Skip to main content
Elsevier - PMC COVID-19 Collection logoLink to Elsevier - PMC COVID-19 Collection
. 2012 Sep 4;42:49–57. doi: 10.1016/j.cor.2012.08.015

A FTA-based method for risk decision-making in emergency response

Yang Liu 1, Zhi-Ping Fan 1,, Yuan Yuan 1, Hongyan Li 1
PMCID: PMC7117036  PMID: 32287928

Abstract

Decision-making problems in emergency response are usually risky and uncertain due to the limited decision data and possible evolvement of emergency scenarios. This paper focuses on a risk decision-making problem in emergency response with several distinct characteristics including dynamic evolvement process of emergency, multiple scenarios, and impact of response actions on the emergency scenarios. A method based on Fault Tree Analysis (FTA) is proposed to solve the problem. By analyzing the evolvement process of emergency, the Fault Tree (FT) is constructed to describe the logical relations among conditions and factors resulting in the evolvement of emergency. Given different feasible response actions, the probabilities of emergency scenarios are estimated by FTA. Furthermore, the overall ranking value of each action is calculated, and a ranking of feasible response actions is determined. Finally, a case study on H1N1 infectious diseases is given to illustrate the feasibility and validity of the proposed method.

Keywords: Emergency response, Fault tree analysis (FTA), Scenario probability estimation, Ranking

1. Introduction

Emergencies, i.e., natural disasters, industrial incidents, infectious diseases and terrorist attacks etc., often cause losses of life or injury, property damages, social and economic disruptions or environmental degradations. For example, the Severe Acute Respiratory Syndrome (SARS) broken out in east Asia early 2003 resulted in the death of hundreds of people, the global panic and the inestimable economic loss. When an emergency occurs, the relevant management personnel or decision-makers (DMs) need to decide what actions to take instantly so as to mitigate or minimize the negative effects. Usually, the decision-making problems in emergency response are complicated due to the limited decision data and possible evolvement of emergency scenarios [1], [2]. Therefore, how to select an effective response action in the earlier stage of emergency is an important research topic of emergency management.

Some studies have been conducted to deal with the decision-making problem in emergency response [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11]. For example, Hämäläinen et al. [1] proposed a multi-attribute risk analysis method to select a strategy for protecting the population in a simulated nuclear accident. Shim et al. [2] developed a decision support system (DSS) for controlling river basin flood. Körte [3] proposed a method named ‘contingent risk and decision analysis’ to solve the decision-making problems under variable environment. Levy [4] developed a DSS for flood risk management by integrating the multi-criteria decision-making (MCDM) method, the remote sensing, GIS, the hydrologic models, and the real-time flood information systems. Based on [4], Levy and Taji [5] proposed a group analytic network process (GANP) approach to provide a support to hazard planning and emergency management under incomplete information. Fu [6] proposed a fuzzy optimization method for selecting the most desirable action to control the flood of reservoir. Geldermann et al. [7] proposed a MCDM-based evaluation method for nuclear remediation management. Lim and Lee [8] proposed a spatial multi-criteria decision analysis approach for evaluating flood damage reduction actions. Yu and Lai [9] proposed a distance-based group decision-making (GDM) method to solve unconventional multi-person multi-criteria emergency decision-making problems. Peng et al. [10] proposed an incident information management framework based on data integration, data mining and multi-criteria decision making. Ergu et al. [11] proposed a simple consistency test process to make ANP more suitable to solve decision-making problems in emergency cases.

The existing studies have made significant contributions to decision analysis in emergency response. In existing studies, various decision-making methods are proposed according to the characteristics of different actual emergency events, such as nuclear accident [1], [7], flood disaster [2], [4], [6], [8] and so on. In some actual emergency situations, like infectious diseases and fire hazards etc., the decision-making problems have dynamic and risky characteristics. This needs to consider a special risk decision-making problem with several distinct characteristics including dynamic evolvement process of emergency, multiple scenarios, and impact of response actions on the emergency scenarios. However, the existing decision analysis methods seldom consider to solve the decision-making problems with the above characteristics. Therefore, it is necessary to further investigate the risk decision-making problem considering the characteristics of dynamic evolvement and multiple scenarios in emergency response.

The Fault Tree Analysis (FTA) is one of the most powerful tools for predicting reliability of a complex system by depicting the logical relations among components or sub-systems in the system. By FTA, the occurrence frequency or probability of the system hazardous events can be estimated [12], [13], [14], [15], [16], [17], and the root causes of system hazardous events can be found. In this paper, we incorporate FTA into the analysis of risk decision-making problem with the characteristics of dynamic evolvement and multiple scenarios in emergency response. An emergency with multiple scenarios is regarded as a ‘system’, the undesirable scenarios of the emergency are regarded as ‘system hazardous events’, and the conditions and factors resulting in the evolvement of emergency are denoted as middle events and basic events. Accordingly, a fault tree (FT) for the emergency is constructed to describe the logical relations among scenarios, conditions and factors. Based on the constructed FT, the probabilities of emergency scenarios can be estimated with respect to each feasible response action. Furthermore, based on obtained probabilities of emergency scenarios, classical risk decision-making method can be employed to calculate the overall ranking value of each action.

The rest of this paper is organized as follows. Section 2 formulates the risk decision-making problem in emergency response based on the analysis of the practical background of SARS diseases. In Section 3, the FT for an emergency is constructed to describe the logical relations among the conditions and factors resulting in the evolvement of emergency scenarios. In Section 4, the probabilities of emergency scenarios are calculated with respect to each feasible response action. Section 5 provides an approach to ranking feasible response actions by calculating overall ranking values of actions. Section 6 demonstrates a case study on the H1N1 infectious diseases. Finally, Section 7 summarizes and highlights the main features of this paper.

2. The risk decision-making problem in emergency response

In this section, we first analyze the practical background of SARS diseases, and then describe the risk decision-making problem in emergency response.

2.1. SARS diseases

SARS is a contagious respiratory disease caused by the SARS corona virus. The first case of SARS was found in Guangdong province in China on November 16, 2002. Since there was no precedent of SARS, an inefficient control action was implemented, which leaded to a rapidly spreading of SARS. In early 2003, more infected cases were successively found in different provinces in China, including, 6 cases in Guangxi province on January 4, 3 cases in Sichuan province on February 10, and 1 case in Hunan province on February 14, etc. SARS continuously spread to other countries and regions by traveling passengers. On February 15, 2003, a doctor from Guangdong province, who had been infected by SARS, arrived at Hongkong, and infected 15 hotel visitors. The infected visitors then traveled to Canada, Singapore, Taiwan and Vietnam, and caused further widely spreading of SARS. According to the report of the World Health Organization (WHO), the SARS disease in 2003 resulted in 8096 known infected cases, 774 confirmed human deaths, the global panic and the inestimable economical loss.

Comparing with the explosive spreading of SARS in 2003, the recurrence of SARS in 2004 was rarely known by public. Two infected cases were respectively found in Beijing and Hefei in April 2004 [18]. The first infected case was a researcher working in a lab of SARS corona virus. Based on the experience obtained in 2003, an effective action was taken to control the spreading of SARS in no time. It restricted the disease to only 9 infected cases finally.

It can be seen from the above practical background of SARS diseases in 2003 and 2004 that emergency response is a risk decision-making problem. Take the spreading of SARS as an example, the emergency response problem usually has the following distinct characteristics: (1) the spreading of SARS disease is dynamic; (2) the spreading of SARS has multiple possible scenarios, and the probability of each scenario is variational; (3) each action of emergency response would change the probabilities of scenarios. Therefore, in order to find the most desirable control action, it is necessary to estimate the probabilities of scenarios by analyzing the conditions and factors that could impact the evolvement of emergency.

2.2. Problem description

Based on the above analysis of practical background of an emergency situation, SARS, we depict a new risk decision-making problem in emergency response in this paper. The following notations are used to describe the problem.

  • A={A1,A2,...,Am}: the set of m feasible response actions (alternatives), where Ai denotes the ith response action, i=1,2,,m.

  • O=(o1,o2,...,om): the vector of costs, where oi denotes the cost of action Ai, i=1,2,,m. Usually, the cost of action Ai consists of several parts, such as the cost of human resource, the cost of relief goods and so on. For the convenience of analysis, let oi denote the total cost of Ai composed of all parts, i=1,2,,m, and it is in monetary form.

  • S=(S0,S1,...,Sn): the scenario vector, where S0 denotes the current scenario of the emergency; Sj denotes the jth potential scenario in the evolvement process of the emergency, j=1,2,,n. In this paper, we further define the damage result under scenario Sj is more serious than that under Sj, if j>j, j,j{0,1,,n}. In addition, we assume that scenarios S0,S1,...,Sn are sequential, and in other words, Sj could occur only if Sj has already occurred, ifj>j. Usually, vector S can be determined by consulting experts, collecting related statistical data or conducting study on cases.

  • D={D1,D2,,Dq}: the set of q criteria for describing the damage result of emergency, where Dk denotes the kth criterion for describing the damage result, k=1,2,,q.

  • dj=(dj1,dj2,,djq): the damage result vector under scenario Sj, where djk is the damage result concerning criterion Dk and under scenario Sj, j=0,1,2,,n, k=1,2,,q.

  • wcost: the weight of cost, 0wcost<1.

  • W=(w1,w2,,wq): the vector of criterion weights, where wk is the weight of criterion Dk, 0wk1, k=1,2,,q. Here, we consider wcost+k=1qwk=1. Usually, wcost and W can be obtained either directly from the assignment of the DM or indirectly using existing procedures such as AHP [19], [20].

  • P=[pij]m×n: the probability matrix, where pij denotes the probability of scenario Sj if response action Ai is taken, i=1,2,,m, j=1,2,,n. Usually, P is unknown in the earlier stage of emergency, which is needed to be estimated by an appropriate approach.

The problem mainly addressed in this paper is how to estimate P and to select the most desirable response action(s) among set A based on O, dj, wcost, W and the obtained P.

As we mentioned before, the problem is a risk decision-making problem. We describe it as a decision tree in Fig. 1. It can be seen from Fig. 1 that there are two possible results of scenario S0 if response action Ai is implemented, i.e., either the emergency will evolve into scenario S1 with probability pi1 or end (Ω) with probability 1pi1. Furthermore, if the emergency evolves into scenario S1, there are also two possible results, i.e., either the emergency will evolve into scenario S2 with probability pi2 or end (Ω) with probability pi1pi2. Similarly, if the emergency evolves into scenario Sn1, there are also two possible results, i.e., either the emergency will evolve into scenario Sn with probability pin or end (Ω) with probability pi(n1)pin. If the emergency ends after the occurrence of scenario Sj, then damage result vector is dj=(dj1,dj2,,djq).

Remark 1

It is necessary to point out that pij is the probability of scenario Sj given that response action Ai is implemented, rather than the conditional probabilities of scenario Sj given that scenario Sj1 has occurred, i=1,2,,m, j=1,2,,n.

Fig. 1.

Fig. 1

The risk decision-making problem in emergency response.

To solve the risk decision-making problem described above, a FTA-based method is proposed. First, a FT is constructed to depict the logical relations among conditions and factors resulting in the evolvement of emergency. Then, based on the constructed FT, the probabilities of different scenarios are calculated given different response actions. Furthermore, based on the obtained probabilities, the overall ranking value of each action is calculated to determine a ranking of the feasible response actions. In the next section, we will construct the FT for an emergency.

3. Constructing the FT for an emergency

FTA is a powerful diagnosis technique and widely used for demonstrating the root causes of undesirable event in system failure, as well as depicting the logical relations among components, manufacturing processes, and sub-systems [12], [13], [14], [15], [16], [17]. It was originally developed by Bell Laboratories for the US Air Force in 1962 and was later adopted and extensively applied by the Boeing Company. Now, FTA is wildly used in many fields, such as chemical industries [16], liquefied natural gas terminal emergency shutdown system [17] and so on. In this paper, the principle of FTA is employed to estimate the probabilities of emergency scenarios. Thus, constructing a FT beforehand is necessary in order to depict the logical relations among the conditions and factors driving the evolvement of emergency scenarios. In the following, we first introduce the basic components of FT, and then give the steps for constructing the FT for an emergency.

3.1. Basic components of FT

Usually, a FT is composed of a series of events and logic gates. The main events include:

  • Top event: is the most undesirable system failure event and the object of the analysis, denoted as □.

  • Middle event: is the sub-system or component failure event and the cause of the top event, denoted as □.

  • Basic event: is the primary failure event and the cause of the top event or middle events, denoted as ○.

  • The main logic gates include:

  • Logic gate ‘OR’: indicates that output event occurs if at least one of the input events occurs, denoted as Inline graphic.

  • Logic gate ‘AND’: indicates that output event occurs only if all of the input events occur, denoted as Inline graphic.

There may be many other types of events and logic gates involved in complex system reliability analysis, but, for the sake of concisions, we only list the most commonly used ones here. For other types of events and logic gates, please refer to [14], [15].

3.2. Steps for constructing the FT for an emergency

The construction of the FT for an emergency is a deductive procedure. The core idea is to identify the conditions and factors that emergency can evolve into scenario Sj from scenario Sj1, j=1,2,,n. The FT should be developed level by level, and each level should be completed before any consideration is given to the next level. To successfully construct the FT for an emergency, the following steps are suggested:

  • Step 1. The most undesirable scenario Sn is defined as top event.

  • Step 2. Define boundary conditions for the analysis. The boundary conditions include: (1) physical boundaries: define what factors, status and emergency scenarios will be included in the FT as events; (2) boundary conditions concerning environmental stresses: define what external stresses (e.g., virus variation) should be included in the FT as events; (3) level of resolution: determine how far down we should identify the potential reasons for an event in detail.

  • Step 3. Classify all events into middle events and basic events. If an event represents a primary factor that may result in the evolvement of emergency, it is classified as a basic event; if an event represents a secondary factor that may result in the evolvement of emergency, it is classified as a middle event that requires a further investigation to identify the prime causes.

  • Step 4. Complete the gates. If the upper level event will occur given that a single lower event occurs, then the events should be linked with ‘OR’ gate; if the upper level event will occur only if two or more lower events occur simultaneously, then the events should be linked with ‘AND’ gate.

Using the above steps, the FT for an emergency can be constructed. In addition, computer-aided FT construction methods have also been proposed in literatures [21], [22], [23], [24], [25], which can also be used to construct the FT for an emergency.

4. Calculating the probabilities of scenarios

Based on the constructed FT, a logical expression of each scenario can be formulated. Then, by estimating the probabilities of basic events, the probabilities of scenarios can be calculated given different response actions. In the following, the procedure for calculating the probabilities is briefly described.

Suppose there are l basic events in the FT for an emergency, denoted as X1,X2,,Xl, respectively. According to the constructed FT, a logical expression of scenario Sj is first formulated as

FSj=Fj(X1,X2,,Xl),j=1,2,,n (1)

In the logical expression, the basic events or middle events are linked by logic operation symbol ‘’ if they are linked by ‘OR’ gate (Inline graphic) in the constructed FT; the basic events or middle events are linked by logic operation symbol ‘’ if they are linked by ‘AND’ gate (Inline graphic) in the constructed FT.

Next, in order to estimate the probabilities of basic events, several experts should be invited to participate in the decision analysis. In fact, it is not easy for the experts to determine or define the probabilities of basic events directly since many factors need to be considered. In this situation, the indirect elicitation technique [26], [27], Delphi method [28] or Nominal Group Technique [29] can be used to determine the probabilities of basic events. In the indirect elicitation technique, a series of data on historical similar events are provided to the experts. Then, the experts are asked to compare the probabilities of basic events with those of historical similar events, which will be helpful to determine the experts' personal judgment on the probabilities of basic events. Further, based on the experts' personal judgment, Delphi method [28] and Nominal Group Technique [29] are employed to determine a consistency collective judgment on the probabilities of basic events. Therefore, a probability matrix of basic events can be obtained, which is represented by

X1X2XlΘ=[ρih]m×l=A1A2Am[ρ11ρ12ρ1lρ21ρ22ρ2lρm1ρm2ρml]

In Θ=[ρih]m×l, ρih denotes the probability of basic event Xh if response action Ai is implemented, i=1,2,,m, h=1,2,,l.

Furthermore, according to FSj and Θ=[ρih]m×l, the probability of scenario Sj given response action Ai can be calculated by

pij=fj(ρi1,ρi2,,ρil),i=1,2,,m,j=1,2,,n (2)

where fj() is the function corresponding to Fj(). In fj(), the logic operation XhXh in Fj() is replaced by probability operation ρih+ρihρihρih; the logic operation XhXh in Fj() is replaced by ρihρih. Therefore, according to pij, i=1,2,,m, j=1,2,,n, the probability matrix of scenarios is constructed, i.e.,

S1S2SnP=[pij]m×n=A1A2Am[p11p12p1np21p22p2npm1pm2pmn]

where pij denotes the probability of scenario Sj if action Ai is implemented, i=1,2,,m, j=1,2,,n.

To illustrate the above computation procedure more clearly, a simple numerical example is given below.

Example 1

Fig. 2 shows an illustrative example of the FT for an emergency.

Fig. 2.

Fig. 2

An illustrative example of FT.

In Fig. 2, S2 is the most undesirable scenario of emergency (top event); S1 is an undesirable scenario in the lower level of S2, and M1 is the middle events; X1, X2, X3 and X4 are four basic events. X1, X2 and S1 are linked by Inline graphic. It denotes that S1 occurs if at least one of X1 and X2 occurs. X3, X4 and M1 are linked by Inline graphic. It denotes that M1 occurs only if all of X3 and X4 occur simultaneously. Similarly, S2 occurs only if all of S1 and M1occur simultaneously.

According to Fig. 2, the logical expressions of S1 and S2 can be respectively formulated, i.e.,

FS1=X1X2, (3)
FS2=S1M1=(X1X2)(X3X4), (4)

where and denote the logic operations of ‘OR’ and ‘AND’.

Suppose two feasible response actions (or alternatives) A1 and A2 are considered to be implemented in emergency response. The probability matrix of basic events determined by indirect elicitation technique and Delphi method is

X1X2X3X4Θ=[ρih]2×4=A1A2[0.80.60.40.20.70.70.30.4]

Then, according to Eq. (3) and matrix Θ, the probability of S1 can be calculated given action A1 or A2, i.e.,

p11=0.8+0.60.8×0.6=0.92, (5)
p21=0.7+0.70.7×0.7=0.91, (6)

Similarly, according to Eq. (4) and matrix Θ, the probability of S2 can be calculated given action A1 or A2, i.e.,

p12=(0.8+0.60.8×0.6)×0.4×0.2=0.0736, (7)
p22=(0.7+0.70.7×0.7)×0.3×0.4=0.1092, (8)

Therefore, we can construct the probability matrix of scenarios, i.e.,

S1S2P=[pij]2×2=A1A2[0.920.07360.910.1092]

5. Determining the ranking of feasible response actions

Based on P=[pij]m×n, the overall ranking values of different response actions can be calculated to determine a ranking of actions. In the following, we briefly described the computation procedure of overall ranking values.

First, to make different criteria have the same range of measurement, the costs and criterion values are normalized into the numbers from 0 to 1 respectively. Let O¯=(o¯1,o¯2,...,o¯m) be the vector of normalized costs, where o¯i is the normalized cost of response action Ai, i=1,2,,m. Let d¯j=(d¯j1,d¯j2,,d¯jq) be the vector of normalized criterion values, where d¯jk is the normalized criterion value concerning Dk with respect to scenario Sj, j=0,1,2,,n, k=1,2,,q. The calculation formulas of o¯i and d¯jk can be respectively expressed by

o¯i=omaxoiomaxomin,i=1,2,,m (9)
d¯jk=dkmaxdjkdkmaxdkmin,j=0,1,2,,n,k=1,2,,q (10)

where omax=max{o1,o2,,om} and omin=min{o1,o2,,om}; dkmax=max{ d0k,d1k,d2k,, dnk} and dkmin=min{ d0k,d1k,d2k,, dnk}. By Eqs. (9) and (10), the costs and criterion values are all unified into benefit type [30], [31], i.e., the greater o¯i is, the better action Ai will be; similarly, the greater d¯jk is, the better damage result concerning Dk with respect to scenario Sj will be.

It can be seen from Fig. 1 that there are n+1 possible damage results, i.e., the emergency ends after the occurrence of scenario S0, S1, S2, , or Sn. The probabilities of the n+1 damage results are 1pi1, pi1pi2, pi2pi3, and pin if response action Ai is implemented. Let aik denote the expected criterion value of action Ai concerning Dk, i=1,2,,m, k=1,2,,q. According to d¯j=(d¯j1,d¯j2,,d¯jq) and P=[pij]m×n, aik can be represented by

aik=(1pi1)d¯01+j=1n1(pijpi(j+1))d¯jk+pind¯nk,i=1,2,,m,k=1,2,,q (11)

Furthermore, let ai denote the overall ranking value of response action Ai, which can be represented by

ai=wcosto¯i+k=1qwkaik,i=1,2,,m (12)

In Eq. (12), wcost is the weight of cost, wk is the weight of criterion Dk, k=1,2,,q.

It can be seen that the greater ai is, the better response action Ai will be. Therefore, according to overall ranking values a1,a2,,am, we can determine a ranking of all feasible response actions.

In summary, the steps of the FTA-based method for risk decision-making in emergency response are given below.

  • Step 1. Construct the FT for an emergency using the steps proposed in Section 3.2.

  • Step 2. Determine logical expression FSj according to Eq. (1), j=1,2,,n.

  • Step 3. Determine matrix Θ=[ρih]m×l using indirect elicitation technique and Delphi method.

  • Step 4. Calculate pij using Eq. (2), i=1,2,,m, j=1,2,,n.

  • Step 5. Determine O¯=(o¯1,o¯2,...,o¯m) and d¯j=(d¯j1,d¯j2,,d¯jq) using Eqs. (9), (10), j=1,2,,n.

  • Step 6. Calculate aik using Eq. (11), i=1,2,,m, k=1,2,,q.

  • Step 7. Calculate ai using Eq. (12), i=1,2,,m.

  • Step 8. Determine a ranking of all feasible response actions according to a1,a2,,am.

6. Case study

In this section, to illustrate the feasibility and validity of the FTA-based method, we investigate a case on H1N1 infectious disease in University B, one of the most famous universities in China. First, the introduction of the case is given. Then, the FTA-based method is used to choose a desirable response action for controlling the spreading of H1N1 in the university. In addition, a sensitivity analysis is conducted to show the impact of parameters on the ranking of feasible response actions.

6.1. Introduction of the case

H1N1 virus is a subtype of influenza A virus and was the most common cause of human influenza in 2009. In September, an infected person of H1N1 was diagnosed in University B, which has 30,000 students and staff living on campus. After persuading the infected person to take quarantine measures, the university needs to take further action to control the spreading of H1N1 by selecting one from six feasible emergency response actions. The six feasible response actions are given as below.

  • A1: Taking no additional countermeasures. The cost of A1 is 0 million RMB, o1=0;

  • A2: Persuading all close contacts of the infected person to take quarantine measures. The cost of A2 is 0.1 million RMB, o2=0.1;

  • A3: Adopting A2 and furthermore, providing antisepsis equipments to dormitories and classrooms of the infected person, and measuring the temperatures of relevant students and staff every 12 h. The cost of A3 is 0.2 million RMB, o3=0.2;

  • A4: Adopting A3 and furthermore, suspending the classes in the institute of the infected person, and control the flow of people between the institute and other institutes. The cost of A4 is 0.5 million RMB, o4=0.5;

  • A5: Adopting A4 and furthermore, providing antisepsis equipments to all dormitories and classrooms, and measuring the temperatures of all students and staff of the university every 12 h. The cost of A5 is 0.8 million RMB, o5=0.8;

  • A6: Adopting A5 and furthermore, suspending all classes in the university. The cost of A6 is 2 million RMB, o6=2.

To select a desirable response action, the university invited five experts of epidemiology and three experts of emergency management to participate in the decision-making process. By consulting the experts, four potential scenarios in the evolvement process of infectious disease are determined as below.

  • S1: New infected persons are detected in the infected person's close contacts.

  • S2: New infected persons are detected in the same institute or dormitories of the infected person and his/her close contacts.

  • S3: Multiple new infected persons are detected in other institutes and dormitories.

  • S4: The pandemic of H1N1 in University B.

When make a decision, the following criteria are considered:

  • D1: the number of infected persons;

  • D2: the panic degree of students and staff;

  • D3: the negative effect on the reputation of the university.

The DM provides the weight of cost and weight vector of criteria, i.e., wcost=0.1 and W=(0.6,0.2,0.1). The values concerning criterion D1 are estimated by experts; the values concerning D2 and D3 are evaluated by experts in the scale of scores of 0–100 (0: no panic or negative effect; 100: serious panic or negative effect). The criterion values with respect to different scenarios are shown in Table 1.

Table 1.

The criterion values with respect to different scenarios.

djk D1 D2 D3
S0 0 0 0
S1 10 20 10
S2 40 50 40
S3 100 80 70
S4 200 100 100

6.2. Choosing a desirable response action using the FTA-based method

To select a desirable action, the FTA-based method proposed in this paper is used and the procedure is summarized as follows.

6.2.1. Constructing the FT for H1N1 infectious disease in the university

The most undesirable scenario S4 is defined as the top event. Then, according to the analysis of historical similar infectious diseases, the conditions or factors that could result in scenario S4 are identified, i.e., “Multiple new infected persons are detected in other institutes and dormitories (S3)” and “The infection routes are unclear (M1)”. Additionally, S4, S3 and M1 are linked by ‘AND’ gate (Inline graphic) since S4 will occur only if S3 and M1 occur simultaneously.

Similarly, the causes of S3 are identified, i.e., “New infected persons are detected in the same institute or dormitories of the infected person and his/her close contacts (S2)” and “New infected persons have contacted persons in other institutes and dormitories (X7)”. Additionally, S3, S2 and X7 are also linked by ‘AND’ gate (Inline graphic). The causes of M1 are regarded as “Healthy persons are infected by intermediary, such as tableware, classroom, etc (M2)” or “Healthy persons are infected by undetected infected ones (M3)”. M1, M2 and M3 are linked by ‘OR’ gate (Inline graphic) since M1 will occur if one of M2 and M3 occurs.

The above deductive procedure are repeated until the root causes of scenario S4 are analyzed clearly. Thereby, the FT for H1N1 infectious disease in University B is constructed, which is shown in Fig. 3. The meanings of the symbols in Fig. 3 are given in Table 2.

Fig. 3.

Fig. 3

The FT for H1N1 infectious disease in University B.

Table 2.

The meanings of symbols in Fig. 3.

Symbols Meanings of symbols
S1 New infected persons are detected in the infected person's close contacts
S2 New infected persons are detected in the same institute or dormitories of the infected person and his/her close contacts
S3 Multiple new infected persons are detected in other institutes and dormitories
S4 The pandemic of H1N1 in University B
M1 The infection routes are unclear
M2 Healthy persons are infected by intermediary, such as tableware, classroom, etc
M3 Healthy persons are infected by undetected infected ones
M4 The ineffective monitoring measures on infection routes
M5 Healthy persons are infected by the close contacts
M6 New infected ones infect healthy persons in the same institute
X1 The close contacts are not taken quarantine measures
X2 The close contacts have been infected
X3 Several persons in the same dormitory have been infected
X4 The classrooms in the institute of the infected ones have not been disinfected timely
X5 The infected ones in the institute are not detected timely
X6 The infected ones contact with others in group activities of the institute
X7 New infected persons have contacted with persons in other institutes and dormitories
X8 The classrooms in other institutes have not been disinfected timely
X9 The infected ones enter the classroom in other institutes
X10 The infected ones in other institutes are not detected timely
X11 The infected ones contact with others in group activities of the university

6.2.2. Calculating the probabilities of scenarios

According to Fig. 3, the logical expressions of S1, S2, S3 and S4 can be respectively formulated, i.e.,

FS1=(X1X2)X3, (13)
FS2=FS1(X4(X5X6))=((X1X2)X3)(X4(X5X6)), (14)
FS3=FS2X7=((X1X2)X3)(X4(X5X6))X7, (15)
FS4=FS3((X8X9)(X10X11))=((X1X2)X3)(X4(X5X6))X7((X8X9)(X10X11)). (16)

Then, indirect elicitation technique [26], [27] and Delphi method [28] are used to help the experts determine a consistency collective judgment on probabilities of basic events. The probability matrix of basic events is shown in Table 3.

Table 3.

The probability matrix of basic events.

X1 X2 X3 X4 X5 X6 X7 X8 X9 X10 X11
A1 1 0.8 0.6 0.8 0.9 0.8 0.7 0.8 0.9 0.9 0.8
A2 0 0.8 0.6 0.8 0.9 0.8 0.7 0.8 0.9 0.9 0.8
A3 0 0.8 0.6 0.4 0.4 0.7 0.6 0.8 0.9 0.9 0.8
A4 0 0.8 0.6 0.4 0.4 0.2 0.1 0.8 0.2 0.9 0.8
A5 0 0.8 0.6 0.4 0.4 0.2 0.1 0.4 0.2 0.4 0.8
A6 0 0.8 0.6 0.4 0.4 0.2 0.1 0.4 0.2 0.4 0.1

Furthermore, according to Eqs. (2) and (13), (14), (15), (16), the formulas for calculating probabilities of scenarios S1, S2, S3 and S4 are constructed with respect to action Ai, i.e.,

pi1=ρi1ρi2+ρi3ρi1ρi2ρi3, (17)
pi2=pi1(ρi4+ρi5ρi6ρi4ρi5ρi6)=(ρi1ρi2+ρi3ρi1ρi2ρi3)(ρi4+ρi5ρi6ρi4ρi5ρi6), (18)
pi3=pi2ρi7=(ρi1ρi2+ρi3ρi1ρi2ρi3)(ρi4+ρi5ρi6ρi4ρi5ρi6)ρi7, (19)
pi4=pi3(ρi8ρi9+ρi10ρi11ρi8ρi9ρi10ρi11)=(ρi1ρi2+ρi3ρi1ρi2ρi3)(ρi4+ρi5ρi6ρi4ρi5ρi6)ρi7(ρi8ρi9+ρi10ρi11ρi8ρi9ρi10ρi11) (20)

According to Table 3 and Eqs. (17)–(20), the probabilities of scenarios given different response actions can be obtained, and shown in Table 4.

Table 4.

The probabilities of scenarios given different response actions.

pij S1 S2 S3 S4
A1 0.92 0.8685 0.6079 0.5603
A2 0.6 0.5664 0.3965 0. 3654
A3 0.6 0.3408 0.2045 0.1884
A4 0.6 0.2688 0.0269 0.0206
A5 0.6 0.2688 0.0269 0.0101
A6 0.6 0.2688 0.0269 0.0031

6.2.3. Determining the ranking of actions

Using Eq. (9), the vector of normalized costs is determined, i.e., O¯=(1,0.95,0.9,0.75,0.6,0); using Eq. (10), the normalized criterion values are obtained, and shown in Table 5. Then, using Eq. (11), the expected criterion values of different actions are determined, and shown in Table 6. Using Eq. (12), the overall ranking value of each action is determined, i.e.,

Table 5.

The normalized criterion values.

d¯jk D1 D2 D3
S0 1 1 1
S1 0.95 0.8 0.9
S2 0.8 0.5 0.6
S3 0.5 0.2 0.3
S4 0 0 0
Table 6.

The expected criterion values of different actions.

aik D1 D2 D3
A1 0.3612 0.2610 0.2970
A2 0.5834 0.5181 0.5415
A3 0.7633 0.6787 0.7199
A4 0.9113 0.7872 0.8451
A5 0.9166 0.7893 0.8483
A6 0.9200 0.7907 0.8504

a1=0.3986, a2=0.6028, a3=0.7557, a4=0.8638, a5=0.8526, a6=0.7952.

Finally, according to the overall ranking values, a ranking of all feasible response actions is determined, i.e., A4A5A6A3A2A1.

6.3. Sensitivity analysis

In the following, a sensitivity analysis is conducted to show the impact of parameters on the ranking of feasible response actions. The sensitivity analysis includes two parts. One is to analyze the impact of the weight of cost on ranking of actions. The other is to analyze the impact of probabilities of basic events on ranking of actions.

6.3.1. The impact of the weight of cost on ranking of actions

The weight of cost implies the relative importance degree of cost comparing with the damage results. Analyzing the influence of weight of cost on ranking of actions would provide more valuable data for decision analysis in emergency response.

Consider the weight of cost is changed to wcost, 0wcost<1. It can be seen that wcost+k=1qwk1 if wcostwcost. Let W=(w1,w2,,wq) be the vector of criterion weights corresponding to wcost. Then, we have

wk=wk(1wcost)1wcost,k=1,2,,q (21)

obviously, wcost+k=1qwk=1.

In the above case study, we have wcost=0.1 and W=(0.6,0.2,0.1). If wcost=0.1 is changed into wcost=0.01, then according to Eq. (21), we have W=(0.66,0.22,0.11). Furthermore, according to Eq. (12), the overall ranking value of each response action can be determined, i.e., a1=0.3385, a2=0.5681, a3=0.7413, a4=0.8751, a5=0.8779, a6=0.8747. Thus, a new ranking result of feasible response actions can be obtained, i.e., A5A4A6 A3A2A1.

The overall ranking values of the six feasible response actions with regard to different wcost are plotted in Fig. 4. It can be seen from Fig. 4 that action A1, A2 or A3 should be selected if wcost is greater. Conversely, action A4, A5 or A6 should be selected if wcost is smaller.

Fig. 4.

Fig. 4

Curves of overall ranking values of the six feasible response actions with regard to different wcost.

6.3.2. The impact of probabilities of basic events on ranking of actions

There are two types of basic events in the FT for an emergency case. The first type includes the events used to describe the current scenario of emergency, whose probabilities will not change with different response actions, such as X2 and X3 in Fig. 3. The second type includes the events used to describe conditions and factors resulting in the evolvement of emergency, whose probabilities will change with different response actions, such as X1, X4,X5,,X11. In the following, the sensitivity analysis will be respectively conducted with respect to the probabilities of each type of events.

It can be seen from Fig. 3, Table 2, Table 3 that X2 and X3 belong to the first type of basic events. If the first infected person has not been detected timely, then the probabilities of X2 and X3 would be greater. Conversely, probabilities of X2 and X3 would be smaller. In addition, it can be seen from the practical meanings of X2 and X3 that there is inter-dependence between the probabilities of X2 and X3. In other words, if the probability of X2 is greater, then the probability of X3 is also greater. Consider the probabilities of X2 and X3 are changed to ρi2 and ρi3, respectively. Here, for the convince of analysis, we suppose ρi3=0.75ρi2. The overall ranking values of the six feasible response actions with regard to different values of ρi2 are plotted in Fig. 5.

Fig. 5.

Fig. 5

Curves of overall ranking values of the six feasible response actions with regard to different ρi2.

It can be seen from Fig. 5 that all of the overall ranking values of actions decrease with the increase of ρi2. Action A1 is the best one only if ρi2 approaches 0.

It can be seen from Fig. 3, Table 2, Table 3 that X1, X4,X5,,X11 belong to the second type of basic events. Here, we take X4 and X7 as two examples. Consider the probabilities of X4 and X7 are respectively changed to ρi4 and ρi7. The overall ranking values of the six feasible response actions with regard to different ρi4 and ρi7 are plotted in Fig. 6, Fig. 7, respectively.

Fig. 6.

Fig. 6

Curves of overall ranking values of the six feasible response actions with regard to different ρi4.

Fig. 7.

Fig. 7

Curves of overall ranking values of the six feasible response actions with regard to different ρi7.

Fig. 6, Fig. 7 show that the overall ranking values are more sensitive to ρi7 than ρi4. Thus, preventing the occurrence of X7 will more effectively mitigate/reduce the expected damage results of emergency.

7. Conclusions

This paper presents a novel FTA-based method for risk decision-making in emergency response. By constructing the FT, the logical relations among the conditions and factors driving the evolvement of emergency are described. Then, based on the constructed FT, the probabilities of emergency scenarios are estimated given each feasible action. Furthermore, according to the obtained probabilities, the ranking of actions is determined by calculating the overall ranking values of feasible actions. The major contributions of this paper are discussed as follows.

First, this paper discovers and formulates a new risk decision-making problem in emergency response with distinct characteristics including the dynamic evolvement of emergency, multiple scenarios and their probabilities, and influence of response actions on probabilities of the scenarios. It is a new idea for describing the decision-making problem in emergency response and lays a good foundation for further conducting studies on risk decision analysis in emergency response.

Second, the key of the proposed method is to estimate the probabilities of scenarios given each feasible response action. For this, the principle of FTA is introduced, and the steps for constructing the FT for an emergency are given. The attempt to introduce FTA into decision analysis makes it possible to capture the dynamic evolvement process of emergency and estimate the probabilities of emergency scenarios before the response actions are implemented. It is valuable and important for developing and enriching theories and methods of decision analysis in emergency response.

Third, using the proposed method, not only the ranking of feasible response actions can be derived, but also the sensitivity analysis can be conducted conveniently. The data obtained by sensitivity analysis provide supplement and inducement to DMs, which is important to support the decision-making of DMs in the process of emergency response.

It is important to highlight that, since the proposed method is new and different from the existing methods, it can give experts or decision analysts one more choice for identifying the appropriate method to solve the problem of emergency response.

In terms of future research, two directions are worthy of pursuing. One is to extend the proposed method to the situation that probabilities or possibility of basic events are in the form of uncertain or fuzzy data, such as interval numbers, linguistic terms or institution fuzzy numbers. The other is to develop the dynamic risk decision-making methods in emergency response on the basis of the method proposed in this paper.

Acknowledgment

This work was partly supported by the National Science Fund for Excellent Innovation Research Group of China (Project no. 71021061), the National Science Foundation of China (Project nos. 90924016, 71001020, 71071029, 71101020 and 71101021), the Fundamental Research Funds for the Central Universities, NEU, China (Project nos. N100406012 and N110706001) and Doctoral Scientific Research Foundation of Liaoning Science and Technology Committee (Project no. 201120013).

References

  • 1.Hämäläinen R.P., Lindstedt M.R.K., Sinkko K. Multiattribute risk analysis in nuclear emergency management. Risk Analysis. 2000;20(4):455–467. doi: 10.1111/0272-4332.204044. [DOI] [PubMed] [Google Scholar]
  • 2.Shim K.C., Fontane D.G., Labadie J.W. Spatial decision support system for integrated river basin flood control. Journal of Water Resources Planning and Management. 2002;128(3):190–201. [Google Scholar]
  • 3.Körte J. Risk-based emergency decision support. Reliability Engineering and System Safety. 2003;82(3):235–246. [Google Scholar]
  • 4.Levy J.K. Multiple criteria decision making and decision support systems for flood risk management. Stochastic Environmental Research and Risk Assessment. 2005;19(6):438–447. [Google Scholar]
  • 5.Levy J.K., Taji K. Group decision support for hazards planning and emergency management: a group analytic network process (GANP) approach. Mathematical and Computer Modeling. 2007;46(7–8):906–917. [Google Scholar]
  • 6.Fu G.T. A fuzzy optimization method for multicriteria decision making: an application to reservoir flood control operation. Expert Systems with Applications. 2008;34(1):145–149. [Google Scholar]
  • 7.Geldermann J., Bertsch V., Treitz M., French S., Papamichail K.N., Hämäläinen R.P. Multi-criteria decision support and evaluation of strategies for nuclear remediation management. Omega. 2009;37(1):238–251. [Google Scholar]
  • 8.Lim K.S., Lee D.R. The spatial MCDA approach for evaluating flood damage reduction alternatives. KSCE Journal of Civil Engineering. 2009;13(5):359–369. [Google Scholar]
  • 9.Yu L., Lai K.K. A distance-based group decision-making methodology for multi-person multi-criteria emergency decision support. Decision Support Systems. 2011;51(2):307–315. [Google Scholar]
  • 10.Peng Y., Zhang Y., Tang Y., Li S.M. An incident information management framework based on data integration, data mining, and multi-criteria decision making. Decision Support Systems. 2011;51(2):316–327. [Google Scholar]
  • 11.Ergu D, Kou G, Shi Y, Shi Y. Analytic network process in risk assessment and decision analysis. Computers and Operations Research, in press. 〈 10.1016/j.cor.2011.03.005〉. [DOI]
  • 12.Lee W.S., Grosh D.L., Tillman F.A., Lie C.H. Fault tree analysis, methods, and applications: a review. IEEE Transactions on Reliability. 1985;34(3):194–203. [Google Scholar]
  • 13.Kim C.E., Ju Y.J., Gens M. Multilevel fault tree analysis using fuzzy numbers. Computers & Operations Research. 1996;23(7):695–703. [Google Scholar]
  • 14.Bertsche B. Springer-Verlag; Berlin Heidelberg: 2008. Reliability in automotive and mechanical engineering. [Google Scholar]
  • 15.Liu D.X., Amari S.V. Fault tree analysis. In: Misra K.B., editor. Handbook of Performability Engineering. Springer-Verlag; London limited: 2008. [Google Scholar]
  • 16.Lin M.S., Chang M.S., Chen D.J., Ku K.L. The distributed program reliability analysis on ring-type topologies. Computers & Operations Research. 2001;28(7):625–635. [Google Scholar]
  • 17.Cheng S.R., Lin B.S., Hsu B.M., Shu M.H. Fault-tree analysis for liquefied natural gas terminal emergency shutdown system. Expert Systems with Application. 2009;36(9):11918–11924. [Google Scholar]
  • 18.Gao X., Shan G.L., Liu H.L., Xie X.Q., Lu H.Y., Zeng G. Analysis on characteristics of transmission and diagnosis of SARS in Beijing in 2004. Chinese Journal of Public Health (in Chinese) 2005;21(5):522–523. [Google Scholar]
  • 19.Saaty T.L. McGraw-Hill; Toronto: 1980. The analytical hierarchy process. [Google Scholar]
  • 20.Peng Y., Kou G., Wang G.X., Wu W.S. Ensemble of software defect predictors: an AHP-based evaluation method. International Journal of Information Technology & Decision Making. 2011;10(1):187–206. [Google Scholar]
  • 21.Lapp S.A., Powers G.J. Computer-aided synthesis of fault-trees. IEEE Transactions on Reliability. 1977;24(1):2–13. [Google Scholar]
  • 22.Bossche A. Computer-aided fault tree synthesis I: system modeling and causal trees. Reliability Engineering & System Safety. 1991;32(3):217–241. [Google Scholar]
  • 23.Bossche A. Computer-aided fault tree synthesis II: fault tree construction. Reliability Engineering & System Safety. 1991;33(1):1–21. [Google Scholar]
  • 24.Khan F.I., Abbasi S.A. Analytical simulation and PROFAT II: a new methodology and a computer automated tool for fault tree analysis in chemical process industries. Journal of Hazardous Materials. 2000;75:1–27. doi: 10.1016/s0304-3894(00)00169-2. [DOI] [PubMed] [Google Scholar]
  • 25.Wang Y., Teague T., West H., Mannan S. A new algorithm for computer-aided fault tree synthesis. Journal of Loss Prevention in the Process Industries. 2002;15(4):265–277. [Google Scholar]
  • 26.Figueira J., Mousseau V., Roy B. ELECTRE methods. In: Figueira J., Greco S., Ehrgott M., editors. Multiple Criteria Decision Analysis: State of the Art Surveys. Springer; 2005. chapter 4. [Google Scholar]
  • 27.Nowak M. Aspiration level approach in stochastic MCDM problems. European Journal of Operational Research. 2007;177:1626–1640. [Google Scholar]
  • 28.Linstone H., Turloff M. The Delphi method: techniques and applications. Addison-Wesley; London, UK: 1975. [Google Scholar]
  • 29.Clemen R.T., Winkler R.L. Combing probability distribution from experts in risk analysis. Risk Analysis. 1999;19(2):187–203. [Google Scholar]
  • 30.Peng Y., Kou G., Wang G.X., Shi Y. FAMCDM: A fusion approach of MCDM methods to rank multiclass classification algorithms. Omega. 2011;39:677–689. [Google Scholar]
  • 31.Kou G., Lu Y.Q., Peng Y., Shi Y. Evaluation of classification algorithms using MCDM and rank correlation. International Journal of Information Technology & Decision Making. 2012;11(1):197–225. [Google Scholar]

Articles from Computers & Operations Research are provided here courtesy of Elsevier

RESOURCES