W1-F.1 Hamilton M, Lambert J, Linkov I; mcg7w@virginia.eduUniversity of VirginiaIDENTIFICATION, PRIORITIZATION, AND MANAGEMENT OFRISKS FOR ENERGY SYSTEMS ACQUISITION AND PORTFOLIO OFASSETSThere is an urgent need <strong>for</strong> improving reliability, efficiency, conservation, andenvironmental protection <strong>for</strong> energy systems at a range of industrial and militaryinstallations. Stakeholders of energy investments are faced with a complex asset managementchallenge. Using traditional finance theory such as a discounted cash flow toanalyze capital investments in energy does not properly account <strong>for</strong> intangible benefitsthat are difficult to monetize such as environmental benefits, risk reduction, andmany others. Furthermore, while new technologies offer themselves continually, theinvestment rationale is complicated by deep uncertainties including technology, environment,regulatory, socio-demographic, political, economic, and many others thatmay effect the lifecycle valuation and resource requirements associated with variousinvestment alternatives. This motivates the need <strong>for</strong> an evidence-based, systematicprocess to identify and assess the implications of future emergent conditions andstakeholder perspectives. This research focuses on identification, ranking, and managementof risks to energy assets through a multi-layer approach. First, a multiplecriteria processor of emergent conditions and scenarios is used to identify whichcombinations of emergent conditions are the most pivotal to the valuation of energyinvestments at installations. The multiple criteria are generated from both installationmissions and energy conservation and sustainability goals. Next, lifecycle cost analysisis per<strong>for</strong>med <strong>for</strong> key scenarios identified in the previous step to determine whichcombinations of emergent conditions have the largest impacts across the investmentlifecycle. The research describes lessons <strong>for</strong> energy managers, systems analysts, andrisk managers who are engaged with comparison and selection of energy technologies.A case study is presented concerning several options <strong>for</strong> investment at a militaryinstallation with multiple criteria.M4-I.2 Hammitt JK, Zhang Y; jkh@harvard.eduHarvard UniversityCOMBINING EXPERTS’ JUDGMENTS: COMPARISON OF ALGO-RITHMIC METHODSExpert judgment (or expert elicitation) is a <strong>for</strong>mal process <strong>for</strong> eliciting judgmentsfrom subject-matter experts about the value of a quantity, such as an input toa risk-assessment model. Experts provide judgments in the <strong>for</strong>m of subjective probabilitydistributions <strong>for</strong> the quantity of interest. Judgments are typically solicited fromseveral experts, raising the question how best to combine the in<strong>for</strong>mation from multipleexperts. A number of algorithmic approaches have been proposed, of which theone most commonly employed is the equal-weight combination, a simple unweighted112average of the experts’ distributions. We evaluate the properties of five combinationmethods (equal-weight, best-expert, per<strong>for</strong>mance, frequentist, and copula) using simulatedexpert-judgment data <strong>for</strong> which we know the relationships among the experts’judgments and the true values. We examine cases in which experts are of equal orunequal quality and their judgments are independent, positively, or negatively dependent.Overall, the copula, frequentist, and best-expert approaches per<strong>for</strong>m better andthe equal-weight combination worse than alternatives.M3-H.4 Hart CA; chris.hart@ntsb.govNational Transportation Safety BoardAVIATION RISK MANAGEMENT: THE IMPORTANCE OF GOVERN-MENT/INDUSTRY COLLABORATIONIn the mid-1990s commercial aviation, already an extremely high reliability system,faced the possibility of unacceptably high accident and fatality rates due to projectedgrowth in the demand <strong>for</strong> commercial air transport. The old risk managementparadigm, of regulators identifying a problem based on historical results and thenimposing a solution on the regulated industry, was recognized as being inadequate tomeet projected risk management needs. The Federal Aviation Administration had todevelop a new approach to managing risk in an increasingly complex and dynamicsystem-of-systems environment. The new approach features collaboration, proactiveidentification of potential problems involving those with the best in<strong>for</strong>mation - pilots,mechanics, other airline employees - and ways of adopting necessary fixes that bypassedthe delays associated with the old regulation-heavy approach. In the decadefollowing the adoption of the new approach (1997-2007), commercial aviation saw a65% decrease in the fatal aviation accident rate, fueled largely by “system think” andpro-active safety in<strong>for</strong>mation programs. This approach has potential applicabilityto other endeavors involving large system-of-systems problems, such as offshore oildrilling and aspects of homeland security.P.81 Hart PS, Yapa S; hart@american.eduAmerican UniversityAVOIDING BOOMERANG EFFECTS WITH MORAL APPEALSIn recent years, a number studies have examined how moral appeals may beused to increase donations to those in need. Several of these studies, however, havefound that the use of a moral appeal can boomerang and lead to a reduction in donations.In a series of previous studies, participants were shown a moral argumentdeveloped by philosopher Peter Singer in which they were told that just as they wouldrisk ruining their clothes to help save a drowning child directly in front of them, theyare equally obligated to help children who are in need abroad. Participants exposedto this argument contributed significantly less in response to a subsequent donationappeal than participants who were not given a moral argument. We build from thisprevious research in the present study by offering the following change - instead of
providing normative in<strong>for</strong>mation of how individuals ought to respond, participantswere allowed to generate their own moral conclusions. 60 undergraduate students at auniversity in the Northeastern United States were recruited to participate. Participantswere randomly assigned to either a control group or a stimulus condition. In the controlgroup, participants were given a solicitation <strong>for</strong> a real donation to an African childdesperately in need of aid. In the stimulus condition, participants were first asked ifthey thought they had an obligation to rescue a drowning child in front of them evenif it would ruin their clothes; they were then given the same appeal <strong>for</strong> the Africanchild as the control group. Participants in the stimulus condition gave significantlymore money to help the African child in need than participants in the control group.The contrast between this result and that of previous research is discussed in termsof reactance and the potential negative consequences of providing normative conclusions<strong>for</strong> moral arguments instead of allowing message recipients to freely generatetheir own moral responses.T3-H.4 Hartnett E, Schaffner D, Lysak K, Hedberg C, Paoli G; ehartnett@<strong>Risk</strong>-SciencesInt.com<strong>Risk</strong> Sciences International, Rutgers, Clarity Healthcare, University of MinnesotaMODELING HEALTH CARE SURGE CAPACITY REQUIREMENTSDURING AN ATTACK ON THE FOOD SUPPLYIntentional attacks on the food supply can potentially have catastrophic impactson the health of the population. In localized events the ability to expand health careto sudden, and potentially prolonged, demand is of great concern. We have developeda simulation-based tool that enables the exploration of current surge capacitydemands under a variety of <strong>for</strong>ms of attack on the food supply. It considers bothtreatment oriented capacity (such as access to treatment facilities, equipment and medicinals)and laboratory capacity (in terms of testing and identification of the agent).The tool is designed such that varying magnitudes of incident can be explored <strong>for</strong>a range of potential threat agents with differing health outcomes (<strong>for</strong> example thenumber of people affected, the severity of health outcomes, and their geographicaldensity). The underlying discrete-event simulation considers both the spatial andtemporal aspects of the population affected by an attack and simulates the resultingdemand on the health care system. Use of the tool allows the exploration of the impactof different responses to an incident, <strong>for</strong> example different protocols addressingthe emergency standard of care, or response strategies such as the implementation oftemporary or mobile care facilities. Such explorations provide insights into the abilityof the health care system to provide the required level of patient care <strong>for</strong> intentionalattacks. This in turn provides in<strong>for</strong>mation and data that can be used in the developmentof emergency preparedness plans aimed at minimizing the impact of an attackon the food supply. This presentation will summarise the structure and mathematicalarchitecture of the tool and illustrate the use of the tool through a scenario involvingbotulinum toxin.T2-J.1 Hartz RT, Coles JB, Keisler JM, Zhuang J, Linkov I; rth13@pitt.eduUniversity of Pittsburgh, University at Buffalo, University of Massachusetts, University at Buffalo,US Army Engineer Research and Development CenterTHE VALUE OF KNOWLEDGE-BASED DECISIONS: IMPROVINGTERRORISM DEFENSE BY INTEGRATING MULTI-CRITERIA DECI-SION ANALYSIS, GAME THEORY, AND THE VALUE OF INFORMA-TIONDecision-making is a vital component of effective homeland security policymaking. The efficiency of current counterterrorism techniques has been widely questioned.New approaches to risk assessment are needed to combat the evolving threatof terrorism. In this work, we expand on previous contributions of game theoryin counterterrorism. We propose a two-player attacker-defender game, introducingthree new elements to the standard problem. Using Multi-Criteria Decision <strong>Analysis</strong>(MCDA) techniques, we provide a different perspective on strategy development. Byintroducing a framework that allows <strong>for</strong> a consistent approach to expert elicitation, weattempt to maximize current data utilization. In addition, we added a feedback loop<strong>for</strong> investment of resources towards improving scientific knowledge using the Valueof In<strong>for</strong>mation (VoI) framework. This addition makes it possible <strong>for</strong> the defendingactor to advance the current set of knowledge relating to tactics and countermeasureswhile mounting an active defense. <strong>Final</strong>ly, once the defender’s resources are investedin defense and knowledge advancement, an attacker with perfect in<strong>for</strong>mation developsand attempts an attack, predicted by maximizing payoff in the game. Game theoryhas been used to effectively model and predict the behavior of entities interacting,with applications in fields as broad as economic policy, military planning, bargainingstructures, and even business planning optimization. By expanding MCDA to incorporategame theory in counterterrorism policy selection, we believe that our approachwill expand a defender’s capability <strong>for</strong> analysis of unique and robust terrorist actors byadapting these powerful tools in a new integrated application. In this presentation weattempt to show that prioritization of defense policy techniques, using a combinationof MCDA and VoI, could have a profound impact on the efficiency of the decisionmakingprocess.T4-C.1 Hattis D, Lynch M, Greco S, Goble R; dhattis@aol.comClark UniversityTHE “STRAW MAN” SYSTEM FOR REPLACING UNCERTAINTY FAC-TORS WITH EMPIRICAL DISTRIBUTIONS FOR TRADITIONAL SYS-TEMIC TOXICANTS’ EXAMPLES AND USE FOR VALUE OF INFOR-MATION ANALYSIS OF IN VITRO MEASUREMENTSSome key recommendations of the NRC “Science and Decisions” report include(1) specifiying criteria <strong>for</strong> RfDs in terms of a “<strong>Risk</strong> Specific Dose” (no morethan X risk of harm with Z confidence) and (2) replacement of the arbitrary single-113
- Page 4 and 5:
Ballroom C1Monday10:30 AM-NoonM2-A
- Page 9 and 10:
US Environmental Protection Agency
- Page 11 and 12:
Workshops - Sunday, December 4Full
- Page 13 and 14:
WK9: Eliciting Judgments to Inform
- Page 15 and 16:
These freely available tools apply
- Page 17 and 18:
Plenary SessionsAll Plenary Session
- Page 19 and 20:
10:30 AM-NoonRoom 8/9M2-F Panel Dis
- Page 21 and 22:
1:30-3:00 PMRoom 8/9M3-F Symposium:
- Page 23 and 24:
4:50 pm M4-E.5Modeling of landscape
- Page 25 and 26:
P.35 Health risk assessment of meta
- Page 27 and 28:
Works-In-ProgressP.99 Assessing the
- Page 29 and 30:
10:30 AM-NoonRoom 8/9T2-F Error in
- Page 31 and 32:
1:30-3:00 PMRoom 8/9T3-F AppliedMet
- Page 34 and 35:
8:30-10:00 AMBallroom C1W1-A Sympos
- Page 36 and 37:
10:30 AM-NoonBallroom C1W2-A Commun
- Page 38:
1:30-3:00 PMBallroom C1W3-A Communi
- Page 41 and 42:
3:30-4:30 PMRoom 8/9W4-F Environmen
- Page 43 and 44:
oth recent advances, and ongoing ch
- Page 45 and 46:
M3-H Symposium: Analyzing and Manag
- Page 47 and 48:
Part 2, we consider the use of expe
- Page 49 and 50:
T4-E Symposium: Food Safety Risk Pr
- Page 51 and 52:
While integral to guiding the devel
- Page 53 and 54:
have contributed to past difficulti
- Page 55 and 56:
M2-C.1 Abraham IM, Henry S; abraham
- Page 58 and 59:
serious accident of the Tokyo Elect
- Page 60 and 61:
een found that independence assumpt
- Page 62 and 63:
W4-I.1 Beach RH, McCarl BA, Ohrel S
- Page 64 and 65: M4-A.1 Berube DM; dmberube@ncsu.edu
- Page 66 and 67: W4-A.1 Boerner FU, Jardine C, Dried
- Page 69 and 70: M2-G.1 Brink SA, Davidson RA; rdavi
- Page 71 and 72: M4-H.5 Buede DM, Ezell BC, Guikema
- Page 73 and 74: same scientists’ environmental he
- Page 75 and 76: periods of time. Successful adaptat
- Page 77 and 78: P.123 Charnley G, Melnikov F, Beck
- Page 79 and 80: derived from mouse and rat testes t
- Page 81 and 82: esources under any circumstance in
- Page 83 and 84: W4-B.3 Convertino M, Collier ZA, Va
- Page 85 and 86: addition, over 10% thought that eve
- Page 87 and 88: Reference Dose (RfD). The average e
- Page 89 and 90: W2-H.2 Demuth JL, Morss RE, Morrow
- Page 91 and 92: T4-H.4 Dingus CA, McMillan NJ, Born
- Page 93 and 94: methods research priorities and pot
- Page 95 and 96: W3-A.2 Eggers SL, Thorne SL, Sousa
- Page 97 and 98: tions) were < 1 for sub-populations
- Page 99 and 100: sociated with model error. Second,
- Page 101 and 102: inter-donation interval to mitigate
- Page 103 and 104: Fukushima nuclear accident coverage
- Page 105 and 106: for growth inhibitor use and retail
- Page 107 and 108: W1-C.1 Goble R, Hattis D; rgoble@cl
- Page 109 and 110: stakeholders. The utility of this m
- Page 111 and 112: T2-E.4 Guidotti TL; tee.guidotti@gm
- Page 113: M4-C.2 Haines DA, Murray JL, Donald
- Page 117 and 118: then allow both systems to operate
- Page 119 and 120: tious disease outbreaks. Several cl
- Page 121 and 122: P.122 Hosseinali Mirza V, de Marcel
- Page 123 and 124: W2-B.1 Isukapalli SS, Brinkerhoff C
- Page 125 and 126: M3-G.3 Jardine CG, Driedger SM, Fur
- Page 127 and 128: P.88 Johnson BB, Cuite C, Hallman W
- Page 129 and 130: metrics to provide risk management
- Page 131 and 132: M4-C.1 Koch HM, Angerer J; koch@ipa
- Page 133 and 134: certainty factors) and comparative
- Page 135 and 136: T3-D.4 LaRocca S, Guikema SD, Cole
- Page 137 and 138: P.71 Lemus-Martinez C, Lemyre L, Pi
- Page 139 and 140: of excretion, and the increased che
- Page 141 and 142: M2-D.4 MacKenzie CA, Barker K; cmac
- Page 143 and 144: isk appetite and optimal risk mitig
- Page 145 and 146: ameters, and enabled a more robust
- Page 147 and 148: over the nature and format of infor
- Page 149 and 150: Analysis (PRA). Existing parametric
- Page 151 and 152: explosion of a bomb in a building,
- Page 153 and 154: T3-G.3 Nascarella MA; mnascarella@g
- Page 155 and 156: corresponding slowdown in container
- Page 157 and 158: ing the scope and usage of the cybe
- Page 159 and 160: dose for a variety of exposure scen
- Page 161 and 162: “nanofibers”) is relatively und
- Page 163 and 164: ment (CEA), which provides both a f
- Page 165 and 166:
T3-D.2 Resurreccion JZ, Santos JR;
- Page 167 and 168:
shore wind turbines have yet been b
- Page 169 and 170:
T2-D.3 Rypinski AD, Cantral R; Arth
- Page 171 and 172:
time and temperature, determining t
- Page 173 and 174:
esponse to requests from the EC, th
- Page 175 and 176:
ers and inspectors. Analysis examin
- Page 177 and 178:
smoked salmon, and associated expos
- Page 179 and 180:
and 95th percentiles). Increasing t
- Page 181 and 182:
esponse relationship for B. anthrac
- Page 183 and 184:
variation on Day 0. Results showed
- Page 185 and 186:
sidered. The most significant resul
- Page 187 and 188:
lived in a apartment (not including
- Page 189 and 190:
W3-C.4 von Stackelberg KE; kvon@eri
- Page 191 and 192:
P.12 Waller RR, Dinis MF; rw@protec
- Page 193 and 194:
W2-B.6 Wang D, Collier Z, Mitchell-
- Page 195 and 196:
iomonitoring “equivalent” level
- Page 197 and 198:
T4-H.2 Winkel D, Good K, VonNiederh
- Page 199 and 200:
mation insufficiency, risk percepti
- Page 201 and 202:
choices. This work examines these s
- Page 203 and 204:
sults and possible intended or unin
- Page 205 and 206:
AAbadin HG.................... 36,
- Page 207 and 208:
Gray GM............................
- Page 209 and 210:
Peters E...........................
- Page 211 and 212:
SECOND FLOOR Floor MapConvention Ce