0.509 0.509 0.518 0.523 0.578 0.608 0.646 0.689 0.722 0.763 0.808 0.817 0.839 0.875 0.903
Sc.2 1.000 0.509 0.509 0.518 0.582 0.608 0.622 0.643 0.656 0.662 0.675 0.701 0.708 0.742 0.770 0.770
Sc.3 1.000 0.509 0.509 0.518 0.636 0.658 0.671 0.689 0.700 0.705 0.717 0.740 0.745 0.775 0.800 0.800
Sc.4 1.000 0.509 0.509 0.518 0.593 0.629 0.633 0.646 0.666 0.678 0.684 0.696 0.721 0.726 0.759 0.785
Sc.5 1.000 0.509 0.509 0.518 0.670 0.680 0.699 0.719 0.738 0.757 0.789 0.822 0.815 0.835 0.854 0.873
Shock
Stress
Re
cov
ery
mo
de
l
Condition
faced by UI
system
Discrete time (t f )
t hz t he t hd t
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 217
Simulating various scenarios for the recovery strategy model, five scenario-based
recovery strategies are considered (Scenario 1-5). The simulation input for five scenarios
can be seen in Appendix D. From both Figure 7-18 and Table 7-17, scenario 1 is considered
the most desirable, followed by scenario 5, scenario 3, scenario 4, and scenario 2 which is
less desirable, based on the F t( ) value reached in the time of 12t . Scenario 1 is considered
the optimum recovery strategy since the UI system robustness increase, reaching 0.903 out
of 1.000. Nonetheless, scenario 1 still leaves a loss to the UI system which refers to ‘residual
loss’ as much as 0.003.
In the simulation analysis, this loss can be expected to have no effect. In real world,
however, this number can be very harmful and inflict severe financial (and non-financial)
losses to both the urban community and respective UI system itself. Furthermore, even
though scenario 1 is the most optimum scenario towards reaching highest robustness
capacity in the time of 12t , this research also found that resilience actions from recovery
model scenario 1 are lower than the other recovery model scenarios between the time
period of t and 4t .
Scenario 1 showed significant escalation of the F t( ) value continuously during the
time period of 4t to 9
t until the highest F t( ) was reached in the time period of 12t compared to
other scenarios. During the post disturbance period, it is acknowledged that scenario 3 and
5 attained a higher F t( )compared with expected and other scenarios in the period of time
between 1 5and t t . Even so, both scenario 3 and 5 obtained a final F t( ) value lower than
scenario 1. Thus, it can be concluded that, recovery model scenarios 3 and 5 have better
robustness capacity improvement towards F t( ) in a short period of time specifically right
after the disturbance occurred.
On the other hand, recovery scenario 2 (also for scenario 4) is perhaps the least
prominent scenario which can be adopted. This finding is supported by the facts that; (i)
Similar to previous discussion both scenario 2 and 4 obtained a higher F t( ) value during the
time period of t and 2t compared to the expected recovery scenario and scenario 1, (ii) Both
scenario 2 and 4 obtained their F t( )value in the low state constantly during time period of 4t
to 12t . which explained that these scenarios deliver a slow pace of recovery processes.
From the simulation results, scenario 2 has its steady F t( ) value in the point of 0.770
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 218
between time 11 12to t t . This indicates that the resilience strategy for scenario 2 has not
contributed and improved much to the respective UI system during 11 12to t t . The reason that
the F t( )value is unchanged over time is that; during the recovery process there is might be
a circumstance that make the system recovery processes ineffective and inefficient. Similar
to the discussion above, the simulation output for scenario 3 also showed that itsF t( )value
kept steady in the point of 0.800 during 11 12to t t .
In addition, scenario 5 works very well, exceeding the expected recovery scenario by
reaching the highestF t( )value during 4 to t t . Notwithstanding, during the time period of
4t till 12
t , scenario 5 experienced obstacles and slowness towards obtaining the expected
F t( )value. One of the deterioration can be found during 8 9to t t when scenario 5 undergoes
a downgrade of its F t( )value from 0.822 to 0.815. This shows that the recovery process is
complex and is influenced by time dimensions, spatial dimensions (e.g., different
neighborhoods may have different recovery paths) and by interdependencies between
different economic sectors that are interested in the recovery process.
Therefore, different UI systems (e.g., electricity, oil and gas, transportation, water
supply) that belong to the same community, but are located in different neighborhoods have
different recovery paths, these essential facilities may experience long term or permanent
losses. In summary, the recovery process shows disparities among different resilience plans
and strategies in the same community, showing different rates and quality of recovery. These
findings are also supported by a previous study conducted by Cimellaro, G. P., A. M. Reinhorn,
and M. Bruneau (2010) [9].
Modeling recovery of a single UI system which is critically important to the entire
community is a complex subject. The REA model processes, in real world, cannot be assumed
to be independent. Some countermeasures are likely to be in place prior to the impact and
many different shocks and stresses may combine or occur close together. Further, different
risks impact the level of resilience at dissimilar scales and each require separate or
integrated measures to reduce the abruptness of downwards development trends.
The recovery analysis described in this section illustrates the use of the quantitative
approach to resilience proposed in this research. It is shown that one can consider multiple
Figure-of-merit (FOM) for the same system, and that resilience behavior can be different
among all these metrics. The example described illustrates the benefits of implementing the
right recovery action. This indicates that it is possible to arrive at an ‘optimal recovery
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 219
strategy’ that would enable the system to bounce back quickly and efficiently considering
the FOM of interest.
7.9 Chapter Summary
This Chapter intends to test, validate, and explore the applicability of a conceptual
framework develops in this research. The Surabaya water supply infrastructure system was
chosen as a case study. Following the data collection in Chapter 6 previously, this Chapter
mainly focuses on the data processing, simulation, and analysis for all phases of the
conceptual framework developed in Chapter 5. The analysis phase commenced by initially
processing the data collection, then transforming both the qualitative and quantitative data
collection from the fieldwork into numerical analysis.
The triplets of risk decision factor (i.e., occurrences, severity and detectability) are
applied towards analyzing the risk magnitude. Then, two main matrices ([R-R] and [S-R])
are formed as an input data towards conducting both 1-mode and 2-mode SNA. The 1-mode
SNA method is applied towards analyzing risk causality and interaction pattern, while 2-
mode SNA method is applied in order to analyze the risk impact to community. Each of the
network analysis consists of a number of network topology measurements. The topology
measurements applied in this research has important meaning in the context of Surabaya
water supply infrastructure system RA.
The simulation and analysis for the total six phases of empirical framework are
presented. Phase 1 focuses on the analysis of risk magnitude, while phase 2 focuses on the
risk causality and interaction pattern analysis, followed by phase 3, which analyzes the risk
impact to community. Then the fourth phase focuses on the integration simulation of the
previous three RAs leading to the risk criticality analysis. The simulation shifts onto the
processes of measuring and analyzing the robustness capacity level of the Surabaya water
supply infrastructure system towards facing various risk events.
A short discussion on the comparison between system robustness analysis and
conventional risk magnitude analysis is presented. This gives reader the further
understanding towards the superiority of risk criticality application as a crucial part within
Surabaya water supply infrastructure robustness analysis. Following a number of RAs, the
case study simulation output and analysis exhibits a consistent result by showing R1, R5 and
R19 as the critical risk events. The reasons behind this phenomenon have also been
discussed in this Chapter and have been strengthened by several archives and experts point
of view which make this simulation and analysis more meaningful.
CHAPTER 7-DATA PROCESSING, SIMULATION AND ANALYSIS
Page 220
This Chapter is ended by discussing the phase six of conceptual framework which
aims to deliberate and explore the scenario-based recovery action simulation and output
towards enhancing the UI system robustness capacity level. Five different recovery action
scenarios have been developed and compared to the ‘expected recovery’ scenario. The best
robustness capacity level output in the end of time frame can be appointed as the basis point
to determine the finest recovery action scenario. Nonetheless, the analysis also found that
considerable stagnant or even losses on the level of robustness happened during the
recovery processes within the discrete time period of analysis.
CHAPTER 8-FINDINGS AND DISCUSSION
Page 221
CHAPTER 8
FINDINGS AND DISCUSSION
CHAPTER HEADINGS Introduction Review of the Previous Sections Discussion and Findings towards Initial RA Joint RA-The Preliminary Step in REA Robustness Model Analysis Measuring UI System REA Chapter Summary
8.1 Introduction
This Chapter focuses on the dual discussion of the research, which is: (i) The discussion shifts
into the critical appraisal of the objectives of this research, (ii) Delivers the previous section
review and discussion towards six phases analysis models within UI system conceptual
framework. In order to purposefully carry out the analysis discussion and findings, this
section deliberates the research objectives within the scope of the research.
Having discussed the analysis of data on the previous Chapter, this Chapter discusses
the results of analysis and answers the key research questions set out in the dissertation.
The discussion is presented in accordance with every phase of the framework proposed in
each sub-section. The Chapter consists of several subsections which focus on the analysis
output discussions which was presented in previous Chapter. The discussion in this Chapter
highlights the significance of the findings of the several analysis models and application of
the framework discussed Chapter 5
8.2 Review of the Previous Chapters
The research objectives spans over a several key areas, that is; RO1-To determine the risk
characteristic and impact mechanism based on literatures; RO2-To explore risk analysis
methods and evaluate its shortages in UI context; RO3-To identify and develop risk function
and analysis model towards measuring the critical risks and impact mechanism; RO4-To
establish system-of-interest robustness analysis model as a function of time; RO5-To develop
system-of-interest recovery analysis model; RO6-To undertake a case study investigation to
test the applicability and validate the conceptual assessment framework.
This research responded the RO1 by conducting an in-depth, literature review
towards the role of the UI system to the community as a pivotal element to support their
CHAPTER 8-FINDINGS AND DISCUSSION
Page 222
activities and, various inherent risk natures and impact characteristics. These discussions
are deliberated in Chapters 2 and 3. Chapter 2 mainly discusses the basic and general
understanding towards UI system following by its crucial role and relationship with urban
community. Chapter 2 discusses the vulnerable UI system and its impact to urban community.
The Chapter ended the discussion by putting a deliberation towards UI system resiliency
facing disturbances.
It is acknowledged that the concept of resilience is attractive as it suggests the ability
of something or someone to cope in the face of adversity to recover and return to normally
after confronting an abnormal, alarming and often unexpected threat. While UI system is
threatened by various disturbances (risk events), society is becoming ever more complex
and organizational systems are becoming more interdependent, and thus more vulnerable
to disruption.
Chapter 3 discusses the risk in the UI system context followed by the resilience aspect.
The discussion initially explores the risk concept as well as its characteristics and impacts.
Based on the literature review, this research found and determined three main risk nature
and impact characteristics in the UI system context, that is: (i) The risk magnitude formed
by its three-dimensional decision factors (i.e., occurrences, severity and detectability), (ii)
Risk causality and interaction pattern, and (iii) Risk impact to community.
Accordingly, Chapter 3 also respond to the RO2 towards exploring and evaluating the
conventional RA methods in UI system resilience analysis issues. A number of RA methods,
both deterministic and probabilistic, have been discussed previously. Imperatively,
conventional RA method lacks its capability to: recognize and accommodate diverse view
points towards risk, analyzing the dynamic of risk behavior towards its causality nature and
interaction pattern with other risk events, and the risk impact to every individual as a part
of urban community.
The RO3 has been clarified in Chapter 4 during the discussion of risk criticality
analysis model. The joint RA between three risk impact characteristics (where each RA
model development was also discussed within the Chapter 5) was mentioned. Then, both the
shock and stress event analysis model were introduced subsequently based on the general
system-of-interest resilience and analysis. Based on the empirical model developed
previously, RO4 can be achieved following the direction of UI system robustness analysis
model.
In the single time period, the robustness level is built upon the result risk, and impact
analysis. Based on the understanding of the previous discussion, the RO5 was introduced in
CHAPTER 8-FINDINGS AND DISCUSSION
Page 223
the analysis of robustness capacity. The development and application of the RA within UI
system showed that UI system capacity is possible to be known, determined and further
predicted in the face of disturbances. Furthermore, in this research, the recovery analysis
which intends to increase the system-of-interest robustness level for every discrete point of
time is essentially affected by various assumptions made.
Regarding the recovery analysis, several assumptions are applied to mimic the real-
world circumstances. Finally, RO6 was accomplished by applying the conceptual framework
developed in Chapter 5 to the case study which was completely discussed in both Chapter 6
and 7. The validation of the proposed methods was elaborated using the Surabaya water
supply infrastructure system as a case study followed by the discussion of the simulation
output.
8.3 Discussion and Findings towards Preliminary Risk Analyses
To show the findings and advantages of the proposed conceptual framework, the three first
RA models are discussed further based on the simulation outputs and analysis discussed in
previous Chapter. In this section, the discussion of three different analysis models will be
deliberated, including the analysis discussion related to the main case study, following by a
number of key RAs findings. The RA of its magnitude has been explored in the first phase of
the conceptual framework.
During the data collection process, it is found that people responded to their
perceived risk, rather than the actual risk measurements applied. Following the flowchart
for analysis model depicted in Figure 5-2, the ranking of the Surabaya water supply
infrastructure risks has been determined based on its RPN and RPV (normalized RPN).
Furthermore, the magnitude of risk is built based on participants perspective towards
various risk decision factors. However, the challenges lied on the dissimilar perceptions
made by each of the participants.
In the process of group decision making problems, DMs sometimes may not provide
their preferences for alternatives to a certain degree and there is usually a degree of
uncertainty in providing their preferences over the alternatives considered. The Fuzzy-based
FMECA applied in the first phase of the conceptual framework developed in this research
has the capability of representing imprecise or not totally reliable judgments which exhibit
affirmation, negation and hesitation characteristics.
The consistency of Fuzzy-based FMECA output discussed from the case study play an
important role in the group decision making problems in order to reach an accurate analysis
CHAPTER 8-FINDINGS AND DISCUSSION
Page 224
and decision results. The suggested process of analysis is based on the evaluation of the
consistency of TFN used to transform the Likert scale towards rating the risk decision factors.
The modified Likert scale is then applied and integrated with the Grey theory into the RA
using Fuzzy-FMECA model. However, the research excludes the priority weights of the
experts since it considers all of the participants having an equal importance weight.
In conventional RA and decision-making processes, particularly in Surabaya water
supply infrastructure system, the interaction between service providers and service users
has been predominantly one-way and top-down. Usually, the only contact between provider
and user has been in the form of the monthly or annual bill. In ideal scenario of RA and
decision making, these should be the responsibility of concerning public agencies for utility
services, the regulatory framework, and the market operations.
Further, following the risk magnitude simulation output, it is clear that there are a
number of significant risks mainly related to both technical and operational aspects
including the natural aspect. This clarifies that participants are highly aware of the Surabaya
water supply infrastructure system serviceability since participants willing to obtain a
secure water supply service as an individual priority rather than other aspects which are
considered less significant, such as; political and social issues.
The initial phase of the conceptual framework develops a clear exploration towards
the significant risk with its ranking based on the risk triplets (risk measurements/decision
factors) included in the previous Chapter. Nonetheless, this RA is considered less
comprehensive to be applied as an essential element within Surabaya water supply
infrastructure system. Following the RQ1 in the first Chapter, the risk impact analysis cannot
be solely related to the magnitude, but it considers its impact characteristics affecting both
the community and other risk events.
Accordingly, the RA model in second phase leverages the collective knowledge of risk
causality and interaction pattern to generate better UI risk management solutions. This is
achieved by proposing a novel RA model using network analysis tools to explore the dynamic
of risk causality and interaction pattern. Both participatory and computerized techniques
are utilized. The model exhibited a useful approach by showing its capability to capture,
model and simulate the risk interactions capacity with respect to their structure in the
network. Further, network visualization also helps understand the types of interventions
necessary for risk impacts reduction.
Applying the model into case study, the model provides visualizations necessary to
contribute to a range of issues within risk management studies. Moreover, the model
CHAPTER 8-FINDINGS AND DISCUSSION
Page 225
provides a new vantage point for understanding UI risk complexity and the structural
dynamics of intervention failures. To this opportunity, therefore, it improves both the
accuracy of RA and building risk decision making effectiveness towards mitigation plan and
strategy by overcoming the traditional RA method limitations.
The second phase of the conceptual framework developed demonstrated the
significance and value of the proposed model over the classical RA methods. It was proved
that effective societal decisions in the context of UI risk are supported in the unified analysis
of latent risk characteristic, which is; risk causality and interaction capacity. Therefore,
making a crucial UI governance decision towards risks that relies on the single and isolated
analysis viewpoint may lead to poor and obscured decisions.
Interconnected perspective provides a new understanding of UI risk complexity and
the structural dynamics of intervention failures. Applying the proposed model and
networked approach into UI case study, necessary visualizations were presented to
contribute to a range of issues within risk management studies. This research reaffirms
existing insights long held within infrastructure risk and its nature. It was asserted that
infrastructure risks are by no means natural, but instead are deeply embedded within a
broad number of social, technical, economical, governance and political arrays.
This phase suggests the need to take a wider view of UI risks and incorporate risk
reduction strategies within broader processes which focused on a variety of areas. Stepping
back and establishing the broader context of the risk (and its impact) characteristic shows
that risks are not simply the products of technological failures to be solved through
engineering or other technocratic measures, but rather human problems related to
governance. Following the aforementioned discussion, the analysis in the third phase
continues to analyze the risk impact towards individual as a part of community.
The third phase of empirical framework leverages the collective knowledge of risk
and stakeholder association to generate better risk management solutions. This phase
proposes and validates a novel RA model from a network perspective to fill the knowledge
gaps towards conventional RA method. The proposed model focuses on the analysis for
determining the significance risk in terms of impact on community. The model shows its’
capability to capture the complex relationship between UI risks and stakeholders as
individual.
Based on the simulation, analysis and discussion, the analysis model improves the
effectiveness and accuracy of RA by overcoming the limitation of the traditional RA methods.
The model provides a useful approach to map out the interactions complexity between risks
CHAPTER 8-FINDINGS AND DISCUSSION
Page 226
and community with respect to their structure in the network. Thus, it provides DMs with a
structured procedure and a series of indicators to analyze and demystify the risk impact
behavior.
Furthermore, the proposed model indicates the unique ability of network analysis to
delve into root impact pattern of risks, to help observe the various processes of coping, and
to understand which type of interventions might require coordination or integration.
Following the case study, the analysis model in this phase demonstrated network-based RA
approach for ensuring better value in comparison to the classical RA method. It is clear that
the SNA-based model presented in phase 2 and 3 is suitable for supporting the decision
making towards building risk mitigation plan and strategy in UI system.
The proposed approach proved that effective societal decisions in the context of UI
risk uncertainty and complexity are better supported by understanding the impacts affecting
community at an individual level. As a practical tool, the analysis model guides the optimal
allocation of scarce resources to build the resilience of at-risk people, communities and
states and their institutions. By identifying and assessing the impact of potential disruptions
to individual (as a part of community), RA model provides governments and local authorities
the basis for the prioritization of investments in building resilience, in a manner tailored to
local conditions, needs and preferences.
The most obvious finding to emerge from the analysis model considered in third
phase of conceptual framework is that; (i) The risk impact characterized by the degree of
association between actors and risks, and (ii) The correlation between risk magnitude and
impact capacity is not fully linear. Importantly, analyzing risk based on a single empirical
metric might not produce a comprehensive output, or be able to be used as consideration to
support the decision making towards building risk mitigation plan and strategy.
Another finding from the analysis output of the case study is that the vulnerability of
communities is born from inequalities which affect access to resources and information, the
ability to absorb the impacts of respective UI system risks without government interventions.
Moreover, the concept of RA model in the second phase can be used to understand how
community leaders can best address disruptive challenges in the UI system, such as; natural
disasters and malicious attacks. Notably, these findings are supported by the study
conducted by the McAslan, A. [85].
Even though the analysis has been done in the period when there was no disruption,
nonetheless the analysis output in phase 3 reveals that public perception towards specific
risk events is dissimilar. Some risk events perceived by the stakeholders are more crucial
CHAPTER 8-FINDINGS AND DISCUSSION
Page 227
than others. With the aid of 2-mode network analysis, this research revealed some
underlying patterns of how the stakeholder-risk associated network is structured, helping
DMs to make the formal arrangements of UI governance visible in terms of building risk
mitigation plans and strategies. Although the findings need to be verified with more UI case
studies, the outcomes of the analysis are meaningful and expected to be of interest and act
as guidelines to the DMs and practitioners from both public and private sectors working on
UI risk mitigation.
8.4 Joint Risk Analysis: The Analysis of Critical Risk
The fourth phase presents a risk criticality approach that integrates three RA models
discussed previously (i.e., phase 1, 2, and 3). The application of risk criticality is considered
to be highly relevant for investigating the unified analysis between risk magnitude, risk
causality and interaction pattern, and risk impact to dependent community in network-
based analysis based.
The three preliminary RA models in previous phases stand as the ‘joint analysis’ of
risk criticality analysis model. Together, three RA models with unified aim to assess the
critical risks. The benefits of integrating a number of RA prior to the UI system REA also
support by the OECD. [200], such as;
- Increasing the amount of information available (from numerous sources) and thus
the ability to triangulate.
- Reducing the cost of the RA.
- Reducing individual actor opinion bias.
- General agreement about which risks should be prioritized.
- Ownership by different communities and thus ability to use a range of instruments to
target the risk identified.
This fourth phase also presented comparative analysis output between risk
magnitude and risk criticality applied in Fuzzy-based model. The results of both analysis
towards risk magnitude, criticality value and ranking of the alternatives events change
significantly. The results of the numerical illustrations showed that risk criticality analysis
provides more accurate priority-based rankings of alternatives by taking into consideration
not just the participants affirmation towards three risk decision factors, but also both risk
causality and interaction pattern, and the risk impact to community.
Furthermore, this research observed significant differences between the rankings of
risk events in two analyses. On the first phase, the analysis output is capable for
CHAPTER 8-FINDINGS AND DISCUSSION
Page 228
categorization of risks for experts and DMs which is based on the differing knowledge about
each particular risk and in a subjective scale, for instance; ‘simple’, ‘complex’, ‘not-critical’
and ‘critical’ risk problems. Accordingly, following the simulation output in Chapter 7, the
change of risk ranking orders between risk magnitude and risk criticality uncovers two
insights.
Firstly, there is an absolute intrinsic uncertainty and individualized value systemin
accurate assessment of risks in decision making process. Secondly, considering both
magnitudes and cause-impact propagation in assessing the risk, the framework is found to
be a robust methodological advancement from risk prevention and building resilience
perspectives. Therefore, not paying attention to these aspects of the analysis leads to the loss
of some important information which eventually results in substantial vagueness in the
prioritization process leading to miss-guiding and miss-management of the risk.
Fuzzy-based FMECA methods have the potential for resulting in a reasonable risk
ranking within the traditional risk management framework. However, lack of integration of
risk causality and interaction pattern as well as its impact to community based on the degree
of community-risk associated made such methods grossly incomprehensive. This leads to
ineffective decision making towards UI risk prevention and resilience actions. The process
of assessment of the most critical risks in the Surabaya water supply infrastructure case
demonstrated an excellent performance of risk criticality model as compared to the results
in Fuzzy-based FMECA.
Specifically, the proposed model does not require criteria weighting or accurate
quantitative calculation as it simplifies decision making process by solving problems based
on both qualitative and quantitative information. The novelty of the risk criticality model is
realized due to its ability to improve the estimation accuracy and decision making. It is
important to note that the level of criticality of individual risks are not only related to the
results of the joint RAs, as applied in this research, they are also related the individual
capability, resources availability and other external factors and constraints.
Moreover, the phase 4 of the conceptual framework also contributes to the literature
in several ways. First, based on a comprehensive literature review, the analysis model
established a benchmark for development of a new RA method within the UI system and
community networks. Second, this phase validates the effectiveness of the model by
integrating a number of RA models. The approach is considered useful from a
methodological advancement when prioritizing similar or competing risk criticality values.
Further, the risk criticality analysis model could be the tool to ensure an early
CHAPTER 8-FINDINGS AND DISCUSSION
Page 229
response for detecting early warning mechanisms for different types of risks, which will in
most cases be cheaper and more effective. Accordingly, the proposed method can be repeated
and applied to any general UI case. The application of the model will potentially assist the
evaluation of decision making related to risk governance, managing the vulnerability of the
infrastructure and increasing both the infrastructure and community resilience.
Following the case study, the analysis output and findings, the risk criticality model
analysis developed in the phase 4 of the conceptual framework clarifies the existence of high-
impact, hard to predict and rare events; so-called ‘black swans’ (e.g., pollution and
contamination-R5, water transmission and distribution problem-R19, climate change-R1
and natural disaster-R2). On the other hand, while the author of the book ‘The Black Swan’
(2007) suggests that, for many governments, local authorities, organizations, it is needless
to prepare for such events as they are very unlikely [289].
However, recently UI system experienced a series of ‘unlikely’ events which the
Financial Times [85], concludes are not adequately addressed by existing risk and business
continuity thinking and practice [85]. Further, the analysis pointed out that threats and
impacts are no longer directed only at the urban utilities and its serviceability (mechanism),
but at the dimension of risk network and society at large. Therefore, the strategy emphasized
the importance of UI system and community resilience in facing up to such disruptions.
Following the discussion above, the risk criticality analysis leads to aiding an effective
risk communication strategy as part of the risk mitigation strategy which found to be useful
to communicate who, or which organization or ministry, is responsible for managing each of
the critical risks. Importantly, this analysis will also help provide incentives for paying proper
attention to addressing those risks and help support public accountability.
8.5 Robustness and Recovery Model Analysis Discussion and Findings
The robustness analysis model in fifth phase works well by showing the analysis output
which was discussed in previous Chapter. The UI system robustness analysis model
delineates the ability of the UI system to absorb and respond to the full impact which judged
in relation to the resilience scale of each risk event. The robustness analysis, further,
supports the fifth phase of the conceptual framework, which was applied and discussed in a
scenario-based system robustness metric for REA in the case of Surabaya water supply
infrastructure system.
The model provides valuable insights into the likely performance of Surabaya water
supply infrastructure systems as a whole, during and after specific disturbances scenario.
CHAPTER 8-FINDINGS AND DISCUSSION
Page 230
The fundamental concepts of UI system resilience discussed herein provide a common point
of reference and a unified terminology. While the proposed REA metrics only provides a
quantitative value for the system robustness, these metrics become useful and valuable only
when used to devise effective recovery strategies and actions for the system of interest.
Preventive strategies or improvement resources may simultaneously affect the resilience
under different risk types.
Nonetheless, the analysis model in this phase is not focused on maximizing the
interacting mechanisms between the improvement resources (or strategies) for a given risk
and their impacts on different risk types. Instead, the objective is to apply the emerging
model to issue strategies to increase UI system robustness capacity and illustrate their
outcomes at a different time associated with the simulation steps in the flowchart of Figure
5-7 depicts in Chapter 5. Theoretically, system resilience can be completely characterized
when considering the system’s associated Figure-of-merit (FOM).
Notably, based on the FOM of shock impact analysis simulation output, it illustrates
that prevention may also be physically impossible, especially if the risk is the result of a
global shock in contexts where levels of resilience are extremely low. Further, as illustrated,
the key parameters in resilience calculation are as follows; disruptive events, component
recovery and overall resilience strategy. In practice, obtaining these parameters may not be
trivial.
Nonetheless, the robustness metric allows for the comparison of recovery strategies
between alternatives. It must be noted that this resilience approach is applicable to any
system as long as FOM can be computed for different states under consideration. For a given
system of interest and an identified FOM, the REA model proposed contributes to the
application which support the computation of the system robustness as well as various
strategies implications considered for different robustness strategies. This would be of help
to systems engineers during overall system mitigation plan and design, or while devising
recovery strategies.
During the recovery analysis, an uncertainty mainly takes place where experts and
academia face new and unforeseen disruptions. This fourth phase also responds to the
knowledge gaps on the basic resilience preliminary strategies based on the UK’s 2010
National Security Strategy which is stated that [290];
“…we need to place more emphasis on spotting emerging risks, and dealing with them
before they become crises. We must do all we can, within the resource available, to predict,
prevent and mitigate the risks to our security and wellbeing. For those risks that we can
CHAPTER 8-FINDINGS AND DISCUSSION
Page 231
predict, we must act to reduce the likelihood of their occurring and develop the resilience
to reduce their impact”
Following the recovery analysis discussion above, this research enables control over
extraneous variables that could affect the value of the dependent variable. However, although
this research is able to better control variables towards enhancing UI system robustness
capacity, the results may lose some generality (the ability to apply this research results
beyond the specific computational simulation conditions). Since has the generalize ability
controlling extraneous variables towards obtaining optimum recovery action to enhance the
UI system robustness level, a scenario-based simulation design is adopted.
Importantly, to obtain the optimum strategy and result towards reaching high
robustness level for respective system-of-interest analysis, a well-established optimization
method and algorithm is needed. Nonetheless, the development of rigorous optimization
method and meta-heuristic techniques is beyond the research scope. In the sixth phase (i.e.,
recovery analysis) of conceptual framework, the scenario-based metric used within a
classical description of non-stochasticity does not provide information on the quality of the
assessment, that is; the quality and strength of knowledge which support the assumptions
made for the assessment itself and this could conceal important aspects which affect the
consequent predictive capability of the RA model.
By characterizing the strength of knowledge that supports the assumptions
underpinning the risk model and leading to the conditional risk results, the DM should be
made aware of the gap with the unconditional risk. The DMs need to consider the fact that
may occur relatively to what is captured in the model based on the analyst knowledge and
would thus be more or less cautious in the decisions. Evidently, the recovery analysis model
presented provides an opportunity to consider UI system multi-objective optimization as a
means to develop effective mitigation, recovery and restoration, or protective strategies.
8.6 Summary of Findings
Assessing UI risks can be a daunting task to various stakeholders as several consideration
aspects need to be taken into account within the whole processes of RA in order to obtain a
reliable and robust assessment result. In this research, two main challenges appear as
utmost important aspects that need to be considered when assessing UI system resilience,
which is; the people’s perceptions towards risk and the hidden characteristic of risk impact
mechanism. This research responds the knowledge gap by applying a number of RA
CHAPTER 8-FINDINGS AND DISCUSSION
Page 232
components and prioritizing the forms of stakeholders’ involvement that can enhance UI
system resilience.
Meanwhile, resilience is the ability of a system to react to and recover from
disturbances with minimal effects on dynamic stability. Resilience is needed as systems and
organizations become more complex and interrelated, and the consequences of accidents
and incidents increase. It is an integrating concept that allows multiple risks, shocks and
stresses and their impacts on UI system and vulnerable people to be considered together in
the context of development. Following the recovery analysis model proposed in this research,
the simulation and analysis output highlights probable slow driver of changes that influence
systems and the potential for non-linearity and system robustness transformation processes.
The drivers of transformation are affected by various aspects, which experts should
give focused attention, such as; set of institutional, community and individual capacities and
particularly on learning, innovation and adaptation. Strengthening UI system resilience by
enhancing its robustness capacity level post disturbances can be associated with windows
of opportunities for change, often opening after a disturbance. Nonetheless, resilience is a
difficult concept to measure and to apply to different operating contexts, meaning other
framings and linked concepts may be more fruitful avenues in which to work with ‘resilience’.
While UI system resilience clearly has attractions as a unifying concept and as a vision
in uncertain times, achieving positive outcomes will require a comprehensive analysis which
handled by policy makers and practitioners to fall back on more familiar concepts with which
they have practical experience. The majority of approaches, tools and methods currently
available to measure UI system resilience reflect strongly the diversity of disciplines and
sectors that have appropriated the term.
Recent attempts to develop ways to measure resilience that cross disciplinary
boundaries have focused on assessing such various elements. Such as; technological capacity,
skills and education levels, economic status and growth prospects, the quality of
environment and natural resource management institutions, livelihood assets, political
structures and processes, infrastructure, flows of knowledge and information and the speed
and breadth of innovation.
The specific combination of measures chosen in the framework developed within this
research are based on available data rather than a normative approach. Regardless of
disciplinary preference, measuring resilience of UI system requires bounded various
temporal and spatial scales. It is, therefore, the decisions on what aspects of a system to draw
a boundary around, and indeed how a system itself is conceptualized, that continue to shape
CHAPTER 8-FINDINGS AND DISCUSSION
Page 233
our knowledge of the interaction of processes that determine resilience in different contexts.
Caution also needs to be exercised in extrapolating findings or measures of resilience
at one scale (spatial and/or temporal) and making assumptions based on those findings for
other contexts or other parts of the same system. The context-specific nature of risk impact,
the dynamic nature of change and the complexity of capacities associated with resilience
make systemic measurement challenging, and lead to proxies or a simpler frame for
evaluation to be considered.
Regarding the knowledge gaps discussed in Chapter 2 and 3, this research takes risk
management as an entry point that proposes conceptual framework for operationalizing and
measuring UI system robustness level. Further, the framework considered various actors
(based on their experience and good practice) who can contribute within the RA. The
analysis models proposed in this research are a practical programming tool as they provide
initial attributes to protect UI system, lives and livelihoods from shocks and stresses.
Instead taking everything in mind of up-down analysis processes and decision
making, the experience-based derivation of ‘resilience’ measures in the context of risk man-
agement is a promising avenue, although measures of resilience more broadly have their
critics. Furthermore, the conceptual framework in this research raises three concerns about
popular measures: their deterministic approaches that focus on the inputs and outputs
processes; their capture of a static rather than a dynamic picture; and the narrow focus on
assessing processes of transformation.
From the conceptual REA framework proposes, risk criticality analysis provide and
allow a cross-disciplinary and cross-issue discussion that complement the REA. Furthermore,
according to the robustness and recovery analyses output, the ability for risk management
to provide a structure actions offers a useful basis for spotting linkages between strategies
and to consider the balance of efforts between reducing and managing risks, strengthen
resilience strategies and actions, and managing residual risks impacts. Understanding this
balance in the context of UI systems is a key challenge recognizing that the
shocks/stresses/risks impacting UI system and communities is constantly changing.
Moreover, the propose framework is also considered as a systematic approach
towards addressing the multiple risks to UI system development progress. This is considered
as one of the advantages where combining elements of risk management and REA in the UI
system context is decidedly the most pragmatic way. Finally, the analysis model based on
urban infrastructural disruptions provides important devices or learning opportunities
through which critical social science can excavate the politics of urban life, and financial
CHAPTER 8-FINDINGS AND DISCUSSION
Page 234
capacity as well as technology deployment in ways that are rarely possible when UI systems
are functioning normally.
8.7 Chapter Summary
The category of UI system REA includes risk magnitude, risk causality and interaction
(interdependent), the risk impact to community, shock and stress event impact, robustness
metric and the recovery empirical strategy. They enable the community to plan and prepare
particular UI systems to respond and recover from a major disruptive event. Physical and
non-physical assets provide the means to survive and recover, improved policies, plans,
procedures and information enable the assets to be applied effectively and efficiently.
The overall objective of the RA as the initial step of the conceptual REA framework is
to prioritize further strategies development (e.g., policy, programming and investments)
towards the particular ‘considerations’ of risk being assessed: the individual, the community,
or the government and its institutions. The RA model developed in the first three phases
could also be used to look at programmatic risk – the risk of causing harm through the
intervention-or institutional risk (i.e., risks to the aid UI provider: security, fiduciary failure,
reputational loss, domestic political damage, etc).
Importantly, following the importance roles of the RA within the body of UI system
REA, RA needs to be simple and appropriate for developing country contexts, where
complete information and credible data sources may be more difficult to obtain. It is the
important first step towards obtaining a shared vision of the wider risk landscape, to help
determine what risks are to be accepted, mitigated and/or transferred; and the reference
guide for prioritizing where the resilience of individuals, communities and governments and
their institutions need to be reinforced–by both governments and by the development,
humanitarian and climate change adaptation communities.
The RA needs to be comprehensive and requires a robust governance framework with
agreed definitions and rules, to ensure consistent and reliable outcomes. Moreover, effective
RA should provide the incentive for development partners to align their efforts towards
addressing high priority risks – those that are critical on the things that people and UI
systems value – whether they are caused by one off big events, or smaller, more regular
occurrences.
The results of the UI system robustness analysis should also inform every expert and
local authority, including showing how policy and strategy programming choices: (i) Have
been prioritized based on the need to address both the shock and stress event, and achieving
CHAPTER 8-FINDINGS AND DISCUSSION
Page 235
highest UI system robustness level, and (ii) How sector and other programs incorporate
measures to build resilience to particular UI system.
Based on the simulation output, it has been shown that the most effective way to
manage risks and shocks is to break them down into layers. This will allow these risks and
shocks to be managed at the most appropriate level. In addition, the discussion clarifies that
community should not expect individuals to deal with UI system risks. This findings has been
supported by the OECD report (2012) which is found that equally the analysis discourages
government policy that aims to remove all risk from individuals and communities [200].
In former period, UI experts and authorities mainly focus on the cost benefit analysis
which are considered be a useful tool in determining whether risks should be accepted,
prevented, mitigated or transferred. However, in the context of UI system REA, the discussion
above clarified that financial cost is not the only factor to take into consideration.
Policymakers, experts and other crucial actors will also need to look at other factors that are
valued in a particular context, especially the social, economic and environmental costs of the
identified risks. Together, all these factors will help determine whether the risks that have
been assessed can be accepted, or whether DMs must be addressed.
By proposing the conceptual risk-based REA framework, in the major and minor
disruptive event, this research are contributes to support the decision making to enhance UI
system resiliency, so that: (i) Are less likely to suffer major (or minor) serviceability
disruption, (ii) Have less damage and negative impact (consequences) to dependent
communities and its system, (iii) Have more secure UI system and utilities service, and finally
(iv) Recover in a manner that is acceptable to the community. These can be described as the
intended outcome of a resilient UI system. Finally, the conceptual framework can be applied
by communities in times of need to survive a disruptive event.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 237
CHAPTER 9
SUMMARY AND CONCLUSION
CHAPTER HEADINGS Introduction Summary of Content Chronological Development of Research and Answering the Research Questions Limitation of the Current Research Recommendations for Further Work Implication of the Research Closure
9.1 Introduction
The final Chapter presents a summary of the content of this research which is discussed in
section 9.2. The discussion focuses on the link of both the research aim and objectives with
the data collected and the analysis in order to accomplish and confirm the research aim and
objectives. In this Chapter, the summary, recommendation, and conclusion are presented
based on the results and findings. Further, section 9.3 discusses the current research
limitation. The limitations of research clearly identified and finding appropriately
contextualized within boundaries.
Research occurs in a dynamic environment hence change is unavoidable. Thus, it is
important to note both the limitations and the consequences, and importantly, the research
limitations. Further, section 9.4 provides the recommended directions. The section 9.5
explains the two main sets of implications of the research; theoretical and practical. Finally,
section 9.6 gives a closure, which ends the dissertation.
9.2 Summary of Content
The UI systems operating environment in highly volatile, uncertain and ambiguous. A
reliable and functioning urban infrastructure (UI) system resilience analysis model is the
indispensable prerequisite for projecting a comprehensive mitigation plan. Strategic
decision making requires trustworthy, accurate, complete and timely information. Analysis
output has to be actionable and compiled in a way that it enables leaders to immediately
make informed decisions on priorities of response, deploy the resources and restore the
services in collective manner.
UI system research so far has mostly focused on the technical, organizational, social,
and socio-psychological effects of disturbances. This research adds the empirical risk
CHAPTER 9-SUMMARY AND CONCLUSION
Page 238
analysis (RA) perspective as a unique and distinctive contribution to UI system resilience
analysis (REA) research. This perspective connects the tangible elements of UI system with
intangible elements, captures their crucial role, and analyze their robustness capacity for
facing the disturbances. Therefore, the research elucidates that there is a need towards
building holistic risk-based UI system resilience management that focuses on both the
interactions between different types of risks, and the strategies designed to manage those
risks.
The term resilience has a number of common characteristics such as the ability to
absorb and then recover from an abnormal event; being ready and prepared to face threats
and events which are abnormal in terms of their scale, form or timing; an ability and
willingness to adapt to a changing and sometimes threatening environment; a tenacity and
commitment to survive; and a willingness of communities and organizations to rally round
a common cause and a shared set of values. Thus, resilience is the ability of something to
cope in the face of adversity-to recover and return to normality after confronting an
abnormal, alarming and often unexpected threat.
A resilient UI system require to ensure that its UI systems are sufficiently robust to
minimize the harm and consequence to its dependent community, property, the environment
and its serviceability. On the other hand, a resilient UI system recognizes that its dependent
community, other infrastructure and service may be affected by some disruptive events, but
it has the innate ability to cope during such extreme events and to recover afterwards. In real
world, few UI system can claim to be robust or enjoy absolute security.
By definition a robust UI system should be able to confront and overcome all risk
impact at all times with small or no socio-economic impact from disruptive events.
Accordingly, to commence the recovery processes, RA inevitably plays an important role as
the initial stage of the resilience analysis. As RA predominantly acts as gate to UI system REA,
however previous studies underestimated and gave less attention to the RA aspect within
REA bodies in the context of UI system case.
Following the gaps on previous UI system resilience studies, this research satisfied
the research aim (RAI) by proposing the conceptual UI system REA based on the RA as the
main entry point towards both the robustness and recovery analyses. Six phases of different
analysis models framed the conceptual UI system REA framework comprehensively. The six
phases of the analysis model, are: (i) Risk magnitude analysis, (i) Risk causality and
interaction pattern analysis, (iii) Risk impact to community analysis, (iv) Risk criticality
analysis, (v) Robustness capacity analysis, and (vi) Recovery analysis.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 239
Ensuing the RAI mentioned below, the framework develops in this research considers
the RA as an integrated part and important component within system-of-interest REA
framework among the six phases. The first three phases are focusing on the RA in the case of
UI system. The phase four is the joint RA which contribute to generate the core equation of
risk criticality.
RAI: To develop a conceptual framework of risk-based resilience assessment for urban
infrastructure system which focus on robustness property.
The risk criticality equation leads to the UI system robustness analysis (fifth phase)
by establishing both shock and stress impact analysis model based on the concept and
understanding of general delivery function and the resilience graph (Figure 4-8). The risk
criticality forms the main analysis to support both the robustness and recovery analysis in
the fifth and sixth phase respectively. The goal of the analysis models developed is to achieve
highest robustness level of the respective UI system after being disrupted and by developing
the appropriate recovery strategy and action.
From the literature review and framework validation, it is clear that the concept of
resilience and robustness is different. It is, thus, important to note the difference between
the concept of resilience and robustness. Both from the theory and analysis output,
robustness is the ability of a system to maintain its functions and characteristics in the face
of disruptive events. A robust UI system should be able to withstand all external shocks with
little or no impact on its dependent community, other infrastructure, services and values.
The conceptual framework which is constituted by a number of novel RA models
provides us with an understanding of how broad RAs and processes resonate, and further
bring around the social interest and logic of the conventional UI system REA. These differing
viewpoints can facilitate greater understanding of the connections between disturbances
and UI system robustness capacity. In the context of managing risks, building and
strengthening resilience, UI involves establishing systems that incorporate the range of risk
management.
This research discussed UI system vulnerability, which pertains (although not
entirely) to the physical and tangible parts of the particular UI system, and its implications
for response and recover against the disturbances which so far have not been systematically
studied. Accordingly, this research also put an attention towards the interdependencies of
physical, tangible and social, relational and less tangible elements of risk impacts within UI
CHAPTER 9-SUMMARY AND CONCLUSION
Page 240
system resilience analysis which are little understood in the past. While, in the past resilience
research have mainly focused on the physical/tangible elements of UI system impact.
UI system is so complex that it would be almost impossible to develop a complete and
accurate model of a UI system resilience towards disruptive events by showing all the aspects,
variables and measurements. However, such an analysis model would be difficult to
understand or apply in a meaningful way to assist policy makers, local authorities,
emergency planners and community groups. Despite a comprehensive research method and
through analysis procedure, the findings reported in this study should be interpreted in light
of several limitations identified during the conduct of the research. A number of limitations
regarding this research are discussed in the next section.
9.3 Chronological Development of Research Objectives and its Achievements
To achieve the RAI, answering and responding both the research objectives (ROs) and
research questions (RQs) are compulsory. To answer all of the research questions, several
approaches and comprehensive actions have been appropriately taken. The chronological
development of ROs and its achievements as well as the findings (and contribution) are
described in Table 9-1 below.
Table 9-1. Chronological development of research objectives and its achievements.
Research objectivess Approach/action taken RO1. To determine the risk characteristics and impact mechanisms based on literatures.
The in-depth literature review from various area, (i.e., risk management, urban infrastructure management, risk analysis, complex and uncertain system, dynamic and stochastic system, network analysis, urban community and its’ behavior) has been considered and conducted comprehensively. The literature review was conducted mainly with desktop study method. In order to achieve RO1, numerous sources, such as; international journal, conference paper, text book as well as the internet sources in the area of risk analysis, are considered thoroughly towards the literature processes.
Findings and contribution Initially, based on the literature review processes, it is found that risk has very complex characteristic. Is complexity with its dynamic and uncertain. One of the most influential things towards risk characteristic complexity is its impact scale and mechanism. In the context of UI system case, there are three significant risk impact mechanism that plays significant role, that is: (i) Risk magnitude, (ii) Risk causality and interaction pattern, and (iii) Risk impact to community.
Firstly, risk magnitude is determined by its decision factor. In previous time, the most common risk decision factor applied is both occurrences and severity. While now, there are several risk decision factors that emerged and can be applied within the risk analysis processes.
Secondly, uncover and explain that the risk is not always a single event randomly occurred that give negative effects. It is also a part of series of events that have tight link, relationship and network pattern. A phenomenon named Domino effect could help to explain the risk impact mechanism.
Thirdly, risk is not only adjusted and assessed based on both its decision factor and causality capacity. Instead, its impact affecting the community. Accordingly, for each risk event, each individual is related and affected dissimilarly. Thus, the loss for each individual is diverse.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 241
The aforementioned findings importantly contribute to open the new horizon for both academia and industry experts who pay attention to the risk management mainly in the urban infrastructure sector. and decision making. In addition, the findings on risk impact characteristic and impact mechanism useful for supporting the risk analysis processes and making decision. Therefore, lack to understand risk characteristic and impact mechanism leads to improper decision making.
RO2. To explore risk analysis methods literature and evaluate its shortages in UI resilience context
Approach/action taken This research explored risk analysis methods from several literatures
which focus on the infrastructure risk analysis context. Following the risk characteristic and impact mechanism that has discussed in RO1, this research explored the well-recognized risk analysis method called FMECA to assess the risk magnitude based on several defined risk decision factors, such as; occurrences and severity.
Further, a more advance analysis on the risk impact connection and interaction pattern is discussed with focus on several analysis methods named; risk maps and topology-based network theory, audit maps and enterprise maps. As risk impact known to have ripple impact and propagation pattern, a discussion on probability and domino effect analysis discussion also raised thoroughly.
The concept of social amplification of risk explored as risk affecting individual differently with its various (random) ways. To form a comprehensive literature review, both advantages and limitations for each of the risk analysis methods abovementioned discussed further as a part of literature review towards achieving RO2.
Findings and contribution Based on the literature review, it is found that previous risk analysis methods are narrowly focused on quantifying single characteristic of risk impact. Accordingly, conventional RA methods mainly applied in a static and deterministic environment which could not cope with real world problem (dynamic and stochastic) as risk has its dynamic characteristic and impact mechanism as mentioned in RO1.
Furthermore, it is affirmed that the conventional RA method is inadequate to analyze risk impact mechanisms in an integrated way. Such as a comprehensive model to assess dynamic risk characteristics and impact mechanisms as a unified model is absolutely needed. Therefore, an integrated RA model needed in order to assess risk in a dynamic environment.
Besides, the integrated RA model is needed as a pivotal element within UI resilience assessment, as far as researcher aware there is none study ever raised this issue. which has not touched by any of previous studies. Therefore, this knowledge gap has a position as a challenge to this research that need to be achieved.
Besides, risk and resilience approaches share four key characteristics which gained little attention recently. It is found that a few studies have investigated the important role of RA involvement in defining the UI system resiliency specifically, providing no insight into the role of risk management knowledge in defining the UI resilience.
RO3. To identify and develop risk function and analysis model respectively towards measuring the critical risk upon its’ impact mechanisms.
Approach/action taken Based on the risk characteristic and impact mechanisms explored and discussed from RQ1, the risk magnitude is analyzed based on the three dimension of risk decision factors, that is; occurrences (O), severity (S) and detectability (D). To analyze the risk magnitude, a Fuzzy-based FMECA is applied. The Fuzzy and Grey theory is used to accommodate divergent risk perception from participants as well as to cover the limited capability of conventional FMECA method.
Further, to model the impact mechanism of risk in terms of causality and interaction pattern, 1-mode social network analysis method is applied. In here, the risk events are modeled as a node that connect and interact with other nodes within specific risk network. To simulate the risk impact behavior and interaction, a risk-risk matrix [R-R] was formed as a base for simulation input.
Accordingly, to model the risk impact mechanism to community, 2-mode social network analysis is applied. In here, both risk and stakeholder are
CHAPTER 9-SUMMARY AND CONCLUSION
Page 242
modeled in different node types that connect each other. Note that, in 2-mode social network analysis, the node interaction only happened between different types of nodes. Therefore, there will be no any interaction between the same type of node.
To simulate the behavior risk impact to community, a stakeholder-risk matrix [S-R] is also developed as a base for simulation input. Both 1-mode and 2-mode social network analysis are applied in order to theoretically obtain risk impact behavior via network topology decipherment and visualization. Both network topology decipherment and visualization shown mathematically and graphically the dynamic of risk impact pattern.
The network topology decipherment applied, such as; degree, degree centrality, closeness centrality, betweenness centrality, eigenvector centrality and status centrality. Importantly, each of the network topology decipherments is shown in-depth understanding towards the risk impact network. The network topology decipherment applied, and its description can be seen in Table 4-2.
The risk criticality model is thus developed by integrating the three elements of risk analysis models discussed above. The risk criticality equation can be seen in the Eq. 5-16 (section 5-7). Equation 5-16 spell out; the risk magnitude element stands as the main coefficient that affect the sum of both 1-mode and 2-mode risk impact analysis output. To validate the risk analysis models, a real case study using urban water supply infrastructure system in Indonesian case study is applied.
Findings and contribution Applying the Fuzzy-based FMECA methods, the risk magnitude analysis result in a reasonable risk ranking. While, applying the risk criticality analysis model, the simulation output for risk ranking is changed dramatically. Comparing both the risk analyses output, the dissimilarity simulation result is found through the change of risk ranking. Out from 30 risk events identified, as many as 25 risk events ranking is changed (see Table 7-7).
The different risk ranking result is due to the Fuzzy-based FMECA being solely focused on the three dimensions of risk decision factors determined rather than taking into consideration two latent risk impact (i.e., risk causality and risk impact to the community).
The change of risk ranking orders between risk magnitude and risk criticality uncovers two insights. Firstly, there is an absolute intrinsic uncertainty and individualized value systemin accurate assessment of risks in decision making process. Secondly, considering both magnitudes and cause-impact propagation in assessing the risk, the framework is found to be a robust methodological advancement from risk prevention and building resilience perspectives.
Therefore, lack of integration of risk causality and interaction pattern as well as its impact to community based on the degree of community-risk associated made such methods grossly incomprehensive. Further, not paying attention to these aspects of the analysis leads to the loss of some important information which eventually results in substantial vagueness in the prioritization process leading to miss-guiding and miss-management of the risk. This leads to ineffective decision making towards UI risk prevention and resilience actions.
Clearly, the risk criticality analysis model does not require criteria weighting or accurate quantitative calculation as it simplifies complicated decision-making process by solving problems based on both qualitative and quantitative information. The novelty of the risk criticality model is evidenced by its ability to improve the simulation and analysis estimation accuracy.
From the simulation output, it is also found that the risk criticality level is not only pertinent to the joint RAs output, they are also related the individual capability, resources availability and other external factors and constraints. Moreover, the phase-4 of the conceptual framework also contributes to the literature in several ways. - The analysis models established a benchmark for development of a new RA methods in the UI system and community networks context.
- By validating the effectiveness of the risk criticality model, the approach is found to be considered useful from a methodological advancement when
CHAPTER 9-SUMMARY AND CONCLUSION
Page 243
prioritizing similar or competing risk criticality values. Further, the risk criticality analysis model could;
- Be a tool to ensure an early response for detecting early warning mechanisms for different types of risks, which will in most cases be cheaper and more effective.
- Potentially assist the evaluation of decision making related to risk governance. - Support the vulnerability management of the infrastructure and increasing both the infrastructure and community resilience.
- Leads to aiding an effective risk communication strategy as part of the risk mitigation strategy which found to be useful to communicate who, or which organization or ministry, is responsible for managing each of the critical risks.
- Help provide incentives for paying proper attention to addressing those risks and help support public accountability.
RO4. To establish system-of-interest robustness analysis model as a function of time.
Approach/action taken Literature review pertaining to the system resilience was conducted in order to obtain a basic theory and ground understanding towards the resilience analysis. Following the common system resilience study, an adjustment towards the figure-of-merit applied. Both main shock and stress function transition model were developed.
To model the shock function, the input for three risk analyses variables is set to be the maximum. From here, shock function showing the ‘high devastating risk impact capacity’, or maximum impact capacity of risk could produce. On the other hand, shock function also indicates to the maximum capacity of respective urban infrastructure system withstand to the particular risk impact. Meanwhile, the stress function specifies the actual risk impact capacity. In here, the actual risk impact capacity refers to the risk criticality.
Based on shock function, stress function and the risk criticality definition, the system-of-interest robustness analysis is developed. A system robustness defines the capacity of particular UI system to actually withstand the risk impact. System robustness estimation is based on the subtraction between shock value and stress value, in a specific time period.
Findings and contribution Although there are various methodologies towards system robustness analysis and computation, however this research proposed a novel model to assess the urban infrastructure system robustness. Based on the case study applied to validate the model, it is found that the robustness level of urban infrastructure system, right after the disturbance occurred, is mainly affected by; system’s capacity and capability to face the uncertain and unexpected disturbance with random impact effect.
The building of system’s capacity and capability to face the risk influenced by many things. Such as; community preparedness towards the disturbance and progressive infrastructure maintenance. Therefore, the system robustness cannot exclusively assess solely by the shock function, stress function and risk criticality elements.
The analysis model output it then rechecked following the desktop study and expert opinions from the interview. Following the case study of urban water supply infrastructure system in Surabaya, it is found that the simulation and analysis output was recognized close to reality. Although expert in the field not really consider and understand deeply this research, however the simulation result obtained, considered as proper analysis result. Experts express that the pollution and contamination (R5) is a multi-dimensional and very serious problem which generate enormous negative impact.
The answer to RQ3, contributes to the literature in several points; - The preliminary risk analyses and risk criticality analysis are stand as
the crucial gate towards the robustness analysis model. - This model brings a new perspective in system resilience analysis since
in past the role of risk analysis within resilience analysis still gained little attentions.
- The maximum risk impact and the actual capacity of urban infrastructure system withstanding particular risk impact can be assessed thoroughly. The analysis output will give deeper understanding to the expert and decision makers towards
CHAPTER 9-SUMMARY AND CONCLUSION
Page 244
preparedness and, or post-disturbance infrastructure system recovery management.
RO5. To develop system-of-interest recovery analysis model.
Approach/action taken As RQ3 has been answered thoroughly, the system recovery analysis model is then developed. The system recovery processes started after the system passed the ‘slack-time’ period. That is, the period that system initially try to do an initial recovery from the disturbance affected and could not functioning normally (as its robustness capacity level reduced). A one-point time period is determined to represent the ‘slack-time’ period. The goal of system recovery is to obtain robustness level as high as it can be in the end point of time analysis. The recovery analysis model is developed by applying the concept of optimization. It is the process to find the best solution towards obtain the optimum result. In here, the solution is to balance the risk variables input so that system can enhance its robustness capacity overtime. The recovery model formula can be seen in equation 5-20. To validate the model, the analysis is conducted in a deterministic-based time frame analysis. For this research, the recovery period is determined only 12-point of time. As many as five scenarios of recovery analysis was conducted to search the optimum robustness level in the end of the time period. For each of the single point of time, the recovery model input is assumed randomly to generate different robustness level over time.
Findings and contribution Although the recovery analysis model follows the concept of optimization, nonetheless none of the five scenarios of recovery analysis reached 100% robustness level. Theoretically, following the recovery model proposed, urban infrastructure system robustness level increase as time goes by. However, interestingly, it is found that there is a point when the system experienced obstacles and slowness towards obtaining the expected robustness level value.
One of the deterioration can be found during t8 to t9 when scenario 5 undergoes a downgrade of its’ robustness value from 0.822 to 0.815. This finding shows that the system recovery process is complex and is influenced by various dimensions, such as; time dimensions, spatial dimensions and by interdependencies between different economic sectors that are interested in the recovery process. Further, it also found that resilience behavior can be different among all recovery model metrics. The case study analysis illustrates the benefits of implementing the right recovery plan and action. This indicates that it is possible to arrive at an ‘optimal recovery strategy’ that would enable the system to bounce back quickly and efficiently considering the figure-of-merit of interest.
RO6. To undertake a case study investigation to test the applicability and validate the conceptual assessment model.
Approach/action taken Surabaya water supply infrastructure system has been chosen as the main
case study to test the applicability the conceptual assessment model. As many as 250 design-based questionnaires had been disseminated to various prospective participants which includes 6 stakeholder groups. Around 126 questionnaires had been successfully obtained within 5 months during data collection period. Further, instead participating to fill the questionnaire, a semi-formal interview had been also conducted to grab experts point-of-view regarding both the risk and resilience issue in Surabaya water supply infrastructure (see Chapter 6).
As a preliminary step, data processed following the initial phase of the framework. Then, following phase 1 till 6 of the proposed framework the input data processed thoroughly. At this quantitative data processing stage, phase 1 till 6 produces risk magnitude, risk impact to stakeholder, risk interaction, risk criticality, resilient analysis and recovery analysis respectively. It is important to note that there were several assumption and adjustment made in order to mimic the real-world problem. These processes are discussed thoroughly in Chapter 7.
By conducting manual checking the questionnaire obtained, a number of data missing had been processed as well. Then, applying high-level Microsoft Excel coding and calculation processes as well as Net Miner 4.0., the input data processed and computed. Several computational simulations employed to
CHAPTER 9-SUMMARY AND CONCLUSION
Page 245
comprehensively generate the computation results. The discussion and finding for each analysis model phases are then performed in Chapter 8.
Findings and contribution The result and findings for every model phases are discussed well in
separated sub-sections. Importantly, results from the interview section with the experts were applied to support the findings to strengthen the argument. The result from analysis model Phase 1, 2, and 3 are considered well as the discussion went comprehensively. In Phase 1, risk magnitude analysis shows clear risk ranking order based on three risk decision factors. A discussion supported by the actual proof from expert opinions is delivered in section 7.3.
While Phase 2 and 3 are discussed in section 7.4 and 7.5 respectively. Both analyses found that risk events are affecting and interacting each other as well as impacting community differently. This risk characteristic and behavior are uncertain and un-patterned. Interestingly, in Phase 4 presented comparative analysis output between risk magnitude and risk criticality applied in Fuzzy-based model.
This phase brings a new horizon as the result comparison between risk criticality model with conventional risk magnitude analysis method shown a very striking difference. It can be concluded that the results of the numerical illustrations showed that risk criticality analysis provides more accurate priority-based rankings of alternatives by taking into consideration; (i) The participants affirmations towards risk decision factors, (ii) Risk magnitude, (iii) Risk causality and interaction pattern, and (iv) Risk impact to community.
Moreover, the change of risk ranking orders between risk magnitude and risk criticality uncovers that; (i) There is an absolute intrinsic uncertainty and individualized value system in accurate assessment of risks in decision making process, (ii) The framework is robust from risk prevention and building resilience perspectives.
The robustness analysis model in fifth phase works well by showing that it delineates the ability of the UI system to absorb and respond to the full impact. The fundamental concepts of UI system resilience discussed herein provide a common point of reference and a unified terminology. It is worth to note that the proposed REA metrics only provides a quantitative value for the system robustness.
Accordingly, these metrics become useful and valuable only when used to devise effective recovery strategies and actions for the system of interest. Preventive strategies or improvement resources may simultaneously affect the resilience under different risk types. Furthermore, the resilience approach is applicable to any system as long as FOM can be computed for different states under consideration. This would be of help to systems engineers during overall system mitigation plan and design, or while devising recovery strategies.
On the other hand, during the recovery analysis, an uncertainty mainly takes place where experts and academia face new and unforeseen disruptions. Following this issue, this research adopted a scenario-based simulation design for the recovery model simulation. This adjustment enables control over extraneous variables that could affect the value of the dependent variable.
Nonetheless, although this research is able to better control variables towards enhancing UI system robustness capacity, the results may lose some generality. In the sixth phase of conceptual framework, the scenario-based metric used within a classical description of non-stochasticity does not provide information on the quality of the assessment.
9.4 Limitation of the Current Research
No single analysis model and computational simulation can offer definitive proof or support
for a theorized relationship by itself. This research does not come without its critics, or
limitations. It is worth to note that, this research was brought only one case study towards
testing and validating the applicability and reliability of the model. Hence, even quantitative
CHAPTER 9-SUMMARY AND CONCLUSION
Page 246
techniques were used in developing the model, generalizing to a population beyond the case
study would not be appropriate. As such the model is domain and case specific. Rather, both
the case study and findings in this research serve as a testing model and lesson learned.
In addition, the determination of both stakeholders and risk decision factor weight
value are missing. In order to obtain data from participant in the fieldwork, it is in
appropriate to assume that stakeholders have same weight value or have a same level of
position in terms of giving their perception/opinion within the RA processes. Contrarily, in
real world the weighted values for different stakeholders are crucial parts as it reflects the
different experiences, powers and legitimation, perception, opinion, influence and interest
that stakeholders hold. Further, during the data collection, the use of convenience sampling
as well as the snowball sample methods can create research analysis bias.
In addition, the risk decision factors also have divergent of weight values depending
on its’ characteristics and influence effect. Although a classical experience-based risk
identification and assessment method is more practical, as had been used in this research,
ideally more stakeholders may be evolved and considered through the snowball method,
when implementing phase 1, 2 and 3 of the analysis models, to increase the accuracy of RA.
While applying SNA method in the second phase of the conceptual framework, a social
network study requires to dichotomize the risk relationship matrix comprehensively me.
However, there is no single method to dichotomize the matrix value due to which an
improper simulation result and incomplete information may be resulted. Similarly, in phase
3 of the conceptual framework, a social network study requires one to list and enumerate all
actors related to the problem at hand, the option of using individuals as nodes were deemed
both impractical (too many individuals to visit) and infeasible (impossible to list all
individuals involved).
Moreover, when considering disturbances on UI system, Gaillard, J. C., suggested that
‘resilience’ tends to frame risk events as threats and appears to increase the prominence of
physical science in identifying solutions [5]. Framing risk in the context of resilience may
inadvertently downplay the focus on other aspects, such as; poverty, vulnerability and the
political economy of skewed development, which definitely draw attention away from the
role of agency, power and politics. As Cannon and Muller-Mahn (2010: 623) argue, resilience
[291];
‘.....is dangerous because it is removing the inherently power-related connotation of
vulnerability and is capable of doing the same to the process of adaptation’.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 247
Conversely, the vulnerability dimension of the conceptual REA framework including
its analysis models seeks to place emphasis on the root causes of UI system disturbances.
Nonetheless, it should be noted that the conceptual framework proposed in this research
lacks in placing emphasis on individual, institutional and system wide capacities, which is
actually could have helped to expose concerns about an inability to address underlying
causes and where weaknesses (such as lack of power) have an impact on overall functioning
of the UI system.
This research puts attention on the main scientific and technocratic responses
divorced from a focus on RA and REA. This research also divorced from a focus on social
processes and systematic failures as well as the policy implication development for the UI
system. In addition, this may result in a skewed, incomplete and potentially ineffective
version of ‘resilience’ being pursued locally. Although the research proposes the conceptual
UI system REA framework from the entry point of RAs, however painting a picture of
resilience as undesirable raises quite different sets of questions.
On one level, UI resilience implies both physical and non-physical capacity to bounce
back from a significant obstacle, much like a rubber ball dropped on the pavement. But UI
systems are not rubber balls, nor is a disaster like an asphalt plane, from which a rebound
can be definitively predicted by a set of mathematical equations. This constrain should be a
trigger for scholars towards seeking systematic analyses of post-disaster recovery. By
developing the recovery model analysis, the time required for each activity period, in the
further time, is approximately predictable.
Accordingly, it is essential to propose and test a “model of recovery activity” that
classified the recovery process into four distinguishable stages; (i) Emergency responses; (ii)
Restoration of the restorable; (iii) Reconstruction of the destroyed for functional
replacement; (iv) Reconstruction for commemoration, betterment and development [292].
Besides, it acknowledged that the rate of recovery is “directly related to the extent of the
damage, the available recovery resources, the prevailing pre-disaster trends, and such
qualities as leadership, planning and organization for reconstruction”.
This sort of analytical framework is certainly a valuable contribution to the task of
explaining post-disaster UI system recovery, yet it masks as much as it reveals. Another
limitation that this research has is that this research is lack of external validity. Measurement
validity applies primarily to quantitative research and to the search for measures of social
scientific concepts [293]. Essentially, it is to do with the question of whether a measure that
is devised of a concept really does reflect the concept that is supposed to be denoting.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 248
External validity is concerned with the question of whether the results of a study can be
generalized beyond the specific research context.
As the application of case study is to test the applicability of the proposed model, thus
the case study findings could not be generalized beyond the 126 respondents participated.
In other words, the result and findings from the case study could only apply to the 126
respondents alone. It is in this context that the issue of how people are selected to participate
in research becomes crucial. This is also one of the main reason why this research is so keen
to generate representative samples. Notwithstanding the above limitations, there is also a
need to provide a sound bases for future research explained in the next section.
9.5 Recommendations for Further Work
The exercise of measuring resilience may be considered highly tedious and clumsy,
depending on the understanding and weight given to concepts such as coping, capacity,
vulnerability and adaptive capacity. In addition, the relationship between risk and resilience
has received less attention and rarely developed in full and is by no means universally agreed
on. Much of the work on disaster resilience, for example; draws on understandings of the
relationship with vulnerability and seeks to measure levels of that vulnerability rather than
resilience itself [4, 16, 95, 294, 295]. This research recommends further work which can be
done in order to fill this research limitations.
Further research is needed to account for both stakeholder and weighted risk values
applied within the calculation method processes. More research will be needed to extend the
Fuzzy and probabilistic risk scenario considering disruptive events and components
recovery times in stochastic manner. Also, experimentation will be considered on a set of
case studies related to a more complex real-life UI system scenario facing disturbances and
considering various FOM as well as resources required for performing the resilience action
and/or mitigation strategies.
Scoring systems are being used in important real-world applications as well as risk
matrix systems. Yet these risk-scoring systems can perform extremely poorly compared to
optimization methods, allocating resources so that much less value-of-risk reduction is
achieved. Hence, further research is needed to build an optimization analysis model for
measuring optimum robustness strategy. The optimization result leads to a predictive
analysis to what (and in which scenario) various robustness variables and formation
strategies will take place in order to achieve the maximum UI system robustness capacity
level.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 249
Nonetheless, this discussion is beyond the scope of this research to develop a
comprehensive optimization model of UI system robustness. Particularly, a multiple-
objectives analysis is important due to the temporal dimension of vulnerability analysis. A
certain set of resilience actions may be delegated on the basis of dimensions of the system
function prioritized for recovery. Indeed, such an optimization model could never be
universal due to many aspects within the UI system resilience analysis and the diverse range
of potential disruptive events.
Regardless, building a novel and comprehensive optimization method using various
metaheuristic models and compare the result for assessing and determining the recovery
strategy would be very influential. Since in this research most of the risk events identified
and considered are negative risks (i.e., consequences), further research need to consider the
positive risks (i.e., opportunities) into the analysis as well. It was assumed that the risk
causality and interaction pattern within the network is static. More research in the modeling
area is needed to analyze the risk network in dynamic circumstances.
Moreover, a REA scheme with time-series and data collected from a real world
extreme events will potentially add significant novelty and confidence in the system
functionalist and application. Analysis of such data will provide valuable insight regarding
policies and plans to reduce infrastructure service disruption and the impacts of that loss on
communities. It will also facilitate the development of new and better computational tools
for supporting resilience planning and management.
In addition, more research is essential to analyze the network in dynamic
circumstances. Notwithstanding the mentioned limitation, a contribution of the RA model
provided a sound basis for future research. First, future research should be undertaken to
develop a method for assessing stakeholder vulnerability in the face of UI system
disturbance. Therefore, the risk mitigation plan can be effectively unified for minimizing risk
impact and strengthen the vulnerable community. Second, the threshold value of
relationship intensity between risk and individual stakeholder should be defined properly
to produce rigorous network simulation result.
The further research needed, as mentioned also from OECD publication [200], to
examine how to build and construct a common REA of UI system that unites and makes sense
of the four key properties of resilience. The common REA which can embrace its four
properties following structured and comprehensive data collection in resilience-building
and analysis are;
- Merging different forms of data and analysis: merging surveillance, early warning,
CHAPTER 9-SUMMARY AND CONCLUSION
Page 250
assessments and impact analyses.
- Combining different thematics: incorporating risk and needs analyses according to
natural hazards, man-made threats, seasonal impacts and the effects of long-term
trends driving change in risk and needs.
- Using data and analysis with varying parameters: information that may vary by (i)
Scale: from local to inter-city, and regional to national; (ii) Timeframe: from weekly
to periodic multi-year exercises; and, (iii) Coordinating a multitude of actors
collecting data in isolation, from local to various actors, including humanitarian and
development agencies, thematic and sector-specific and special-interest actors, all
with different methodologies for collecting data.
- To develop a unified model which can accommodate four properties of resilience for
helping community to recover and restore their capacity disrupted by extreme events.
- Another limitation of this research is that, the RA applying SNA method in the case
study was a one-off. For a more longitudinal result, the dynamics of the risk network
should be monitored and reviewed periodically in a real situation.
- Furthermore, the analysis process does not consider stakeholders’ perspectives and
input towards risk and its impact. All stakeholders should have adequate
opportunities to have their voice heard in the process of defining and evaluating the
level of risk impact and UI system robustness respectively based on their point of view.
Accordingly, stakeholders’ input should be taken in accordance with their particular
concern on different project definition elements.
Further, it is important to mention the challenges that this research faced during the
analysis of the simulation output, that is; the information and analyses are lacked between
different forms of data systems (surveillance and early warning systems, assessments,
impact and cost benefit analyses), which importantly to be carried out at different
geographical scales, across different timeframes or cycles of time, involving a myriad of
uncoordinated actors.
During the stakeholder identification and data collection in this research, there were
numerous heterogeneous actors that are interconnected through strong social interactions.
They are embedded in multiple levels of institutional and cultural layers which act as a
normative guideline to individuals. In the case of infrastructure management, where a
growing number of actor groups are becoming involved and acquiring new responsibilities,
there would appear to be a real need to broaden the scope of actor analysis.
In addition, it is not enough to pose the general model of simplified UI system
CHAPTER 9-SUMMARY AND CONCLUSION
Page 251
recovery model using exponential recovery functions. It is mainly because of the extent, pace,
and direction of UI system recovery are chartable only in very general terms and present a
woefully incomplete picture of real world environment. Moreover, even if every extreme
event follows a predictable pattern of restoration -it is not this generality that is interesting;
what matters are the variations. Considering that this research is still in the early stage, the
complex recovery models are not available.
Thus, it is possible to describe relationships across different scales-socioeconomic
agents, neighborhood and community, and to study the effects of different policies and
management plans in an accurate way. Therefore, building different types of recovery
functions that can be cope with and selected depending on the system and society
preparedness response respectively (e.g., linear and trigonometric model [9, 72]), is also one
note for further work. To do this the recovery model could be continuously updated as soon
as more data are available using stochastic and dynamic approach.
Additionally, several adjustments need to be applied within the model analysis
framework to mimic the real-world problem. In this context, the adjustment has to reflects
and refers to the three main engineering application abilities, that is; (i) Application of
established engineering methods to complex engineering solving, (ii) Application of
systematic engineering synthesis and design process, (iii) Application of systematic
approaches to the conduct and management of engineering projects.
Following the research limitation mentioned in previous section, instead of focusing
only to the model validity, further research also need to give an attention towards evaluating
three most prominent criteria of social research, that is: (i) Reliability, (ii) Replication, and
(iii) Validity. This research suggests another further work to evaluate the risk-based UI
system resilience analysis model reliability by repeating the model application to other UI
case study. The idea of reliability is very close to another criterion of research-replication
and more especially replicability.
Accordingly, reliability is concerned with the question of whether the results of this
research are repeatable. Reliability, in other words, measuring the consistency of
measurement that are devised for this research concept. Importantly, the evaluation of risk-
based UI system resilience analysis model reliability might particularly unmasked latent
findings of current research original results that do not match other evidence. In this way, to
do replication, the risk-based UI resilience analysis model must be replicable.
Since this research described the methodology and procedures in great details,
replication is possible for other case study. Similarly, to assess the reliability of a risk-based
CHAPTER 9-SUMMARY AND CONCLUSION
Page 252
UI system resilience model concept, the procedures that constitute that measure must be
replicable by further research work. The application of more than once case study in order
to repeat the experiment is then essential. Therefore, further work towards evaluation this
model would be a great opportunity to test the model reliability and replicability.
As discussed earlier in the limitation of the current research section, each analysis
models and simulations are subject to a host of random factors that affect the outcomes.
Hence, there is always a chance that a single simulation in this research study, no matter how
well conducted, may produce misleading results. This is the reason why replication and
extension recognized such an important part of further research. Most importantly, the
process of replication, strengthens the results analytically, and to reveal a pattern of
replication from the findings.
As Eisenhardt points out, following the replication logic resulting from more than one
case study is central in shaping theory [296]. Regarding the external validity limitation that
this research owns, it is then acknowledged and expected to apply the model to more
generally UI case study with substantial populations of urban infrastructure broader
stakeholders at the time particular UI system disturbed by the extreme event.
Accordingly, further work is also needed towards mapping the social organization of
UI system management in selected urban regions, identifying the principal actor groups,
their spheres of influence and forms of interaction with one another. This approach needed
towards analytical generalization, which can be assumed to provide more compelling
evidence of the model framework superiority. Notwithstanding the above-mentioned
limitations, this research has contribution in the both theoretical and practical implications
which are discussed in the next section.
9.6 Implication of the Research
Recently, resilience has become a buzz word and being recognized as a major element to the
success of UI system surviving the aftermath of disturbances while returning its capacity to
the period when there was no disturbance. This has encouraged researchers to expend a
significant amount of effort in attempting to provide strategies to maintain UI serviceability.
Most of these attempts have focused on investigating REA method in technical context to
improve the UI system resilience, thereby enhancing the UI system capacity level.
Despite numerous research efforts, more studies are required to advance the existing
body of knowledge and generate practical research outcomes that benefit both the UI and
urban community as the dependent party. With this in mind, this research was conducted
CHAPTER 9-SUMMARY AND CONCLUSION
Page 253
with a view to provide conceptual progression in the area of RA and resilience research in
the context of UI system as well as practical contributions for the management of risk within
the UI system context. Based on the empirical results of the previous Chapter and the
discussions, this Chapter will highlight proportions and implications for theory as well as for
practice that has been hosting the research study.
9.6.1 Theoretical Implications
This research contributes to the body of knowledge in both risk management and UI
management by proposing and validating a novel risk-based REA conceptual framework. The
framework concept development is to investigate and measure the UI system robustness
level after being disturbed. The previous literature suggests that risk management and REA
theories are two separate domains, which are often investigated separately in the system
management field. However, this research show that REA particularly in the context of UI
system can benefit from RA theories, which can complement UI system REA.
In an attempt to fill the identified gap in the literature on developing well-defined UI
system robustness level that account for RA roles importance. This research uses three
different RA models, namely; risk magnitude, risk causality and interaction pattern, and risk
impact to community for developing risk criticality analysis which stand as the point of
departure towards the UI system REA processes. The combination was used to provide an
evaluation tool to measure the critical level, shock and stress impact of particular risk, and
UI system robustness capacity.
By applying participation theories to bring together risk and resilience analysis in
infrastructure management, this research contributed to the theory in both UI risk and
resilience management literature to quantify stakeholders’ input to measure the level of UI
system robustness capacity and recovery processes. The study provides empirical evidence
to support the notion that UI robustness capacity with resilience analysis scope is improved
when comprehensive recovery strategy developed, appropriate decision made, and action
conducted after the system has been disturbed.
Further, this research contributes to the UI resilience body of knowledge by
expanding previous resilience research by applying the RA as a main element of the analysis.
Previous research that developed the UI system REA for measuring one of the resilience
property can be improved by considering several RAs within the process. In addition, this
research complements the UI system robustness analysis by quantifying risk criticality,
shock and stress impact inputs in evaluating the completeness of the robustness elements.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 254
Findings from the case studies revealed the result of risk magnitude analysis is not
comprehensive and cannot be used as a sole consideration towards making crucial decisions.
The risk magnitude, in fact, lacks consideration in both the risk causality capacity and
interaction pattern, and its impact to urban community. This offers empirical evidence for
the explanation of comprehensive risk management and decision-making as a regarding of
comprehensive RA solution. Adequate and effective RA can further support to build UI
system REA comprehensiveness and management capacity towards a better robustness
analysis and recovery strategy outcome and plan respectively.
Through this process, authorities and other experts will be able to highlight optimum
strategies for the recovery strategy towards enhancing UI system robustness capacity post-
disturbances period. This should help in achieving a good understanding of all stakeholders’
requirements and concerns from the particular UI system, reducing the constraints
challenges and conflicts which would be arose in recovery processes.
The innovation of developing the conceptual risk-based REA framework in this
research lies on the combination of three different risk impact characteristic elements. The
risk impact characteristics is built upon various mathematical variables from the three
dimensional of RAs, that is; risk magnitude, risk causality and interaction pattern, and risk
impact to community, which leads to the development of risk criticality analysis model. The
risk criticality then applied as the main gate towards the robustness analysis based on
general model of system REA. Previous studies analyzed the UI system risk and resilience
separately, to fill this knowledge gaps, this research linked the two domains by the
combination of several techniques abovementioned.
In addition, studying urban infrastructural disruptions allow various stakeholders
(both experts and lay people) to do much more than learn policy of planning lessons about
how to avoid repetitions of such risk events or how to ameliorate their effects. The analysis
model fills the risk management knowledge gaps by suggesting that networked approach to
RA are uniquely suited capturing the intricate processes that shape UI risks. Further, by
validating the proposed model into a real case study, this research shows the capability of
the model and application for supporting the UI risk governance and enhancing community
resilience.
Further, this research also contributed to the theoretical concept underlying the UI
system REA by considering the importance of both RA and stakeholders role, to identify their
relative contribution to the analysis elements. To the best of the researcher’s knowledge, this
is the first time that this combination has been incorporated into RA to measuring and
CHAPTER 9-SUMMARY AND CONCLUSION
Page 255
developing the level and recovery strategy of UI system robustness capacity respectively.
Thus, the proposed conceptual framework, including with its analysis models and
approaches, contributes to theoretical insight and technical originality.
9.6.2 Practical Implications
The quantitative model proposed in this research is novel in terms of UI system resilience
research and generic, so that it can be applied to different UI systems in various scenarios
and disciplines in a consistent manner. This research contributes as a practical tool for
experts and DMs to;
1. Determine the amount of investment that could be used for resilience strategies. It is
inevitably for the UI system to have proper maintenance to improve its’ serviceability.
The maintenance including various preparations towards bear the unexpected
extreme event that could affect UI’s serviceability. In fact, this arrangement needs
rigorous investment plan which in real world, the realization is challenging and
burdensome. In the face of this issue, this research contributes as a constructive and
functional tool for experts and decision makers in planning and deciding the
investment strategies enhancing UI system resilience.
2. Develop public awareness strategies. As examined by Frischmann, B. M., the UI can be
seen as common management which conjures up the notion of a shared community
resource and further brings to mind the related concept of open access or openness
[14]. Thereupon, the urban community relationship with UI system is inseparable.
Accordingly, the success of building UI system resiliency influenced by active public
participation. In the planning period, this research can be applied to guide arranging
the strategy related with community and human resource. The results of RA and REA
should be used to raise the awareness levels of key DMs. This can be achieved by
presenting the results to various authorities and experts locally and nationally. The
RA should also be shared with those who are charged with managing the response,
depending on the context. Greater knowledge of risk profiles should lead to the
prioritization of investments to strengthen resilience in UI systems and development
plans. Further, it also helps embed risk knowledge into governmental policies,
regulations and standards, including at regional and local levels. Accordingly, this
should also help governments ask the international to support UI system resilience
building efforts.
3. Achieve the level of robustness that they would now enable the UI system to exhibit
CHAPTER 9-SUMMARY AND CONCLUSION
Page 256
in case of a disruption in future. The recovery analysis model contributes as the main
formula underlying the guidance of recovery plan and strategy. Accordingly, the
recovery model also can be applied in a such way to forecast the recovery action
output by using designed-based or random input towards achieving highest
robustness level. In addition, this research also has an advantage to be efficient tool
to adjust the optimum resource needed in condition when resources limited
Meanwhile, based on the risk impact to community analysis model, the output could
be communicated to the public, targeting those who are likely to be affected. Messages
should be tailored to local condition and include preparedness measures and guidelines on
what to do in times of crisis–even if those crisis periods are regular and lower-impact.
Accordingly, the proposes analysis model can be a guideline on content that will help limit
confusion and conflicting messages.
Several trusted organizations, perhaps government-based organizations, such as;
local authorities and leaders on respective UI system, and Non-Governmental Organizations
are the most useful conduits of risk messages. Furthermore, the proposed RA framework
was carried out by experts in different way from those that have performed in the previous
time, to allow for different perspectives. Furthermore, the comprehensive of the risk
criticality model as a core element within REA suggests it is appropriate for planning
purposes. It capable facilitates the creation of a database schema for UI loss and recovery,
and its impact on indicators of community resilience.
The conceptual framework proposes in this research could be used to help educate
various stakeholders in particular UI system about empirical findings from UI management
studies (e.g., what types of extreme events have the most difficulty recovering from certain
UI disruption). Such a conceptual model is daunting for implementation but can provide
significant opportunities for advancing specifically, UI and community resilience research
and planning respectively, more broadly.
Not to mention, the recovery analysis model in this research will further push
understanding of UI resilience and facilitate the development of better tools for supporting
resilience planning. Importantly, the RA and REA output could be applied to inform various
stakeholder groups in consistent and persistent messages to internalize information, change
perceptions and move towards taking appropriate action.
For policymakers, both RA and REA outputs, can be a useful communication and
decision-making tool towards supporting the policy and program design, which aids to:
- Identify the most significant threats in UI system context.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 257
- Identify the people, assets, environmental and economic resources that are most
exposed to (or particular) risk event.
- Weigh up the relative costs and benefits of different plans and strategies to mitigate
the impact of various risks.
- Establish priorities amongst these mitigation strategies, and
- Make the appropriate policy changes and programming decisions to implement the
resilience measurement and strategies to enhance resilient UI system.
On the other hand, several RA models proposed could illustrate and inform the DMs
if risks exceed acceptable levels and trade-offs. Ideally, policy and programming decisions
should aim to prevent all unacceptable risks; often, in fact, this will not be financially viable.
Thus, the models can support the development of both plan and strategy towards addressing
the risk swiftly and concisely.
Following the robustness and recovery analysis models that aim to enhance the UI
system robustness capacity post-disturbance, practically, it is found that optimal strategies
will need to focus on building the resilience of the people, communities and institutions at
risk by a mix of policy and programming work. This includes: (i) Empowering those at risk,
(ii) Mitigating risks and its impact, and, (iii) Where feasible, through risk transfer strategies.
In addition, the robustness analysis approach will provide a common framework
which should assist policy makers, community development workers, and emergency
managers share a common perspective, and thus develop complementary policies and
priorities for building both respective UI system and community resilience. The robustness
and recovery analysis model provide the information and ideas needed to plan and prepare
for, respond to, and recover from major (and minor) disruptive events.
Such information draws on stakeholder experiences, improvements to operational
practice (gained through lessons learned and experimentation) and a thorough analysis of
immediate and future risks. Finally, the conceptual risk-based REA framework provides
policy makers, emergency planners, community leaders and individuals with the ability to
understand the context in which recovery plans and strategies can be developed and serves
as the foundation upon which adaptability and innovation may be exercised.
Furthermore, the analysis model contributes to the risk management literature that
can support the governance of UI by developing scenarios and quantifying the value of
countermeasures and making fundamental policy. Finally, this phase also contributes to
delivering practical tools for the urban communities towards developing better UI risk
management system and enhancing community resilience.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 258
The simulation output based on the conceptual framework would be significant
towards supporting the politics of investing in different options, on the economics of how to
balance investments. Specifically, the investment across the continuum in the context of
dynamic and interacting risks and on the extent to which implementation of measures across
the risk management helps develop the attributes of a resilient UI system.
9.7 Closure
This research was conducted in response to the need for a more comprehensive procedure
to assess UI system REA by putting RA as a high consideration of crucial element. More
specifically, the purpose of this research is to pave the way for empirical research on the
subject and to conceptually develop a REA framework which focus on robustness property.
To achieve RAI determined in Chapter 1, the proposed conceptual framework
proposes was divided into six main phases. The first phase was analysis of risk magnitude
followed by the second phase which focused on the risk causality and interaction pattern
analysis. The third phase analyzed the risk impact to community. Then the fourth phase,
focus on the integration of various variables from previous three RAs which leads to the risk
critical analysis. The simulation shifted onto the processes of measuring and analyzing the
robustness level of UI system towards facing various risk events.
The assessment processes ended by shifting to the phase six of conceptual framework
which aims to deliberate and explore the scenario-based recovery action simulation and
output towards enhancing particular UI system robustness level post-disturbance. Five
different resilience action scenarios have been developed and compared to the ‘expected
recovery’ scenario. The highest robustness level output in the end of time frame can be
appointed as the basis point to determine the finest recovery action scenario.
For study completeness (testing and validating the empirical framework),
exploratory case study was undertaken using Surabaya water supply infrastructure system
in Indonesian context. The simulation output and discussion found that using the risk
criticality analysis model made a significant difference in measuring the impact of each risk
event. Notably, the developed procedure can only be analytically generalized in the context
of Surabaya water supply infrastructure system case; it is not statistically generalizable.
However, the conceptual framework proposed in this research, not including the final
evaluation sheets, can be replicated globally, for any UI type and sector.
This dissertation recommends that REA in UI system context should put an attention
towards risk management in defining both the UI system robustness and recovery strategy.
CHAPTER 9-SUMMARY AND CONCLUSION
Page 259
Nonetheless, the inputs based on data collection in the field should be quantified with
respect to the input importance of each stakeholder on a particular UI sector. This research
proposed a conceptual framework that can help authorities and DMs to; (i) Measure the
initial level of UI system robustness post-disturbances in a manner that respects all
stakeholders’ sense of fairness in decision-making processes, and (ii) Advance the practice
of preparing the recovery strategy, which could in turn enhance the UI system robustness
level.
Insights gained by performing the resilience research are expected to be useful in
designing UI systems for resilience i.e., building particular UI systems that have the ability to
bounce back from a disruptive state. The proposed risk-based REA framework suitable for
the development of a UI security plans, in which will gather, assemble and apply the
exchanging experience-based information between various stakeholders towards the
inherent risk within the specific UI system considered.
Importantly, this dissertation makes recommendation for future research directions,
paving the way for other researchers willing to enhance and extend the current research
study’s findings. Finally, this research holds the promise to be a great potential utility for:
stakeholders (i.e., experts, DMs and recovery managers as well as affected communities) in
preparedness, response, recovery, and mitigation efforts as timely and actionable
information which is still the scarcest and most sought resource during extreme events.
BIBLIOGRAPHY
Page 261
BIBLIOGRAPHY
1. Cabanyes Truffino, J., Resilience: An approach to the concept. Revista de Psiquiatrí a y
Salud Mental (English Edition), 2010. 3(4): p. 145-151.
2. Rinaldi, S.M. Modeling and simulating critical infrastructures and their
interdependencies. in System Sciences, 2004. Proceedings of the 37th Annual Hawaii
International Conference on. 2004.
3. Rinaldi, S.M., J.P. Peerenboom, and T.K. Kelly, Identifying, understanding, and analyzing
critical infrastructure interdependencies. Control Systems, IEEE, 2001. 21(6): p. 11-25.
4. Zio, E., Challenges in the vulnerability and risk analysis of critical infrastructures.
Reliability Engineering & System Safety, 2016. 152: p. 137-150.
5. Gaillard, J.C., Vulnerability, capacity and resilience: Perspectives for climate and
development policy. Journal of International Development, 2010. 22(2): p. 218-232.
6. Miller, W., What does built environment research have to do with risk mitigation,
resilience and disaster recovery? Sustainable Cities and Society, 2015. 19: p. 91-97.
7. Shafieezadeh, A. and L. Ivey Burden, Scenario-based resilience assessment framework
for critical infrastructure systems: Case study for seismic resilience of seaports.
Reliability Engineering & System Safety, 2014. 132: p. 207-219.
8. Francis, R. and B. Bekera, A metric and frameworks for resilience analysis of engineered
and infrastructure systems. Reliability Engineering & System Safety, 2014. 121: p. 90-
103.
9. Cimellaro, G.P., A.M. Reinhorn, and M. Bruneau, Framework for analytical
quantification of disaster resilience. Engineering Structures, 2010. 32(11): p. 3639-
3649.
10. Aven, T., On some recent definitions and analysis frameworks for risk, vulnerability, and
resilience. Risk Analysis, 2011. 31(4): p. 515-522.
11. Mitchell, T. and K. Harris, Resilience: A risk management approach. ODI Background
Note. Overseas Development Institute: London, 2012.
12. Weathington, B.L., C.J. Cunningham, and D.J. Pittenger, Research methods for the
behavioral and social sciences. 2010: John Wiley & Sons.
13. Rydin, Y., et al., Shaping cities for health: complexity and the planning of urban
environments in the 21st century. Lancet, 2012. 379(9831): p. 2079-2108.
14. Frischmann, B.M., Defining Infrastructure and Commons Management, in
Infrastructure: The Social Value of Shared Resources, B. Frischmann, Editor. 2012. p. 3-
9.
BIBLIOGRAPHY
Page 262
15. Boone, C. and A. Modarres, Urban Infrastructure: Living with The Consequences of Past
Decisions and Opportunities for The Future, in City and Environment, C. Boone and A.
Modarres, Editors. 2009, Temple University Press: Philadelphia. p. 95-133.
16. Zio, E. Vulnerability and Risk Analysis of Critical Infrastructures. in Second
International Conference on Vulnerability and Risk Analysis and Management (ICVRAM)
and the Sixth International Symposium on Uncertainty, Modeling, and Analysis (ISUMA).
2014.
17. Graham, S., When infrastructures fail, in Disrupted Cities: When Infrastructure Fails.
2010. p. 1-26.
18. Ennis, F., Infrastructure provision and the urban environment. Infrastructure provision
and the Negotiating Process, 2003: p. 1-18.
19. Frischmann, B.M., Infrastructure resources, in Infrastructure: The social value of shared
resources, B.M. Frischmann, Editor. 2012, Oxford University Press. p. 61-90.
20. Graham, S. and C. McFarlane, Infrastructural Lives: Urban Infrastructure in Context.
2014: Routledge.
21. Moss, T., Battle of the Systems? Changing Styles of Water Recycling in Berlin, in Urban
infrastructure in transition: networks, buildings and plans, S. Guy, S. Marvin, and T.
Moss, Editors. 2001, Earthscan. p. 43-56.
22. Little, R.G., Managing the risk of cascading failure in complex urban infrastructures, in
Disrupted Cities-When Infrastructures Failes, S. Graham, Editor. 2009, London:
Routledge: New York. p. 27-39.
23. Guy, S., Splintering networks: cities and technical networks in 1990s Britain. Urban
Studies, 1997. 34(2): p. 191-216.
24. Bowker, G.C. and S.L. Star, Sorting things out: Classification and its consequences. 2000:
MIT press.
25. Hughes, T.P., The evolution of large technological systems. The social construction of
technological systems: New directions in the sociology and history of technology,
1987: p. 51-82.
26. Tonkiss, F., Infrastructure as 'Design Politics', in Cities by design: the social life of urban
form, F. Tonkiss, Editor. 2014, John Wiley & Sons. p. 138-158.
27. Eusgeld, I., et al., The role of network theory and object-oriented modeling within a
framework for the vulnerability analysis of critical infrastructures. Reliability
Engineering & System Safety, 2009. 94(5): p. 954-963.
BIBLIOGRAPHY
Page 263
28. Setola, R., S. De Porcellinis, and M. Sforna, Critical infrastructure dependency
assessment using the input–output inoperability model. International Journal of
Critical Infrastructure Protection, 2009. 2(4): p. 170-178.
29. Merabti, M., M. Kennedy, and W. Hurst. Critical infrastructure protection: A 21th
century challenge. in Communications and Information Technology (ICCIT), 2011
International Conference on. 2011.
30. Singh, A.N., M.P. Gupta, and A. Ojha, Identifying critical infrastructure sectors and their
dependencies: An Indian scenario. International Journal of Critical Infrastructure
Protection, 2014(0).
31. Chen, P., et al., Managing Critical Infrastructure Interdependence through Economic
Input-Output Methods. Journal of Infrastructure Systems, 2009. 15(3): p. 200-210.
32. Simone, A., Relational infrastructure in postcolonial urban worlds, in Infrastructural
lives: Urban infrastructure in context. 2014, Routledge. p. 17-38.
33. Mau, B. and J. Leonard, Massive change. 2004.
34. Guy, S., S. Marvin, and W. Medd, Shaping urban infrastructures: intermediaries and the
governance of socio-technical networks. 2011: Routledge.
35. Li, T.H.Y., S.T. Ng, and M. Skitmore, Conflict or consensus: An investigation of stakeholder
concerns during the participation process of major infrastructure and construction
projects in Hong Kong. Habitat International, 2012. 36(2): p. 333-342.
36. Graham, S., When infrastructures fail. Disrupted Cities: When Infrastructure Fails,
2010: p. 1-26.
37. McAllister, T., Research needs for developing a risk-informed methodology for
community resilience. Journal of Structural Engineering, 2015: p. C4015008.
38. Guy, S. and S. Marvin, Urban Environmental Flows: Towards a New Way of Seeing, in
Urban infrastructure in transition: networks, buildings and plans, S. Guy, S. Marvin, and
T. Moss, Editors. 2001, Earthscan.
39. Moss, T., Flow Management in Urbanb Regions: Introduction a Concept, in Urban
infrastructure in transition: networks, buildings and plans, S. Guy, S. Marvin, and T.
Moss, Editors. 2001, Earthscan. p. 3-21.
40. Oh, E., Identification of the impact of critical infrastructure on associated industries:
Analysis of a flood disaster event. Master's Thesis: Purdue University, Indiana, USA,
2008.
BIBLIOGRAPHY
Page 264
41. Oh, E., A. Deshmukh, and M. Hastak, Vulnerability Assessment of Critical Infrastructure,
Associated Industries, and Communities during Extreme Events, in Construction
Research Congress 2010. 2010. p. 449-469.
42. Ongkowijoyo, C.S. and H.K. Doloi. Analyzing the Risk Criticality of an Infrastructure
System on the Community. in Construction Research Congress 2016. 2016.
43. Oh, E. and M. Hastak. Impact analysis of natural calamities on infrastructure and
industries. in Proceedings of the 4th i-REC conference. 2008.
44. Mei, R., H. Chuanfeng, and L. Liang. Critical Infrastructure Failure Interdependencies in
the 2008 Chinese Winter Storms. in Management and Service Science (MASS), 2010
International Conference on. 2010.
45. Labaka, L., J. Hernantes, and J.M. Sarriegi, A holistic framework for building critical
infrastructure resilience. Technological Forecasting and Social Change, 2016. 103: p.
21-33.
46. Lauge , A., J. Hernantes, and J.M. Sarriegi, Critical infrastructure dependencies: A holistic,
dynamic and quantitative approach. International Journal of Critical Infrastructure
Protection, 2015. 8: p. 16-23.
47. Lewis, T.G., Critical infrastructure protection in homeland security: defending a
networked nation. 2014: John Wiley & Sons.
48. Rochas, C., T. Kuzn ecova, and F. Romagnoli, The concept of the system resilience within
the infrastructure dimension: application to a Latvian case. Journal of Cleaner
Production, 2014(0).
49. Milman, A. and A. Short, Incorporating resilience into sustainability indicators: An
example for the urban water sector. Global Environmental Change, 2008. 18(4): p.
758-767.
50. Jordan, E. and A. Javernick-Will, Measuring Community Resilience and Recovery: A
Content Analysis of Indicators, in Construction Research Congress 2012. p. 2190-2199.
51. Ouyang, M. and Z. Wang, Resilience assessment of interdependent infrastructure
systems: With a focus on joint restoration modeling and analysis. Reliability
Engineering & System Safety, 2015. 141: p. 74-82.
52. Dalziell, E.P. and S.T. McManus, Resilience, Vulnerability, and Adaptive Capacity:
Implications for System Performance, in 1st International Forum for Engineering
Decision Making (IFED). 2004, University of Canterbury. Civil and Natural Resources
Engineering: Stoos, Switzerland.
BIBLIOGRAPHY
Page 265
53. Scholl, H.J. and B.J. Patin, Resilient information infrastructures. Transforming
Government: People, Process and Policy, 2014. 8(1): p. 28-48.
54. Miles, S., The Role of Critical Infrastructure in Community Resilience to Disasters, in
Structures Congress 2011. 2011. p. 1985-1995.
55. Zio, E., Reliability engineering: Old problems and new challenges. Reliability
Engineering & System Safety, 2009. 94(2): p. 125-141.
56. Woods, D.D., N. Leveson, and E. Hollnagel, Resilience engineering: concepts and
precepts. 2012: Ashgate Publishing, Ltd.
57. Cutter, S.L., Resilience to What? Resilience for Whom? The Geographical Journal, 2016.
182(2): p. 110-113.
58. Henry, D. and J. Emmanuel Ramirez-Marquez, Generic metrics and quantitative
approaches for system resilience as a function of time. Reliability Engineering & System
Safety, 2012. 99: p. 114-122.
59. Boin, A. and A. McConnell, Preparing for Critical Infrastructure Breakdowns: The Limits
of Crisis Management and the Need for Resilience. Journal of Contingencies and Crisis
Management, 2007. 15(1): p. 50-59.
60. Dalziell, E.P. and S.T. McManus, Resilience, vulnerability, and adaptive capacity:
implications for system performance. 2004.
61. Hosseini, S. and K. Barker, Modeling infrastructure resilience using Bayesian networks:
A case study of inland waterway ports. Computers & Industrial Engineering, 2016. 93:
p. 252-266.
62. Johannessen, A ., et al., Strategies for building resilience to hazards in water, sanitation
and hygiene (WASH) systems: The role of public private partnerships. International
Journal of Disaster Risk Reduction, 2014. 10, Part A(0): p. 102-115.
63. Chang, S.E., et al., Toward Disaster-Resilient Cities: Characterizing Resilience of
Infrastructure Systems with Expert Judgments. Risk Analysis, 2014. 34(3): p. 416-434.
64. Manyena, S.B., The concept of resilience revisited. Disasters, 2006. 30(4): p. 434-450.
65. Chertoff, M., National infrastructure protection plan. Department of Homeland
Security (DHS), Washington, DC, 2009.
66. Haimes, Y.Y., On the definition of resilience in systems. Risk Analysis, 2009. 29(4): p.
498-501.
67. SRA. Society of risk analysis, glossary of the specialty group on foundations of risk
analysis. 2015; Available from: http://www.sra.org/news/sra-develops-glossary-
risk-related-terms.
BIBLIOGRAPHY
Page 266
68. Bocchini, P., et al., Resilience and sustainability of civil infrastructure: Toward a unified
approach. Journal of Infrastructure Systems, 2013. 20(2): p. 04014004.
69. Ouyang, M., L. Duen as-Osorio, and X. Min, A three-stage resilience analysis framework
for urban infrastructure systems. Structural Safety, 2012. 36–37(0): p. 23-31.
70. Rigaud, E. and F. Guarnieri. Proposition of a conceptual and a methodological modelling
framework for resilience engineering. in 2nd Symposium on Resilience Engineering.
2006.
71. Rochas, C., T. Kuzn ecova, and F. Romagnoli, The concept of the system resilience within
the infrastructure dimension: application to a Latvian case. Journal of Cleaner
Production, 2015. 88: p. 358-368.
72. Cimellaro, G.P. and D. Solari, Considerations about the optimal period range to evaluate
the weight coefficient of coupled resilience index. Engineering Structures, 2014. 69: p.
12-24.
73. Zhang, P. and S. Peeta, A generalized modeling framework to analyze interdependencies
among infrastructure systems. Transportation Research Part B: Methodological, 2011.
45(3): p. 553-579.
74. Sellke, P. and O. Renn, Risk, Society and Environmental Policy: Risk Governance in
Complex World, in Environmental sociology: European perspectives and
interdisciplinary challenges, M. Gross and H. Heinrichs, Editors. 2010, Springer
Science & Business Media. p. 295-321.
75. Little, R.G., Managing the risk of cascading failure in complex urban infrastructures.
2009: London: Routledge.
76. Cozzani, V., et al., The assessment of risk caused by domino effect in quantitative area
risk analysis. Journal of Hazardous Materials, 2005. 127(1–3): p. 14-30.
77. Antonioni, G., G. Spadoni, and V. Cozzani, Application of domino effect quantitative risk
assessment to an extended industrial area. Journal of Loss Prevention in the Process
Industries, 2009. 22(5): p. 614-624.
78. Reniers, G.L.L., et al., The use of current risk analysis tools evaluated towards preventing
external domino accidents. Journal of Loss Prevention in the Process Industries, 2005.
18(3): p. 119-126.
79. Cox Jr, L.A., Risk analysis of complex and uncertain systems. Vol. 129. 2009: Springer
Science & Business Media.
BIBLIOGRAPHY
Page 267
80. Correa-Henao, G.J., J.M. Yusta, and R. Lacal-Ara ntegui, Using interconnected risk maps
to assess the threats faced by electricity infrastructures. International Journal of
Critical Infrastructure Protection, 2013. 6(3–4): p. 197-216.
81. Kasperson, R.E., et al., The social amplification of risk: A conceptual framework. Risk
analysis, 1988. 8(2): p. 177-187.
82. Kasperson, J.X., et al., The social amplification of risk: assessing fifteen years of research
and theory. The social amplification of risk, 2003. 1: p. 13-46.
83. Matthews, J., K. Piratla, and E. Matthews, Disaster Resilience of Drinking Water
Infrastructure Systems to Multiple Hazards, in Structures Congress 2014. p. 2312-2317.
84. Komendantova, N., et al., Multi-hazard and multi-risk decision-support tools as a part
of participatory risk governance: Feedback from civil protection stakeholders.
International Journal of Disaster Risk Reduction, 2014. 8(0): p. 50-67.
85. McAslan, A., Community resilience: Understanding the concept and its application.
Torrens Resilience Institute, Adelaide, 2011.
86. Fang, C., et al., Network theory-based analysis of risk interactions in large engineering
projects. Reliability Engineering & System Safety, 2012. 106(0): p. 1-10.
87. Vidal, L.-A. and F. Marle, Understanding project complexity: implications on project
management. Kybernetes, 2008. 37(8): p. 1094-1110.
88. Khan, F.I. and S.A. Abbasi, An assessment of the likelihood of occurrence, and the
damage potential of domino effect (chain of accidents) in a typical cluster of industries.
Journal of Loss Prevention in the Process Industries, 2001. 14(4): p. 283-306.
89. Cozzani, V. and E. Salzano, The quantitative assessment of domino effect caused by
overpressure: Part II. Case studies. Journal of Hazardous Materials, 2004. 107(3): p.
81-94.
90. Cozzani, V. and E. Salzano, The quantitative assessment of domino effects caused by
overpressure: Part I. Probit models. Journal of Hazardous Materials, 2004. 107(3): p.
67-80.
91. Khakzad, N., et al., Domino effect analysis using Bayesian networks. Risk Analysis, 2013.
33(2): p. 292-306.
92. Yang, R.J. and P.X.W. Zou, Stakeholder-associated risks and their interactions in complex
green building projects: A social network model. Building and Environment, 2014.
73(0): p. 208-222.
93. Sapori, E., M. Sciutto, and G. Sciutto, A Quantitative Approach to Risk Management in
Critical Infrastructures. Transportation Research Procedia, 2014. 3(0): p. 740-749.
BIBLIOGRAPHY
Page 268
94. Huang, C.-N., J.J.H. Liou, and Y.-C. Chuang, A method for exploring the interdependencies
and importance of critical infrastructures. Knowledge-Based Systems, 2014. 55(0): p.
66-74.
95. Marrone, S., et al., Vulnerability modeling and analysis for critical infrastructure
protection applications. International Journal of Critical Infrastructure Protection,
2013. 6(3–4): p. 217-227.
96. Yusta, J.M., G.J. Correa, and R. Lacal-Ara ntegui, Methodologies and applications for
critical infrastructure protection: State-of-the-art. Energy Policy, 2011. 39(10): p.
6100-6119.
97. Zhang, W.-J., et al., Social network analysis of the vulnerabilities of interdependent
critical infrastructures. International journal of critical infrastructures, 2008. 4(3): p.
256-273.
98. Rausand, M., Risk assessment: theory, methods, and applications. Vol. 115. 2013: John
Wiley & Sons.
99. ISO/IEC, ISO/IEC FDIS 31010:2009, in Risk management - Risk assessment techniques.
2009, International Organization for Standardization.
100. Kro ger, W. and E. Zio, Vulnerable systems. 2011: Springer Science & Business Media.
101. Hopkin, P., Fundamentals of risk management: understanding, evaluating and
implementing effective risk management, ed. P. Hopkin. 2014: Kogan Page Publishers.
357.
102. Cox Jr, L.A., Limitations of Risk Assessment Using Risk Matrices, in Risk Analysis of
Complex and Uncertain Systems. 2009, Springer. p. 101-124.
103. Cox Jr, L.A., Limitations of Quantitative Risk Assessment Using Aggregate Exposure and
Risk Models, in Risk Analysis of Complex and Uncertain Systems. 2009, Springer. p. 125-
161.
104. Gardoni, P. and C. Murphy, A scale of risk. Risk Analysis, 2014. 34(7): p. 1208-1227.
105. Nirupama, N., Risk and vulnerability assessment: a comprehensive approach.
International Journal of Disaster Resilience in the Built Environment, 2012. 3(2): p.
103-114.
106. Roozbahani, A., B. Zahraie, and M. Tabesh, Integrated risk assessment of urban water
supply systems from source to tap. Stochastic Environmental Research and Risk
Assessment, 2013. 27(4): p. 923-944.
107. Zio, E., An introduction to the basics of reliability and risk analysis. Vol. 13. 2007: World
scientific.
BIBLIOGRAPHY
Page 269
108. Deshmukh, A., E.H. Oh, and M. Hastak, Impact of flood damaged critical infrastructure
on communities and industries. Built Environment Project and Asset Management,
2011. 1(2): p. 156-175.
109. Zhang, J., et al., A Case Study on Risk Assessment of Long Distance Water Supply System.
Procedia Engineering, 2014. 70(0): p. 1762-1771.
110. Gurzau, A.E., et al., Identification and Risk Assessment of Central Water Supply Systems-
Case Study. Aerul si Apa. Componente ale Mediului, 2011: p. 545-552.
111. Duenas-Osorio, L. and S.M. Vemuru. Risk Assessment of Complex Infrastructures. in
Special Workshop on Risk Acceptance and Risk Communication. 2007. Citeseer.
112. John, A., et al., A risk assessment approach to improve the resilience of a seaport system
using Bayesian networks. Ocean Engineering, 2016. 111: p. 136-147.
113. Dobbie, M.F. and R.R. Brown, A Framework for Understanding Risk Perception,
Explored from the Perspective of the Water Practitioner. Risk Analysis, 2014. 34(2): p.
294-308.
114. Lee, M., et al., Fuzzy-Logic Modeling of Risk Assessment for a Small Drinking-Water
Supply System. Journal of Water Resources Planning and Management, 2009. 135(6):
p. 547-552.
115. Oh, E., A. Deshmukh, and M. Hastak, Criticality Assessment of Lifeline Infrastructure for
Enhancing Disaster Response. Natural Hazards Review, 2013. 14(2): p. 98-107.
116. Grigg, N., Water Utility Security: Multiple Hazards and Multiple Barriers. Journal of
Infrastructure Systems, 2003. 9(2): p. 81-88.
117. Pollard, S.J.T., et al., Risk Analysis and Management in the Water Utility Sector: A Review
of Drivers, Tools and Techniques. Process Safety and Environmental Protection, 2004.
82(6): p. 453-462.
118. Selvakumar, A. and A. Tafuri, Rehabilitation of Aging Water Infrastructure Systems: Key
Challenges and Issues. Journal of Infrastructure Systems, 2012. 18(3): p. 202-209.
119. Boudet, H., D. Jayasundera, and J. Davis, Drivers of Conflict in Developing Country
Infrastructure Projects: Experience from the Water and Pipeline Sectors. Journal of
Construction Engineering and Management, 2011. 137(7): p. 498-511.
120. Clark-Ginsberg, A., Participatory risk network analysis: A tool for disaster reduction
practitioners. International Journal of Disaster Risk Reduction, 2017. 21: p. 430-437.
121. McAllister, T., Research Needs for Developing a Risk-Informed Methodology for
Community Resilience. Journal of Structural Engineering, 2016. 142(8).
BIBLIOGRAPHY
Page 270
122. Lindhe, A., et al., Fault tree analysis for integrated and probabilistic risk analysis of
drinking water systems. Water research, 2009. 43(6): p. 1641-1653.
123. Masys, A., Black swans to grey swans: revealing the uncertainty. Disaster Prevention
and Management: An International Journal, 2012. 21(3): p. 320-335.
124. Kaplan, S., et al., New Tools for Failure and Risk Analysis: Anticipatory Failure
Determination. Ideation International Inc, Detroit, 1999.
125. Khakzad, N., Application of dynamic Bayesian network to risk analysis of domino effects
in chemical infrastructures. Reliability Engineering & System Safety, 2015. 138: p.
263-272.
126. Yuan, Z., et al., Domino effect analysis of dust explosions using Bayesian networks.
Process Safety and Environmental Protection, 2016. 100: p. 108-116.
127. LaRocca, S. and S. Guikema. A survey of network theoretic approaches for risk analysis
of complex infrastructure systems. in Vulnerability, Uncertainty, and Risk: Analysis,
Modeling, and Management Proceedings of the International Conference on
Vulnerability and Risk Analysis and Management (ICVRAM) and International
Symposium on Uncertainty Modeling and Analysis (ISUMA), Hyattsville, MD, April. 2011.
128. Ongkowijoyo, C. and H. Doloi, Determining critical infrastructure risks using social
network analysis. International Journal of Disaster Resilience in the Built
Environment, 2017. 8(1): p. 5-26.
129. Marsden, P.V., Recent developments in network measurement. Models and methods in
social network analysis, 2005. 8: p. 30.
130. Thekdi, S. and J. Lambert, Quantification of Scenarios and Stakeholders Influencing
Priorities for Risk Mitigation in Infrastructure Systems. Journal of Management in
Engineering, 2014. 30(1): p. 32-40.
131. Aven, T. and B.S. Krohn, A new perspective on how to understand, assess and manage
risk and the unforeseen. Reliability Engineering & System Safety, 2014. 121: p. 1-10.
132. Fischhoff, B., P. Slovic, and S. Lichtenstein, Lay foibles and expert fables in judgments
about risk. The American Statistician, 1982. 36(3b): p. 240-255.
133. Kemp, R., Risk perception: The assessment of risks by experts and by lay people–a
rational comparison. Risk is a construct: Perceptions of risk perception, 1993: p. 103-
118.
134. Wildavsky, A., The comparative study of risk perception: A beginning. Risk is a
construct. Mu nchen: Knesebeck, 1993.
BIBLIOGRAPHY
Page 271
135. Bordens, K.S. and B.B. Abbott, Research design and methods: A process approach. 2002:
McGraw-Hill.
136. Johnson, R.B., A.J. Onwuegbuzie, and L.A. Turner, Toward a definition of mixed methods
research. Journal of mixed methods research, 2007. 1(2): p. 112-133.
137. Tan, W.C.K., Practical research methods. 2002: Prentice Hall.
138. Babbie, E.R., The practice of social research. 2015: Nelson Education.
139. Mertens, D.M., Research and evaluation in education and psychology: Integrating
diversity with quantitative, qualitative, and mixed methods. 2014: Sage publications.
140. Creswell, J.W., Research design: Qualitative, quantitative, and mixed methods
approaches. 2013: Sage publications.
141. Creswell, J.W. and V.L.P. Clark, Designing and conducting mixed methods research. 2007.
142. Creswell, J.W., et al., Advanced mixed methods research designs. Handbook of mixed
methods in social and behavioral research, 2003. 209: p. 240.
143. Mook, D.G., In defense of external invalidity. American psychologist, 1983. 38(4): p.
379.
144. Stake, R.E., The art of case study research. 1995: Sage.
145. Schramm, W., The nature of communication between humans. The process and effects
of mass communication, 1971: p. 3-53.
146. Yin, R.K., Case study research: Design and methods fourth edition. Los Angeles and
London: SAGE, 2009.
147. Alegre, H. and S.T. Coelho, Infrastructure asset management of urban water systems, in
Water Supply System Analysis-Selected Topics. 2012, InTech.
148. Nurhidayah, L., Toward Environmentally Sustainable City in Indonesia: Case Study on
Environment Protection in Surabaya. 2008.
149. Razif, M. and S.F. Persada, The Fluctuation Impacts of BOD, COD and TSS in Surabaya’s
Rivers to Environmental Impact Assessment (EIA) Sustainability on Drinking Water
Treatment Plant in Surabaya City. International Journal of ChemTech Research, 2015.
8(8): p. 143-151.
150. Setiono, I., Using output-based aid to expand piped water supply to Surabaya urban
poor, in Prakarsa Compendium, C.S. Walker and P. Punjabi, Editors. 2013, Indonesia
Infrastructure Initiative: Jakarta. p. 169-173.
151. Pranoto., A.H. and B. Suwarso. Community-Based Water Environmental Governance: A
Community Movement in Surabaya City 2007.
BIBLIOGRAPHY
Page 272
152. W.Dick, H., Surabaya City of Work. A Socioeconomic History, 1900-2000. 2002, Scott
Quadrangle, Athens, OH, USA: Ohio University Press. 224-226.
153. Frankfort-Nachmias, C. and D. Nachmias, Study guide for research methods in the social
sciences. 2007: Macmillan.
154. Bell, J., Doing Your Research Project: A guide for first-time researchers. 2014: McGraw-
Hill Education (UK).
155. Yin, R.K., Case study research: Design and methods. 2013: Sage publications.
156. Schwab, D.P., Research methods for organizational studies. 2013: Psychology Press.
157. Tashakkori, A. and C. Teddlie, Mixed methodology: Combining qualitative and
quantitative approaches. Vol. 46. 1998: Sage.
158. Marshall, M.N., Sampling for qualitative research. Family practice, 1996. 13(6): p. 522-
526.
159. Coyne, I.T., Sampling in qualitative research. Purposeful and theoretical sampling;
merging or clear boundaries? Journal of advanced nursing, 1997. 26(3): p. 623-630.
160. Neuman, L.W., Social research methods: Qualitative and quantitative approaches. 2002.
161. Silva, M.M., et al., A multidimensional approach to information security risk
management using FMEA and fuzzy theory. International Journal of Information
Management, 2014. 34(6): p. 733-740.
162. Puente, J., et al., A decision support system for applying failure mode and effects analysis.
International Journal of Quality & Reliability Management, 2002. 19(2): p. 137-150.
163. Beauregard, M.R. and R.J. Mikulak, The basics of FMEA. 2009: CRC Press.
164. Wall, M., et al., Failure Modes, Reliability and Integrity of Floating Storage Unit (FPSO,
FSU) Turret and Swivel Systems. 2002: Great Britain, Health and Safety Executive.
165. Vinnem, J.E., et al. Generalised methodology for operational risk analysis. in
Proceedings of ESREL. 2007.
166. Xia, J., et al., Failure Mode Criticality Analysis of Metro Door System, in Proceedings of
the 2013 International Conference on Electrical and Information Technologies for Rail
Transportation (EITRT2013)-Volume II, L. Jia, et al., Editors. 2014, Springer Berlin
Heidelberg. p. 251-257.
167. Pillay, A. and J. Wang, Modified failure mode and effects analysis using approximate
reasoning. Reliability Engineering & System Safety, 2003. 79(1): p. 69-85.
168. Zhang, Z. and X. Chu, Risk prioritization in failure mode and effects analysis under
uncertainty. Expert Systems with Applications, 2011. 38(1): p. 206-214.
BIBLIOGRAPHY
Page 273
169. Clark, K., Design for manufacturability at Midwest industries: teaching note, in Note No.
5-693-007. 1992, Harvard Business School Boston, MA.
170. Wang, Y.-M., et al., Risk evaluation in failure mode and effects analysis using fuzzy
weighted geometric mean. Expert Systems with Applications, 2009. 36(2, Part 1): p.
1195-1207.
171. Liu, H.-C., et al., Failure mode and effects analysis using fuzzy evidential reasoning
approach and grey theory. Expert Systems with Applications, 2011. 38(4): p. 4403-
4415.
172. Liu, H.-C., L. Liu, and N. Liu, Risk evaluation approaches in failure mode and effects
analysis: A literature review. Expert Systems with Applications, 2013. 40(2): p. 828-
838.
173. Li, Q., A novel Likert scale based on fuzzy sets theory. Expert Systems with Applications,
2013. 40(5): p. 1609-1618.
174. Pedrycz, W., P. Ekel, and R. Parreiras, Fuzzy multicriteria decision-making: models,
methods and applications. 2011: John Wiley & Sons.
175. Yager, R.R. and L.A. Zadeh, An introduction to fuzzy logic applications in intelligent
systems. Vol. 165. 2012: Springer Science & Business Media.
176. Be lohla vek, R. and G.J. Klir, Concepts and fuzzy logic. 2011: MIT Press.
177. Cintula, P., C. Fermu ller, and C. Noguera, Handbook of Mathematical Fuzzy Logic-
Volume 3. 2015.
178. Zadeh, L.A., Information and control. Fuzzy sets, 1965. 8(3): p. 338-353.
179. Zadeh, L.A., Fuzzy logic-computing with words. Fuzzy Systems, IEEE Transactions on,
1996. 4(2): p. 103-111.
180. Marin, A. and B. Wellman, Social network analysis: An introduction, in The SAGE
handbook of social network analysis. 2011. p. 370-388.
181. Wasserman, S. and K. Faust, Social network analysis: Methods and applications. Vol. 8.
1994: Cambridge university press.
182. Carrington, P.J., J. Scott, and S. Wasserman, Models and methods in social network
analysis. Vol. 28. 2005: Cambridge university press.
183. Wambeke, B., M. Liu, and S. Hsiang, Using Pajek and Centrality Analysis to Identify a
Social Network of Construction Trades. Journal of Construction Engineering and
Management, 2012. 138(10): p. 1192-1201.
BIBLIOGRAPHY
Page 274
184. Park, H., et al., Social Network Analysis of Collaborative Ventures for Overseas
Construction Projects. Journal of Construction Engineering and Management, 2011.
137(5): p. 344-355.
185. Stein, C., H. Ernstson, and J. Barron, A social network approach to analyzing water
governance: The case of the Mkindo catchment, Tanzania. Physics and Chemistry of the
Earth, Parts A/B/C, 2011. 36(14–15): p. 1085-1092.
186. Lienert, J., F. Schnetzer, and K. Ingold, Stakeholder analysis combined with social
network analysis provides fine-grained insights into water infrastructure planning
processes. Journal of Environmental Management, 2013. 125(0): p. 134-148.
187. Allin, C., Progress and challenges in seismic performance assessment. PEER newsletter,
2000.
188. Wambeke, B., M. Liu, and S. Hsiang, Task Variation and the Social Network of
Construction Trades. Journal of Management in Engineering, 2014. 30(4): p.
05014008.
189. Prell, C., K. Hubacek, and M. Reed, Stakeholder Analysis and Social Network Analysis in
Natural Resource Management. Society & Natural Resources, 2009. 22(6): p. 501-518.
190. Agneessens, F. and M.G. Everett, Introduction to the special issue on advances in two-
mode social networks. Social Networks, 2013. 35(2): p. 145-147.
191. Malisiovas, A. and X. Song. Social Network Analysis (SNA) for Construction Projects’
Team Communication Structure Optimization. in Construction Research Congress
2014@ sConstruction in a Global Network. 2014. ASCE.
192. Chinowsky, P.S., J. Diekmann, and J. O’Brien, Project organizations as social networks.
Journal of Construction Engineering and Management, 2009. 136(4): p. 452-458.
193. H., L.G., Mutual influence of corporate networks and industrial change. J. Korea Soc.
Social Sci., 2005. 39: p. 1.
194. K., W., et al., Global dimension of robust project network design. J. Constr. Eng. Manage.,
2010. 136: p. 442.
195. E., T.J., L. R., and V.J. A., Simulating learning dynamics in project networks. J. Constr. Eng.
Manage., 2009. 135: p. 1009.
196. E., T.J. and B.P. G., Paradigm trajectories of building information modeling practice in
project networks. J. Manage. Eng., 2009. 25: p. 69.
197. Chai, C.L., et al., Application of social network theory to prioritizing Oil & Gas
industries protection in a networked critical infrastructure system. Journal of Loss
Prevention in the Process Industries, 2011. 24(5): p. 688-694.
BIBLIOGRAPHY
Page 275
198. Borgatti, S.P., M.G. Everett, and J.C. Johnson, Analyzing social networks. 2013: SAGE
Publications Limited.
199. Rausand, M. and M. Rausand, Hazard Identification, in Risk Assessment. 2011, John
Wiley & Sons, Inc. p. 213-263.
200. OECD, Disaster Risk Assessment and Risk Financing, in A G20/OECD METHODOLOGICAL
FRAMEWORK. 2012, G20.
201. Xenidis, Y. and N. Gkoumas, Risk identification and fuzzy system-based risk analysis for
airport projects, in Safety, Reliability and Risk Analysis. 2013, CRC Press. p. 2095-2102.
202. Sadiq, R., Y. Kleiner, and B. Rajani, Water Quality Failures in Distribution Networks—
Risk Analysis Using Fuzzy Logic and Evidential Reasoning. Risk Analysis, 2007. 27(5):
p. 1381-1394.
203. Akgun, I., A. Kandakoglu, and A.F. Ozok, Fuzzy integrated vulnerability assessment
model for critical facilities in combating the terrorism. Expert Systems with
Applications, 2010. 37(5): p. 3561-3573.
204. Ezell, B., J. Farr, and I. Wiese, Infrastructure Risk Analysis Model. Journal of
Infrastructure Systems, 2000. 6(3): p. 114-117.
205. Aven, T., On how to define, understand and describe risk. Reliability Engineering &
System Safety, 2010. 95(6): p. 623-631.
206. Aven, T., On the new ISO guide on risk management terminology. Reliability
Engineering & System Safety, 2011. 96(7): p. 719-726.
207. Zhou, Q. and V.V. Thai, Fuzzy and grey theories in failure mode and effect analysis for
tanker equipment failure prediction. Safety Science, 2016. 83: p. 74-79.
208. Yang, R.J., An investigation of stakeholder analysis in urban development projects:
Empirical or rationalistic perspectives. International Journal of Project Management,
2014. 32(5): p. 838-849.
209. Doloi, H., Assessing stakeholders' influence on social performance of infrastructure
projects. Facilities, 2012. 30(11): p. 531-550.
210. Parise, S., Knowledge management and human resource development: An application
in social network analysis methods. Advances in Developing Human Resources, 2007.
9(3): p. 359-383.
211. Jung, H.P.S.H.H.E.M.R.J.S.W., Social Network Analysis of Collaborative Ventures for
Overseas Construction Projects. Journal of Construction Engineering and Management,
2011. 137(5).
BIBLIOGRAPHY
Page 276
212. Vechan, E. and E.-A. Islam. Dynamic Social Network Analysis for Infrastructure
Transportation Systems. in Construction Research Congress 2014: Construction in a
Global Network. 2014.
213. Lin, S.-C., An Analysis for Construction Engineering Networks. Journal of Construction
Engineering and Management, 2015. 141(5).
214. Vechan, I.H.E.-a.I.S.A.E., Social Network Analysis Approach for Improved
Transportation Planning. Journal of Infrastructure Systems, 2016. 0(0).
215. Sadri, A.M., S.V. Ukkusuri, and H. Gladwin, The Role of Social Networks and Information
Sources on Hurricane Evacuation Decision Making. Natural Hazards Review, 2017.
0(0).
216. Chambers, R., The origins and practice of participatory rural appraisal. World
development, 1994. 22(7): p. 953-969.
217. Degenne, A. and M. Forse , Introducing social networks. 1999: Sage.
218. Danilovic, M. and T.R. Browning, Managing complex product development projects with
design structure matrices and domain mapping matrices. International journal of
project management, 2007. 25(3): p. 300-314.
219. Lindemann, U., M. Maurer, and T. Braun, Structural complexity management: an
approach for the field of product design. 2008: Springer Science & Business Media.
220. Ravichandran, C. and G.M. Fitzmaurice, To dichotomize or not to dichotomize?
Nutrition, 2008. 24(6): p. 610-611.
221. Thomas, A.C. and J.K. Blitzstein, Valued Ties Tell Fewer Lies, II: Why Not To Dichotomize
Network Edges With Bounded Outdegrees. arXiv preprint arXiv:1101.2228, 2011.
222. Ansell, C., A. Boin, and A. Keller, Managing transboundary crises: Identifying the
building blocks of an effective response system. Journal of Contingencies and Crisis
Management, 2010. 18(4): p. 195-207.
223. Steward, D., The design structure matrix: A method for managing the deisgn of complex
systems. IEEE Transactions on Engineering Management, EM, 1981. 28(3).
224. Browning, T.R., Applying the design structure matrix to system decomposition and
integration problems: a review and new directions. Engineering Management, IEEE
Transactions on, 2001. 48(3): p. 292-306.
225. Everett, M.G. and S.P. Borgatti, The dual-projection approach for two-mode networks.
Social Networks, 2013. 35(2): p. 204-210.
BIBLIOGRAPHY
Page 277
226. Malinick, T.E., D.B. Tindall, and M. Diani, Network centrality and social movement
media coverage: A two-mode network analytic approach. Social Networks, 2013. 35(2):
p. 148-158.
227. Dessavre, D.G., J.E. Ramirez-Marquez, and K. Barker, Multidimensional approach to
complex system resilience analysis. Reliability Engineering & System Safety, 2016. 149:
p. 34-43.
228. Proag, V., Assessing and Measuring Resilience. Procedia Economics and Finance, 2014.
18: p. 222-229.
229. Ingirige, B., et al., Assessing vulnerability, resilience and adaptive capacity of a UK Social
Landlord. International Journal of Disaster Resilience in the Built Environment, 2013.
4(3): p. 287-296.
230. Chatfield, A.T., S.F. Wamba, and H. Tatano. E-government challenge in disaster
evacuation response: The role of RFID technology in building safe and secure local
communities. in System Sciences (HICSS), 2010 43rd Hawaii International Conference
on. 2010. IEEE.
231. Kapucu, N., T. Arslan, and M.L. Collins, Examining intergovernmental and
interorganizational response to catastrophic disasters: Toward a network-centered
approach. Administration & Society, 2010. 42(2): p. 222-247.
232. Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis, A multi-layer Criticality Assessment
methodology based on interdependencies. Computers & Security, 2010. 29(6): p. 643-
658.
233. Ameyaw, E.E. and A.P.C. Chan, Identifying public-private partnership (PPP) risks in
managing water supply projects in Ghana. Journal of Facilities Management, 2013.
11(2): p. 152-182.
234. OECD, Infrastructure to 2030. Telecom, Land transport, Water and Electricity. 2006,
Paris, France: OECD Publishing. 355.
235. Sharma, S.K. and K. Vairavamoorthy, Urban water demand management: prospects and
challenges for the developing countries. Water and Environment Journal, 2009. 23(3):
p. 210-218.
236. Blackmore, J. and R. Plant, Risk and Resilience to Enhance Sustainability with
Application to Urban Water Systems. Journal of Water Resources Planning and
Management, 2008. 134(3): p. 224-233.
BIBLIOGRAPHY
Page 278
237. Karamouz, M., S. Saadati, and A. Ahmadi, Vulnerability Assessment and Risk Reduction
of Water Supply Systems, in World Environmental and Water Resources Congress 2010.
p. 4414-4426.
238. Platon, V., S. Frone, and A. Constantinescu, Financial and Economic Risks to Public
Projects. Procedia Economics and Finance, 2014. 8(0): p. 204-210.
239. Ezell, B., J. Farr, and I. Wiese, Infrastructure Risk Analysis of Municipal Water
Distribution System. Journal of Infrastructure Systems, 2000. 6(3): p. 118-122.
240. Khatri, K. and K. Vairavamoorthy, A New Approach of Risk Analysis for Complex
Infrastructure Systems under Future Uncertainties: A Case of Urban Water Systems, in
Vulnerability, Uncertainty, and Risk. p. 846-856.
241. Bakker, K., Trickle Down? Private sector participation and the pro-poor water supply
debate in Jakarta, Indonesia. Geoforum, 2007. 38(5): p. 855-868.
242. Kodoatie, R.J. and R. Sjarief, Pengelolaan Sumber Daya Air Terpadu. Edisi Revisi ed. Vol.
2. 2008, Yogyakarta: Penerbit ANDI. xii+420.
243. Prihandrijanti, M. and M. Firdayanti, Current Situation and Considerations of Dometic
Wastewater Treatment Systems for Big Cities in Indonesia (Case Study: Sutrabaya and
Bandung). Journal of Water Sustainability, 2011. Volume 1(Issue 2): p. 97-104.
244. Ostojic, D.R., et al., Surabaya, Indonesia, in Energizing Green Cities in Southeast Asia.
2013, The World Bank: Washington DC. p. 139-156.
245. ADB, Experience in River Basin Planning in Indonesia, in River Basing Management
Planing in Indonesia. 2016, Asian Development Bank: Mandaluyong City, Philippines.
p. 186-209.
246. Grafton, R.Q., et al., Water. First ed. Security, Economics and Governance. 2013,
Australia: Tilde Publishing and Distribution.
247. Mays, L.W., Urban water supply management tools. 2004: McGraw-Hill.
248. Mays, L.W., Water resources sustainability. 2007: McGraw-Hill; WEF Press.
249. Zimmerman, R. and J.G. Voeller, Understanding the Implications of Critical
Infrastructure Interdependencies for Water, in Wiley Handbook of Science and
Technology for Homeland Security. 2008, John Wiley & Sons, Inc.
250. Quiggin, J., Uncertainty, Risk, and Water Management in Australia, in Water policy in
Australia: the impact of change and uncertainty, L. Crase, Editor. 2008, Earthscan. p.
61-73.
251. Grafton, R.Q. and K. Hussey, Water Resource Planning and Management. 2011, United
States: Cambridge University Press.
BIBLIOGRAPHY
Page 279
252. Olmstead, S.M., Climate change adaptation and water resource management: A review
of the literature. Energy Economics, (0).
253. Stephenson, D., Water Service Management. 2005, United Kingdom: IWA Publishing.
254. Karamouz, M., A. Moridi, and S. Nazif, Urban Water Engineering and Management.
2010: CRC Press.
255. Means, E., Water 2050: Attributes of Sustainable Water Supply Development, in Toward
a Sustainable Water Future. p. 117-125.
256. Irias, X. and A. Coate, Managing Climate Change Uncertainty in Water Supply Planning,
in Vulnerability, Uncertainty, and Risk. p. 578-586.
257. Lu, J., C. Wang, and T. Huang, Analysis on Seismic Risk of Urban Water Supply System, in
ICPTT 2009. p. 1158-4466.
258. Grigg, N.S., Water, Wastewater, and Stormwater Infrastructure Management. Second
ed. 2012, United States: CRC Press and IWA Publishing. 343.
259. Shammas, N.K. and L.K. Wang, Water supply and wastewater removal. 2011: John
Wiley & Sons.
260. Hurlbert, M., et al., Climate change and water governance in Saskatchewan, Canada.
International Journal of Climate Change Strategies and Management, 2009. 1(2): p.
118-132.
261. Marlow, D.R., et al., Towards sustainable urban water management: A critical
reassessment. Water Research, 2013. 47(20): p. 7150-7161.
262. Ratnayaka, D.D., M.J. Brandt, and K.M. Johnson, Twort's Water Supply. Six ed. 2009,
United Kingdom: Elsevier Lt.
263. Akbar, H.M.D., et al., Community water supply for the urban poor in developing
countries: The case of Dhaka, Bangladesh. Habitat International, 2007. 31(1): p. 24-35.
264. Taylor, P., F.B.A. Hall, and J. Harlin, National Stakeholder Consultations on Water:
Supporting the Post-2015 Development Agenda. 2013, Global Water Partnership, Swiss
Agency for Development and Cooperation, The EUWI (Africa Working Group) and
United Nations Development Programme.: Stockholm, Sweden.
265. Nilsson, D. and E.N. Nyanchaga, Pipes and politics: a century of change and continuity
in Kenyan urban water supply. The Journal of Modern African Studies, 2008. 46(1): p.
133-158.
266. Sangodoyin, A.Y., Water Quality in Pipe Distribution Systems. Environmental
Management and Health, 1993. 4(4): p. 15-20.
BIBLIOGRAPHY
Page 280
267. Approaches to Private Participation in water Services: A Toolkit. 2006, Washington, DC.:
The International bank for Reconstruction and Development.
268. Decker, C.W., Managing water losses in Amman's renovated network: a case study.
Management of Environmental Quality: An International Journal, 2006. 17(1): p. 94-
108.
269. Chan, A.P.C. and E.E. Ameyaw, The private sector's involvement in the water industry of
Ghana. Journal of Engineering, Design and Technology, 2013. 11(3): p. 251-275.
270. Egan, M., Sydney water sector change and industrial water management. Journal of
Accounting & Organizational Change, 2009. 5(2): p. 277-293.
271. Madrigal-Ballestero, R., F. Alpí zar, and A. Schlu ter, Public perceptions of the
performance of community-based drinking water organizations in Costa Rica. Water
Resources and Rural Development, 2013. 1–2(0): p. 43-56.
272. Rao, S. and J. Rasmussen, Technology of Small Community Water Supply Systems in
Developing Countries. Journal of Water Resources Planning and Management, 1987.
113(4): p. 485-497.
273. Martinez, E.C.a.F., Water Supply Systems. State of The Art and Future Trends. 1993,
United Kingdom: Computational Mechanis Publications. 431.
274. Sullivant, J., Strategies for Protecting National Critical Infrastructure Assets. A Focus on
Problem-Solving. 2007, New Jersey: John Wiley & Sons, Inc.
275. Di Cristo, C., A. Leopardi, and G. de Marinis, Water infrastructure protection against
intentional attacks: An experience in Italy. Frontiers of Earth Science, 2011. 5(4): p.
390-399.
276. Grigg, N.S. and J.G. Voeller, Water Infrastructure Interdependencies, in Wiley Handbook
of Science and Technology for Homeland Security. 2008, John Wiley & Sons, Inc.
277. Dawson, G., Women, men and infrastructure development, in Prakarsa Compendium,
C.S. Walker and P. Punjabi, Editors. 2013, Indonesia Infrastructure Initiative: Jakarta.
p. 121-127.
278. Guerrini, A., G. Romano, and B. Campedelli, Factors affecting the performance of water
utility companies. International Journal of Public Sector Management, 2011. 24(6): p.
543-566.
279. Zimmerman, R. and C. Faris, Chapter 4: Infrastructure impacts and adaptation
challenges. Annals of the New York Academy of Sciences, 2010. 1196(1): p. 63-86.
BIBLIOGRAPHY
Page 281
280. Haider, H., R. Sadiq, and S. Tesfamariam, Performance indicators for small- and
medium-sized water supply systems: a review. Environmental Reviews, 2013. 22(1): p.
1-40.
281. Ouyang, M., Review on modeling and simulation of interdependent critical
infrastructure systems. Reliability engineering & System safety, 2014. 121: p. 43-60.
282. Shammas, N.K. and L.K. Wang, Fair, Geyer, and Okun's, Water and Wastewater
Engineering: Water Supply and Wastewater Removal: Water Supply and Wastewater
Removal. 2010: Wiley Global Education.
283. Qatar Water Report - Q2 2011. 2011, Business Monitor International: London. p. 1-53.
284. Biswas, A.K., et al., Water Pricing and Public-Private Partnership. 2005, New York:
Routledge.
285. Kolaczyk, E.D. and P.N. Krivitsky, On the question of effective sample size in network
modeling. arXiv preprint arXiv:1112.0840, 2011.
286. Chinowsky, P., J. Diekmann, and J. O’Brien, Project Organizations as Social Networks.
Journal of Construction Engineering and Management, 2010. 136(4): p. 452-458.
287. Suroso, D.S., O. Abdurahman, and B. Setiawan, Impacts of climate change on the
sustainability of water supply in Indonesia. 2010.
288. Huisman, M. and M.A. Van Duijn, Software for social network analysis. Models and
methods in social network analysis, 2005. 270: p. e316.
289. Sua rez-Lledo , J., The black swan: the impact of the highly improbable. The Academy of
Management Perspectives, 2011. 25(2): p. 87-90.
290. Cameron, P.M.D. and D.P.M.N. Clegg, A strong Britain in an age of uncertainty: the
National Security Strategy. Stationery Office, 2010.
291. Cannon, T. and D. Mu ller-Mahn, Vulnerability, resilience and development discourses in
context of climate change. Natural hazards, 2010. 55(3): p. 621-635.
292. Vale, L.J. and T.J. Campanella, Axiom of Resilience, in The resilient city: How modern
cities recover from disaster. 2005, Oxford University Press. p. 335-353.
293. Bryman, A., Social research methods. 2015: Oxford university press.
294. Srinivasan, V., et al., Climate vulnerability and adaptation of water provisioning in
developing countries: approaches to disciplinary and research-practice integration.
Current Opinion in Environmental Sustainability, 2013. 5(3–4): p. 378-383.
295. Srinivasan, V., et al., The impact of urbanization on water vulnerability: A coupled
human–environment system approach for Chennai, India. Global Environmental
Change, 2013. 23(1): p. 229-239.
BIBLIOGRAPHY
Page 282
296. Eisenhardt, K.M., Building Theories from Case Study Research. The Academy of
Management Review, 1989. 14(4): p. 532-550.
APPENDIX A
Page 283
APPENDIX A
Appendix Lists Fieldwork Funding Letter Plain Language Statement (in English) Plain Language Statement (in Bahasa) Application Letter (in Bahasa)
APPENDIX B
Page 289
APPENDIX B
Appendix Lists Questionnaire form (English ver.) Questionnaire form (Bahasa ver.) [R-R] Matrix [S-R] Matrix
APPENDIX B
Page 291
FACULTY OF ARCHITECTURE, BUILDING AND PLANNING
THE UNIVERSITY OF MELBOURNE
QUESTIONAIRE FORM
Research title:
A Conceptual Model for Assessing Risks and Building Resilience for Urban
Infrastructure System: An Indonesian Case
1. Age Group : (1) □ 23~30 Years (2) □31~38 Years (3) □39~46
(4) □ 46~53 Years (5) □54~60 Years (6) □> 61 Years
2. Level of education : (1) □ Bachelor degree (2) □ Master degree
(3) □ Doctorate degree (4) □ Others, (please specify):__________
3. Occupation : (1) □Academia group (2) □Business or Service industry
(3) □ Manufacturing industry (4) □Government functionary
(5) □ Others, (please specify): ____________________________
4. Name of institution (where relevant) : _______________________________________
5. Position (where relevant) : _______________________________________
6. Personal Experience : (1) □ < 5 Years (2) □ 5-10 Years
(3) □11-15Years (4) □15-20 Years
7. Email/phone number : ________________________________________
Part A. Respondent background information
As the initial part of research questionnaire, you are asked to provide a background data about yourself.
Please select the most appropriate answer by giving tick (√) in the blank box. We will maintain the
confidentiality of information provided.
Participant number: (for surveyor only)
Note for participants
This survey intends to get the real data from various stakeholders in conjunction with risk inherent
within urban water supply infrastructure system. The data will then stand as the input in our proposed
framework which talked about the stakeholder-risk associated relationship. Therefore, in order to reach a valid data, minimize the mistake and misconception, please read carefully all of the instruction which
before you continue and answer in every part of this questionnaire.
APPENDIX B
Page 292
Risk event Risk decision variable
Nature risk R1. Climate change. The climate change refers to the change in regional climate patterns, in particular a change apparent from the mid to late 20th century onwards and attributed largely to the increased levels of atmospheric carbon dioxide produced by the use of fossil fuels. In Indonesia context potential regional impacts of climate change could include; increased frequency and magnitude of droughts and floods, and long-term changes in mean renewable water supplies through changes in precipitation, temperature, humidity, wind intensity, duration of accumulated snowpack, nature and extent of vegetation, soil moisture, and runoff.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R2. Natural disasters. Natural disasters (act of god) can be describes as the non-man-made risk. The things that beyond human control which can be quantified such as; earthquake, flooding-river, flash, dam break, wind-hurricanes, waterborne disease, drought, other severe weather-cold, heat, high winds, lighting, prolonged dry and rainy season (which affecting the river water runoff from other upstream regions).
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R3. Water scarcity (shortage). Two dimensions of water scarcity; demand-driven water stress where there is a high usage compared to the availability of water and, population-driven water shortage: where there are many people dependent on the availability of water. In Surabaya city context, the water scarcity happened during the dry season which gives constraints to the water treatment processes and thus reducing the supply volume of clean water to the community.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R4. Idle land exploitation. The dynamic of modern society has been forced for urban water supply service to provide a vast and safe water supply services. The service includes expanding the water supply infrastructure within specific region and, thus allowing the risk of difficulty in controlling the land. The urban water supply infrastructure will mostly, utilize the region’s both underground and ground by which touch the environmental aspect.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R5. Pollution and contamination. As settlements quickly expanded, society grew into catchments and close to water sources, eventually polluting the supply and forcing a search for newer supplies of potable water beyond the town limits. In Surabaya city context, a pollution and contamination is a major environmental issue. In fact, pollution and contamination not just generated from industry waste but also community is self, such as; littering, treating river as communal space for washing and bathing which aggravates the condition and quality of Surabaya river.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Part B. Risk magnitude analysis for urban water supply infrastructure risks.
Based on your perception, please fill the most appropriate answer by circling the 10-point of Likert scale for each of O, S and D. The definition for O, S and D, and the Likert scale definition (and its understanding) can be described below;
Occurrence (O) refers to the likelihood that the hazard will be occurred.
Almost never 1 2 3 4 5 6 7 8 9 10 Almost certain
Severity (S) indicates how high the hazard impact will affect.
None 1 2 3 4 5 6 7 8 9 10 Hazardous without warning
Detectability (D) refers to the probability not to detect the existence of hazard.
Almost certain 1 2 3 4 5 6 7 8 9 10 Absolutely uncertain
APPENDIX B
Page 293
Social risk R6. Demand uncertainty. Variations of supply and demand depends on many factors whose laws of variation are uncertain, for instance the increase in population (Supplies were in precarious balance with demand which affected by the water losses, leakage and wastage risks; The changing and increasing of domestic and non-domestic leads on consumption and demand behavior for public water). Fuzziness of water rights and unclear water accounting is linked to a tendency of over-allocating water to satisfy more water users, because of unclear pictures of supplies; Unrealistic planning with disaster requirements beyond the reach of local government.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R7. Water misuse. Water misuse has been known for long time in some regions as a crime action. The example of water misuse in Surabaya city, such as; an illegal activity building water connection without proper license; manipulate water meter instrument; and, arbitrarily, improper and excessive use of water. Another effect and consequences of this risk is that, this risk not only affect the fire pressure (water loss) of the water and services within one network region of community, but also contribute to the deteriorating of the physical infrastructure and urban development deprivation.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R8. Limited access to clean water. In Surabaya city context, access to the water may be uneven due to socio-economic inequalities. In keeping with its high levels of coverage, most areas of Surabaya are already served by the piped water system, and many households have individual connections. However, there are still some pockets of un-served areas that belong to the lowest income brackets. Many of these poor households are unable to afford the steep connection fee, which includes the cost of tertiary network expansion. In addition, some segments of the urban poor population are unable to furnish the legal documentation required by the utility for the provision of individual connections. In the absence of piped supply, these households relying on a combination of water from neighbors, purchased from vendors or small scale independent providers, and free well water. However, much of the water from these sources is expensive and contaminated.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R9. Payment problem. Unpaid water service creates on the water market, financial and economic risk. Willingness to pay for water still low for some region (delay payment and further not paying). Some people are becoming more reluctant to pay the necessary changes. In some area, the ability to pay and the desire for good services are underestimated. In Surabaya city, the common case happened in terms of payment problem is more like; late payment made by the consumer/customer, and the water use bill problem.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R10. Community rejection. In many countries, customer have experienced several attempted reforms in which tariffs were increased, but service did not improve. Complexities within UWS system (especially in Surabaya city case) involved with obtaining community acceptance of alternative water supply solutions. In some cases, community reluctant or event reject the solution of specific problems provided either by the regional water supply company or other government agencies
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R11. Population growth & urbanization problem. As a metropolitan city, population growth and urbanization contributes to the uncertain of supply and demand trends in Surabaya, incriminating the water supply infrastructure system. The population growth (and the dynamic of urbanization pattern) leads on water consumption rose, both in total amount needed and in per capita demand. Further, this risk leads to the changes of society behavior on how to treat the water demand. This risk event is tightly related with uncertain water demand (and supply) trends risk event.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R12. Sabotage to physical infrastructure. In Indonesia, water supply infrastructure system protected by the constitution law. Physical attack or sabotage in Surabaya water supply infrastructure can be classified as criminal act. The example of sabotage to physical infrastructure of water supply in Surabaya; vandalism act towards water supply system, illegal act by
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 294
adding chemical or biological agents into water treatment (including post-treatment facilities) and distribution systems, technical system destruction, unexplained cutting of utility fences and damage to storages and water contaminants on utility property. Further, a number cases such as water meter, other fittings and tools theft often occurred
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Political risk R13. Uncertain political behavior. This risk refers to the water supply service disturbances which occurred due to; the dynamic of both local and national political movement, obscurity happened on the cooperation agreement and tasks among various agencies, and bad decision making as well as low commitment among various agencies towards laws and regulations that applied. Further, this risk refers to the conflict which leads to the delay in the development of water supply infrastructure system, lack of requirements specification and low priority given to society interest.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R14. Limited public participation. Since water supply infrastructure in Surabaya solely handled by the regional water supply company, the public participation in decision making are not taking place at all. Based on interview obtained from various stakeholder groups, the limited public participation caused by several factors, such as; there is a barrier between community with authorities/ high-level politician in terms of communication. The public interest is not prioritized by the authority, the public interest and authority point of view is disparate, the decision making decided by the politician (and the authority) are not clear and lack of transparency and accountability. Further, the decision making towards infrastructure development usually conducted without involving community consideration.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R15. Changes in government policy. The water supply sector has a legal and regulation to run the appropriate work under the government policy and rules where the term of contract management stand as the basic and core value to the way of delivering safe and clean water to community. However, the existence of policy uncertainty leads to the water quality standards shifting, the obscurity towards the allocation of clean water quantity distribution, lack of authority accountability which results on the declining of public confidence towards the government policy changes (e.g., changes in customer tariffs, an administration and non-administration rules)
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R16. Obscurity on government. Typical risk event which are taken into consideration here refers to the mediocre governance of the existing legal and regulatory framework for the provision of water supply by the government, the incoherence of national and regional legal method of resolving disputes, such as those related to the enforceability of legal provisions. Another example for this risk, such as; the ambiguous towards the basic framework of laws, regulations and provisions which applied towards the water supply empowerment, treatment and distribution to the community. Importantly, this risk emerges because of the incoherence between methods and implementation of law and regulation by the authorities and agency bodies in terms of dispute resolution
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Technical and operational risk R17. Insufficient non-technical service provision. The example of this risk event can be described as; the decreasing of non-technical service provision in terms of delivering solution towards public demand and complaints on the water supply service, the customer service division irreverent and lack of competency (unable) dealing with customer complaints, public problems and complaints are handled very slow, long process and complicated (tricky)
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R18. Water quality defective. The problem with water quality can be described as; a poor quality of distributed clean water by the regional water supply company, the color of clean water is not clear (turbid), unearthly clean water taste and an odor within the water. It is also found that the water supplied to the community contained with residual disinfectant, microbial
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 295
growth, sediment, substances and dirt D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R19. Trouble in water transmission and distribution network. This risk event refers to; the disorderly condition of elements of water distribution networks, limited transportation capacity of the system in relation to real needs (i.e., the needs which exceeding/overwhelm the planned distribution system capacity). Unless the distribution systems improve, the water may still have questionable taste, odor, color, sediment, and corrosivity
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R20. Mechanical (physical) component failure. The failure of individual mechanical network components related to the water treatment processing, storage, and distribution to the community. For instances; pumps, pipes, connections and joints, meters, panels and valves, and another component accessories
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R21. Under rate maintenance. Under rate maintenance refers to the physical infrastructure not being maintained following the undue period. The problem of the maintenance including; the calibration and replacement of physical checking carried out under the standard regulation, maintenance does not get any priority and lack of attention (tend to be underestimated)
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R22. Physical infrastructure decay. This risk refers to an old and vulnerable physical infrastructure due to the aging factor (deterioration). In fact, Surabaya water supply physical infrastructure mainly has been built in the Dutch colonial era (some of the physical system approaching 100 years old). Surabaya water supply physical system (pumps, pipes, connections and joints, meters, panels and valves) have exceeded the anticipated “useful life-time” (the permitted limit time)
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R23. Lack of technical service provision. The customer service and technical service department of authority or government agency takes very long to respond to customer’s problems and complaints. The origin and example of this risk event can be explained as; the technical service department of authority lack of technicians in the field, the technician lack the ability to understand the problem on site and thus cannot take the proper action, lack of investing on the modern technology to perform technical service and maintenance tasks, and technicians still prefer to do the task using traditional methods and technology rather than modern technology. Further, the authorities lack of finding solutions in terms of accessing the inaccessible areas for developing the water supply infrastructure system.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R24. Water loss (NRW). Water loss or Non-Revenue Water (NRW) is one of the major issues in water supply management studies. The NRW problem cannot be easily assessed, however the NRW occurs because of several things, such as; a leakage within distribution pipe (premiere, secondary and tertiary), leakage within piping connection or joint system, water theft by the customer or non-customer.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R25. Disturbance from another supporting infrastructure. In terms of treating, processing and delivering water to the community, respective authority rely or depend on another ‘supporting’ infrastructure (e.g., transportation, banking and finance, gas and oil, information and technology and electric power). A single disturbance on supporting infrastructure to water supply infrastructure system resulting in service interruption. For instances; without gas and transportation infrastructure PDAM cannot transmit the water by using water tankers to several water-problem (or non-piped water) areas in Surabaya, a disruption on electricity infrastructure system PDAM hampered the processes (mainly rely on the electricity and information technology) of treating and distributing clean water to community
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Economic risk
APPENDIX B
Page 296
R26. Interest rates instability. Interest is the cost of borrowing money. It is a function of the unrepaid principal and is expressed as a percentage per year. Interest rates instability affecting many aspects. For instance; based on regional water supply company (Perusahaan Daerah Air Minum-PDAM Surya Sembada) experts acknowledges the process of treating water is affected by the interest rate instability. The wide range of chemical materials required to treat the raw water into clean water which cannot be easily obtained has a sensitive price following the interest rate value. Thus, the price of various chemical materials is affected by the changes of interest rate. Unpredictable variation in interest rates results in an unstable and susceptible economy
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R27. Foreign exchange rates instability. Exchange rate risk comes from unpredictable variation in the exchange rate. Currency risk affects the value of the business through several mechanisms, which are; operational costs, maintenance and construction costs, and finance costs. Unpredictable variation in exchange rates results in an unstable and susceptible economy. One impact of this risk in Surabaya water supply infrastructure system is the increment of water supply fare which charged to the community.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R28. Poor infrastructure investment. The shortage of investment towards Indonesian infrastructure system development in the case of urban water supply system has been acknowledged by a number of studies. This means that infrastructure system upgrades get deferred and the backlog of investment needs grows. The cause of poor infrastructure investment in Indonesia can be explained as follows, but not limited to; lack of adaptive and long-term planning towards constructing and developing the Surabaya water supply infrastructure system by the authorities, lack of coordination and complexity between various public institutions in terms of developing infrastructure system, distrust of both domestic and foreign investors toward making decision to invest in Indonesia infrastructure development program
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R29. Inflation hazard. Almost all of the water supply sectors in Indonesia have been funded under massive loan agreement. The inflation hazard gives entirety impact not just to economy and financial aspect but also to the service provided by the regional water supply company (Perusahaan Daerah Air Minum-PDAM Surya Sembada) delivering reliable, continuous, reasonable and affordable price, and high quality clean water to the customers. Further, the inflation hazard affects whole of the stakeholders in the form of different impact levels. The inflation hazard related to Indonesian urban water supply infrastructure system can be seen in
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R30. The failure of price stabilization. In Indonesia context, the regional water supply enterprises are owned by the local government (Badan Usaha Milik Daerah-BUMD Surabaya). This means, that every single region (mainly city/district) has their own regional water supply company which have the authority to form the policies and rules (including the water price adjustment) in terms of providing water supply service and management. Even though the water price in Surabaya city is relatively stable, nonetheless, this hazard issue is considered as big issue that should get an attention from various scholars
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 297
Part C. Respondent position as stakeholder within urban water supply infrastructure
Please choose one stakeholder category which describes and represent you the best as the stakeholder group
within community. Tick (√, just one) in the left blank box towards your choice.
Stakeholder group Stakeholder description
G1. Brantas river basin
management
agency.
The national Brantas river basin management agency formed under the Directorate General
of water resource responsibility. It is one of the governmental institution for water resource
management in the context of managing ‘only’ the national strategic river. Further, it has a
duty to manage the water resource in terms of basin region which also cover; planning,
construction, operation and maintenance, in the context of; conservation and utilization of water resources, controlling water damage to the rivers, lakes, reservoirs, dams and other
types of water reservoirs, irrigation, ground water, raw water, marsh, ponds and beaches.
G2. State public works
department.
The state public works service (Dinas Pekerjaan Umum-PU) has a duty of; management,
assessment and makeing significant decisions regarding the development of; (i) Building
infrastructure (Cipta Karya dan Tata Ruang), (ii) Roadway infrastructure (Bina Marga) and
(iii) Irrigation and watering infrastructure respectively in the province (state) level
(Pematusan). Furthermore, PU has a responsibility to coordinate, assess and work together
with other PU department as well as with the Surabaya city government towards the
development of water supply infrastructure system.
P1. Jasa Tirta-I public
corportation.
Jasa Tirta-1 Public Corporation (PJT-1) provides bulk water for industry, agriculture,
flushing, port, electric power generation and others, (ii) provide water power to generate
electricity for the state electricity company, (iii) generate and distribute electric power and clean water, perform consulting in water resources fields, heavy equipment rental and water
quality laboratory services, and (iv) develop other water-related services including piped
domestic supply at specified scales.
G3. Surabaya city
government.
The Surabaya city government is an important stakeholder for Surabaya water supply
infrastructure either as the owner of regional water supply enterprise, clean water user, public
counseling, licensing services, public information providers, and the DM related to the
Surabaya community interest. Importantly, Surabaya city government plays a crucial role for
the Surabaya city development in building a good connection and coordination with BBWS,
several state government of PU departments, PJT-1, and the regional water supply enterprises
towards the development of UI.
P2. Regional water
supply enterprise.
Substantially, the PDAM Surya Sembada has a responsibility to continuously supply a reliable a high-quality water for the society. The responsibility includes, but not limited to; treating
bulk raw water to be a high quality clean water, distribute the clean water to the society, plan
and build a water distribution network system. Accordingly, PDAM has the responsibility to
maintain the level and ability for supplying clean water continuously to society with
affordable quality and prices includes satisfying service provision.
M1. Industry and
business.
The stakeholder group who has a high dependency towards the big quantity supply of clean
water in order to sustain their business. This industry group refers to the state-owned, joint
venture, public-owned or even private business entity whose rely heavily on the continuity of
inviolable domestic water services (massive quantity) to promote their business.
M2. Commercial and, or
public space.
A general, public space or commercial sector which managed by public or private institution
and stand as both regular clean water customer and user. For instance; park, public toilet,
worship place, public squares, public library, university, department store, school and office building, swimming pool, single management-based housing (apartment and condominium),
hotel, restaurant, and exhibition hall.
M3. Domestic end user.
The domestic end user group is either an individual or group in respective residence or
dwelling area in Surabaya city as a regular customer towards clean water end user to support
their daily activity. This stakeholder group is the society and, or group of laypeople who rely
on the domestic UWS infrastructure service to support their daily life.
APPENDIX B
Page 298
Part D. Information exchange between stakeholders related to the stakeholder-risk associated.
1. Please choose the risk event that you personally think threating/affecting you by ticking (√) in the
second (“Affected”) column as many risk events as you wish.
2. Based on the point 1 above, for each risk event you choose, determine other stakeholder groups
that you think also impacted/ affected by each of your risk. Note: Both risk events and the stakeholder groups are refers to part B and C respectively.
Risk ID
Affected by:
G1 G2 P1 G3 P2 M1 M2 M3
R1 R2 R3 R4 R5
Risk ID
Affected by:
G1 G2 P1 G3 P2 M1 M2 M3
R6 R7 R8 R9
R10 R11 R12
Risk ID
Affected by:
G1 G2 P1 G3 P2 M1 M2 M3
R13 R14 R15 R16
Risk ID
Affected by:
G1 G2 P1 G3 P2 M1 M2 M3
R17 R18 R19 R20 R21 R22 R23 R24 R25
Risk ID
Affected by:
G1 G2 P1 G3 P2 M1 M2 M3
R26 R27 R28 R29 R30
APPENDIX B
Page 299
Part E. Critics and suggestion
Thank you, your participation will give a huge contribute to the further path of this research processes.
APPENDIX B
Page 300
QUESTIONAIRE APPENDIX
Tabel 1. Probability of occurrences (O), failure rate description and rating scale.
Probability of occurrence Possible failure rate Rating Almost certain ≥1/2 10 Very High 1/3 9 High 1/8 8 Moderate high 1/20 7 Moderate 1/80 6 Moderately low 1/400 5 Low 1/2000 4 Slight 1/15.000 3 Remote 1/150.000 2 Almost never 1/1.500.000 1
Table 2. Severity (S), effect description and rating scale.
Effect Severity of Effect Rating Hazardous without warning
Hazardous effect and safety related when a potential failure mode effects safe system operation without warning
10
Hazardous with warning
Serious effect and product must stop when a potential failure mode affect safe system operation with warning
9
Very high Very high effect and product inoperable 8 High High effect on product performance with equipment damage 7 Moderate Moderate effect on product performance with minor damage 6 Low Low effect on product performance 5 Very low Very low effect on product performance 4 Minor Slight effect on product performance 3 Very minor Very slight effect on product performance 2 None No effect 1
Table 3. Detectability (D), criteria description and rating scale.
Detectability Criteria (Detection-%) Rating
Absolutely impossible Design control will not and/or cannot detect a potential cause/mechanism and subsequent failure mode; or there is no design control (0-5%)
10
Very remote Very remote chance the design control will detect a potential cause/mechanism and subsequent failure mode (6-15%)
9
Remote Remote chance the design control will detect a potential cause/mechanism and subsequent failure mode (16-25%)
8
Very low Very Low chance the design control will detect a potential cause/mechanism and subsequent failure mode (26-35%)
7
Low Low chance the design control will detect a potential cause/mechanism and subsequent failure mode (36-45)
6
Moderate Moderate chance the design control will detect a potential cause/mechanism and subsequent failure mode (46-55)
5
Moderately high Moderately high chance the design control will detect a potential cause/mechanism and subsequent failure mode (56-65)
4
High High chance the design control will detect a potential cause/mechanism and subsequent failure mode (66-75)
3
Very high Very High chance the design control will detect a potential cause/mechanism and subsequent failure mode (76-85)
2
Almost certain Design control will almost certainly detect a potential cause/mechanism and subsequent failure mode (86-100)
1
APPENDIX B
Page 301
FACULTY OF ARCHITECTURE, BUILDING AND PLANNING
THE UNIVERSITY OF MELBOURNE
FORM KUESIONER
Judul Penelitian:
Model Konseptual untuk Menilai Resiko dan Membangun Ketahanan Sistem
Infrastruktur Perkotaan: Studi Kasus Indonesia
1. Golongan umur : (1) □ 23~30 Tahun (2) □31~38 Tahun (3) □39~46 Tahun
(4) □ 46~53 Tahun (5) □54~60 Tahun (6) □> 61 Tahun
2. Tingkat pendidikan : (1) □ Sarjana (2) □ Magister
(3) □ Doktoral (4) □ Lain-lain, (sebutkan):____________________
3. Pekerjaan : (1) □ Akademisi/pendidikan (2) □ Bisnis atau industry jasa
(3) □ Industri manufaktur (4) □ Fungsionaris pemerintah
(5) □ Lain-lain, (sebutkan): ____________________________
4. Nama institusi (apabila relevan) : _______________________________________
5. Posisi (apabila relevan) : _______________________________________
6. Pengalaman kerja : (1) □ < 5 Tahun (2) □ 5-10 Tahun
(3) □11-15 Tahun (4) □15-20 Tahun
7. Email/nomor telepon : ________________________________________
Bagian A. latar belakang responden
Pada bagian awal kuesioner ini, anda diminta untuk memberikan informasi mengenai diri anda. Jawablah
pertanyaan dibawah ini dengan memberikan tanda cawang (√) pada kotak yang disediakan serta isilah
jawaban pada tempat yang telah disediakan. yang sesuai dengan diri anda Kami akan memastikan
kerahasiaan dari pada segala informasi anda berikan kepada kami.
Nomor partisipan: (for surveyor only)
Catatan untuk reponden
Survei ini ditujukan untuk mendapatkan data sebenar-benarnya dari stakeholder yang berbeda dalam
hal risiko dalam system infrastruktur air minum perkotaan. Hasil kuesioner akan menjadi input dalam
framework riset ini yang mana membahas soal hubungan stakeholder dengan risiko. Oleh karena itu, untuk mendapatkan data yang valid, meminimalisasi kesalahan dan ketidaksamaan pemahaman, bacalah
instruksi yang tertera pada bagian awal tiap-tiap bagian kuesioner ini.
APPENDIX B
Page 302
Daftar risiko Variabel risiko
Risiko alam
R1. Perubahan iklim (cuaca). Hujan berkepanjangan diluar waktu pada umumnya, musim panas dan kemarau berkepanjangan
menyebabkan; perubahan suhu, kelembaban, perubahan intensitas angin, tingkat vegetasi, kelembaban tanah dan limpasan serta
perubahan (penurunan) kualitas air baku.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R2. Bencana alam. Kejadian yang mempengaruhi segala aktivitas sistem penyediaan air minum yang berada diluar
jangkauan manusia. Contoh: Gempa bumi, banjir, kerusakan sistem bendungan, serangan kilat, badai angin, tornado, penyakit
menular melalui air minum, kebakaran hutan, badai api, tanah longsor semburan lumpur, lahar, hujan abu dan peperangan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R3. Kelangkaan air minum. Debit menurun drastis, tidak tersedianya tekanan dalam sistem pendistribusian air minum,
tidak ada air yang keluar dari sistem distribusi, terjadinya kekeringan/kekurangan air baku sebagai bahan utama air minum perkotaan, adanya permintaan pengguna air minum jauh lebih tinggi dari pada kapasitas produksi, ketersediaan simpanan dan
cadangan air minum, kapasitas produksi air minum oleh pihak yang berwenang dibawah jumlah permintaan masyarakat.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R4. Exploitasi lahan tidur berlebihan/ tak terkendali. Dalam proses pengembangan infrastruktur penyediaan air minum perkotaan,
risiko exploitasi, penggunaan dan pengalihgunaan lahan tidur semakin besar (dikarenakan juga oleh faktor pertumbuhan populasi
penduduk dan perubahan pola urbanisasi). Hal tersebut berdampak negatif terhadap lingkungan (polusi ke aquifer, gangguan
lingkungan dan kontaminasi sungai dan, atau daerah tangkapan air.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R5. Polusi dan kontaminasi. Masyarakat dan industri bermukim didaerah tangkapan air (sumber air baku) yang menjadi bahan baku
olahan untuk air minum bagi masyarakat, pembuang sampah sembarangan di wilayah tangkapan air, pembuangan hajat, pembuangan limbah dari industri dan perumahan secara liar yang berdampak pada pencemaran wilayah tangkapan air.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 Risiko sosial
R6. Ketidakjelasan jumlah permintaan air bersih. Dinamika jumlah permintaan masyarakat akan air minum yang disebabkan oleh;
perubahan jumlah populasi penduduk, kapasitas instalasi pengolahan dan produksi air minum yang bersifat fluktuatif, risiko kebocoran
dan kehilangan air minum yang relatif susah untuk diketahui, berubahnya pola konsumsi air minum masyarakat domestik maupun non-
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Bagian B. Analisa besaran resiko pada sistem infrastruktur pasokan air baku perkotaan.
Berdasarkan persepsi anda, berilah penilaian pada tiap variabel risiko (O, S dan D) dengan cara melingkari 10-point skala Likert. Pengertian akan tiap-tiap variable
risiko O, S dan D dijelaskan dibawah ini;
Occurrence (O) mengacu pada kemungkinan bahwa risiko tersebut akan terjadi.
Tidak pernah 1 2 3 4 5 6 7 8 9 10 Hampir pasti
Severity (S) mengindikasikan bagaimana dampak tiap risiko akan berpengaruh.
Tidak ada 1 2 3 4 5 6 7 8 9 10 Berbahaya tanpa peringatan
Detectability (D) mengacu pada probabilitas akan tidak terdeteksinya kehadiran risiko tersebut (ketidaktahuan akan eksistensi risiko tersebut).
Hampir pasti 1 2 3 4 5 6 7 8 9 10 Tidak mungkin
APPENDIX B
Page 303
domestik. D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R7. Penyalahgunaan air minum. Perlakuan atas pemanfaatan air minum yang kurang benar dan, atau adanya penyalahgunaan
(penggunaan air secara berlebihan, penggunaan tidak pada kebutuhan yang semestinya, perlakuan penggunaan air minum dipandang
sebelah mata, menjual air tanpa ijin/ melanggar hukum).
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R8. Terbatasnya akses mendapatkan air minum. Ketidakterjangkauan masyarakat memperoleh (akses) air minum dikarenakan
adanya permasalahan ketidaksetaraan sosial-ekonomi, keterbatasan infrastruktur pendistribusian air perkotaan pada wilayah-wilayah
tertentu (khususnya wilayah terpencil dan rawan air), adanya diskriminasi gender dalam sistem infrastruktur penyediaan air minum
perkotaan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R9. Permasalahan pembayaran rekening air pelanggan. Tidak terbayarnya biaya tagihan konsumsi air minum oleh pelanggan,
adanya tidak pidana penipuan dengan mengganti meteran air yang bertujuan agar membayar biaya tagihan lebih rendah dari jumlah
semestinya, rendahnya kesadaran untuk membayar biaya tagihan tepat waktu, adanya rasa enggan membayar tagihan dikarenakan
perubahan sistem pelayanan dan harga air minum.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R10. Penolakan masyarakat. Penolakan akan solusi yang diberikan terhadap permasalahan distribusi air minum, seperti; perubahan
kebijakan dan peraturan, kenaikan tarif air namun stagnansi dan penurunan kualitas pelayanan distribusi air minum masih terjadi,
mempersulit/menolak pemeriksaan meter air beserta perlengkapannya oleh petugas. Penolakan masyarakat berujung pada penolakan
untuk membayar tagihan, protes dan boikot masal, demo dan kemungkinan berujung pada tindakan anarkis.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R11. Pertumbuhan penduduk dan perubahan pola urbanisasi. Pertumbuhan penduduk dan pola urbanisasi berubah sehingga
populasi menjadi sangat padat diwilayah perkotaan. Kapasitar produksi dan permintaan air minum berubah-ubah mengikuti pola
konsumsi masyarakat diwilayah perkotaan. Dampak lain adalah adanya perubahan pola penggunaan lahan tidur yang berdampak pada
polusi air tanah.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R12. Ancaman pengrusakan sistem infrastructure (sabotase). Ancaman tindakan pengerusakan fisik fasilitas umum infrastruktur
penyediaan air minum perkotaan dengan mengunakan bahan peledak, tindakan kriminal dengan mencemari proses instalasi pengolahan
dan, atau jaringan distribusi air minum, pengerusakan meteran air dan pipa saluran primer distribusi air, merusak, melepas dan
menghilangkan segel serta kelengkapannya termasuk hidran/kran umum (termasuk aksesoris lainnya).
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 Political risk
R13. Dinamika pergerakan politik. Gangguan pelayanan air minum perkotaan yang disebabkan oleh; pergerakan politik negara, ketidakjelasan kerjasama politik antar berbagai instansi, ketidakjelasan pengambilan keputusan dan rendahnya komitmen bersama dari berbagai instansi terkait dengan pengembangan dan penginplementasian kerangka dasar hukum (dan regulasi) yang berlaku, konflik yang berujung pada terhambatnya pengembangan sistem infrastruktur penyediaan air minum perkotaan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R14. Terbatasnya partisipasi publik. Adanya hambatan dalam hal komunikasi antar perwakilan masyarakat dengan elit politik, kurangnya prioritas yang diberikan kepada kepentingan masyarakat, munculnya bias, ketidakjelasan dan ketidak-transparansian dalam pengambilan keputusan yang dilakukan pihak berwenang (elit politik) tanpa melibatkan suara dan partisipasi masyarakat sekitar.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R15. Perubahan kebijakan pemerintah. Ketidakjelasan mengenai alokasi kuantitas distribusi air minum (cenderung berlebihan), rendahnya transparansi dan akuntabilitas pihak pemerintah sehingga menurunkan kepercayaan publik atas perubahan kebijakan pemerintah yang disahkan (perubahan tarif pelanggan tak menentu yang merugikan masyarakat).
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 304
R16. Ketidakjelasan legalitas dan regulasi hokum. Tidak jelasnya (rancu) kerangka dasar hukum dan regulasi/ketentuan yang berlaku dalam hal pemberdayaan, pengolahan dan pendistribusian air minum kepada masyarakat. Risiko ini juga timbul dalam bentuk inkoherensi metode dan implementasi hukum nasional (tingkat provinsi, kabupaten dan regional/kota) dalam hal penyelesaian sengketa.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 Technical and operational risk
R17. Kurangnya tingkat pelayanan non-teknis. Penurunan kualitas pengelolah infrastruktur penyediaan air minum dalam memberikan pelayanan dan solusi atas permintaan maupun keluhan masyarakat, bagian pelayanan bersangkutan kurang sopan dalam menghadapi pelanggan, lambatnya penanganan atas keluhan masyarakat, bagian pelayanan kurang mampu menguasai permasalahan yang ada, pelayanan dan administrasi yang rumit.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R18. Penurunan kualitas air bersih. Penurunan/rendahnya kualitas air minum dengan berbagai parameternya, yaitu; adanya perubahan warna (tidak jernih), tingkat kekeruhan tidak dapat diterima, rasa air yang aneh dan bau tak sedap.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R19. Gangguan jaringan distribusi air bersih. Aliran air mengecil atau bahkan mati, penurunan tekanan air minum karena kapasitas perpipaan distribusi air minum melebihi beban permintaan masyarakat (tidak mencukupi/ kapasitas jaringan distribusi melebihi perencanaan awal dari kapasitas yang telah direncanakan), adanya kebocoran dalam pipa distribusi, aliran air yang ditutup/ dimatikan sementara oleh pihak berwenang (adanya perbaikan pipa), tekanan air dalam jaringan tidak merata.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R20. Kerusakan komponen fisik infrastruktur. Risiko kerusakan komponen fisik infrastruktur meliputi (tak menutup kemungkinan lain); kerusakan pipa, pompa air, sambungan-sambungan, aksesoris, meteran air dan katup air, kebocoran karena katup air dan pipa distribusi air bermasalah, masuknya akar pohon ke dalam pipa distribusi.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R21. Tingkat pemeliharaan fisik infrastruktur yang rendah. Perawatan dan pemeliharaan (penggantian, kalibrasi dan pengecekan fisik) fisik infrastruktur mengalami penurunan/ dilakukan dibawah standar peraturan, pemeliharaan tidak diprioritaskan dan tidak diperhatikan, cenderung diremehkan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R22. Penuaan umur fisik infrastruktur. Sistem infratruktur fisik penyediaan air minum perkotaan melebihi ambang batas waktu penggunaan yang dijinkan (pipa, pompa, panel, rumah pompa, sambungan dan aksesoris), infrastruktur fisik terlampau lama dibangun (sejak jaman belanda), sistem fisik infrastruktur melebihi kapasitas masa layan yang dianjurkan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R23. Kurangnya tingkat pelayanan teknis. Penurunan kualitas pelayanan teknis ke masyakarat rendah dan kurang terorganisir. Contoh: pemberitahuan berita penting ke para pelanggan terlambat, perbaikan kembali atas pekerjaan galian dan perbaikan sistem infrastruktur fisik kurang baik (asal-asalan), pengecekan meteran air dan input data yang kurang teliti, pekerja bersangkutan kurang sopan dalam menghadapi pelanggan, lambatnya penanganan atas keluhan masyarakat.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 R24. Kehilangan air (Non-Revenue Water). Adanya kebocoran pipa, kebocoran sambungan, kebocoran pada kran dan atau, aksesoris lainnya, pencurian air oleh pelanggan dan, atau oleh non-pelanggan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 305
R25. Gangguan dari infrastruktur pendukung lainnya. Gangguan dari sistem infrastruktur pendukung lain yang menyebabkan terganggunya proses pengolahan, dan pendistribusian air minum perkotaan. Contoh; Pemadaman listrik mengganggu proses pengelolaan dan pendistribusian air minum perkotaan, gangguan infrastruktur transportasi menghambat proses pendistribusian air ke daerah rawan air (mobil tangki), gangguan pada kapastias suplai energi (dan dukungan IT) untuk keberlanjutan kinerja sistem infratruktur penyediaan air perkotaan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
Economic risk
R26. Fluktuasi tingkat bunga perbankan. Tingkat bunga yang terlalu tinggi menyebabkan krisis keuangan. Fluktiasi bunga perbankan yang tak dapat di prediksi berdampak pada ketidakseimbangan dan kerentanan ekonomi. Contoh; kenaikan tarif penggunaan air yang dibebankan kepada masyarakat (pelanggan), terhambatnya proses pengembangan pembangunan infrastruktur penyediaan air perkotaan. Proses pengolahan air baku menjadi air minum juga dipengaruhi oleh fluktuasi bunga perbankan.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R27. Fluktuasi nilai pertukaran valuta asing. Terjadinya perubahan pertukaran valuta asing yang tidak dapat diprediksi. Variasi perubahan nilai pertukaran valuta asing berdampak pada kerentanan dan ketidakstabilan ekonomi. Salah satu dampak daripada risiko ini adalah adanya kenaikan tarif pengguna air yang dibebankan kepada masyarakat (pelanggan).
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R28. Kurangnya tingkat investasi pengembangan infrastruktur. Kurangnya perencanaan yang bersifat adaptif dan jangka panjang dalam hal perencanaan pembangunan dan pengembangan infrastruktur penyediaan air minum perkotaan, kerumitan yang disebabkan oleh lembaga-lembaga pemerintah/ swasta terkait, adanya faktor ketidakpercayaan investor domestik maupun luar negeri dalam hal menanamkan modalnya untuk pengembangan infrastruktur di Indonesia.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R29. Risiko inflasi. Risiko inflasi (kenaikan dan ketidaksimbangan atas harga-harga barang ditengah masyarakat), dapat memberikan dampak tidak hanya kepada aspek ekonomi dan finansial namun juga berdampak pada tingkat sistem pelayanan penyediaanan air minum. Inflasi memberikan dampak yang tidak sama bagi berbagai stakeholder dalam konteks infrastruktur penyediaan air minum.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
R30. Kurang stabilnya harga air bersih. Ketidakjelasan pengaturan dan penetapan tarif air minum berimbas pada terganggunya sistem penyediaanan dan pemenuhan kebutuhan air minum. Tarif ditetapkan tanpa studi lanjut dan pertimbangan yang tepat, ketidakefisienan tingkat harga juga berujung pada ketidakseimbangan tingkat layanan pemenuhan kebutuhan air minum.
O = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
S = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
D = 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10
APPENDIX B
Page 306
Bagian C. Posisi responden sebagai pemegang kepentingan dalam infrastruktur suplai air bersih Pilihlah salah satu (hanya satu) kategori dari pilihan stakeholder dibawah ini yang paling tepat untuk merepresentasikan
posisi anda sebagai stakeholder dalam konteks infrastruktur penyediaan air bersih kota Surabaya dengan mencentang
(√) pada kotak yang tersedia.
Stakeholder group Stakeholder description
G1. Balai Besar
Wilayah Sungai
Brantas (BBWS).
Balai Besar Wilayah Sungai mempunyai tugas melaksanakan pengelolaan sumber daya air di
wilayah sungai yang meliputi perencanaan, pelaksanaan konstruksi, operasi dan pemeliharaan
dalam rangka konservasi dan pendayagunaan sumber daya air dan pengendalian daya rusak
air pada sungai danau, waduk, bendungan dan tampungan air lainnya, irigasi, air tanah, air
baku, rawa, tambak dan pantai.
G2. Dinas Pekerjaan
Umum-provinsi
Dinas Pekerjaan Umum mempunyai fungsi: (i) Perumusan kebijakan teknis di bidang
pekerjaan umum, bina marga, cipta karya, pengairan dan tata ruang; (ii)Pelaksanaan
pengaturan, pembinaan, pengendalian, pembangunan, pemeliharaan dan pengawasan jalan
dan jembatan, drainase, irigasi, sungai, sumber daya air, bangunan dan gedung, permukiman
dan perumahan, sanitasi perkotaan serta tata ruang yang menjadi kewenangan daerah; (iii)
Pelaksanaan kegiatan pemungutan retribusi yang menjadi kewenangannya; (iv) Pelaksanaan Standar Pelayanan Minimal (SPM) dan Standart Pelayanan Publik (SPP) serta pelaksanaan
fasilitasi pengukuran Indeks Kepuasan Masyarakat (IKM) secara periodik untuk
memperbaiki kualitas layanan dan pengelolaan pengaduan masyarakat di bidang pekerjaan
umum; (v) dan lain-lain.
P1. Perusahaan Umum
Jasa Tirta-I.
Perusahaan Umum Jasa Tirta-1 adalah Badan Usaha Milik Negara (BUMN) yang ditugasi
untuk menyelenggarakan pemanfaatan umum atas air dan sumber-sumber air yang bermutu
dan memadai bagi pemenuhan hajat hidup orang banyak, serta melaksanakan tugas-tugas
tertentu yang diberikan Pemerintah dalam pengelolaan wilayah daerah aliran sungai (DAS).
G3. Pemerintahan kota
Surabaya.
Pemerintahan Kota Surabaya merupakan bagian dari sistem penyelenggaraan pemerintahan
daerah di Indonesia, yang menganut sistem desentralisasi, tugas pembantuan, dan
dekonsentrasi dalam mengatur dan mengurus sendiri urusan pemerintahan menurut asas
otonomi dan menjalankan otonomi seluas-luasnya serta tugas pembantuan di kota Surabaya.
P2. Perusahaan Daerah
Air Minum-Surya
Sembada.
Perusahaan Daerah Air Minum (PDAM) Surya Sembada mimiliki visi dan misi, diantaranya;
Visi: Tersedianya air minum yang cukup bagi pelanggan melalui perusahaan air minum yang
mandiri, berwawasan global, dan terbaik di Indonesia.
Misi: Memproduksi dan mendistribusikan air minum bagi pelanggan; Memberi pelayanan
prima bagi pelanggan dan berkelanjutan bagi pemangku kepentingan; Melakukan usaha lain
bagi kemajuan perusahaan dan berpartisipasi aktif dalam kegiatan sosial kemasyarakatan.
M1. Industri/bisnis.
Industri pengguna air minum sebagai bahan baku prioritas dalam usaha/ proses produksinya.
Perusahaan dengan komoditas produk yang diperdangangkan secara keseluruhan (atau
sebagian besar) merupakan hasil produksi dari bahan baku air minum perkotaan. Contoh:
industri air minum, industry minuman ringan, industri agrikultur.
M2. Komersial dan,
atau tempat publik.
Ruang publik, pusat perbelanjaan, rumah sakit (publik/ swasta), universitas, sekolah, pusat hiburan, taman rekreasi, tempat umum (kamar mandi umum), restaurant, hotel, gedung
pertemuan, gedung perkantoran, pasar tradisional, pasar modern, pelabuhan udara, pelabuhan
laut, apartemen, kondominium, gedung perkantoran, gedung pemerintah, gedung/tempat
ibadah, terminal, pergudangan, penjual air minum independen dan swasta.
M3. Pengguna akhir
domestik.
Pengguna/ pelanggan umum, pelanggan pemukiman perumahan, pengguna/ pelanggan air
minum ditingkat kawasan/ wilayah, pengguna potensial dan pengguna regular, pengguna
kelas atas-menengah-bawah, pengguna dengan tingkat koneksi layanan air minum perkotaan
kurang baik, pengguna dengan tingkat koneksi tingkat layanan air minum perkotaan sangat
buruk.
APPENDIX B
Page 307
Bagian D. Pertukaran informasi antar pemangku kepentingan terhadap kepemilikan risiko.
1. Pilihlah risiko-risiko yang berhubungan dan, atau berdampak pada anda dengan memberikan tanda
centang (√) dikolom kedua (“Terkena dampak”). Anda dapat memilih lebih dari satu risiko.
2. Berdasarkan poin 1 diatas, untuk tiap risiko yang telah nada pilih, tentukan pemangku kepentingan
lain yang mungkin memiliki hubungan dan, atau terkena dampak dari tiap-tiap risiko yang tela anda pilih.
Catatan: Penjelasan risiko dan pemangku kepentingan mengacu dan dapat dilihat pada bagian B dan
C kuesioner ini.
Risiko Terkena dampak
G1 G2 P1 G3 P2 M1 M2 M3
R1 R2 R3 R4 R5
Risiko Terkena dampak
G1 G2 P1 G3 P2 M1 M2 M3
R6 R7 R8 R9
R10 R11 R12
Risiko Terkena dampak
G1 G2 P1 G3 P2 M1 M2 M3
R13 R14 R15 R16
Risiko Terkena dampak
G1 G2 P1 G3 P2 M1 M2 M3
R17 R18 R19 R20 R21 R22 R23 R24 R25
Risiko Terkena dampak
G1 G2 P1 G3 P2 M1 M2 M3
R26 R27 R28 R29 R30
APPENDIX B
Page 308
Bagian E. Kritik dan saran.
Terima kasih, partisipasi anda memberikan kontribusi yang besar terhadap proses riset ini.
APPENDIX B
Page 309
APPENDIX KUESIONER
Tabel 1. Probabilita terjadinya risiko (O), deskripsi tingkat kegagalan dan tingkat penilaian.
Probabilitas terjadinya Tingkat kegagalan Penilaian
Hampir pasti ≥1/2 10
Sangat pasti 1/3 9
Tinggi 1/8 8
Sedang-Tinggi 1/20 7
Sedang 1/80 6
Cukup rendah 1/400 5
Rendah 1/2000 4 Sedikit 1/15.000 3
Hampir tidak pernah 1/150.000 2
Tidak pernah 1/1.500.000 1
Tabel 2. Dampak/efek (S), deskripsi dan tingkat penilaian.
Efek/Akibat Besarnya Dampak/Efek Penilaian
Berbahaya tanpa
peringatan
Efek berbahaya terkait dengan keamanan ketika kegagalan sistem
keamanan kinerja terjadi tanpa peringatan 10
Berbahaya
dengan peringatan
Dampak serius ketika potensial kegagalan mempengaruhi sistem
keamanan kinerja terjadi dengan peringatan 9
Sangat tinggi Tingkat dampak/efek yang sangat tinggi pada sistem kinerja 8
Tinggi Tingkat dampak/efek tinggi pada sistem kinerja 7
Sedang Tingkat dampak/efek sedang pada sistem kinerja 6
Rendah Tingkat dampak/efek rendah pada sistem kinerja 5
Sangat rendah Dampak yang sangat rendah pada sistem kinerja 4
Kecil Sedikit dampak/efek pada sistem kinerja 3
Sangat kecil Sangat sedikit berpengaruh pada sistem kinerja 2
Tidak ada Tidak ada efek 1
Tabel 3. Deteksi (D), deskripsi kriteria dan tingkat penilaian.
Pendeteksian Kriteria (Terdeteksi-%) Penilaian
Tidak mungkin
Tidak akan dan, atau tidak ada peluang untuk/dapat mendeteksi
penyebab/mekanisme potensial dan modus kegagalan; atau tidak ada kontrol
desain (0-5%)
10
Hampir tidak
mungkin
Peluang yang hampir tidak mungkin untuk mendeteksi dan mengontrol
penyebab potensial kegagalan mekanisme (6-15%) 9
Sangat rendah Peluang yang sangat rendah untuk mendeteksi dan mengontrol penyebab
potensial kegagalan mekanisme (16-25%) 8
Cukup rendah Peluang yang cukup rendah untuk mendeteksi dan mengontrol penyebab potensial kegagalan mekanisme (26-35%)
7
Rendah Peluang yang rendah untuk mendeteksi dan mengontrol penyebab potensial
kegagalan mekanisme (36-45%) 6
Sedang Peluang sedang untuk mendeteksi dan mengontrol penyebab potensial
kegagalan mekanisme (46-55%) 5
Cukup tinggi Peluang cukup tinggi untuk mendeteksi dan mengontrol penyebab potensial
kegagalan mekanisme (56-65%) 4
Tinggi Peluang cukup besar untuk mendeteksi dan mengontrol penyebab potensial
kegagalan mekanisme (66-75%) 3
Sangat tinggi Peluang sangat tinggi untuk mendeteksi dan mengontrol penyebab potensial
kegagalan mekanisme (76-85%) 2
Hampir pasti Hampir pasti terdeteksi dan kemampuan mengontrol akan penyebab
potensial kegagalan mekanisme (86-100%) 1
APPENDIX B
Page 310
Table B-1. R-R matrix with global interrelationship value
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
R1 2885 2940 3160 1437 3709 1616 2208 2589 1990 1287 1814 2098 1142 1260 2617 1901 2373 3549 3022 2433 2465 1891 2115 2304 1567 1289 1124 1662 1906 2189
R2 3507 3531 3811 1705 4504 1883 2604 3136 2379 1494 2173 2481 1363 1481 3163 2241 2843 4300 3657 2906 2929 2257 2525 2729 1848 1517 1306 1967 2289 2610
R3 3580 3628 3907 1748 4624 1925 2676 3234 2433 1537 2236 2555 1391 1511 3237 2293 2928 4422 3772 2995 3012 2317 2589 2810 1905 1558 1341 2038 2348 2685
R4 1302 1346 1418 646 1689 712 957 1179 884 571 826 928 520 571 1192 851 1053 1598 1385 1112 1089 875 958 1029 711 564 491 737 853 969
R5 4168 4196 4552 2022 5351 2204 3106 3737 2817 1742 2558 2939 1582 1713 3743 2619 3390 5143 4333 3424 3490 2632 2976 3241 2172 1791 1541 2332 2719 3104
R6 1429 1487 1540 717 1843 801 1064 1281 984 661 904 1036 608 657 1325 974 1150 1736 1498 1224 1198 985 1053 1144 789 647 570 827 966 1080
R7 1871 1902 2048 897 2398 1010 1396 1676 1281 803 1142 1347 729 792 1689 1213 1526 2319 1926 1541 1583 1205 1348 1475 983 818 714 1054 1247 1414
R8 2640 2687 2911 1263 3413 1433 1985 2387 1808 1134 1643 1908 1016 1115 2386 1704 2172 3282 2773 2203 2239 1711 1919 2083 1407 1147 991 1498 1744 1991
R9 1786 1825 1973 874 2315 976 1356 1614 1224 774 1115 1289 693 759 1620 1161 1468 2223 1875 1492 1516 1156 1304 1431 950 787 690 1024 1189 1358
R10 1110 1163 1210 546 1440 624 825 1004 767 503 695 809 461 499 1027 757 898 1369 1165 948 934 763 826 898 613 493 439 634 753 846
R11 1672 1740 1821 830 2165 955 1263 1514 1163 778 1059 1229 698 767 1545 1146 1365 2048 1769 1437 1416 1151 1249 1357 932 760 668 977 1132 1276
R12 1867 1928 2032 931 2418 1047 1400 1685 1284 848 1187 1341 768 838 1717 1251 1518 2283 1974 1593 1567 1265 1380 1495 1023 834 730 1076 1248 1410
R13 1249 1291 1362 596 1609 690 910 1138 854 558 787 903 504 557 1145 835 1007 1528 1323 1063 1040 855 925 986 685 545 471 709 831 931
R14 1272 1318 1402 628 1651 741 975 1172 893 617 833 950 539 598 1185 895 1058 1560 1378 1112 1079 894 974 1062 721 598 524 765 872 983
R15 2737 2815 2987 1356 3539 1511 2044 2484 1872 1220 1727 1969 1101 1195 2490 1805 2230 3365 2896 2326 2300 1828 2013 2181 1497 1205 1051 1565 1808 2055
R16 1863 1925 2006 918 2403 1025 1373 1678 1268 851 1169 1336 784 841 1719 1248 1495 2264 1951 1591 1554 1279 1358 1470 1021 827 720 1077 1249 1394
R17 2306 2328 2550 1101 2979 1238 1735 2084 1580 972 1427 1652 864 957 2078 1471 1886 2868 2422 1890 1935 1460 1679 1835 1199 1001 872 1297 1526 1744
R18 3831 3845 4196 1852 4926 2027 2874 3429 2600 1599 2352 2706 1445 1569 3437 2403 3127 4728 3985 3130 3212 2398 2736 2994 1983 1652 1426 2150 2506 2863
R19 3113 3136 3399 1519 4004 1676 2340 2795 2116 1345 1935 2217 1219 1323 2819 2006 2537 3828 3240 2576 2614 2006 2246 2458 1640 1376 1190 1779 2063 2339
R20 2614 2651 2845 1316 3372 1441 1983 2358 1789 1174 1663 1877 1063 1155 2388 1721 2142 3195 2763 2206 2202 1731 1910 2086 1417 1181 1026 1528 1739 1973
R21 2385 2442 2627 1169 3081 1329 1809 2170 1642 1073 1514 1735 954 1053 2179 1589 1966 2942 2533 2016 2007 1587 1767 1924 1292 1067 930 1376 1593 1813
R22 1953 1997 2108 974 2510 1085 1464 1753 1335 896 1231 1404 809 874 1792 1311 1583 2372 2054 1655 1630 1309 1432 1566 1064 884 775 1139 1311 1475
R23 2182 2211 2381 1067 2812 1170 1624 1969 1478 946 1368 1555 863 938 1984 1410 1775 2679 2295 1822 1824 1422 1567 1713 1155 960 827 1251 1443 1634
R24 2292 2341 2501 1120 2966 1239 1722 2063 1569 1008 1415 1640 911 980 2094 1499 1869 2834 2399 1908 1919 1495 1666 1829 1212 1017 889 1311 1541 1739
R25 1494 1533 1619 744 1933 826 1121 1343 1023 679 946 1069 617 669 1378 1000 1213 1825 1577 1264 1243 1004 1098 1203 803 675 592 867 1006 1131
R26 1281 1316 1412 604 1667 689 949 1165 877 552 793 917 500 547 1170 838 1042 1595 1354 1068 1067 843 938 1022 678 545 478 720 851 966
R27 1003 1025 1101 468 1297 535 730 915 679 433 625 716 395 433 915 656 813 1240 1060 839 830 668 733 788 533 431 369 564 666 749
R28 1409 1463 1551 685 1823 808 1052 1309 974 669 926 1051 602 671 1315 987 1174 1742 1538 1247 1204 1012 1087 1161 821 659 572 844 971 1094
R29 1812 1823 1946 833 2299 949 1295 1616 1212 761 1101 1272 699 762 1626 1165 1445 2213 1883 1491 1488 1185 1313 1408 959 771 665 998 1190 1349
R30 2461 2497 2700 1193 3185 1287 1830 2217 1661 1019 1501 1741 934 999 2217 1541 1997 3068 2553 2025 2072 1554 1748 1909 1279 1047 906 1378 1612 1834
APPENDIX B
Page 311
Table B-2. Dichotomized R-R matrix
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30 Total
R1 0 3 3 0 4 2 2 3 2 0 2 2 0 0 3 2 2 3 3 2 2 2 2 2 2 0 0 2 2 2 54
R2 3 0 4 2 4 2 3 3 2 0 2 2 0 0 3 2 3 4 4 3 3 2 2 3 2 0 0 2 2 3 65
R3 3 4 0 2 4 2 3 3 2 0 2 2 0 0 3 2 3 4 4 3 3 2 3 3 2 2 0 2 2 3 68
R4 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 4
R5 4 4 4 2 0 2 3 4 3 2 2 3 2 2 4 3 3 5 4 3 3 3 3 3 2 2 0 2 3 3 83
R6 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 4
R7 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 0 2 2 0 2 0 0 0 0 0 0 0 0 0 18
R8 3 3 3 0 3 0 2 0 2 0 2 2 0 0 2 2 2 3 3 2 2 2 2 2 0 0 0 0 2 2 46
R9 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 16
R10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
R11 2 2 2 0 2 0 0 0 0 0 0 0 0 0 2 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 14
R12 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 0 2 2 2 2 0 0 0 0 0 0 0 0 0 20
R13 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2
R14 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 4
R15 3 3 3 0 3 0 2 2 2 0 2 2 0 0 0 2 2 3 3 2 2 2 2 2 0 0 0 2 2 2 48
R16 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 0 2 2 2 2 0 0 0 0 0 0 0 0 0 20
R17 2 2 2 0 3 0 2 2 2 0 0 2 0 0 2 0 0 3 2 2 2 0 2 2 0 0 0 0 0 2 34
R18 4 4 4 2 5 2 3 3 3 2 2 3 0 2 3 2 3 0 4 3 3 2 3 3 2 2 0 2 2 3 76
R19 3 3 3 0 4 2 2 3 2 0 2 2 0 0 3 2 2 4 0 3 3 2 2 2 2 0 0 2 2 2 57
R20 3 3 3 0 3 0 2 2 2 0 2 2 0 0 2 2 2 3 3 0 2 2 2 2 0 0 0 0 2 2 46
R21 2 2 3 0 3 0 2 2 2 0 0 2 0 0 2 2 2 3 2 2 0 2 2 2 0 0 0 0 2 2 41
R22 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 2 2 2 2 2 0 0 2 0 0 0 0 0 0 24
R23 2 2 2 0 3 0 2 2 0 0 0 2 0 0 2 0 2 3 2 2 2 0 0 2 0 0 0 0 0 2 32
R24 2 2 2 0 3 0 2 2 2 0 0 2 0 0 2 0 2 3 2 2 2 0 2 0 0 0 0 0 0 2 34
R25 0 0 2 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 8
R26 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 4
R27 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
R28 0 0 2 0 2 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 6
R29 2 2 2 0 2 0 0 2 0 0 0 0 0 0 2 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 16
R30 2 2 3 0 3 0 2 2 2 0 0 2 0 0 2 0 2 3 2 2 2 2 2 2 0 0 0 0 2 0 39
Total 50 51 57 8 73 12 32 45 28 4 18 30 2 4 47 21 32 70 54 37 39 23 29 32 12 6 0 14 23 30
APPENDIX B
Page 312
Table B-3. S-R matrix from input data (1).
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
S1 0 0 0 0 1 0 0 1 1 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 1 0 0 0 0 0
S2 1 1 1 1 1 0 0 1 0 0 0 0 0 0 1 0 1 1 1 1 1 1 0 0 0 0 0 0 1 1
S3 0 1 1 0 1 0 0 1 1 0 0 1 0 0 1 0 0 1 1 0 0 0 0 1 0 0 0 0 0 1
S4 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 1 0 0 0 0 0 0 0
S5 1 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 0 0 1 1 0 0 1 1 1
S6 1 1 0 0 1 0 0 0 1 0 0 0 0 0 0 0 1 1 1 1 0 0 1 1 1 0 0 0 0 0
S7 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0
S8 1 0 1 0 0 1 1 0 0 0 1 1 0 0 0 1 1 0 1 0 0 1 1 0 0 0 0 0 1 1
S9 0 0 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S10 1 1 1 0 0 0 1 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 1
S11 1 1 1 0 0 1 1 1 1 0 0 1 0 0 1 1 1 1 1 0 0 0 1 1 0 1 1 0 1 0
S12 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S13 1 1 1 0 1 1 1 1 1 0 1 1 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0
S14 0 0 0 1 1 0 0 0 1 0 0 1 0 0 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0
S15 0 0 1 0 1 0 0 0 0 0 1 1 0 0 0 0 1 0 1 1 1 1 0 0 0 0 0 1 0 0
S16 0 1 1 0 1 0 0 1 0 1 0 0 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 1 1 0
S17 0 0 1 0 1 0 1 1 1 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 1
S18 0 1 1 0 1 1 0 1 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 1
S19 0 1 1 0 1 0 1 1 0 0 1 1 0 1 1 0 1 1 1 0 1 0 0 1 0 0 0 0 1 1
S20 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1
S21 1 1 1 0 1 1 1 0 0 0 1 0 0 0 0 1 1 1 0 0 0 0 1 1 0 0 0 0 0 1
S22 1 1 0 0 1 0 0 0 1 0 0 1 0 1 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0
S23 1 1 0 1 1 0 1 1 0 0 0 1 0 0 1 1 0 1 1 1 1 1 1 1 1 1 0 1 1 1
S24 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0
S25 1 0 0 1 1 1 1 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 1 0 0 0 0 1 1 0
S26 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0
S27 1 1 1 0 1 0 0 1 1 0 0 0 0 0 0 0 1 1 1 1 0 0 0 1 0 0 0 0 0 1
S28 1 1 1 1 1 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 1
S29 0 1 0 0 1 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0
S30 1 1 1 1 1 0 0 1 0 0 1 0 0 0 1 1 0 0 1 0 0 0 1 1 0 0 0 0 1 0
APPENDIX B
Page 313
Table B-4. S-R matrix from input data (2).
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
S31 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0
S32 1 0 1 0 1 0 1 0 0 0 0 0 0 0 1 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1
S33 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 1 1 0 0 0 1 0 0 1 0 0
S34 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 1 0 1 1 0 1 0 0 0 0 0
S35 0 0 0 0 1 0 0 1 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0
S36 0 0 0 0 1 0 0 1 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0
S37 1 1 1 0 1 1 1 1 0 1 1 1 0 0 0 1 0 1 1 1 1 1 1 1 1 0 0 1 0 0
S38 1 0 1 0 1 0 0 1 0 0 1 0 0 0 0 0 1 1 1 0 1 0 0 0 0 0 0 1 0 0
S39 1 1 1 0 1 0 0 1 0 0 1 0 0 0 1 0 1 1 0 1 1 0 1 1 0 1 0 0 1 1
S40 1 1 1 0 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1
S41 1 0 0 0 1 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1
S42 1 0 0 0 0 0 0 0 0 0 1 1 0 0 1 1 0 1 0 1 0 0 0 0 0 0 0 0 0 1
S43 0 0 1 0 1 1 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 0 1 1 0 0 0 0 0 1
S44 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S45 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S46 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S47 1 1 1 1 0 0 0 1 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
S48 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0
S49 0 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S50 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S51 1 1 0 0 1 0 0 0 0 0 0 0 1 1 1 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0
S52 0 0 1 0 1 0 1 1 1 0 0 1 0 0 1 1 0 1 1 0 0 0 1 0 0 0 0 0 0 0
S53 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0
S54 0 0 1 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1 1 1 1 0 1 1 1 0 0 0 0 0
S55 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0
S56 0 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 0 1 1 1 0 1 0 1 0 0 0 0 0 0
S57 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0
S58 0 1 1 0 0 0 1 1 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0
S59 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 1
S60 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
APPENDIX B
Page 314
Table B-5. S-R matrix from input data (3).
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
S61 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S62 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S63 1 1 0 0 1 0 0 0 0 0 0 0 1 1 1 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0
S64 1 1 1 0 1 0 0 1 0 1 0 1 1 0 1 1 0 1 0 1 1 1 0 0 0 1 0 1 1 0
S65 1 0 0 0 1 1 0 0 1 0 0 0 0 0 1 0 1 0 0 0 1 0 1 0 0 1 0 0 1 0
S66 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 1 0 1 1 1
S67 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0
S68 0 1 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
S69 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S70 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S71 0 1 1 1 1 1 1 1 0 0 0 1 0 0 1 1 0 1 0 0 1 1 1 1 0 0 1 1 1 1
S72 1 1 1 0 1 0 0 1 0 0 1 1 1 1 1 1 0 1 1 1 0 1 0 1 0 0 0 0 0 0
S73 0 1 0 0 1 0 0 0 0 0 0 1 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 1
S74 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1
S75 1 0 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 1 0 0 1 1 1 0 0 0 0 1
S76 1 1 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 1 1 1 1 0 0 1 0 1 1 1 1 1
S77 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0
S78 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S79 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0
S80 1 0 1 0 0 0 1 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
S81 1 0 0 0 1 0 1 0 0 1 1 0 1 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1
S82 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S83 1 1 1 0 1 1 1 0 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 1 0 0 0 0 0 1
S84 0 0 1 0 0 0 0 1 0 0 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 1 0 0 0 0
S85 1 1 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0
S86 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S87 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S88 1 0 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0
S89 0 1 1 0 1 0 0 1 1 0 0 1 0 0 1 1 0 1 1 0 0 0 1 1 1 0 0 0 1 1
S90 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
APPENDIX B
Page 315
Table B-5. S-R matrix from input data (4).
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
S91 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S92 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S93 1 1 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 1 0
S94 0 1 0 1 0 0 0 0 0 0 1 0 1 0 1 1 0 0 0 0 0 0 0 0 0 1 1 0 1 0
S95 1 1 1 1 1 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S96 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S97 1 1 1 0 1 0 0 1 0 0 0 1 0 0 0 0 0 1 1 0 1 0 0 1 1 0 0 0 0 1
S98 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S99 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S100 1 1 0 0 1 1 1 0 1 0 1 0 0 1 1 0 1 1 1 1 1 1 1 0 0 0 0 0 0 1
S101 1 1 0 1 0 1 0 1 0 0 0 1 0 0 0 1 0 0 0 1 1 0 0 0 1 0 0 0 0 0
S102 1 1 1 0 1 1 0 1 1 0 1 1 0 0 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 1
S103 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 0 1 1 1 0 0 1 0 0 1 1 0 0
S104 0 1 1 0 1 0 1 1 1 0 0 0 0 0 0 0 0 1 1 1 1 0 1 1 0 0 0 0 0 0
S105 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0
S106 1 1 0 1 1 0 1 1 0 0 1 1 1 0 1 0 1 1 1 1 1 1 1 0 1 0 0 1 0 0
S107 1 1 1 0 0 1 0 1 1 0 0 0 0 0 1 0 0 1 1 0 0 0 1 0 0 0 1 0 1 1
S108 0 1 0 0 1 0 0 0 0 0 0 1 0 0 1 1 1 1 1 1 1 0 0 0 0 0 0 1 0 0
S109 1 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 0 1 0 0 1 1 0 0 0 0 0 0 0 1
S110 1 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 0 0 0 0 0 0 1
S111 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S112 1 1 1 1 1 1 1 0 1 0 1 1 0 0 1 1 0 1 1 1 1 1 1 1 1 0 0 0 0 1
S113 0 1 0 0 1 0 1 0 0 0 0 0 0 0 1 0 1 1 1 1 0 0 0 0 0 0 0 0 0 1
S114 1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0
S115 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
S116 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S117 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
S118 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 1 1 0 0 0 0 0 0 0
S119 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
S120 1 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1
APPENDIX B
Page 316
Table B-7. S-R matrix from input data (4).
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 R18 R19 R20 R21 R22 R23 R24 R25 R26 R27 R28 R29 R30
S121 0 1 1 0 1 0 1 1 1 1 0 1 0 0 0 0 1 1 1 0 0 0 0 0 0 1 0 1 1 1
S122 1 0 1 0 0 1 1 0 0 0 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 0 1 1 1 0
S123 0 0 1 0 1 0 1 1 0 0 1 0 0 0 1 0 0 1 0 1 0 0 0 1 0 0 0 1 1 1
S124 0 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
S125 1 1 0 1 1 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 1 0 0
S126 1 0 1 0 1 1 1 0 0 0 0 0 0 0 1 0 1 1 1 1 1 0 0 0 0 0 0 0 0 1
APPENDIX C
Page 317
APPENDIX C
Appendix Lists Figures Detail Scenario for Recovery Analysis Shock impact simulation result Stress impact simulation result Expected recovery simulation result Actual recovery simulation result
APPENDIX C
Page 319
Figure C-1. Gunung Sari Floodgate (front) managed by Jasa Tirta-I public corporation. (Source: http://kodim0832.blogdetik.com/2016/10/11/pantauan-babinsa-karah-pintu-
air-rolak-gunung-sari-status-aman).
Figure C-2. Gunung Sari Floodgate (back) managed by Jasa Tirta-I public corporation. (Source: http://travpacker.blogspot.com.au/2015/05/bangunan-sejarah-bendungan-rolak-
songo.html).
Figure C-3. Physical UWS infrastructure system managed by PDAM. (Source: Figure from: http://www2.jawapos.com/baca/artikel/17427/pdam-berhenti-berharap-pasokan-
umbulan).
APPENDIX C
Page 320
Figure C-4. Water treatment plant owned and operated by PDAM. (Source: http://kelanakota.suarasurabaya.net/news/2014/144689-250-Ribu-Pelanggan-PDAM-
Surabaya-Tak-Dapat-Pasokan-Air).
Figure C-5. Trans-logistic business in Surabaya, a business which need UWS service. (Source: https://thestoryofwardana.files.wordpress.com/2013/05/guariglia-cityscape-
urban-city-architectural-9.jpg).
Figure C-6. Activity of beverage plant which need a non-stop UWS service. (Source: https://coca-colaamatil.co.id/cctour).
APPENDIX C
Page 321
Figure C-7. Surabaya water supply is definitely required for bottled water industry. (Source:
http://www.harianterbit.com/hanterhumaniora/read/2017/05/08/81009/0/40/KPPU-Diminta-Netral-dalam-Menyikapi-Kasus-AMDK#).
Figure C-8. Plaza as both commercial and public space which need water supply. (Source: https://www.gotomalls.com/blog/2016/11/10-mall-terbaik-di-surabaya/).
Figure C-9. An open space in Surabaya equipped with ready-to-drink water facilities. (Source: https://www.flickr.com/photos/eastjava/4874286030).
APPENDIX C
Page 322
Table C-1. Scenario-1 for simulation-based recovery strategy
Step Time
(discrete)
Risk impact mechanism network topology
Magnitude Risk impact to community Risk causality and interaction pattern
DC BC CC EC ODC OCC BC EC OSC
1 9 2.5% magnitude reduction Original Original Original Original Original Original Original Original Original
2 10 5% magnitude reduction 5% random [S-R] nodes link reduction 5% random [R-R] nodes link reduction
3 11 10% magnitude reduction 10% random [S-R] nodes link reduction 10% random [R-R] nodes link reduction
4 12 15% magnitude reduction 15% random [S-R] nodes link reduction 15% random [R-R] nodes link reduction
5 13 20% magnitude reduction 20% random [S-R] nodes link reduction 20% random [R-R] nodes link reduction
6 14 25% magnitude reduction 25% random [S-R] nodes link reduction 25% random [R-R] nodes link reduction
7 15 30% magnitude reduction 30% random [S-R] nodes link reduction 30% random [R-R] nodes link reduction
8 16 35% magnitude reduction 35% random [S-R] nodes link reduction 35% random [R-R] nodes link reduction
9 17 40% magnitude reduction 40% random [S-R] nodes link reduction 40% random [R-R] nodes link reduction
10 18 45% magnitude reduction 45% random [S-R] nodes link reduction 45% random [R-R] nodes link reduction
11 19 50% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
12 20 55% magnitude reduction 55% random [S-R] nodes link reduction 55% random [R-R] nodes link reduction
APPENDIX C
Page 323
Table C-2. Scenario-2 for simulation-based recovery strategy
Step Time
(discrete)
Risk impact mechanism network topology
Magnitude Risk impact to community Risk causality and interaction pattern
DC BC CC EC ODC OCC BC EC OSC
1 9 10% magnitude reduction 5% random [S-R] nodes link reduction Original Original Original Original Original
2 10 10% magnitude reduction 10% random [S-R] nodes link reduction 10% random [R-R] nodes link reduction
3 11 10% magnitude reduction 15% random [S-R] nodes link reduction 15% random [R-R] nodes link reduction
4 12 10% magnitude reduction 20% random [S-R] nodes link reduction 20% random [R-R] nodes link reduction
5 13 10% magnitude reduction 25% random [S-R] nodes link reduction 25% random [R-R] nodes link reduction
6 14 10% magnitude reduction 30% random [S-R] nodes link reduction 30% random [R-R] nodes link reduction
7 15 10% magnitude reduction 35% random [S-R] nodes link reduction 35% random [R-R] nodes link reduction
8 16 10% magnitude reduction 40% random [S-R] nodes link reduction 40% random [R-R] nodes link reduction
9 17 10% magnitude reduction 45% random [S-R] nodes link reduction 45% random [R-R] nodes link reduction
10 18 10% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
11 19 10% magnitude reduction 55% random [S-R] nodes link reduction 55% random [R-R] nodes link reduction
12 20 10% magnitude reduction 55% random [S-R] nodes link reduction 55% random [R-R] nodes link reduction
APPENDIX C
Page 324
Table C-3. Scenario-3 for simulation-based recovery strategy
Step Time
(discrete)
Risk impact mechanism network topology
Magnitude Risk impact to community Risk causality and interaction pattern
DC BC CC EC ODC OCC BC EC OSC
1 9 20% magnitude reduction 5% random [S-R] nodes link reduction Original Original Original Original Original
2 10 20% magnitude reduction 10% random [S-R] nodes link reduction 10% random [R-R] nodes link reduction
3 11 20% magnitude reduction 15% random [S-R] nodes link reduction 15% random [R-R] nodes link reduction
4 12 20% magnitude reduction 20% random [S-R] nodes link reduction 20% random [R-R] nodes link reduction
5 13 20% magnitude reduction 25% random [S-R] nodes link reduction 25% random [R-R] nodes link reduction
6 14 20% magnitude reduction 30% random [S-R] nodes link reduction 30% random [R-R] nodes link reduction
7 15 20% magnitude reduction 35% random [S-R] nodes link reduction 35% random [R-R] nodes link reduction
8 16 20% magnitude reduction 40% random [S-R] nodes link reduction 40% random [R-R] nodes link reduction
9 17 20% magnitude reduction 45% random [S-R] nodes link reduction 45% random [R-R] nodes link reduction
10 18 20% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
11 19 20% magnitude reduction 55% random [S-R] nodes link reduction 55% random [R-R] nodes link reduction
12 20 20% magnitude reduction 55% random [S-R] nodes link reduction 55% random [R-R] nodes link reduction
APPENDIX C
Page 325
Table C-4. Scenario-4 for simulation-based recovery strategy
Step Time
(discrete)
Risk impact mechanism network topology
Magnitude Risk impact to community Risk causality and interaction pattern
DC BC CC EC ODC OCC BC EC OSC
1 9 15% magnitude reduction Original Original Original Original Original Original Original Original Original
2 10 15% magnitude reduction 5% random [S-R] nodes link reduction 5% random [S-R] nodes link reduction
3 11 15% magnitude reduction 10% random [S-R] nodes link reduction 10% random [S-R] nodes link reduction
4 12 15% magnitude reduction 15% random [S-R] nodes link reduction 15% random [S-R] nodes link reduction
5 13 15% magnitude reduction 20% random [S-R] nodes link reduction 20% random [S-R] nodes link reduction
6 14 15% magnitude reduction 25% random [S-R] nodes link reduction 25% random [S-R] nodes link reduction
7 15 15% magnitude reduction 30% random [S-R] nodes link reduction 30% random [S-R] nodes link reduction
8 16 15% magnitude reduction 35% random [S-R] nodes link reduction 35% random [S-R] nodes link reduction
9 17 15% magnitude reduction 40% random [S-R] nodes link reduction 40% random [S-R] nodes link reduction
10 18 15% magnitude reduction 45% random [S-R] nodes link reduction 45% random [S-R] nodes link reduction
11 19 15% magnitude reduction 50% random [S-R] nodes link reduction 50% random [S-R] nodes link reduction
12 20 15% magnitude reduction 55% random [S-R] nodes link reduction 55% random [S-R] nodes link reduction
APPENDIX C
Page 326
Table C-5. Scenario-5 for simulation-based recovery strategy
Step Time
(discrete)
Risk impact mechanism network topology
Magnitude Risk impact to community Risk causality and interaction pattern
DC BC CC EC ODC OCC BC EC OSC
1 9 2.5% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
2 10 5% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
3 11 10% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
4 12 15% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
5 13 20% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
6 14 25% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
7 15 30% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
8 16 35% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
9 17 40% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
10 18 45% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
11 19 50% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
12 20 55% magnitude reduction 50% random [S-R] nodes link reduction 50% random [R-R] nodes link reduction
APPENDIX C
Page 327
Table C-6. Shock impact simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100 - 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 1.000 0.000 0 t(hd) 7 Shock period 1.000 1.000 0.000 0
t(ᵟ) 8 Slack time 1.000 1.000 0.000 0
1 9
Recovery action absent
1.000 1.000 0.000 0
2 10 1.000 1.000 0.000 0
3 11 1.000 1.000 0.000 0
4 12 1.000 1.000 0.000 0
5 13 1.000 1.000 0.000 0
6 14 1.000 1.000 0.000 0
7 15 1.000 1.000 0.000 0
8 16 1.000 1.000 0.000 0
9 17 1.000 1.000 0.000 0
10 18 1.000 1.000 0.000 0
11 19 1.000 1.000 0.000 0
12 20 Ending recovery period 1.000 1.000 0.000 0
Table C-7. Stress impact simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100
- 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852
t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.491 0.509 50.852
1 9
Ideal recovery
1.000 0.491 0.509 50.852
2 10 1.000 0.491 0.509 50.852
3 11 1.000 0.491 0.509 50.852
4 12 1.000 0.491 0.509 50.852
5 13 1.000 0.491 0.509 50.852
6 14 1.000 0.491 0.509 50.852
7 15 1.000 0.491 0.509 50.852
8 16 1.000 0.491 0.509 50.852
9 17 1.000 0.491 0.509 50.852
10 18 1.000 0.491 0.509 50.852
11 19 1.000 0.491 0.509 50.852
12 20 Ending recovery period 1.000 0.491 0.509 50.852
APPENDIX C
Page 328
Table C-8. Expected recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100 - 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852 t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.458 0.542 54.243
2 10 1.000 0.412 0.588 58.819
3 11 1.000 0.350 0.650 64.996
4 12 1.000 0.280 0.720 71.997
5 13 1.000 0.210 0.790 78.998
6 14 1.000 0.147 0.853 85.298
7 15 1.000 0.096 0.904 90.444
8 16 1.000 0.057 0.943 94.266
9 17 1.000 0.032 0.968 96.846
10 18 1.000 0.016 0.984 98.423
11 19 1.000 0.007 0.993 99.290
12 20 Ending recovery period 1.000 0.003 0.997 99.716
Table C-9. Scenario-1 recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100
- 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852
t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.477 0.523 52.252
2 10 1.000 0.422 0.578 57.790
3 11 1.000 0.392 0.608 60.763
4 12 1.000 0.354 0.646 64.617
5 13 1.000 0.311 0.689 68.920
6 14 1.000 0.278 0.722 72.201
7 15 1.000 0.237 0.763 76.305
8 16 1.000 0.192 0.808 80.781
9 17 1.000 0.183 0.817 81.671
10 18 1.000 0.161 0.839 83.929
11 19 1.000 0.125 0.875 87.495
12 20 Ending recovery period 1.000 0.097 0.903 90.324
APPENDIX C
Page 329
Table C-10. Scenario-2 recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100 - 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852 t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.418 0.582 58.214
2 10 1.000 0.392 0.608 60.763
3 11 1.000 0.378 0.622 62.184
4 12 1.000 0.357 0.643 64.330
5 13 1.000 0.344 0.656 65.552
6 14 1.000 0.338 0.662 66.189
7 15 1.000 0.325 0.675 67.504
8 16 1.000 0.299 0.701 70.145
9 17 1.000 0.292 0.708 70.760
10 18 1.000 0.258 0.742 74.232
11 19 1.000 0.230 0.770 77.014
12 20 Ending recovery period 1.000 0.230 0.770 77.014
Table C-11. Scenario-3 recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100
- 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852
t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.364 0.636 63.591
2 10 1.000 0.342 0.658 65.812
3 11 1.000 0.329 0.671 67.050
4 12 1.000 0.311 0.689 68.920
5 13 1.000 0.300 0.700 69.985
6 14 1.000 0.295 0.705 70.540
7 15 1.000 0.283 0.717 71.686
8 16 1.000 0.260 0.740 73.987
9 17 1.000 0.255 0.745 74.522
10 18 1.000 0.225 0.775 77.548
11 19 1.000 0.200 0.800 79.972
12 20 Ending recovery period 1.000 0.200 0.800 79.972
APPENDIX C
Page 330
Table C-12. Scenario-4 recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100 - 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852 t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.407 0.593 59.257
2 10 1.000 0.371 0.629 62.894
3 11 1.000 0.367 0.633 63.288
4 12 1.000 0.354 0.646 64.617
5 13 1.000 0.334 0.666 66.625
6 14 1.000 0.322 0.678 67.769
7 15 1.000 0.316 0.684 68.365
8 16 1.000 0.304 0.696 69.595
9 17 1.000 0.279 0.721 72.066
10 18 1.000 0.274 0.726 72.641
11 19 1.000 0.241 0.759 75.890
12 20 Ending recovery period 1.000 0.215 0.785 78.493
Table C-13. Scenario-5 recovery simulation output.
UI system shocked
t Point
of t Description
Initial capacity
Disturbance effect
Robustness capacity
Robustness (%)
- 1
Service as usual
1.000 0.000 1.000 100
- 2 1.000 0.000 1.000 100
- 3 1.000 0.000 1.000 100 - 4 1.000 0.000 1.000 100
t(hz) 5 Disturbance happened 1.000 0.000 1.000 100
t(he) 6 Disturbance affected 1.000 0.491 0.509 50.852
t(hd) 7 Shock period 1.000 0.491 0.509 50.852
t(ᵟ) 8 Slack time 1.000 0.482 0.518 51.835
1 9
Ideal recovery
1.000 0.330 0.670 67.039
2 10 1.000 0.320 0.680 68.006
3 11 1.000 0.301 0.699 69.940
4 12 1.000 0.281 0.719 71.874
5 13 1.000 0.262 0.738 73.808
6 14 1.000 0.243 0.757 75.742
7 15 1.000 0.211 0.789 78.933
8 16 1.000 0.178 0.822 82.221
9 17 1.000 0.185 0.815 81.544
10 18 1.000 0.165 0.835 83.478
11 19 1.000 0.146 0.854 85.413
12 20 Ending recovery period 1.000 0.127 0.873 87.347
APPENDIX D
Page 333
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, Risk Criticality-based Resilient Assessment Model for Urban Infrastructure System: With a Focus on Restoration Modeling and Analysis, International Journal of Reliability Engineering and System Safety.
Abstract
The concept of urban infrastructure (UI) resilience has been introduced and applied to minimize losses from disturbances through enhanced resistance and robustness to extreme events, as well as more effective recovery strategies. While it is acknowledged that resilience concept interrelated highly with risk management, however, conventional resilience analysis model lack to consider risk as crucial metric within analysis bodies. The challenge that experts faced is how best to develop and integrate the general metrics of resilience analysis with risk analysis model which capable to capture and mimic UI system in real life environment, to promote the UI resilience. This research aims to propose a novel conceptual resilience analysis model for measuring UI system focusing on the robustness dimensions. The model rooted in the well-established risk criticality model integrated with the modified resilience analysis which includes the disturbance shock and stress capacity as well as the scenario-based recovery strategies model. To validate and exemplify the model applicability, a numerical example and simulation in urban water supply infrastructure system case study is applied and analysed. The advantages of the model are shown by its capability to capture the uncertainty of risk impact, system capacity facing the disturbance, and recovery strategies complexities towards enhancing system robustness. This research contributes as a practical tool that can be applied to promote the concept of UI resilience in a way that assists local and authorities, and community leaders to develop more suitable decision making towards recovery and restoration policies, programs, strategies and plans. Keywords: Robustness; resilience, risk analysis, urban infrastructure system; recovery and restoration.
APPENDIX D
Page 334
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, Participatory-based Urban Infrastructure System Risk Causality and Interaction Pattern Analysis using Social Network Analysis, International Journal of Reliability Engineering and System Safety.
Abstract
Abstract. The inherent risks within urban infrastructure (UI) system exert significant consequences on the dependent community. While risk is a product of a complex set of network processes, understanding its’ characteristics, such as; causality dynamic and interaction pattern, will give an advantage towards analysing risks. Nonetheless, conventional risk analysis (RA) methods are not designed and lack of capability to assess the causality dynamic and interaction patterns that shape risks based on community perceptions. This research aims to develops a novel RA model in which capable to capture and model the dynamic of risk causality and interaction pattern. The novelty of the model lies in the modified participatory method and risk interaction link weight to comprehensively capture the risks interaction pattern. To test and exemplify, the model is applied in the case of water supply infrastructure system. This study reveals that the model is better suited to capture the intricate processed that shape infrastructure risks. Based on the analysis output, it is found that; (i) the risk causality and interaction pattern characterized by the degree of connectedness between various risks, and (ii) the correlation between risk based on its impact capacity is non-linier. This research contributes in delivering practical tools which could potentially provide a way forward for developing mitigation strategy, intervention, policies and solutions that seek to address risk complex phenomena and thus enhance community resilience. Keywords: Participatory; network analysis; community resilience, infrastructure system, risk analysis
APPENDIX D
Page 335
201X Citra S. Ongkowijoyo and Hemanta K. Doloi, A Network-based Risk Analysis Model for Assessing Urban Infrastructure Risk Impact to Community, Built Environment Project and Asset Management.
Abstract
Abstract. The urban infrastructure (UI) system is crucial for supporting societal needs. Yet, the inherent risks exert significant consequences on the dependent community. As every risk event not necessarily affects everyone equally, the risk analysis (RA) in relation to the individuals and the specificity of impacts is pivotal. Conventional RA methods are lack the capability to analyze the impact of specific risk affecting multitude of people within the community. Utilizing the Social Network Analysis as the main method, this research puts forward a model for mapping and simulating the complex relationships of the risks and the community in relation to UI system. The applicability of the model has been demonstrated using a case research of urban water supply infrastructure. Based on the analysis output, it is found that; (i) the risk impact characterized by the degree of association between actors and risks, and (ii) it is found that the correlation between risk magnitude and its impact capacity is non-linier. Following the findings, analyzing risk towards making crucial decisions cannot lie solely on a single conventional metric. This research demonstrates how the tool of network analysis can be employed to develop network maps between risk and community and discusses the utility of such displays in designing interventions to reduce risk impact. This research contributes in delivering practical tools which can provide a path forwards for developing policies and solutions that seek to address risk complex phenomena and enhance community resilience. Keywords: Risk analysis; two-mode network analysis; community resilience, infrastructure system.
APPENDIX D
Page 336
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Determining Critical Infrastructure Risks using Social Network Analysis, International Journal of Disaster Resilience in The Built Environment.
Abstract
Purpose-The purpose of this paper is to develop a novel risk analysis method named fuzzy critical risk analysis (FCRA) for assessing the infrastructure risks from a risk-community network perspective. The basis of this new FCRA method is the integration of existing risk magnitude analysis with the novel risk impact propagation analysis performed in specific infrastructure systems to assess the criticality of risk within specific social-infrastructure interrelated network boundary. Design/methodology/approach-The FCRA uses a number of scientific methods such as failure mode effect and criticality analysis (FMECA), social network analysis (SNA) and fuzzy-set theory to facilitate the building of risk evaluation associated with the infrastructure and the community. The proposed FCRA approach has been developed by integrating the fuzzy-based social network analysis (FSNA) method with conventional fuzzy FMECA method to analyse the most critical risk based on risk decision factors and risk impact propagation generated by various stakeholder perceptions. Findings-The application of FSNA is considered to be highly relevant for investigating the risk impact propagation mechanism based on various stakeholder perceptions within the infrastructure risk interrelation and community networks. Although conventional FMECA methods have the potential for resulting in a reasonable risk ranking based on its magnitude value within the traditional risk assessment method, the lack of considering the domino effect of the infrastructure risk impact, the various degrees of community dependencies and the uncertainty of various stakeholder perceptions made such methods grossly ineffective in the decision-making of risk prevention (and mitigation) and resilience context. Research limitations/implications-The validation of the model is currently based on a hypothetical case which in the future should be applied empirically based on a real case study. Practical implications-Effective functioning of the infrastructure systems for seamless operation of the society is highly crucial. Yet, extreme events resulted in failure scenarios often undermine the efficient operations and consequently affect the community at multiple levels. Current risk analysis methodologies lack to address issues related to diverse impacts on communities and propagation of risks impact within the infrastructure system based on multi-stakeholders’ perspectives. The FCRA developed in this research has been validated in a hypothetical case of infrastructure context. The proposed method will potentially assist the decision-making regarding risk governance, managing the vulnerability of the infrastructure and increasing both the infrastructure and community resilience. Social implications-The new approach developed in this research addresses several infrastructure risks assessment challenges by taking into consideration of not only the risk events associated with the infrastructure systems but also the dependencies of various type communities and cascading effect of risks within the specific risk-community networks. Such a risk-community network analysis provides a good basis for community-based risk management in the context of mitigation of disaster risks and building better community resilient. Originality/value-The novelty of proposed FCRA method is realized due to its ability for improving the estimation accuracy and decision-making based on multi-stakeholder perceptions. The process of assessment of the most critical risks in the hypothetical case project demonstrated an eminent performance of FCRA method as compared to the results in conventional risk analysis method. This research contributes to the literature in several ways. First, based on a comprehensive literature review, this work established a benchmark
APPENDIX D
Page 337
for development of a new risk analysis method within the infrastructure and community networks. Second, this study validates the effectiveness of the model by integrating fuzzy-based FMECA with FSNA. The approach is considered useful from a methodological advancement when prioritizing similar or competing risk criticality values. Keywords: Resilience; disaster response; risk analysis; disaster mitigation; infrastructure management; vulnerable groups.
APPENDIX D
Page 338
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Risk-based Resilience Assessment Model Focusing on Urban Infrastructure System Restoration, Procedia Engineering for 7th International Conference on Building Resilience 2017 (ICBR-2017), 27-29 November, Bangkok-Thailand.
Abstract
A number of metrics in the past studies have been proposed and numerically implemented to assess particular system resilience during natural disaster and their recovery in the aftermath of the events. Among such performance measures, resilience is a reliable metric. The resilience assessment on the urban infrastructure system facing disturbances depends on comprehensive risk assessment. Nonetheless, it is found that previous studies lack of putting the risk assessment processes within the resilience assessment bodies. This study proposes a risk criticality-based resilient assessment model for scenario-based resilience assessment of infrastructure systems. The model accounts for uncertainties in the process including; the people expressions towards risks measures, risks magnitude and its impact to community estimation, and the dynamic of causality propagation pattern simulation. The proposed model is applied to water supply infrastructure case study with a hypothetical restoration scenario. The resilience level is assessed and determined based on the maximum resilience level the system can reach. Results of this analysis have shown that a holistic and integrated mitigation plans and strategies that seek to address complex phenomena towards system restoration is a critical requirement. The model will enable stakeholders to systemically assess the most-likely performance of the system during expected risk events. Keywords: Risk assessment; resilience analysis; infrastructure system; urban community.
APPENDIX D
Page 339
2017 Citra S. Ongkowijoyo and Hemanta K. Doloi, Understanding of Impact and Propagation of Risk based on Social Network Analysis, Procedia Engineering for 7th International Conference on Building Resilience 2017 (ICBR-2017), 27-29 November, Bangkok-Thailand.
Abstract
The inherent risks within urban infrastructure system exert significant consequences on the dependent community. As the risk is a product of a complex set of network processes. the complexity is better assessed by understanding the risk nature, interrelationship dynamic and impact propagation pattern. Experts and professionals often use various assessment models and tools to help understand risk nature. Nonetheless, such models are not designed to capture the interconnections that shape risks based on community participation. This study proposes a novel model to capture, draw and simulate the risk impact propagation pattern and interrelationships based on a single mode network analysis. Following the concept of social risk amplification, a process of developing risk network map based on community perspective is presented. The proposed model is applied on a water supply infrastructure system. A total of 30 risk events were used for collection of data from 126 individuals across eight different stakeholder categories. This study reveals that participatory networked approaches to risk interrelationship analysis are better suited to capturing the intricate processed that shape infrastructure risk. This approach could potentially provide a way forward for developing mitigation strategy, intervention and policy that seek to address risk complex phenomena and thus enhancing both infrastructure and community resilience. Keywords: Unimodial network; community resilience, infrastructure system; risk network.
APPENDIX D
Page 340
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Setting The Priority of Risks To Community based on Social Network Analysis, 6th International Conference on Building Resilience (ICBR-2016) 2016, 7-9 September, Auckland-New Zealand.
Abstract
The ability to assess the risk and its impact in urban infrastructure context is of great importance supporting the preparedness, response and further fostering the recovery period of the infrastructure in the pre and post extreme event period, as well as significantly improves the building of both society well-being and community resilience. Nonetheless, current risk analysis methods are commonly worked in an isolate manner and focused solely on the technical matter. A missing point on the current risk analysis methodologies is the lack of assessing, determining and prioritizing the impact of risks to different community groups in the face of various specific risk events which is received very little portion of attention in the academia field. This study develops and validates a novel risk analysis method for assessing, setting and prioritizing the risks and its impact level on each of a number of community groups facing multi-hazard events in the context of urban infrastructure systems. The method developed in this study has been validated using a real case study in the Surabaya water supply infrastructure context. The data analysis and simulation result will be explained and discussed as well as the findings. The advantage of the proposed method is it capable to determine and screen both the associated the most endangers risks to several community groups. The proposed method will potentially assist the decision making in regards to the infrastructure risks governance and increasing both the infrastructure and community resilience. Keywords: Community resilience; social network; risk management; urban infrastructure; vulnerability; decision support systems.
APPENDIX D
Page 341
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Analyzing Community Hazard in Urban Infrastructure System, 6th International Conference on Building Resilience 2016 (ICBR-2016), 7-9 September, Auckland-New Zealand.
Abstract
The reliable serviceability of urban infrastructure system is crucial for supporting modern society needs. Yet, the inherent hazard events within the respective urban infrastructure system exert significant risks on the dependent community. A number of conventional risk assessment methods are unable to assess the risks in the context of its ripple effect and impact within the community as various stakeholders associated and impacted dissimilar to the existing hazard events. This study intends to fill the risk assessment knowledge gap by applying a social network theory and analysis which can capture, model and simulate the relationship between the inherent urban infrastructure hazard events and the community. A bipartite network analysis, called Bi-NA, utilized to analyze the complex risk problem in a two-mode affiliated social network. The method is applied using the real case study of urban water supply infrastructure in Indonesia context. As many as 30 hazard events identified from both literature review and expert comments in the field, including the fulfilled design-based questionnaire by 126 individual which grouped within 8 stakeholder groups of Surabaya city water supply infrastructure system used as a main input data. The core capability and advantages of the Bi-NA includes; characterizing, portraying, modelling and expressing the association between each individual (stakeholder) with the hazard events. The result, discussion and findings of this study will contribute to the risk management field and as practical tools for the urban communities in order to develop better urban infrastructure system and community resilience. Keywords: Risk assessment; social network; bipartite analysis; infrastructure system.
APPENDIX D
Page 342
2016 Citra S. Ongkowijoyo and Hemanta K. Doloi, Analyzing The Risk Criticality of Infrastructure System on The Community, American Society in Civil Engineering (ASCE) for Construction Research Congress 2016 (CRC-2016), 31 May-2 June, San Juan-Puerto Rico.
Abstract
The importance of infrastructure poses significant complexity and challenges to the society under dynamic and uncertain conditions. Current risk assessment methodologies fail to address effectively the issue related to the criticality of risk in a specific infrastructure system. This issue has highlighted the need to understand both the magnitude and impact propagation mechanism of risk. This study develops a novel risk analysis method to analyze the risk criticality among various risks within specific infrastructure in the dynamic manner of stakeholder perceptions towards risk magnitude and impact propagation mechanism. The developed method is the combination of Failure Mode Effect and Criticality Analysis, Social Network Analysis and Fuzzy-set theory in a group decision-making environment to facilitate the building of risk evaluation. The developed method validated in a hypothetical case of urban water supply infrastructure context. The proposed method identifies and measures critical risk at different level of value when comparing a number of hazard events. The risk analysis model developed prioritizes hazard events by considering risk decision factors and impact network analysis to address the risk magnitude and impact propagation mechanism in the context of risk analysis and decision-making process. Compared to conventional risk assessment method, the proposed method provides more reliable estimation accuracy, increases decision quality and efficiency in risk management decision making. The empirical demonstration will add a significant insight and new perspective of risk analysis in order to prioritize the critical type of risk. Keywords: Infrastructure; Social network; Risk analysis; Fuzzy-theory.
Minerva Access is the Institutional Repository of The University of Melbourne
Author/s:Ongkowijoyo, Citra
Title:A conceptual model for assessing risks and building resilience for urban infrastructuresystem: an Indonesian case
Date:2017
Persistent Link:http://hdl.handle.net/11343/212141
Terms and Conditions:Terms and Conditions: Copyright in works deposited in Minerva Access is retained by thecopyright owner. The work may not be altered without permission from the copyright owner.Readers may only download, print and save electronic copies of whole works for their ownpersonal non-commercial use. Any use that exceeds these limits requires permission fromthe copyright owner. Attribution is essential when quoting or paraphrasing from these works.