Next Article in Journal
Nuclear Power and Resource Efficiency—A Proposal for a Revised Primary Energy Factor
Next Article in Special Issue
Monitoring, Human Health Risk Assessment and Optimized Management for Typical Pollutants in Indoor Air from Random Families of University Staff, Wuhan City, China
Previous Article in Journal
Evaluation of GHG Mitigation Measures in Rice Cropping and Effects of Farmer’s Characteristics: Evidence from Hubei, China
Previous Article in Special Issue
Study of Water Environmental Cumulative Risk Assessment Based on Control Unit and Management Platform Application in Plain River Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System

1
School of Civil Engineering, Southeast University, Nanjing 210096, China
2
Department of Civil, Construction, & Environmental Engineering, North Carolina State University, Raleigh, NC 27695, USA
3
School of Mechanics and Civil Engineering, China University of Mining and Technology, Xuzhou 221116, China
4
School of Civil Engineering, Lanzhou University of Technology, Lanzhou 730050, China
*
Author to whom correspondence should be addressed.
Sustainability 2017, 9(6), 1065; https://doi.org/10.3390/su9061065
Submission received: 12 May 2017 / Revised: 11 June 2017 / Accepted: 16 June 2017 / Published: 20 June 2017
(This article belongs to the Collection Risk Assessment and Management)

Abstract

:
As a sustainable means of public transportation, urban rail transit system undergoes rapid expansion in China. How to provide a safe and reliable service has been the subject of growing attention in this context. However, such work is challenging because rail transit systems are quite vulnerable and influenced by a set of interacting factors. Studying these vulnerability factors will contribute significantly to the operation of rail transit system. From this perspective, this paper made an exploration of the vulnerability factors based on an integrated method consisting of AHP (Analytical Hierarchy Process) and ISM (Interpretative Structural Modeling). Based on literature review, 21 vulnerability factors were identified. Subsequently, expert elicitation was employed to ascertain the importance of each factor and the interrelations among them. The results suggest that management and individual factors have the highest importance weights and the interrelations among vulnerability factors could be expressed as a five-layer structure, in which management factors were inclined to be at the lower level. The research provides valuable information for decision makers to take proactive strategies and reinforcement policies to guarantee safety operation of urban rail transit system and ensure urban public safety, which could promote the sustainable development of cities.

1. Introduction

Many of today’s developing cities are experiencing growing motorization, congestion, and worsening pollution, paralleling rail economic growth. China is no exception, especially with regard to its increasing rates of urbanization [1]. Urban rail transit, a sustainable transportation means with the merit of large capacity, high speed, and low pollution, has quickly become an ideal way to solve these problems. In order to realize urban sustainable development, the rail transit system is the inevitable choice for Chinese large- and medium-sized cities [1]. By the end of 2016, 30 cities from 17 provinces or municipalities nationwide have built rail transit systems with approximately 44 million passenger trips being made on a daily basis [2]. Meanwhile, 228 lines are still under construction simultaneously. There is no doubt that rail transit has evolved into the backbone of Chinese urban public transportation modes. In consideration of the number of rail transit systems, providing a safe and reliable service is bound to be an extremely crucial and rough challenge for the rail transit management departments.
During last decades, plenty of works have been conducted to ensure and enhance the safety operation of the rail transit system. Kyriakidis et al. introduced the human performance railway index operation index (HuPeROI) for formulating mitigation strategies to minimize operators’ degraded performance phenomena during the operation of rail transit system [3]. As the foundation of the HuPeROI, Kyriakidis et al. made a further research on the railway performance-shaping factors (R-PSFs) taxonomy, in which most common R-PSFS had been identified to improve safety management systems of railway organizations [4]. Song and Li carried out an empirical study on the relationship between the passenger density and the safety level of the station platform [5]. In contrast to many other public transport means, rail transit systems are more complicated, dynamic and open to the environment. Their operations are continuously affected by many factors, which make it vulnerable to disruptive events. Exploring the vulnerability of rail transit system has been proven to obtain significant contributions to improve systems’ performance [6]. As a result, the vulnerability of rail transit system has gained extensive attention in regard to the influence of the network characteristics [7,8], the technology of the infrastructure and vehicles [9], the workers, and the passengers [10], just to mention a few. Nevertheless, what is noticeable is that almost all of these studies have been limited in that research on a portion of rail transit system. Few systematic explorations on the vulnerability have delved into a holistic analysis of the entire rail transit system [11,12]. For such reason, this research seeks to add to our understanding of the vulnerability of the entire system. It uses the analytical hierarchy process and interpretative structural modeling to perform a quantitative analysis of vulnerability factors so that management departments and decision makers can take reinforce measures to improve the system’s ability to resist disruptive events and make the system safer.
The remaining sections of this paper are organized as follows. Section 2 elaborates on the definition of vulnerability and collects the vulnerability factors that significantly influence the safety operation of rail transit system based on literature review. An integrated methodology consisting of AHP (Analytical Hierarchy Process) and ISM (Interpretative Structural Modeling) is introduced in Section 3. Section 4 applies this method to identify the most important factors and demonstrate the interrelationships among the vulnerability factors. Based on the result from Section 4, a further discussion about the findings is conducted in Section 5. Finally, Section 6 draws the overall conclusions.

2. Vulnerability Factors of Rail Transit System

The study of vulnerability has a long history, having been used to study power distribution systems [13], the Internet [14] and transportation systems [15] to just name a few. Because of differences between the various settings, vulnerability does not yet have a commonly accepted definition. However, two are closely related and relevant here. In the first, vulnerability means susceptibility to injury or attack [16]. In this sense, vulnerability is the manifestation of the inherent states of the system that express the extent of adverse effects caused by disruptive events that originate both within and outside the system boundary [17,18,19,20,21]. The second definition focuses on the fact that a system component or an aspect of a system can weaken or limit the system’s ability to withstand a threat or to resume a new stable condition [22,23,24]. Given that the objective of this paper is to explore the global system vulnerability, the first definition is the one employed in this research. To a certain extent, this interpretation of vulnerability is similar concept of risk, which is seen as encompassing the estimation of probabilities of risk scenarios and associated negative consequences [19]. However, rather than assessing probabilities and consequences, the focus of analyzing vulnerability is to systematically explore the effects of failures for the purpose of identifying system weakness that may be vulnerable to exploitation by unknown or unimagined threats [20,25]. From this point of view, addressing the vulnerability factors of urban rail transit system involves answering the following question: what factors have the propensity to turn into the weaknesses that resulted in the failure of the system?
Collecting the vulnerability factors was a critical process of the research, which provided a foundation for the following analysis. Two typical options, literature review and expert interview, were employed to identify the vulnerability factors in this paper. Above all, peer reviewed studies that dealt with the safety operation of urban rail transit system were adopted to perform a comprehensive literature review, which resulted in an initial list of vulnerability factors. This list was then examined through the several interviews with five professors from Southeast University. All professors were knowledgeable in the field of safety with more than ten years of experience. After reviewing the preliminary list, the professors come to the consensus that all vulnerability factors derived from the existing literature were reasonable and of significance. Finally, a summary of 21 vulnerability factors are presented in Table 1, which could be grouped into six dimensions based on their properties and attributes: individual, equipment/facility, environment, management, structure, and emergency. Table 1 also provides an explanation of each factor and the related references.

3. Research Methodology

The methodology used in the present study to better understand the 21 vulnerability factors was an integrated approach that consisted of the Analytical Hierarchy Process (AHP) and Interpretative Structural Modeling (ISM). The AHP was used to assign weights to each vulnerability factor and evaluate the relative importance of each factor properly, while the ISM was employed to intuitively describe the interrelationships among these factors. Although both techniques are more than three decade old, their merits of flexibility and robustness make them have extensive applications in many domains [34,35].

3.1. Analytical Hierarchy Process (AHP)

AHP, developed by Saaty [36], is widely used to make efficient and effective decisions for decision making problems that involve multiple objectives. It helps the analyst identify the key factors, determine the allocation of resources, and consider different preferences. By using AHP, decisions can be made using weights that based on subjective pairwise relative comparisons through multilevel hierarchic structures. AHP is a systematic and comprehensive method to solve multi-criteria decision problems and avoid inconsistencies in the decision-making process. The use of the AHP is illustrated below.
Step 1: Model the decision problem as a hierarchy. The first step in AHP is to break down the decision problem into component factors and structure these factors in a hierarchical order from the broadest perspective to the most narrow (top to bottom, respectively).
Step 2: Construct pairwise comparison matrices. Once the hierarchy structure has been built, a series of pairwise comparison are performed for the production of the relative importance value of each factor by comparing it with other factor in the same level regarding their impact on an element above them in the hierarchy. The comparison is made by assigning numerical values to express the strength of the preference of one factor over the other, as shown in Table 2. Overall comparison questions are formulated as: (1) “What is the relative importance of factors in selecting the most preferred alternative?” (2) “What is the relative preference of alternative with respect to each factor?”
Step 3: Examine the consistency of the hierarchy. After establishing pairwise matrices, the priorities of each factor in terms of its contribution to the objective are calculated through eigenvalues and eigenvectors of each pairwise comparison matrix. Specifically, the priorities of each factor are obtained from any pairwise comparison matrix A as the solution of the following equation system,
A ω = λ max ω , i = 1 n ω i = 1
where n is the size of the matrix according to the number of pairwise comparison, A is the positive pairwise comparison matrix of order n, λ max is the principal eigenvalue of A, and ω is the priority vector.
The consistency ratio (CR) gives a measure of where the judgments in the pairwise comparison matrix lie (between totally consistent and totally random). It is obtained as follows:
C R = C I R I
where C I = ( λ max n ) / ( n 1 ) is the consistency index, and RI is the average random consistency index for different matrix order, as shown in Table 3.
When the CR is less than 0.1, the matrix is considered to be consistent. If the CR is greater than 0.1, the comparison matrix is considered inconsistent and it needs to be revised.
Step 4: Compute the weight of each factor. The priorities obtained from the comparisons are used to weight the priorities in the level immediately below for every factor. The process continues until the normalized principal eigenvectors, which give the weights for each factor, are obtained.

3.2. Interpretative Structural Modeling (ISM)

Interpretative structural modeling (ISM), developed by Warfield [37], is a methodology of systemic structural modeling, which has been widely applied in identifying and summarizing relationships among factors. It is an interactive learning process in which a set of unique, interrelated variables are structured into a comprehensive systemic model presented as a hierarchy graph. ISM provides a means by which people can synthesize an objective hierarchy of the factors by mathematical deduction, given the pairwise relations among the factors. The general process of ISM development is described below.
Step 1: Identify the system factors set. A set of variables affecting the system is defined. The relevant parameters to be considered in analysis are generated by brainstorming and using a literature review, interviews, or other research tools.
Step 2: Construct the adjacency matrix. Depending on the situation and the factors, a contextual relationship is chosen from the following options: “depends on”, “leads to”, “impacts”, “increases”, and “decreases”. When judging the relationship between any two factors, a direct binary relationship, a i j , is formed by the following four principles:
(1)
For the relationship a i j , if i has an impact on j, a i j = 1 ; if not, a i j = 0 and vice versa;
(2)
If the two factors do not impact each other, then a i j = a j i = 0 ;
(3)
If the two factors impact each other, then a i j = a j i = 1 ;
(4)
When i = j , then a i j = a j i = 0 .
The adjacency matrix A is generated from the total of the direct binary relationships.
Step 3: Generate the reachability matrix. According to the transition law characteristics, the reachability matrix M can be calculated by the formula:
( A + I ) ( A + I ) 2 ( A + I ) r = ( A + I ) r + 1 = M
The matrix multiplications satisfy Boolean algebra algorithms, where I is the unit matrix. The power, r, in the equation, is defined as less than or equal to the number of the factors.
The reachability matrix is obtained by an algorithm-based process. Specifically, (A + I) is multiplied by itself according to Boolean algebraic algorithms, until a power of the product reaches the identical matrix.
Step 4: Partition the reachability matrix into different levels. The reachability set (R) and the antecedent set (A) are derived from the final reachability matrix. The reachability set consists of the factor itself and other factors that it may impact, whereas the antecedent set consists of the factor itself and the other factors that may impact it. The intersection of these sets, R A , is derived for all the factors. If R A = R , the factor in R will be located in the top layer and removed from consideration. This process is repeated to obtain the factors for the next level and then it is repeated iteratively until all the factors have been partitioned into the hierarchical levels.
Step 5: Draw a directed graph. A digraph is drawn to illustrate the hierarchical relationships among these factors in terms of nodes and lines of edges. The top-level factor is positioned at the top of the hierarchy and the second level factor is placed just below the top level. This process is repeated until the bottom level factors are placed at the lowest position in the hierarchy. A line is drawn if there is a direct link between the two factors, and a final graph is developed after checking all the relationships.

3.3. The Integrated Methodology

From the description of the AHP and ISM method, it is acknowledged that both techniques do not require any training stage and there are non-existent data for them. Generally speaking, under such circumstance, expert elicitation is regarded as the best option allowing for the production of primary data to conduct further analysis [38]. As a structured process that collects scientific and technical judgments from experts [39], expert elicitation is proven to be competent under the situation when other empirical data are expensive, limited or unreliable [38], and has been applied in many studies [40,41]. The expert elicitation adopted in this study could be decomposed into three steps. In the first step of the expert elicitation, all experts was independently provided with the background and required to make judgments on the relative weights of the factors as well as the relationships among the factors by means of one-to-one, face-to-face, in-depth interviews. The initial results ascertained were examined to make it accurate and reasonable in the second step. The third step consisted of several rounds of discussion on the initial results among experts, in which any disagreements were resolved until a consensus of opinion was reached.
A flowchart of the integrated methodology combining the AHP method and the ISM process adopted here is presented in Figure 1. First, a list of all possible factors is generated by a literature review and preliminary interviews. Then, the expert elicitation is employed to collect the data of this study. Ultimately, after reviewing and checking the intermediate outputs from the expert elicitation, the final result is obtained.

4. Results

In advance of utilizing the integrated methodology to analyze the 21 vulnerability factors, the expert elicitation was accomplished during late August 2016 and early December 2016. A panel of nine experts was invited to participate in making the judgments among vulnerability factors, consisting of five professors from Southeast University and four senior managers in Nanjing Metro Co., Ltd. (Nanjing, China). These experts all had more than 10 years of work experience, which could make the judgments more credible and reliable. Before making the judgments, several experts were consulted to make certain that the questions were properly phrased and established. As a result, seven rounds of discussion were carried out to reach an agreement, among which three discussions were on the importance of the factors and other four discussions were about the interrelations, respectively.
With respect to the AHP analysis, a three-level hierarchy structure of the vulnerability factors illustrated in Table 1 was developed. Unlike the conventional structure in most AHP models, the current structure used the goal of identifying the most contributing vulnerability factor on the first level. Six dimensions including individual (B1), equipment/facility (B2), environment (B3), management (B4), structure (B5) and emergency (B6) were placed at the criteria level. The sub-criteria level was composed of vulnerability factors (C1–C21). There was no alternative at the bottom. A pairwise comparison of the factors was conducted using the standard 1–9 scale given in Table 2 based on the question that with respect to a given dimension, and bearing in mind the overall goal of enhancing the safety of urban rail transit system, which of two factors can make the greatest contribution to the parent dimension? For the importance value of each pair factors, it equaled to the nearest integer of the geometric mean values which considered all experts’ judgments. Finally, an assigned and normalized weight of each factor was obtained as shown in Table 4. These weights indicate the importance of the factor itself. From the second row of Table 4, it is evident that management dimension ranks first in the criteria level, with an evaluation of 0.31203. With an evaluation of 0.30552, individuals dimension rank second, followed by emergencies dimension accompanied with an evaluation of 0.16408. There is a slight gap between management and individuals. In contrast, the gap between individuals and emergencies is more obvious. The weights for the remaining elements are 0.09710 (structure dimension), 0.08204 (equipment/facility dimension) and 0.03924 (environment dimension). In addition, the ranks of the 21 vulnerability influencing factors in the sub-criteria level are shown in the last column of Table 4. The four most important factors are: “Education and training” (C13) and “Safety investment” (C12), and “Individual technical capability” (C1) and “Individual security awareness” (C2). The weight differences between the factors are less pronounced than the differences between the dimensions. As for the consistency of all judgments, relevant calculations were displayed in column 8 and 9 of Table 4. Apparently, all of the CR values are less than 0.1, which indicates that the comparison matrices are of good consistency.
Concerning the ISM analysis, direct relationships among vulnerability factors (from C1 to C21) were obtained from the judgments of the experts with the question: are there any direct interrelations between the two factors? Figure 2 graphically presents these relationships, in which nodes represent the vulnerability factors and arrows indicate their interrelations. It is clear that 28 pairs of direct relationships exist among the factors and no bidirectional relationship exists. Only two nodes (C17 and C18) are isolated from the other nodes and node C20 has the maximum relationships. However, the indirect interrelations among the vulnerability factors and how these factors influence the rail transit system remain obscure from this picture.
Along with Figure 2, the adjacency matrix A was simultaneously generated based on the experts’ judgments. The reachability matrix M was then developed from the adjacency matrix with an assumption that if i impacted j and j impacted k, then i impacted k in terms of Equation (3). The calculation process was implemented in Matlab and the final result is presented in Table 5. All of the indirect impacts were reflected in the reachability matrix as 1* and original interrelations were expressed as 1 in Table 5.
The level partitioning of matrix M was presented in Table 6. The reachability set in the second column consisted of the factors which were shown as a 1 in each row of Table 5. The antecedent set consisted of the factors which were shown as a 1 in each column of Table 5. The last column was the intersection set which contained the common factors in reachability and antecedent set. These factors were the elements that would be placed in the first level of the structure. In Table 6, factors C6, C7, C17, C18, and C20 were found at level 1 and subsequently removed before the next partition. The process was repeated for four times until all factors were well arranged.
Basis on the level partition result and referring to the fifth step of ISM procedure introduced above, the interpretative structure model for the vulnerability factors was obtained, which is a five-layer hierarchy as shown in Figure 3. Several observations could be drawn from Figure 3. First, this model is not symmetric. Second, factors C17 and C18 are entirely independent and have no relationship with the other factors. The inherent properties of these factors have been reserved after the matrix operation. Third, factors C14 and C12 are at the deepest layer of the structure. Factors C6, C7, C17, C18 and C20 are at the surface layer of the structure. The rest of the factors are in the middle. The second level has the maximum number of factors (6): C1, C8, C9, C18, C19 and C21. Furthermore, factors C2, C5 and C11 have bidirectional relationships which cannot be perceived easily in Figure 2.

5. Discussion

Knowing what vulnerability factors influence and how these factors influence the operation of urban rail transit system is a worthy work for promoting the operational safety level. With the assistance of the expert elicitation and the application of an integrated AHP-ISM method, this study conducted a comprehensive exploration on the vulnerability factors, in which the importance weights of each factor are obtained and the influence paths of each factor are elaborated in a more evident way. Regarding the weights of vulnerability factors, a more visualized presentation about the importance value of each factor can be seen in Figure 4. Consistent with the current studies concerning the rail transit safety operation [28,29], the management dimension (B4), is believed to be of greatest importance in the criteria level. Not only can more scientific and comprehensive management lower the probability of accidents, but it can also limit the loss associated with those accidents [1]. With the highest weight in the criteria level, the factors under the management dimension show the relative high importance in the sub-criteria level. Education and training (C13), safety investment (C12), rules and regulations (C14), and organizational structure (C15) rank 1st, 2nd, 6th and 12th, respectively. Obviously, only with sufficient education and training can employees make their work more efficient and handle unexpected situation more flexibly. While adequate safety investment is the most important way to guarantee a safe operating environment [40]. Individual dimension (B1) plays the second importance role in the safety operation of urban rail transit system. Related factors, involving individual technical capabilities (C1) and security awareness (C2), also obtain the higher weights in the sub-criteria level. As the fundamental determinants of human performance, these factors are also critical because positive human performance is essential to keep the system safe running in normal circumstance and bring the abnormal operation back to normal one [3,4]. Moreover, it is well worthy of attention that the topology of the network (C17) and the equipment/facility interdependency (C18) occupy the middle positions in the sub-criteria level, which is suggestive of the relative importance of these two factors. Nevertheless, they have not been mentioned in previous studies related to risk analysis of urban rail transit system [26,27].
Concerning the interpretative structural model for vulnerability factors, Figure 5 depicts the five-layer hierarchical structure with consideration of the importance weight of each factor, in which different dimension factors are filled with different color. The higher weight the dimension possess, the darker the fill color is. In Figure 5, it can be intuitively seen that the fill color of vulnerability factors become darker as they move to the deeper layer. The vulnerability factors belonging to the same dimension are inclined to gather and have more interactions, which conform to reality. In addition, the majority of management factors such as regulations and rules (C14) and safety investment (C12) are at the deepest hierarchy of the mode, meaning these factors contribute significantly latent impacts on other dimension factors. It is generally recognized that the improper regulation system and the insufficient safety investment is the immediate cause of the accidents [42]. The intangible factors are significant contributors to the safety operation of rail transit system [30]. Consequently, more attention should be paid to these factors. In addition, individual security awareness (C2), individual physical and physiological state (C5), and operational environment (C11) form a circle in the structure. A pleasant operational environment could make staff and passengers feel comfortable [26]. In such comfortable environment, individuals could keep favorable physical and physiological states which had positive effects on individuals’ security awareness [30]. With the high level of security awareness, potentially dangerous actions or factors could be prevented or handled in time, which would, in turn, guarantee offering a safe and comfortable environment. Although network topology (C17) and equipment/facility interdependency (C18) are isolated from other vulnerability factors and have no impacts on the rest, they should be considered in establishing the preventive actions. There is a general consensus that different topological structures of rail transit systems have different degrees of vulnerability from disruptions [31], and the interdependency between the equipment in the system increase vulnerability [16].
Comparing to the conventional safety analysis, exploring the vulnerability factors allows for the production of new perception into elevating system safety of urban rail transit operation. As for the foundation of this study, the extracted vulnerability factors may not be exhaustive. In this paper, the vulnerability factors were further reviewed by five professors. All professors were experienced experts who were occupied in safety related studies for more than ten years. For such reason, it can be reasonably argued that the current list contains the majority of the vulnerability factors that influence system performance and the extraction process could be regarded to possess superior credibility. With regard to the integrated method proposed in this paper, expert elicitation was employed to obtain the primary data. In fact, expert elicitation depends heavily on the participants’ experience and knowledge, and their information about the investigate topic. Adopting this technique would make the result more subjective. How to quantify the contributions of vulnerability factors in a more objective way will be a priority in further research.

6. Conclusions

Safety is one of the crucial considerations for the residents to travel by urban rail transit system, other than speed and flexibility. Understanding the inherent property of rail transit vulnerability is conductive to retain a high level of safety. Starting from the definition of vulnerability, this paper shows how the application of an AHP-ISM based integrated method can lead to a better understand how various vulnerability factors influence the operation of the rail transit system. Based on the inputs from a thorough literature review, a list involving 21 vulnerability factors is generated. With the assistance of the expert elicitation technique, the fundamental data for further analysis are obtained from nine experienced experts. The importance weights of vulnerability factors are quantified and the interrelations among them are illustrated by utilizing the proposed integrated method. The management factors, such as safety investments, rules and regulations are extraordinarily crucial because these factors not only occupy relative importance weights but also locate at the bottom level of the interpretative structural model. It is also concluded that network topology and equipment/facility interdependency are critical factors which have largely been ignored in previous studies. More emphases should be placed on these abovementioned factors and corresponding strategies and measures should be formulated by which the operation of urban rail transit system could be safer and more reliable. The research findings provide valuable insights into the perception of and knowledge about safety operation of urban rail transit system. For the sake of simplicity, the weights of factors are ascertained through AHP method, and it is encouraged to apply ANP method to analyze the vulnerability factors in future research.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 51578144). The authors would like to acknowledge the experts who participated in the study and those who provided suggestions.

Author Contributions

The authors Liangliang Song and Qiming Li drafted the manuscript, George F. List contributed to research methodology and polished the language, Yongliang Deng assisted in literature review and data analysis, Ping Lu assisted in data collection. All authors have read and approved the final version of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, Q.M.; Song, L.L.; List, G.; Deng, Y.L.; Zhou, Z.P.; Liu, P. A new approach to understand metro operation safety by exploring metro operation hazard network (mohn). Saf. Sci. 2017, 93, 50–61. [Google Scholar] [CrossRef]
  2. National Bureau of Statistic of China. 2016. Available online: http://www.stats.gov.cn/english/Statisticaldata/AnnualData (accessed on 15 May 2017).
  3. Kyriakidis, M.; Majumdar, A.; Grote, G.; Ochieng, W. Development and assessment of taxonomy for performance-shaping factors for railway operations. Transp. Res. Rec. 2012, 2289, 145–153. [Google Scholar] [CrossRef]
  4. Kyriakidis, M.; Majumdar, A.; Ochieng, W.Y. Data based framework to identify the most significant performance shaping factors in railway operations. Saf. Sci. 2015, 78, 60–76. [Google Scholar] [CrossRef]
  5. Song, X.M.; Li, C.Y. Subway Station Operational Safety Analysis Method Based on Spatial and Temporal Resource Analysis. In Proceedings of the CICTP 2014: Safe, Smart, and Sustainable Multimodal Transportation Systems, Changsha, China, 4–7 July 2014; pp. 2660–2665. [Google Scholar]
  6. Rausand, M. Risk Assessment: Theory, Methods, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
  7. Lou, Y.Y.; Zhang, L.H. Defending transportation networks against random and targeted attacks. Transp. Res. Rec. 2011, 2234, 31–40. [Google Scholar] [CrossRef]
  8. Lownes, N.E.; Wang, Q.X.; Ibrahim, S.; Ammar, R.A.; Rajasekaran, S.; Sharma, D. Many-to-many game-theoretic approach for the measurement of transportation network vulnerability. Transp. Res. Rec. 2011, 2263, 1–8. [Google Scholar] [CrossRef]
  9. Deng, Y.L.; Li, Q.M.; Lu, Y. A research on subway physical vulnerability based on network theory and fmeca. Saf. Sci. 2015, 80, 127–134. [Google Scholar] [CrossRef]
  10. Wan, X.; Li, Q.M.; Yuan, J.F.; Schonfeld, P.M. Metro passenger behaviors and their relations to metro incident involvement. Accid. Anal. Prev. 2015, 82, 90–100. [Google Scholar] [CrossRef] [PubMed]
  11. Zimmerman, R. Mass transit infrastructure and urban health. J. Urban Health 2005, 82, 21–32. [Google Scholar] [CrossRef] [PubMed]
  12. Sun, D.; Zhao, Y.; Lu, Q.C. Vulnerability analysis of urban rail transit networks: A case study of shanghai, china. Sustainability 2015, 7, 6919. [Google Scholar] [CrossRef]
  13. Albert, R.; Albert, I.; Nakarado, G.L. Structural vulnerability of the north american power grid. Phys. Rev. E 2004, 69. [Google Scholar] [CrossRef] [PubMed]
  14. Kamara, S.; Fahmy, S.; Schultz, E.; Kerschbaum, F.; Frantzen, M. Analysis of vulnerabilities in internet firewalls. Comput. Secur. 2003, 22, 214–232. [Google Scholar] [CrossRef]
  15. Srinivasan, K. Transportation Network Vulnerability Assessment: A Quantitative Framework; Transportation Security Papers 2002; Southeastern Transportation Center: Knoxville, TN, USA, 2002; pp. 63–82. [Google Scholar]
  16. Grubesic, T.H.; Matisziw, T.C. A typological framework for categorizing infrastructure vulnerability. GeoJournal 2013, 78, 287–301. [Google Scholar] [CrossRef]
  17. Berdica, K. An introduction to road vulnerability: What has been done, is done and should be done. Transp. Policy 2002, 9, 117–127. [Google Scholar] [CrossRef]
  18. Erath, A.; Birdsall, J.; Axhausen, K.W.; Hajdin, R. Vulnerability assessment methodology for swiss road network. Transp. Res. Rec. 2009, 2137, 118–126. [Google Scholar] [CrossRef]
  19. Haimes, Y.Y. On the definition of vulnerabilities in measuring risks to infrastructures. Risk Anal. 2006, 26, 293–296. [Google Scholar] [CrossRef] [PubMed]
  20. Johansson, J.; Hassel, H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliab. Eng. Syst. Saf. 2010, 95, 1335–1344. [Google Scholar] [CrossRef]
  21. Tampere, C.M.J.; Stada, J.; Immers, B.; Peetermans, E.; Organe, K. Methodology for identifying vulnerable network sections in a national road. Transp. Res. Rec. 2007, 2012, 1–10. [Google Scholar] [CrossRef]
  22. Apostolakis, G.E.; Lemon, D.M. A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Anal. 2005, 25, 361–376. [Google Scholar] [CrossRef] [PubMed]
  23. Aven, T. A unified framework for risk and vulnerability analysis covering both safety and security. Reliab. Eng. Syst. Saf. 2007, 92, 745–754. [Google Scholar] [CrossRef]
  24. Schuchmann, G. Road network vulnerability-evaluation of measures in ranking damages and developments. Period Polytech. Civ. Eng. 2010, 54, 61–65. [Google Scholar] [CrossRef]
  25. Johansson, J.; Hassel, H.; Zio, E. Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems. Reliab. Eng. Syst. Saf. 2013, 120, 27–38. [Google Scholar] [CrossRef]
  26. Lu, Y.; Li, Q.; Song, L. Safety risk analysis on subway operation based on socio-technical systems. In Proceedings of the 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE), Chengdu, China, 15–18 June 2012; pp. 180–184. [Google Scholar]
  27. Lu, Y.; Li, Q.; Xiao, W. Case-based reasoning for automated safety risk analysis on subway operation: Case representation and retrieval. Saf. Sci. 2013, 57, 75–81. [Google Scholar] [CrossRef]
  28. Kyriakidis, M.; Hirsch, R.; Majumdar, A. Metro railway safety: An analysis of accident precursors. Saf. Sci. 2012, 50, 1535–1548. [Google Scholar] [CrossRef]
  29. Gershon, R.R.M.; Qureshi, K.A.; Barrera, M.A.; Erwin, M.J.; Goldsmith, F. Health and safety hazards associated with subways: A review. J. Urban Health 2005, 82, 10–20. [Google Scholar] [CrossRef] [PubMed]
  30. Song, L.L.; Li, Q.M.; Lu, Y.; Deng, Y.F. Research on factors affecting vulnerability of subway system. China Saf. Sci. J. 2016, 26, 64–69. [Google Scholar]
  31. Derrible, S.; Kennedy, C. Network analysis of world subway systems using updated graph theory. Transp. Res. Rec. 2009, 2112, 17–25. [Google Scholar] [CrossRef]
  32. Derrible, S.; Kennedy, C. Evaluating, comparing, and improving metro networks application to plans for toronto, canada. Transp. Res. Rec. 2010, 2146, 43–51. [Google Scholar] [CrossRef]
  33. Pederson, P.; Dudenhoeffer, D.; Hartley, S.; Permann, M. Critical Infrastructure Interdependency Modeling: A Survey of Us and International Research; Technical Report INL/EXT-06-11464; Idaho National Laboratory: Idaho Falls, ID, USA, 2006.
  34. Khalil, N.; Kamaruzzaman, S.N.; Baharum, M.R. Ranking the indicators of building performance and the users’ risk via analytical hierarchy process (ahp): Case of malaysia. Ecol. Indic. 2016, 71, 567–576. [Google Scholar] [CrossRef]
  35. Mohanty, M.; Shankar, R. Modelling uncertainty in sustainable integrated logistics using fuzzy-tism. Transp. Res. Part D 2017, 53, 471–491. [Google Scholar] [CrossRef]
  36. Saaty, T.L. The modern science of multicriteria decision making and its practical applications: The ahp/anp approach. Oper. Res. 2013, 61, 1101–1118. [Google Scholar] [CrossRef]
  37. Warfield, J.N. Toward interpretation of complex structural models. IEEE Trans. Syst. Man Cybern. 1974, 4, 405–417. [Google Scholar] [CrossRef]
  38. Bolger, F.; Rowe, G. The aggregation of expert judgment: Do good things come to those who weight? Risk Anal. 2015, 35, 5–11. [Google Scholar] [CrossRef] [PubMed]
  39. Morgan, M.G. Use (and abuse) of expert elicitation in support of decision making for public policy. Proc. Natl. Acad. Sci. USA 2014, 111, 7176–7184. [Google Scholar] [CrossRef] [PubMed]
  40. Zhang, G.; Thai, V.V. Expert elicitation and bayesian network modeling for shipping accidents: A literature review. Saf. Sci. 2016, 87, 53–62. [Google Scholar] [CrossRef]
  41. Maniram Kumar, A.; Rajakarunakaran, S.; Arumuga Prabhu, V. Application of fuzzy heart and expert elicitation for quantifying human error probabilities in lpg refuelling station. J. Loss Prev. Process Ind. 2017, 48, 186–198. [Google Scholar] [CrossRef]
  42. Ma, Y.; Zhao, Q.; Xi, M. Decision-makings in safety investment: An opportunity cost perspective. Saf. Sci. 2016, 83, 31–39. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the methodology.
Figure 1. Flowchart of the methodology.
Sustainability 09 01065 g001
Figure 2. Relationships among vulnerability factors.
Figure 2. Relationships among vulnerability factors.
Sustainability 09 01065 g002
Figure 3. Interpretative structural model.
Figure 3. Interpretative structural model.
Sustainability 09 01065 g003
Figure 4. The importance value of each factor.
Figure 4. The importance value of each factor.
Sustainability 09 01065 g004
Figure 5. Interpretative structural model with the importance of each factor.
Figure 5. Interpretative structural model with the importance of each factor.
Sustainability 09 01065 g005
Table 1. Vulnerability factors of rail transit system.
Table 1. Vulnerability factors of rail transit system.
DimensionFactorsExplanationReferences
Individual (B1)Individual technical capability (C1)Technical capability depends on professional personnel knowledge, skill, and experience. Experienced staff tend to make fewer mistakes and are capable of dealing with and solving unexpected problems.[3,4]
Individual security awareness (C2)Security awareness is an individual’s sensitivity to danger and is correlated with alertness. It depends on the attention devoted to sensing warnings and information regarding the safety conditions.[3,4]
Individual discipline (C3)Each staff member’s positive attitude, healthy personality, and sense of responsibility can make the system safer and more efficient.[26,27]
Individual workload and stress (C4)Over workload and stress can cause loss of concentration, unstable mood, and physical fatigue to subway staff, especially when they are engaged in repetitive work.[3,26,27]
Individual physical and physiological state (C5)Staff that are in good physical and physiological condition can keep a positive attitude toward work and achieve higher performance.[3,26,27]
Equipment/facility (B2)Equipment/facility condition (C6)The condition of equipment and facilities is affected by service times and maintenance. Accidents are likely to occur if the equipment and facilities are not in appropriate state.[16,28]
Equipment/facility performance (C7)Equipment and facility performance depends on reliability and the adoption of advanced technology and materials for the system.[16,28,29]
Equipment/facility protection (C8)The protection of the equipment and facilities can reduce the impact of disruptive events to the system. For example, installing platform screen doors can keep passengers from falling onto the tracks or attempting suicide.[16,28,29]
Environment (B3)Natural environment (C9)Natural disasters, such as earthquakes, strong winds, and snowstorms, can impair the safe operation of the system.[16,29]
Social environment (C10)A subway system is especially vulnerable to terrorist threats or attacks because it can be accessed easily by the general public. A favorable social environment can limit such events.[16,29]
Operating environment (C11)The operating environment includes the travel conditions for passengers and the working conditions for the staff.[29,30]
Management (B4)Safety investment (C12)Safety investment is the essential funding to ensure safe operation of subway system, which could be in form of introducing new technology, safety training, safety incentives or other activities.[26,28,30]
Education and training (C13)Staff can continuously improve their operational capability by education and training, including technical training and emergency drills.[26,28,29]
Rules and regulations (C14)Rules and regulations can make staff and departmental responsibilities clear which contribute a lot to increase the safety of operating the system.[26,30]
Organizational structure (C15)Organizational structure defines how activities or tasks are to be allocated, coordinated, and supervised to assist in safe operation, which is particularly important to subway systems for its direct impact on the communication and cooperation between different departments.[3,26,30]
Structure (B5)Station layout (C16)Scientific station layouts can create a safe, convenient, and comfortable environment for passengers. They can also improve the efficiency of mustering and evacuating, which exert the positive influence on mitigating the consequences of disruptive events.[30]
Network topology (C17)The consequences of an accident can spread through a network. For instance, the loss of a single node or link can paralyze the whole network. The topology of the network affects the rate at which these consequences spread, what portions of the system they affect, and the extent of the impacts.[16,31,32]
Equipment/facility interdependency (C18)Equipment/facility interdependency is a relationship between two subsystems by which the state of each subsystem influences or is correlated to the state of the other. Such interdependencies can exacerbate the system’s vulnerability and further aggravate the impact of accidents.[16,33]
Emergency (B6)Emergency management plan (C19)An emergency management plan is a course of action developed to mitigate the damage of potential events that could endanger the system’s ability to function.[29,30]
Emergency response execution (C20)Accurate action taken in the initial minutes of an incident can help control the incident and minimize the damage to the system. The more efficient and timely the actions, the less will be the impact of the accident.[29,30]
Emergency support system setup (C21)Well-designed, well-equipped and maintained systems that are used in emergencies can have a significant impact on impact mitigation.[29,30]
Table 2. Scale of preference between two parameters in AHP.
Table 2. Scale of preference between two parameters in AHP.
Intensity of ImportanceDefinitionExplanation
1EquallyTwo factors contribute equally to the objective
3ModeratelyExperience and judgment slightly favor one factor over the other
5StronglyExperience and judgment strongly favor one activity over the other
7Very stronglyExperience and judgment very strongly favor one over the other
9ExtremelyThe evidence favoring one over another is of the highest possible order of affirmation
2, 4, 6, 8IntermediatelyUsed to represent compromises between the preferences in weights 1, 3, 5, 7 and 9
ReciprocalsOppositesUsed for inverse comparison
Table 3. Random consistency index value (RI).
Table 3. Random consistency index value (RI).
N12345678910
RI000.5250.8821.1151.2521.3411.4041.4521.484
Table 4. The importance weights of all factors.
Table 4. The importance weights of all factors.
FactorB1B2B3B4B5B6CICRWeightRank
0.305520.082040.039240.312030.097100.16408
C10.33493 0.003470.003110.10233
C20.32337 0.09894
C30.10572 0.032311
C40.05797 0.017718
C50.17801 0.05447
C6 0.59537 0.002790.005320.04889
C7 0.12828 0.010520
C8 0.27635 0.022715
C9 0.16341 0.004490.008850.006421
C10 0.29696 0.011719
C11 0.53963 0.021216
C12 0.35767 0.001220.002330.11162
C13 0.37881 0.11821
C14 0.17883 0.05586
C15 0.08469 0.026412
C16 0.25001 000.024213
C17 0.49999 0.048510
C18 0.25001 0.024314
C19 0.309000.001860.003550.05078
C20 0.581550.09545
C21 0.109450.018017
Table 5. Reachability matrix.
Table 5. Reachability matrix.
FactorC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18C19C20C21
C1100001000000000000010
C21*1001*1*010010000000010
C311101*1*01*001*000000001*0
C41*1*0111*01*001*000000001*0
C5110011*01*001*000000001*0
C6000001000000000000000
C7000000100000000000000
C8000001010000000000000
C9000001001000000000000
C101*1*001*1*00011000000001*0
C111*1*0011*00001000000001*0
C121*1*001*1*11000110000001*1
C1311001*1*01*0000100000010
C141*1*101*1*01*000011000001*0
C15000000000000001000010
C161*1*001*1*01*0010000100010
C17000000000000000010000
C18000000000000000001000
C19000000000000000000110
C20000000000000000000010
C21000000000000000000011
Table 6. Level partition of reachability matrix.
Table 6. Level partition of reachability matrix.
FactorReachability SetAntecedent SetIntersectionet
L 1 = { C 6 , C 7 , C 17 , C 18 , C 20 } .
C11,6,201,2,3,4,5,10,11,12,13,14,161
C21,2,5,6,8,11,202,3,4,5,10,11,12,13,14,162,5,11
C31,2,3,5,6,8,11,203,143
C41,2,4,5,6,8,11,2044
C51,2,5,6,8,11,202,3,4,5,10,11,12,13,14,162,5,11
C661,2,3,4,5,6,8,9,10,11,12,13,14,166
C777,127
C86,82,3,4,5,8,10,11,12,13,14,168
C96,999
C101,2,5,6,8,10,11,201010
C111,2,5,6,8,11,202,3,4,5,10,11,12,13,14,162,5,11
C121,2,5,6,7,8,11,12,13,20,211212
C131,2,5,6,8,11,13,2012,13,1413
C141,2,5,6,8,11,13,14,201414
C1515,201515
C161,2,5,6,8,11,16,201616
C17171717
C18181818
C1919,201919
C20201,2,3,4,5,10,11,12,13,14,15,16,19,20,2120
C2120,2112,2121
L 2 = { C 1 , C 8 , C 9 , C 15 , C 19 , C 21 }
C111,2,3,4,5,10,11,12,13,14,161
C21,2,5,8,112,3,4,5,10,11,12,13,14,162,5,11
C31,2,3,5,8,113,143
C41,2,4,5,8,1144
C51,2,5,8,112,3,4,5,10,11,12,13,14,162,5,11
C882,3,4,5,8,10,11,12,13,14,168
C9999
C101,2,5,8,10,111010
C111,2,5,8,112,3,4,5,10,11,12,13,14,162,5,11
C121,2,5,8,11,12,13,211212
C131,2,5,8,11,1312,13,1413
C141,2,3,5,8,11,13,141414
C15151515
C161,2,5,8,11,161616
C19191919
C212112,2121
L 3 = { C 2 , C 5 , C 11 }
C22,5,112,3,4,5,10,11,12,13,14,162,5,11
C32,3,5,113,143
C42,4,5,1144
C52,5,112,3,4,5,10,11,12,13,14,162,5,11
C102,5,10,111010
C112,5, 112,3,4,5,10,11,12,13,14,162,5,11
C122,5,11,12,131212
C132,5,11,1312,13,1413
C142,3,5,11,13,141414
C162,5,11,161616
L 4 = { C 3 , C 4 , C 10 , C 13 , C 16 }
C333,143
C4444
C10101010
C1212,131212
C131312,13,1413
C143,13,141414
C16161616
L 5 = { C 12 , C 14 }
C12121212
C14141414

Share and Cite

MDPI and ACS Style

Song, L.; Li, Q.; List, G.F.; Deng, Y.; Lu, P. Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System. Sustainability 2017, 9, 1065. https://doi.org/10.3390/su9061065

AMA Style

Song L, Li Q, List GF, Deng Y, Lu P. Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System. Sustainability. 2017; 9(6):1065. https://doi.org/10.3390/su9061065

Chicago/Turabian Style

Song, Liangliang, Qiming Li, George F. List, Yongliang Deng, and Ping Lu. 2017. "Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System" Sustainability 9, no. 6: 1065. https://doi.org/10.3390/su9061065

APA Style

Song, L., Li, Q., List, G. F., Deng, Y., & Lu, P. (2017). Using an AHP-ISM Based Method to Study the Vulnerability Factors of Urban Rail Transit System. Sustainability, 9(6), 1065. https://doi.org/10.3390/su9061065

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop