TECHNICAL PAPERS
Dec 1, 2006

Methodology for Ranking the Elements of Water-Supply Networks

Publication: Journal of Infrastructure Systems
Volume 12, Issue 4

Abstract

This paper presents a scenario-based methodology for the ranking of the elements of a water-supply network according to their value to the network’s owner. The failures of the elements due to random causes and to malevolent acts are considered. The methodology is based on multiattribute utility theory and a graph theory-based network analysis algorithm. This methodology extends approaches proposed in the literature by taking into consideration the capacity of the infrastructure’s elements and their mean time to repair. The water-supply infrastructure of a midsize city serves as a case study. We model the infrastructure system as a network and create scenarios to evaluate the consequences of the failure of each of its elements. For each scenario, we evaluate the supply level to the various users considering the capacity of their connection to the available resources. We then evaluate the disutility of this supply level to the decision makers using multiattribute utility theory. The accident scenarios are ranked according to their expected disutility. The vulnerabilities to malevolent acts are ranked using a subjective combination of the disutilities and the scenario susceptibility to attack. The results are provided to the decision makers for evaluation and risk management. The limitations of the proposed methodology and its applicability to other infrastructures are discussed.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

The writers thank the decision makers of the water-supply authority in the city that served as a case study for the development of this approach for their willingness to prepare and provide the data required for the analysis, and for the time they spent sharing their experience and insights during the development and evaluation of this approach.

References

Albert, R., Albert, I., and Nakarado, G. L. (2004). “Structural vulnerability of the North American power grid.” Phys. Rev. E, 69(2), 025103(R).
Amin, M. (2002). “Toward secure and resilient interdependent infrastructures.” J. Infrastruct. Syst., 8(3), 67–75.
Apostolakis, G. E. (2004). “How useful is quantitative risk assessment?” Risk Anal., 24(3), 515–520.
Apostolakis, G. E., and Lemon, D. M. (2005). “A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism.” Risk Anal., 25(2), 361–376.
Biringer, B., and Danneels, J. J. (2000). “Risk assessment methodology for protecting our critical physical infrastructures.” Proc., 10th Risk-Based Decision Making in Water Resources, American Society of Civil Engineers, Santa Barbara, Calif.
CARE-W. (2004). CARE-W Final Rep. to the European Commission, Trondheim ⟨http://care-w.unife.it/⟩.
Clemen, R. T. (1996). Making hard decisions: An introduction to decision analysis, Duxbury, Belmont, Calif.
Dijkstra, W. (1959). “A note on two problems in connexion [sic] with graphs.” Numer. Math., 1, 269–271.
ESRI. (2005). ArcInfo 9.1, Redlands, Calif. ⟨www.esri.com⟩.
Ezell, B. C., Farr, J. V., and Wiese, I. (2000). “Infrastructure risk analysis model.” J. Infrastruct. Syst., 6(3), 114–117.
Garrick, B. J., et al. (2004). “Confronting the risks of terrorism: Making the right decisions.” Reliab. Eng. Syst. Saf., 86(2), 129–176.
Grigg, N. S. (2003). “Water utility security: Multiple hazards and multiple barriers.” J. Infrastruct. Syst., 9(2), 81–88.
Haimes, Y. Y., and Horowitz, B. M. (2004). “Modeling interdependent infrastructures for sustainable counterterrorism.” J. Infrastruct. Syst., 10(2), 33–42.
Kaplan, S., and Garrick, B. J. (1981). “On the quantitative definition of risk.” Risk Anal., 1(1), 11–27.
Pagani, L., Smith, C., and Apostolakis, G. E. (2004). “Making decisions for incident management in nuclear power plants using probabilistic safety assessment.” Risk Decision and Policy, 9, 271–295.
President’s Commission on Critical Infrastructure Protection (PCCIP). (1997). The Rep. of the President’s Commission on Critical Infrastructure Protection, ⟨http://permanent.access.gpo.gov/lps15260/PCCIP_Report.pdf⟩.
Saaty, T. L. (2000). Fundamentals of decision-making and priority theory, RWS Publications, Pittsburgh.
Siu, N. O., and Kelly, D. L. (1998). “Bayesian parameter estimation in probabilistic risk assessment.” Reliab. Eng. Syst. Saf., 62(1–2), 89–116.
Weil, R., and Apostolakis, G. E. (2001). “A methodology for the prioritization of operating experience in nuclear power plants.” Reliab. Eng. Syst. Saf., 74(1), 23–42.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 12Issue 4December 2006
Pages: 230 - 242

History

Received: Jul 20, 2005
Accepted: Feb 21, 2006
Published online: Dec 1, 2006
Published in print: Dec 2006

Permissions

Request permissions for this article.

Authors

Affiliations

David Michaud [email protected]
SM Engineering and Management, Engineering Systems Division, Massachusetts Institute of Technology, Cambridge, MA 02139-4307. E-mail: [email protected]
George E. Apostolakis [email protected]
Professor, Engineering Systems Division and Dept. of Nuclear Science and Engineering, Room 24-221, Massachusetts Institute of Technology, Cambridge, MA 02139-4307 (corresponding author). E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share