T2-A.4 L’Orange Seigo S, Wallquist L, Dohle S, Siegrist M; slorange@ethz.chETH ZurichTHE POTENTIALLY ALARMING EFFECT OF COMMUNICATINGCCS MONITORINGAn online experiment (N = 200) was conducted to investigate the influenceof in<strong>for</strong>mation about monitoring measures at CO2 storage sites on laypeople’s perceptionsof Carbon Capture and Storage (CCS). One experimental group receivedonly a basic introductory text, while the other group received additional in<strong>for</strong>mationabout CO2 monitoring. Men in the monitoring condition exhibited significantly loweracceptance, significantly higher levels of negative affect, and marginally higher riskperception of CCS; no significant effects were observed in the female subsample.We conclude that in<strong>for</strong>mation about monitoring activities does not exert a reassuringeffect and may even be alarming when actively communicated. The gender differencemay be explained by a difference in the salience of mental concepts between men andwomen regarding CCS. Implications <strong>for</strong> communication about CCS and <strong>for</strong> futureresearch are discussed.T2-C.2 Lam JL, Fox MA, Burke TA; juleenlam@gmail.comJohns Hopkins University, Bloomberg School of Public HealthDEVELOPING A BAYESIAN APPROACH TO DOSE RESPONSE AS-SESSMENT: AN APPLICATION TO TRIHALOMETHANES IN DRINK-ING WATERPervasive uncertainty is a dominant analytical difficulty that continues to hinderthe EPA’s risk assessment process <strong>for</strong> setting standards <strong>for</strong> environmental contaminants,particularly within the dose-response step. Currently, the EPA handles thisby applying deterministic factors referred to as safety or uncertainty factors. Thisapproach has long been criticized as arbitrary, obscuring the true uncertainty, andlimiting the ability of policy-makers to make adequately in<strong>for</strong>med risk managementdecisions. We propose a hierarchical Bayesian model approach to synthesize evidencefrom toxicological and epidemiological studies, allowing <strong>for</strong> explicit statement of uncertaintyassumptions in the prior distributions, and pre-processing data using BayesianModel Averaging (BMA) to account <strong>for</strong> model uncertainty. We apply this modelto a case study of chloro<strong>for</strong>m, a disinfection byproduct, in drinking water. We usethe same data set considered by the EPA when setting their regulatory standards<strong>for</strong> chloro<strong>for</strong>m, exploring four different health outcomes that were either cancer orconsidered pre-cursors to cancer. <strong>Final</strong> model estimates demonstrated that incorporatingmore scientific in<strong>for</strong>mation into the priors had minimal impacts on mean estimates,but reduced the uncertainty surrounding the final estimates. Benchmark dose(BMD) and lower-bound benchmark (BMDL) dose estimates from the model weremostly lower than those estimated by the EPA, indicating that not considering thefull body of scientific evidence fails to capture the true uncertainty surrounding the132final estimate. As a result, Maximum Contaminant Level Goal (MCLG) estimates usingthe Bayesian model were consistently lower than EPA estimates, and in particularwere lower than the MCLG standard <strong>for</strong> chloro<strong>for</strong>m currently in place. This Bayesianmodel provide an alternative approach to incorporating and quantifying varioussources of uncertainty in the dose-response step, and may be applicable in otheraspects of risk assessment.M3-H.2 Langbehn W; bob.ross@dhs.govHomeland Security Institute/ANSERASSESSMENT OF COMPLEX ADAPTIVE SYSTEM THEORY FORHOMELAND SECURITY RISK MANAGEMENTThis presentation will provide the results of a preliminary examination of thestate of the art and knowledge in Complex Adaptive System (CAS) theory, risk analysisand risk management strategies. This study was driven by the dual beliefs that mostof the problems falling within homeland security arise within CASs and that many ofthe most widely used risk analytic methodologies are either inadequate <strong>for</strong> use withCASs or are being misapplied therein. <strong>Risk</strong> assessment leading to risk managementas a means <strong>for</strong> in<strong>for</strong>ming decisions is central to homeland security planning, and policymaking.Prevailing homeland security risk problem designs and analytical methodsinadequately address important complexities that affect risk assessments and there<strong>for</strong>erisk management. Addressing threats to our security requires considering thecomplex interaction between the homeland security enterprise actors and the bodyof threats. For example, terrorism risk assessments require an estimation of behaviors<strong>for</strong> both sides over time and consideration of their opposing capabilities. Analyzingthese complex dynamic interactions, many of which are not well understood, requiressimplification. Un<strong>for</strong>tunately, too much simplification produces results which may beuseless, or even worse, badly misleading. Complex Adaptive System concepts - theirtheoretic underpinnings and potential applications — may present opportunities <strong>for</strong>improving the quality of homeland security risk management. Accordingly, the purposeof this task is to research the current “state of the art” with respect to both thetheory and application of CAS concepts to terrorist-driven risk assessments and providean evaluation of its potential utility as a tool <strong>for</strong> enhancing homeland security riskmanagement. This paper and presentation are intended to alert the academic researchcommunity to the issue, to emphasize DHS interest in the topic and hopefully to spurfurther exploratory and developmental work in applying CAS theory and practice toimprove DHS risk management.
T3-D.4 LaRocca S, Guikema SD, Cole J, Sanderson E; larocca@jhu.eduJohns Hopkins UniversityBROADENING THE DISCOURSE ON INFRASTRUCTURE INTER-DEPENDENCE BY MODELING THE ‘ECOLOGY’ OF INFRASTRUC-TURE SYSTEMSInterdependencies among infrastructure systems arise <strong>for</strong> many reasons, includinggeographic proximity inducing common cause failures, direct dependence <strong>for</strong>physical flows of in<strong>for</strong>mation, and common maintenance and repair actions. However,existing modeling of the risk and reliability of interdependent infrastructuregenerally deals with a limited subset of these sources of dependence, often focusingonly on physical flows and geographic proximity. In this paper we show how a modelingconstruct recently proposed <strong>for</strong> ecological modeling can be used to give a broaderpicture of dependencies between infrastructure systems and system elements. Thisapproach is based on Muir webs, a modeling approach first proposed <strong>for</strong> modelingcomplex interdependencies in a pre-European ecological-human community in theU.S. by Sanderson 2009. Muir webs generalize from traditional predator-prey relationshipsto consider broader interactions such as dependencies on biotic but notdirectly consumed factors (e.g., shade <strong>for</strong> certain species of trees). They also includeinterdependencies due to abiotic factors (e.g., soil types and climate) and human ‘management’of the environment. These factors are considered through a dependencynetwork describing (1) what factors a given organism depends on and (2) what otherorganisms and factors depend on a given organism per<strong>for</strong>ming its role in the environment.In this paper we show how a Muir web can be used to model interdependentinfrastructure system reliability. Here, each ‘organism’ in the infrastructure Muir webis either a component of the system (e.g., a pump or valve in a water distributionsystem) or is a factor needed by some element(s) of the system <strong>for</strong> it to per<strong>for</strong>m itsintended role (e.g., <strong>for</strong> a water pump: stable soil, a water supply, and proper maintenance).We use this expanded representation of the dependencies and interdependenciesand demonstrate how to estimate system reliability through a simulation-basedapproach.M3-H.3 Lathrop JF, Post JM; jlathrop@innovativedecisions.comInnovative Decisions, Inc. and Political Psychology <strong>Program</strong>, Elliot School of International Affairs,George Washington UniversityTHE MODELER MEETS THE EXPERT ON TERRORIST DECISIONMAKING: RISK MANAGEMENT BASED ON TWO CULTURESThis paper will be delivered as a dialog between a “Modeler” and an expert,an “SME” on terrorist decision making. Terrorism risk management offers uniquechallenges to risk management Modelers and terrorism SMEs. Those challenges call<strong>for</strong> a new paradigm in analysis. You can’t address the problem by the modeler buildingthe model then going to the SME to populate it. The SMEs know more aboutthe necessary structures of the models than the Modelers do. Be<strong>for</strong>e the Modelerstarts building his model, he should elicit the architecture from the SME, starting ata narrative level, build his model upon that architecture, then populate it with SMEjudgments. This risk management problem needs the in<strong>for</strong>mation collection and aggregationstructure of PRA, but there needs to be an analytic strategy surroundingPRA to make full use of the in<strong>for</strong>mation from the SMEs to advise Blue risk management.The Modeler and the SME come from two different cultures, but they have towork together: The SME needs the Modeler to trans<strong>for</strong>m his knowledge into <strong>for</strong>msuseful <strong>for</strong> risk management advice; The Modeler needs the SME first to provide himhis model architecture, then to provide the data with which to populate the model.Four fundamental considerations: 1.) Don’t Fight the Last War: as if Red behavioris predictable by a simple equation, as in the Cold War, and don’t key on currentlyknown Reds (e.g. al Qaeda, McVeigh) when the bulk of the threat is future Reds. 2.)Don’t Play the Wrong Game, examples: don’t play the game at the defend-each-targetlevel if Red is playing at a higher level, and don’t play as if Red maximizes fatalities ifRed is maximizing terror. 3.) Avoid Mirror Imaging: assuming Reds behave/decide ina linear, rational, “Modeler’s” manner. 4.) Maintain Epistemological Modesty: Avoidany false precision of a model result, which could e.g. over-focus on defending highscoringcities. This presentation will end with suggested strategies <strong>for</strong> addressing thechallenges presented.M4-E.3 Lawrence R, Brown SM; Susan_Brown@McCormick.comMcCormick & Company IncIDENTIFICATION, MONITORING AND MANAGEMENT OF RISKSIN THE SPICE INDUSTRYThe American Spice Trade Association published in the spring of 2011 a guidancedocument aimed at reducing the risk <strong>for</strong> contamination of spices with Salmonellaand other pathogens. The guidance contains five key recommendations. 1)Minimize risk <strong>for</strong> introduction of filth throughout the supply chain 2) Prevent environmentalcontamination, cross-contamination, and post-processing contaminationduring processing and storage 3) Use validated microbial reduction techniques 4)Per<strong>for</strong>m post-treatment testing to verify a safe product 5) Test to verify a clean andwholesome manufacturing environment The recommendations where based on thebest practices from the industry. Hear how one firm, McCormick & Company, hasbeen applying these as part of their on-going commitment to food safety. McCormickhas been in the business of sourcing ingredients globally since 1889. Few companieshave their know-how and experience in sourcing pure, wholesome and safefood products from around the world. Join McCormick as they share a case study ofthe company’s experiences and strategies <strong>for</strong> developing programs that meet the importchallenges of today. Learn how it successfully manages the sourcing of materialfrom China, India, Indonesia and other developing nations that have historically beenchallenged to meet the standards of good agricultural and manufacturing practices.133
- Page 4 and 5:
Ballroom C1Monday10:30 AM-NoonM2-A
- Page 9 and 10:
US Environmental Protection Agency
- Page 11 and 12:
Workshops - Sunday, December 4Full
- Page 13 and 14:
WK9: Eliciting Judgments to Inform
- Page 15 and 16:
These freely available tools apply
- Page 17 and 18:
Plenary SessionsAll Plenary Session
- Page 19 and 20:
10:30 AM-NoonRoom 8/9M2-F Panel Dis
- Page 21 and 22:
1:30-3:00 PMRoom 8/9M3-F Symposium:
- Page 23 and 24:
4:50 pm M4-E.5Modeling of landscape
- Page 25 and 26:
P.35 Health risk assessment of meta
- Page 27 and 28:
Works-In-ProgressP.99 Assessing the
- Page 29 and 30:
10:30 AM-NoonRoom 8/9T2-F Error in
- Page 31 and 32:
1:30-3:00 PMRoom 8/9T3-F AppliedMet
- Page 34 and 35:
8:30-10:00 AMBallroom C1W1-A Sympos
- Page 36 and 37:
10:30 AM-NoonBallroom C1W2-A Commun
- Page 38:
1:30-3:00 PMBallroom C1W3-A Communi
- Page 41 and 42:
3:30-4:30 PMRoom 8/9W4-F Environmen
- Page 43 and 44:
oth recent advances, and ongoing ch
- Page 45 and 46:
M3-H Symposium: Analyzing and Manag
- Page 47 and 48:
Part 2, we consider the use of expe
- Page 49 and 50:
T4-E Symposium: Food Safety Risk Pr
- Page 51 and 52:
While integral to guiding the devel
- Page 53 and 54:
have contributed to past difficulti
- Page 55 and 56:
M2-C.1 Abraham IM, Henry S; abraham
- Page 58 and 59:
serious accident of the Tokyo Elect
- Page 60 and 61:
een found that independence assumpt
- Page 62 and 63:
W4-I.1 Beach RH, McCarl BA, Ohrel S
- Page 64 and 65:
M4-A.1 Berube DM; dmberube@ncsu.edu
- Page 66 and 67:
W4-A.1 Boerner FU, Jardine C, Dried
- Page 69 and 70:
M2-G.1 Brink SA, Davidson RA; rdavi
- Page 71 and 72:
M4-H.5 Buede DM, Ezell BC, Guikema
- Page 73 and 74:
same scientists’ environmental he
- Page 75 and 76:
periods of time. Successful adaptat
- Page 77 and 78:
P.123 Charnley G, Melnikov F, Beck
- Page 79 and 80:
derived from mouse and rat testes t
- Page 81 and 82:
esources under any circumstance in
- Page 83 and 84: W4-B.3 Convertino M, Collier ZA, Va
- Page 85 and 86: addition, over 10% thought that eve
- Page 87 and 88: Reference Dose (RfD). The average e
- Page 89 and 90: W2-H.2 Demuth JL, Morss RE, Morrow
- Page 91 and 92: T4-H.4 Dingus CA, McMillan NJ, Born
- Page 93 and 94: methods research priorities and pot
- Page 95 and 96: W3-A.2 Eggers SL, Thorne SL, Sousa
- Page 97 and 98: tions) were < 1 for sub-populations
- Page 99 and 100: sociated with model error. Second,
- Page 101 and 102: inter-donation interval to mitigate
- Page 103 and 104: Fukushima nuclear accident coverage
- Page 105 and 106: for growth inhibitor use and retail
- Page 107 and 108: W1-C.1 Goble R, Hattis D; rgoble@cl
- Page 109 and 110: stakeholders. The utility of this m
- Page 111 and 112: T2-E.4 Guidotti TL; tee.guidotti@gm
- Page 113 and 114: M4-C.2 Haines DA, Murray JL, Donald
- Page 115 and 116: providing normative information of
- Page 117 and 118: then allow both systems to operate
- Page 119 and 120: tious disease outbreaks. Several cl
- Page 121 and 122: P.122 Hosseinali Mirza V, de Marcel
- Page 123 and 124: W2-B.1 Isukapalli SS, Brinkerhoff C
- Page 125 and 126: M3-G.3 Jardine CG, Driedger SM, Fur
- Page 127 and 128: P.88 Johnson BB, Cuite C, Hallman W
- Page 129 and 130: metrics to provide risk management
- Page 131 and 132: M4-C.1 Koch HM, Angerer J; koch@ipa
- Page 133: certainty factors) and comparative
- Page 137 and 138: P.71 Lemus-Martinez C, Lemyre L, Pi
- Page 139 and 140: of excretion, and the increased che
- Page 141 and 142: M2-D.4 MacKenzie CA, Barker K; cmac
- Page 143 and 144: isk appetite and optimal risk mitig
- Page 145 and 146: ameters, and enabled a more robust
- Page 147 and 148: over the nature and format of infor
- Page 149 and 150: Analysis (PRA). Existing parametric
- Page 151 and 152: explosion of a bomb in a building,
- Page 153 and 154: T3-G.3 Nascarella MA; mnascarella@g
- Page 155 and 156: corresponding slowdown in container
- Page 157 and 158: ing the scope and usage of the cybe
- Page 159 and 160: dose for a variety of exposure scen
- Page 161 and 162: “nanofibers”) is relatively und
- Page 163 and 164: ment (CEA), which provides both a f
- Page 165 and 166: T3-D.2 Resurreccion JZ, Santos JR;
- Page 167 and 168: shore wind turbines have yet been b
- Page 169 and 170: T2-D.3 Rypinski AD, Cantral R; Arth
- Page 171 and 172: time and temperature, determining t
- Page 173 and 174: esponse to requests from the EC, th
- Page 175 and 176: ers and inspectors. Analysis examin
- Page 177 and 178: smoked salmon, and associated expos
- Page 179 and 180: and 95th percentiles). Increasing t
- Page 181 and 182: esponse relationship for B. anthrac
- Page 183 and 184: variation on Day 0. Results showed
- Page 185 and 186:
sidered. The most significant resul
- Page 187 and 188:
lived in a apartment (not including
- Page 189 and 190:
W3-C.4 von Stackelberg KE; kvon@eri
- Page 191 and 192:
P.12 Waller RR, Dinis MF; rw@protec
- Page 193 and 194:
W2-B.6 Wang D, Collier Z, Mitchell-
- Page 195 and 196:
iomonitoring “equivalent” level
- Page 197 and 198:
T4-H.2 Winkel D, Good K, VonNiederh
- Page 199 and 200:
mation insufficiency, risk percepti
- Page 201 and 202:
choices. This work examines these s
- Page 203 and 204:
sults and possible intended or unin
- Page 205 and 206:
AAbadin HG.................... 36,
- Page 207 and 208:
Gray GM............................
- Page 209 and 210:
Peters E...........................
- Page 211 and 212:
SECOND FLOOR Floor MapConvention Ce