Sunteți pe pagina 1din 4

ECAI 2015 - International Conference – 7th Edition

Electronics, Computers and Artificial Intelligence


25 June -27 June, 2015, Bucharest, ROMÂNIA

A quantitative risk analysis framework for


bow-tie models
Ionut Emil Iacob Alex Apostolou
Department of Mathematical Sciences Meercat Pty Ltd
Georgia Southern University Perth, Australia
USA alex@meercat.com.au
ieiacob@georgiasouthern.edu

Abstract – Risk management is a critical part of every Likelihood, Consequence Severity. A low risk
industrial activity. In recent years, due to the involves a very unlikely cause with a low severity
complexity, importance and potential impacts of consequence. A very likely cause with a high severity
industrial processes, risk analysis has taken advantage consequence would produce a high risk value.
of increasing computational availability to deliver tools Different cause likelihoods/consequence severities
at every level of the risk management spectrum. Bow-tie would produce intermediate risk values. During risk
models, so called because of their generalized shape, are analysis the high risk scenarios must be identified and
used at various levels in the risk analysis process, solutions to prevent such scenarios must be found.
fundamentally because their presentation aggregates
complex, real-world scenarios in consistent, reducible
and communicable ways. As a result, vendors have Cause 1 Consequence 1
sought to map additional capabilities onto the Bow-tie Critical
extending their applicability into qualitative, semi- Cause 2 Event
quantitative, and quantitative risk assessment Consequence 2
modalities. In this paper we present a generalized Cause 3
computational framework for risk analysis using Bow-
tie models that simultaneously perform all such
analytical modes. Figure 1. The bow-tie model overview

Bowties are powerful representations and they


Keywords: risk; bow-tie; risk analysis; quantitative
risk assessment
serve well both the qualitative [5] and (semi-)
quantitative [1,2,3] risk analysis. With the increased
pressure from regulators, companies and experts in
I. INTRODUCTION risk analysis are in need of tools to process larger and
Risk is an intensively studied subject which can be more complex models. Some popular tools are
summarized as the relationship between the likelihood Meercat RiskView [6] and BowTieXP [7].
of a major accident (critical event) and the severity of Implementing good tools for risk analysis is a
the damage the accident would produce. More challenge in its own. Satisfying all legislative
precisely, the standard ISO/TC 199 defines risk requirements and functional needs is often difficult.
analysis as a sequence of steps an expert must take to On top of these, generality, scalability, and
analyze dangerous events associated to an activity. extensibility of the model are desirable features of a
Initially introduced in Australian and European Union good tool. The requirements in the former category are
regulations for mining and offshore drilling the appanage of risk analysis experts. The burden of
companies, risk analysis has quickly gained popularity satisfying the requirements in the latter category,
in social [1] and occupational [2] analysis, hazardous however, is the duty of the tool designer.
materials handling [3], failures in water supply
networks [4], or medical safety risk analysis [5]. II. THE RISK ASSESSMENT PROCESS
The Bow-tie model for risk analysis was first The risk assessment process has as its first task the
mentioned in late 70s and the Shell Group was the first selection of a tool or model within which to perform
major company that integrated the model in its that activity. Tools must be fit for purpose are selected
business practice. The model is centered on a critical according to:
event (major accident) having the possible causes that
may produce the event on the left-hand-side and the • suitability to the type and complexity of the
probable consequences of the event on the right-hand- facility
side. A simplified representation of the model yields a • and the nature of the hazards present
bowtie-shaped diagram as in Figure 1. • assists in understanding and selecting the
risk control measures
In the model, the main attribute of a Cause is the
likelihood of initiating the Critical Event. The main • is adequate to differentiate between hazards
attribute of a Consequence is the severity of the on a risk basis (ie likelihood and
Consequence if the Critical Event occurs. Then the consequence)
risk is measured by means of the pair: Cause

978-1-4673-6647-2/15/$31.00 ©2015 IEEE


Y-44 Ionut Emil Iacob and Alex Apostolou

• is capable of managing the assessment of (consequences) of hazards. This activity if mainly


cumulative risk and the potential effect of based on direct observations of the process and/or
risk reduction measures on the risk collections of data related to previous events.
• is not overly complicated for the facility’s Figure 2 represents a typical bow-tie diagram,
needs which consists of the following elements:
• is consistent with the facility’s general
approach to safety. - Critical Event: the central node of the diagram
represents the manifestation of the risk event
• [Stolen from page 4 of the itself.
WS_11_Safety_Asessment document]
- Cause 1, 2, 3: the potential causes that may
produce the critical event. Causes are
Additionally, the more severe the consequences, quantitatively characterized by their likelihood
the detailed the risk assessment required, introducing (or, alternatively, by their frequencies) of
additional tiers of assessments. As a result, the data occurrence. We denote these likelihoods by
gathered and processed for one process may not be L11, L12, …, L32 respectively.
suitable for another process, with the relationships,
measures and methods in one process being - Prevent 1.1 – 3.2: the preventative measures
incompatible with another. Modelling introduces (barriers) for producing the critical event, for
additional challenges as models suffers inevitable each specific cause. These preventative
changes such as adding/removing causes and/or measures are characterized by their “reduction
consequences, adjustment of likelihoods and/or factor” (denoted by p11, p12, …, p32
severities, new elements for containing the effects of respectively), which are percentages of cause
causes and limit the damages of consequences, etc. likelihood reduction, for their respective
These changes raise questions about how the causes.
computation model can adjust in a flexible way as
- Effectiveness 1.1: a possible reduction of
both the structure, its purpose and the mechanism of
effectiveness for a preventative measure. In
it’s interaction also changes. In this paper we want to
the presence of such element, the preventative
demonstrate an approach that bridges the gap between
measure reduction factor is diminished by the
a very wide spectrum of risk assessment processes
reduction factor of the “effectiveness”
with a computation framework that is general,
element. If we denote the reduction factor of
scalable, and extensible. Our framework relies on the
the effectiveness element by e11, then the
standard XQuery language [8], which is a de-facto
effective reduction factor of Prevent 1.1
query language for searching tree data models.
element is in fact: e11*p11. From a
The rest of the paper is organized as follows. In mathematical perspective, the influence of an
Section II we introduce the bow-tie model for risk Effectiveness element can be directly
analysis. We explain the terminology and present a incorporated into the corresponding Prevent
case study scenario. In Section III we present a general element. From the risk analysis perspective,
computational framework for (semi-) quantitative risk however, it is important to represent these
assessment. We conclude and present future plans in elements distinctively.
Section IV.
- Mitigate 1.1 – 3.2: similar to what Prevent
element does for a Cause, the Mitigate
III. BOW-TIE MODEL FOR RISK ANALYSIS element reduces the severity of a consequence
Risk analysis and assessment is a complex process when the critical event occurs. These elements
performed by experts in the subject. It generally starts are quantitatively characterized by their
by identifying all potential hazards related to a certain reduction factor, denoted by m11, …, m32.
activity, causes that may produce the hazards, their - Effectiveness 3.1: similar to Effectiveness 1.1,
consequences, and means to prevent hazards as well as this element may reduce the effectiveness of
methods to efficiently limit the damages the Mitigate 3.1. We will denote the reduction
Fault Tree Event Tree

Cause 1 Prevent 1.1 Prevent 1.2 Mitigate 1.1 Mitigate 1.2 Conseq 1

Escalation
Factor 1.1 Mitigate 2.1 Mitigate 2.2 Conseq 2
Critical
Even
Cause 2 Prevent 2.1
Mitigate 3.1 Mitigate 3.2 Conseq 3

Cause 3 Prevent 3.1 Prevent 3.2 Effectiveness


3.1

Figure 2. Typical Bow-tie diagram


A quantitative risk analysis framework for bow-tie models Y-45

factor of this element by e31 and consequently automatically absorbed by a computational


the effective reduction factor of Mitigate 3.1 framework, allowing the risk analyst focus on model
is: e31*m31. and parameters of the model rather than performing
chain corrections of computational formulas.
- Conseq 1, 2, 3: the consequences of the
critical event occurrence. They are
characterized by their severities, denoted by IV. QUANTITATIVE RISK ASSESSMENT FOR BOW-TIE
S1, S2, and S3, respectively. MODELS

For the diagram in Figure 2 with the notations as In this section we briefly describe how the
described above, the effective likelihood EL1 of computation model illustrated in Figure 2 and
Cause 1 towards producing the Critical Event is: described by equations similar to (1) and (2) can be
implemented in practice in a flexible and extensible
way.
L1*e11*p11*p12 (1)
A. Using XPath/XQuery for path-navigation of trees
Similarly, the effective severity ES1 of XQuery [8] is the de facto query language for
Consequence 1 is: searching Document Object Model (DOM) trees [11]
built from XML data. Since DOM trees can be
S1*m11*m12 (2) virtually built out of any hierarchical data, XQuery can
be used for searching trees, in general. At the core of
Based on effective likelihoods and severities, the the language there is a tree-navigation language
risk is evaluated according to specific risk-analysis (XPath), which traverses and selects sets of tree nodes
engineering rules using a classical logic and/or their attributes.
implication: “If the cause likelihood is L and the A path query for navigating the tree consists of a
consequence severity is S, then the risk category is sequence of /-separated steps and has the following
R”. Depending on the process being analyzed, the syntax:
results of the above logic implication are typically
defined using a 3x3, 5x5 [9], 7x4 [10], or 7x5 [3] Query := /step1/step2/…./stepn
chart (called risk matrix) as shown in Figure 3. The A step consists of a standard tree nodes
risk matrix in the example is clearly not universal, relationship (child, parent, descendant, ancestor,
as each process may have different approaches for sibling, etc), followed by a node name and possibly by
estimating the risk. Moreover, the estimated a filtering condition enclosed in brackets:
likelihood and severity used for risk analysis may
vary between maximum likelihood/severity among step := nodes-relationship::node-name[filter]
all causes/consequences or the averages of these For the purpose of discussion here, we will only
values. consider the simplified version of a step in a path
query:
step := node-name or step := @aname
10-1 TNA NA NA NA NA
where @aname refers to a special leaf node in a DOM
10-2 TNA TNA NA NA NA tree, called attribute.
10-3 TA TNA TNA NA NA
R
Likelihood

-4
10 TA TA TNA TNA NA

10-5 A TA TA TNA TNA


A B
-6
B @a
10 A A TA TA TNA
@a
10-7 A A A TA TA B @b

1 2 3 4 5 C
C
Severity
Figure 4. A DOM tree example
Figure 3. An example of a risk matrix (A = acceptable;
TA = tolerable-acceptable; TNA = tolerable-non-
acceptable; NA = non-acceptable) Figure 4 shows a DOM tree example where R (the
It is the risk analyst who decides which method(s) root), A, B, and C are node names; @a and @b are
of computation to be used and the computational attributes of the nodes they are connected to.
framework/tool should provide means to A path query like /R/A/B will produce a set of two
accommodate such methods. On top of these nodes (both nodes named “B” from the left hand side
challenges, a computational framework/tool should be of the tree). A path query like /R/B/@a will return a
easily extensible. Naturally, a change of the risk single node, namely the attribute node @a of the node
analysis model in Figure 2 may produce changes in B on the right hand side of the tree. The main purpose
formulas (1) or (2). These changes should be of the path query part of XQuery is to select nodes of
Y-46 Ionut Emil Iacob and Alex Apostolou

the tree. The individual nodes or set of nodes can then likelihood() (lines 1 – 8). This recursive function goes
be manipulated by the language using standard deep on a path to a cause C and multiplies along the
programming concepts: variable assignments, loops, way all reductions of P nodes (and E nodes, if any),
conditional statements, and functions. It is not the and eventually computes the effective likelihood
purpose of this paper to give a full description of the produced by the cause at the bottom of the path. The
language, for which the user is directed to the query eventually returns a sequence of effective
language reference [10]. Next, we will illustrate and likelihoods (one effective likelihood per each cause in
explain a more complex. the diagram), where each effective likelihood for
cause i is eventually computed as:
B. Using XQuery in a bow-tie model
ELi = Li * Πκ=1..ν pik
A typical bowtie diagram (as given in Figure 2) is where ELi is the effective likelihood produce by cause
a directed graph. However, as illustrated in Figure 2, i; Li is the likelihood of cause i; pik are the reduction
the bowtie diagram can be decomposed in a “fault factors of all Prevent nodes (from 1 to n) on the path
tree” and an “event tree”. Each one of these parts can to cause i. The major benefit of this query is the fact
be easily modelled as DOM trees, on which XQuery that a change in the structure (adding/removing
searches can be perform. We illustrate the DOM
Prevent or Cause nodes; changes of likelihood and/or
representation of the fault tree (left hand side of the
reduction factors) would not require adjusting any
diagram) in Figure 5, but the representation of the
event tree is very similar. computation formulas, hence extensibility is
achieved.
CE V. CONCLUSIONS
In this paper we present the bowtie model for risk
P P
analysis and we introduce a general framework for
p quantitative risk assessment in bowtie models using
p
P XQuery. The method allows the risk analyst focus
p p P primary on adjusting the model and its parameters in
P
order to better fit the process, rather than permanently
p adjusting computational formulas required by model
E changes. XQuery is the de facto query standard for
tree data structures and can be naturally used for
C e C L C L processing the Fault Tree and Event Tree components
L of a bowtie model (see Figure 2).
Figure 5. The Fault Tree of a bowtie diagram: CE is the Central
Event node; Ps are the Prevent nodes (with @p attributes holding the REFERENCES
reduction factor values); E is the Escalation Factor node (with @e
the corresponding attribute holding the reduction factor value); Cs [1] Aurélie Léger, Carole Duval, Philippe Weber, Eric Levrat,
are the Cause nodes (with @L being the corresponding likelihoods Régis Farret. Bayesian Network Modelling the risk analysis
stored as attribute nodes). of complex socio technical systems. Workshop on Advanced
Control and Diagnosis, ACD'2006, Nov 2006, Nancy, France.
With the power of XQuery over the Fault and Event [2] Ioannis A. Papazoglou, Ben J.M. Ale, A logical model for
Trees, one can successfully represent many models of quantification of occupational risk, Reliability Engineering &
computation for the effective likelihood or severity the System Safety, Volume 92, Issue 6, June 2007, p 785-803.
Central Event is receiving. Regardless of how the [3] Adam S. Markowski, M. Sam Mannan, Fuzzy risk matrix,
likelihood for producing the central event is computed Journal of Hazardous Materials, Volume 159, Issue 1, 15
(as an average of all cause likelihoods, or as maximum November 2008, Pages 152-157, ISSN 0304-3894.
likelihood among all cause), one needs to compute the [4] B. Tchórzewska-Cieślak, K. Boryczko, I. Piegdoń,
Possibilistic risk analysis of failure in water supply network,
effective likelihoods (after applying preventative Safety and Reliability: Methodology and Applications -
reductions) on each path from the central node CE Proceedings of the European Safety and Reliability
down to each cause C. These likelihoods can be easily Conference, ESREL 2014, Pages 1473-1480.
computed using the following query, for instance: [5] Peter C. Wierenga, Loraine Lie-A-Huen, Sophia E. de Rooij,
Niek S. Klazinga, Henk-Jan Guchelaar, Susanne M.
(1) declare function likelihood($node) { Smorenburg, Application of the Bow-Tie Model in
(2) if ($node/P/E) then Medication Safety Risk Analysis, Drug Safety, 2009, Volume
(3) return $node/P/@p * $node/P/E/@e * likelihood($node/P) 32, Issue 8, pp 663-673.
(4) else if ($node/P)
[6] Meercat RiskView, http://www.meercat.com.au/
(5) return $node/P/@p * likelihood($node/P)
(6) else if ($node/C) return $node/C/@L [7] BowTieXP, http://www.bowtiexp.com.au/
(7) else return 1 [8] XQuery 1.0: An XML Query Language (Second Edition),
(8) }; W3C, http://www.w3.org/TR/xquery/
(9) for $ll in /CE/P [9] B. Ruge, Risk Matrix as Tool for Risk Assessment in the
(10) return $ll/@p * likelihood($ll) Chemical Process Industries, ESREL 2004, paper 0192.
[10] O. Salvi, B. Debray, A global view on ARAMIS, a risk
The main part of the query is in lines 9 – 10: the assessment methodology for industries in the framework of
immediate P child nodes from the central event node the SEVESO II directive, J. Hazard. Mater. 130 (2006) 187–
199.
CE are retrieved. For each P node, the reduction value
[11] Document Object Model (DOM), http://www.w3.org/DOM/.
is multiplied with the result of the recursive function

S-ar putea să vă placă și