Academia.eduAcademia.edu

Advanced evaluation tools in road safety

Rouhiainen, Veikko (ed.), Scientific activities in Safety & Security 2009, 78-79

Scientific activities in Safety & Security 2008 2009 2010 2011 1 2 Editor: Veikko Rouhiainen Graphic design: Tuija Soininen Technical editor: Jari Schabel Copyright: © VTT Technical Research Centre of Finland 2009 INTRODUCTION INNOVATIONS FOR A SAFE AND SECURE WORLD VTT Technical Research Centre of Finland is a multi-technology contract research organisation under the auspices of the Ministry of Employment and the Economy. VTT’s mission is to provide research and innovation service to enhance the international competitiveness of companies, society and other customers thereby creating prerequisites for growth, employment and wellbeing. The main drivers behind all research at VTT are: a) rapid information and communication technology as an enabler of new products and business models; and b) the global need to reach sustainable development of the society. In addition, research is gradually changing from purely technology oriented R&D to more business-oriented and it covers also services and business processes. Safety and security research at VTT dates back to the founding of VTT in 1942. VTT has an extensive expertise on related sciences and research from general safety issues to security-oriented subjects. VTT’s aim is to develop and combine various technologies and services to secure the critical infrastructures of society and to ensure security and continuity in industry and business, as well as the safety and security of citizens. We have moved from the original stand-alone safe and protected home to the interconnected, open and global world. Globalisation entails free circulation of goods, resources, energy, people and knowledge. This new situation has changed the basic nature of safety and security – from control of losses and protection to something more active and even at times offensive. Achieving an acceptable level of safety and security in the modern society requires also a new approach in research and development. Traditional safety and security management was based on the experience and the consciousness of existing hazards and threats – and the subsequent management of the situation. Protection was achieved by building borders and utilising guards to shield the threats from places and operations of interest. In the global network of networks this is no longer sufficient. Absolute security is no longer a realistic target. Currently, a diverse range of threats and hazards may arise, and the consequences may spread via networks in a short time over large and unexpected areas. Future risks may be associated with the misuse of new and emerging technologies. At the same time, advances in technology and our generally increasing dependence on technology in all areas of life make us even more vulnerable. New technologies may even introduce new threats. The threats cannot be completely eliminated nor their probabilities accurately assessed. New research and solutions are therefore needed. New ways of thinking, new safety culture and novel concepts of safety management are needed. In the prevailing conditions, the only possibility is to live with the risks. We must be prepared to the hazards by developing early warning systems, robust and adaptable operating systems, and reliable contingency planning. In other words, we must benefit from the available new technology as much as possible and adjust our own operations accordingly. In parallel with technical solutions human practices need to be developed, accepted and adopted in the society. RESEARCH SUPPORTING THE ASSURANCE OF SAFETY AND SECURITY As illustrated in the graph on the next page, VTT’s safety and security research covers a broad range of technologies with a broad scope of applications. The basic principle of our work is to maximise the impact, i.e. appropriate technologies and competencies are combined to develop safety and security solutions to the specific applications and problems being addressed. Typically, we carry out research and development together with other stakeholders including end-users, technology providers and 3 4 authorities. Most of our research includes also collaboration with domestic or foreign research performing organisations. pact of critical incidents. VTT´s strength is e.g. in modelling the process and phenomena of hazardous events. Safety and security of citizens and society Today’s societies depend strongly on technical infrastructures like energy, communication and water systems, transportation and logistics, and public services. Disturbances and interference in the critical infrastructures may cause consequences which threaten the wellbeing of citizens. Consequently, it is crucial to develop methods and technical solutions to reduce the vulnerability of society and to protect citizens. Most of the safety and security related work at VTT is carried out as an integral part of developing the utility networks or processes to operate them. Safety and security of infrastructure and utilities Present societies are vulnerable to natural and industrial disasters, acts of terrorism, corruption and organised crime, as well as daily accidents and incidental crime. Prevention through early warning, surveillance and intelligence gathering systems is essential. Nevertheless, public authorities cannot rely on preventive measures alone. At the same time when preparing for the unexpected events, an appropriate balance between the application of preventive and targeted protective hazard mitigation measures and the freedom of the citizens needs to be maintained. On the other hand it is important that, for example, infrastructure and service provisions are designed and operated in a way that ensures resilience, redundancy and robustness to survive and recover from disturbances. Failsafe procedures, safety management or post-incident consequence management are particularly important for minimising the actual and perceived im- Intelligent surveillance Over the years, VTT has developed generic technologies for overall security management, alarm and alerting systems, monitoring, and information security, which are now being utilised to develop new technologies and more specific solutions for various stakeholders. Generic technologies and improved capabilities can be applied to en- sure not only the safety and security of citizens, but also the activities and functions in all sectors of society. The improvement of safety and security in society requires cross-scientific research and combining various technologies together with different capabilities. Safety and risk management Industry and businesses have recognised that there is a need to put more emphasis on both direct and indirect safety and security threats to ensure the continuity of operations. There is a need to identify and manage various security threats to companies’ products, production and services, facilities, and other technical systems. Increasing interdependencies of technical systems, extensive supply chains and operation in networks have created new threats, which industry and businesses needs to cope with. VTT is developing generic and specific solutions and technologies to ensure the safety and security of production and services, buildings and constructions, as well as products, systems and information. During recent years, research has rapidly shifted from a focus on physical or chemical risks to more holistic risk management approaches treating overall risks to business operations. Emergency and crisis management Some safety and security threats may have low probability but the consequences are expected to be severe and extensive. To strengthen the preparedness and response in an emergency, the multi-organisational cooperation need to be further developed in order to join the competence and resources of several organisations in a most efficient way. However, the current tools and technologies are not always interoperable and all capabilities cannot be utilised. Technical research in this field aims at supporting the mitigation of consequences and their impact in all kind of emergencies, from man-made accidents to natural disasters. More interoperable systems improve the information sharing and utilisation, communication, and the efficiency of rescue and reconstruction measures. Simulation platforms and advanced training tools enable better preparedness and understanding of various emergency situations. Working with realistic crisis scenarios supports also the development of capabilities for crossborder operations. Traffic safety The public health and socio-economic losses resulting from inadequate traffic safety are enormous. In the EU, for example, there are more than 40 000 fatalities annually, and the socio-economic losses amount to about 2% of regional output. However, the major portion of the losses caused by road accidents could be avoided through various new, even more cost-effective means. Maritime traffic in the Baltic has increased during recent years, and is predicted to continue its growth. The increase has been especially great in oil transport. The share of international actors also increases, which leads to decreased knowledge of local circumstances. These changes lead to increased risk of accidents and environmental effects in maritime transport. Rail traffic safety research supports the goal of maintaining the safety level involving no fatalities or serious environmental damage. Fire safety Fire safety technology produces fi re safety design and assessment methods for the needs of industries and society. These methods can be used to describe the behaviour of products and systems in case of fi re, as well as the related risks. VTT develops the simulation of fi re development, evacuation and extinguishing, as well as other tools for the assessment of fi re safety. The fi re safety research conducted by VTT has an extensive field of application: the research subjects vary from the ignition and burning of materials to the overall fi re safety of large objects and even social aspects. Modelling and simulation competence combined with experimental research and scientific and practical expertise makes the holistic fi re safety management possible. TRENDS AND CHALLENGES OF SAFETY AND SECURITY RESEARCH Safety and security research cannot be considered in isolation from the technological development and changing business environment as well as the societal requirements. It is important to develop technological solutions in the context of operational requirements and user needs. It is also necessary to identify the required market mechanisms to ensure and enhance the development of safety and security -related industrial products and services. Safety and security -related research as such continues to be an important enabling activity in the future. It will enable more efficient and effective operational capabilities in products, systems and processes. The global market particularly on security products and services continues to grow steadily. Systematic interaction is necessary between the users and providers to defi ne, adapt and optimise the operational use of technologies to address changing threats and related challenges. The community of service suppliers comprises a large variety of different actors and competences. Also the community of end-users is diverse and 5 6 their functions and tasks have become more and more complex. For future development, it is important to improve the understanding of the user’s needs. Close cooperation with users and customers needs to take place throughout the development and deployment processes. The security market may make use of experience from the defence market and comply it with the regulations, processes and specifications of the civil market at the same time. The prevailing rules and regulations supporting dual-use require harmonisation. In order to create a harmonised security market, clear commitment is needed from the public user – the policy makers and the regulators – in order to encourage and support the supply side. A common framework is needed for an improved understanding of the principles governing the security market. Since this market is still highly diverse, dispersed and fragmented, research plays an important role in the exchange of information. Innovation potential in safety and security area gives still a lot of possibilities. Safety and security area will utilize the evolving innovation ecosystem, which covers all the stages of innovation chain. International Competence Networks and Centres of Excellence developed in EU will strengthen the knowledge and expertise. New technologies, such as micro- and nanotechnology, biotechnology and biosensors offer new capabilities to improve safety and security. These technological and industrial competences will support in assuring critical operations of the society. Technology and systems integration, interoperable communications, etc. will promote the implementation and application of innovative security solutions. In spite of all these new technologies and human practices, all the threats to our safety and security cannot be eliminated. We must live with the residual risk and be as prepared as possible. The required resilience implies that adequate early warning systems, robust and adaptable operating systems, and good contingency plans have to be developed. We have a great competence already in Finnish research and industry – the challenge is to harness it and to network it efficiently and effectively for a secure Europe. THIS PUBLICATION This publication is a collection of extended abstracts of the current safety and security research at VTT. The targeted readership is the international research community, but we trust the information is of value also to the industry and other stakeholders. Only the public research is included, i.e. proprietary contract work to industry or policy makers has not specifically been discussed here. The primary contact people listed on the following page are currently responsible for setting the future research direction and ensuring that the entire organisation delivers what has been promised. We hope this collection of current information provides you a good overview of VTT’s safety and security research and the kinds of competences available for serving our customers and for working together with researchers from other organisations. August 2009 Veikko Rouhiainen Research Professor Research Coordinator, Safety and Security Matti Kokkala, Prof. Vice President, Strategic Research Services and the Built Environment matti.kokkala@vtt.fi tel. +358 20 722 4800 Risto Kuivanen, Prof. Vice President, R&D Industrial Systems risto.kuivanen@vtt.fi tel. +358 20 722 3220 Eva Häkkä-Rönnholm, Prof Vice president, R&D Materials and Building eva.hakka-ronnholm@vtt.fi tel. +358 20 722 4930 RESEARCH COORDINATORS AND TECHNOLOGY MANAGERS Tuomas Häme, Prof. Research Coordinator Modelling, Simulation and Visualization tuomas.hame@vtt.fi tel. +358 20 722 6282 Eija Kaasinen, Dr Research Coordinator Human Technology Interaction eija.kaasinen@vtt.fi tel. +358 20 722 3323 Heikki Kanner Technology Manager Transport and Logitics heikki.kanner@vtt.fi tel. +358 20 722 6210 Helena Kortelainen Technology Manager Risk and Reliability Management helena.kortelainen@vtt.fi tel. +358 20 722 3206 Eila Lehmus Technology Manager Structural Performance eila.lehmus@vtt.fi tel. +358 20 722 6946 Juha Luoma, Prof. Research Coordinator Transport Systems and Telematics juha.luoma@vtt.fi tel. +358 20 722 4533 Timo Määttä, Dr Technology Manager Production Systems timo.maatta@vtt.fi tel. +358 20 722 3291 Veikko Rouhiainen, Prof. Research Coordinator Safety and Security veikko.rouhiainen@vtt.fi tel. +358 20 722 3262 7 8 Contents INTRODUCTION Innovations for a Safe and Secure World ............................................................................................................................ 3 TABLE OF CONTENTS .......................................................................................................................................................... 8 INCREASING THE SECURITY OF CITIZENS AND SOCIETY Safety and Risk Management at VTT – Strengths and Future Challenges ............................................................ 10 Security Risk Management of Valuable Goods Supply Chain ....................................................................................... 12 Information Security Assurance of Software-intensive Systems ..................................................................................... 14 Information Security and Trust Metrics Development ..................................................................................................... 16 INCREASING THE SECURITY OF INFRASTRUCTURES AND UTILITIES Critical Infrastructure Protection – Emerging Security Risks of Complex Systems – Today and Tomorrow ................... 18 Single Location Surveillance Point .................................................................................................................................. 20 Safety of Infrastructure in a Changing Climate ........................................................................................................... 22 INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Remote Sensing Techniques to Improve Security and Safety .................................................................................. New UV, Visible and Infrared Multispectral Imaging Platforms for Security Applications ..................................... Developing of Land- and Seaport Border Checkpoint Security ................................................................................ Virtual Model for Land Border Surveillance by Mobile Robots ................................................................................. System for Enhanced Coastal Security and Maritime Safety (SeaSAFE) ................................................................... Visual Analytics .................................................................................................................................................................. 24 26 28 30 32 34 RESTORING SECURITY AND SAFETY IN CASE OF CRISIS Technical Opportunities to Support Crisis Management ............................................................................................... 36 UHHA – a Framework for Emergency Management in Chemical Accidents ..................................................................... 38 Interoperable Simulation Framework for Planning and Training of Crises/Emergencies Management ........................ 40 Business Continuity Management in Abnormal Conditions ......................................................................................... 42 STRUCTURAL SAFETY Robustness of Structures .................................................................................................................................................... 44 Safety Research on Inpact Loaded Structures .................................................................................................................. 46 Structural Safety in Seismic Regions ................................................................................................................................ 48 Quality of Timber Construction - Guidance for Buildings and Load Bearing Structures ........................................ 50 Proposal for a European Template to be Used in Assessment of Structural Failures .................................................... 52 FIRE SAFETY Internet Tool for Controlling Domestic Fire Risks ...................................................................................................... 54 Fire Safe Building with Wood ......................................................................................................................................... 56 A Numerical Tool for Evacuation Simulation ................................................................................................................... 58 MANAGEMENT OF EMERGING RISKS Integrated Risk Assessment of Emerging Risks in Large Investment Projects ......................................................... 60 Safety-Conscious Modernising Process of Automated Machinery ................................................................................. 62 Safety-Critical Software in Machinery .......................................................................................................................... 64 TECHNO-ECONOMIC RISK MANAGEMENT Quality of Risk Assessment and its Implementation .................................................................................................... The Value Creation Process of Safety and Security ..................................................................................................... The Prevention of Industrial Accidents with Risk Analysis ...................................................................................... Assessment of Vulnerability and Adaptation to Climate Change Based on Multi-Criteria Decision Analysis ........ Computerised Risk Analysis Workshops .......................................................................................................................... 66 68 70 72 74 IMPROVING ROAD AND RAILWAY SAFETY Traffic Enforcement and Safety Effects of Automatic Speed Enforcement .............................................................. 76 Advanced Evaluation Tools in Road Safety ................................................................................................................... 78 Current Speed Management Issues ....................................................................................................................................... 80 Development of a Road Safety Test for Drivers ........................................................................................................... 82 Safety Inspections of Railway-road Level Crossings ...................................................................................................... 84 Mobile Warning System for Railway Level Crossings .................................................................................................... 86 Trespassing on Finnish Railways ...................................................................................................................................... 88 NEW TECHNOLOGIES FOR ROAD SAFETY New Traffic Management and Surveillance Technologies ............................................................................................. 90 Safety Effects of Intelligent In-Vehicle Systems ............................................................................................................ 92 Aftermarket Devices Assisting Drivers ........................................................................................................................... 94 How Intelligent Vehicles Prevent and Mitigate Collisions ................................................................................................ 96 Camera-based Driver Workload Estimation ..................................................................................................................... 98 In-Vehicle Road Friction Monitoring ............................................................................................................................. 100 MARITIME SAFETY AND SECURITY Maritime Safety Research at VTT ................................................................................................................................... Improving Maritime Safety in Åland Sea Using Formal Safety Assessment ............................................................ AIS Data Analysis for Identification of Close Encounter Situations of Vessels ......................................................... Safer Seafaring through Improved Information Exchange ......................................................................................... 102 104 106 108 HUMAN AND ORGANISATIONAL FACTORS IN SAFETY AND SECURITY Cooperation in Corporate Security Management .............................................................................................................. 110 Safety Culture in Complex Sociotechnical Systems – Integration of People, Technology and Organisation ................ 112 Safety in Healthcare – for the Well-being of Patients, Personnel and the Organisation ........................................... 114 9 10 SAFETY AND RISK MANAGEMENT AT VTT – STRENGTHS AND FUTURE CHALLENGES Anna-Mari Heikkilä, Veikko Rouhiainen Safety and risk management in the ever-changing operating and business environment requires multidisciplinary and multi-scientific approaches with a wide range of competencies. This challenges the existing safety and risk competencies and directs their development and use in new contexts. INTRODUCTION Safety and risk management is a multidisciplinary and multi-scientific research area. In order to focus the future research and development work, an extensive overview of the know-how and experience in safety and risk management is fi rst needed. Thereafter, various knowledge potentials from different clusters and knowledge centres can optimally be combined. This knowledge potential includes both specialised safety and risk related expertise and technological knowledge from different fields. The combination of various areas of expertise enables VTT to build-up larger service-concepts for new and traditional market areas and to support industrial clients in their aims to achieve their goals for efficiency in the networked environment through-out the life-cycle of an industrial plant. By networking internally and externally, VTT aims to provide assistance irrespective of the special technology-field and thus be more prepared to fi nd and suggest new solutions for emerging risks. METHODS AND RESULTS VTT’s strengths and future research challenges in safety and risk management were identified in an internal roadmap [1]. Current expertise and knowledge covers the steps of risk analysis and risk assessment as well as means of risk management on different industrial branches including: • identification of hazards and risks • incident scenario modelling • consequences, their analyses and estimation • estimation and evaluation of identified risks • decision-making processes. VTT has competencies to apply various qualitative and quantitative methods, which are chosen based on the target, objectives and purpose of the analyses or, for example, by the demands of the client or some external body (e.g. authorities). VTT uses both generally known and self-developed methods which vary from one technological sector to another, but the basic principles of safety and risk management often follow the RAMS ideology and relevant standards [e.g. 2, 3,4]. In the multidisciplinary and multi-scientific research, we are also required to acknowledge the differences in risk terminology and follow the appropriate terminology case-by-case. The appropriate standards and associated defi nitions for the risk analysis and risk assessment are identified and used in the research. In the global research and market environment, the following issues have been identified as future challenges in the domain of safety and risk management: • transfer of existing knowledge to the new fields • identification of solutions to multi-technological safety and security problems • support of entire business and operation through risk management from strategic decisions to operational and structural risks, as well as business risks, and their interdependencies • improvement and development safety and risk management systems for industrial activities • decision-making and organisational behaviour in safety and risk management • overall corporate risk management (in the business environment). This publication provides some insights into various research projects associated with these topics. CONCLUSIONS AND EXPLOITATION POTENTIAL Successful safety and risk management require multiscientific and cross-sectoral expertises. The research includes common processes to identify, estimate and eval- INCREASING THE SECURITY OF CITIZENS AND SOCIETY Figure 1. Safety and security. [1] uate risks, as well as measures to manage risks and their consequences. Commonly approved processes enable safety and risk management efforts to be applied to various technological areas, as well as to human and organisational aspects. In different technological areas, various and own kind of expertises are needed for developing measures to manage risks throughout the life-cycle of a plant, product, business and public services. In addition to the safety and risk management experts, all technology areas need technology developers who can and have solved risk and safety related problems. Strong competencies in risk identification, evaluation and estimation methods and tools – both qualitative and quantitative – enable the further development and benchmarking of related methods. The related work is based on commonly approved standards and supports development and updating of standards e.g. of IEC and ISO. Consequently, VTT is actively involved in both national and international projects to establish safety and risk management procedures and to prevent any undesirable consequences. REFERENCES [1] Rouhiainen, V. 2007. Technology roadmap of security research. Espoo. VTT Research Notes 2368: 33p. [2] ISO/IEC Guide 73. Risk Management – Vocabulary [3] IEC 60300-3-9. Risk analysis of technological systems [4] IEC 31010. Risk assessment techniques (draft) CONTACT Veikko Rouhiainen Research Professor veikko.rouhiainen@vtt.fi Tel. +358 20 722 3262 11 12 SECURITY RISK MANAGEMENT OF VALUABLE GOODS SUPPLY CHAIN Sirra Toivonen, Hannu Salmela, Pekka Maijala, Johan Scholliers Supply chain security (SCS) risk management is currently a topic that is high on the agenda of many logistics operators and governmental agencies. In addition to the concern of using the supply chain as a tool for terrorist and other illicit actions, a major concern of the operators is the increasing security threat in regard to the transportations of valuable goods. INTRODUCTION The difficulties in enhancing supply chain security are wide-ranging because of the lack of single system governing the international movement of goods, the versatile amount of operators or modes in the networks and the lack of technology in guaranteeing the whole supply chain. In the recent years large steps of development have been made but also the challenges have become more varied. To the identification, estimation and management of present and future risks efficient methods are needed. Technology plays also a key role in addressing the security challenges in today’s logistics networks. New technologies provide opportunities for increasing overall security and safety of shipments with their ability to enhance proactive supply chain risk managements. Security technologies are developing rapidly, and in many cases they are already mature for use. The implementation is typically hindered by lack of business models and widely accepted standards as well as procurement and maintenance costs. Supply chain security management needs a framework covering the fi rms’ whole business scope. Supply chain security management (SCSM) has to work on a continuous development basis. ment and practical case studies on a transportation value chain fi rms. The case studies were done in individual fi rms and in supply chain value network. These studies included supply chain modelling, supply chain vulnerability analysis, risk analysis and methodological development. RESULTS As a result a supply chain risk management method was introduced. The method consists of modelling tool for supply chain risk management, vulnerability analysis, risk analysis and continuous improvement of the security. Because supply chain risks may not be managed in business units own physical environment and properties or with own operations, the operations and parties of the value chain must also be included in the whole analysis and management phase. Modelling of the supply chain (SC) includes modelling of the phases, actors, circumstances, normal and abnormal procedures, timelines and movement of different kind of information. As a result a multifaceted understanding of the chain is achieved. Vulnerability analysis serves as a preliminary analysis emphasizing the deeper analysis to most sensitive part in supply chain. Vulnerability analysis is implemented with help of a risk map and covers wide areas of supply chain environment. Deeper risk analysis methods are then carried through according to the results. Deeper risk analysis uses information of occurred situations, knowledge of participants and method suitable to the problem at hand. METHODS Security risk management increases of the general security level, resilience, effectiveness and transparency of the supply network. It also reduces load thefts, pilferage and inspections and preserves the reputation and brand of the company and brings commercial advantage to the service providers. This paper presents a view to SCS risk assessment needed for assessing and guaranteeing secure transportation of valuable goods. The results are based on a literature review on SCSRM practices, methodological develop- Supply chain security management development requires both operational and technological actions. Mature technologies can offer efficient ways to manage se- INCREASING THE SECURITY OF CITIZENS AND SOCIETY Figure 1. SCS risk analysis is a basis for security management. curity problems when combined with appropriate operational management systems. DISCUSSION AND CONCLUSIONS Supply chain risk analysis is a key method to enhance security. New and innovative ways to analyse security bring new information to the management. The information gathering from the whole supply chain and of happened disruptions or near misses needs to be more effective to guide the security management – technology offers very promising ways to support this task. Risk management tools offer an effective way to prioritise security management practices and to communicate security information inside value chains. systems, as well as intelligent transportation units and packages, are building blocks that are used to implement proactive security management systems and to create additional value for the customers of the supply chain. ACKNOWLEDGEMENTS The author wishes to thank the TurvaTH project specialist group for their advice and contribution to this work. The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation) and the TurvaTH partners. EXPLOITATION POTENTIAL Supply chain security management provides a wide range of possibilities for developing the management of logistics, and supply chain efficiency and reliability. Risk analysis methods are important tools in the security management process. Technological opportunities include positioning non-desired occasions, verifying integrity of transport units and goods, enhancing data security, or improving the personal safety of the logistics employees. Security solutions such as detection and identification technologies, localisation, intelligent monitoring and tracking systems, access control, surveillance CONTACT Sirra Toivonen Research Scientist sirra.toivonen@vtt.fi Tel. +358 20 722 3778 13 14 INFORMATION SECURITY ASSURANCE OF SOFTWARE-INTENSIVE SYSTEMS Reijo Savola, Pasi Ahonen, Ilkka Uusitalo to the results. The type of tools required heavily depends on the use cases, the current threat landscape and the environment of the system and the potential impact and exposure of security threats and vulnerabilities. Of course, there often may be a majority of more generic fault and vulnerability types in typical software, which require constant attention and remediation activities. Software bugs cause many information security holes in software. The bugs could be eliminated with good programming processes, but there are typically an average of 20-30 bugs per 1,000 lines of code in commercial software, and about three per cent of these bugs have a critical effect on information security. Some software have higher security level than some other but it is highly unlikely that wholly secure software can exist, ever. This is where security and robustness testing tools come in to the picture; these tools can assist in fi nding the bugs. METHODS The increasing complexity of software-intensive and telecommunication products, together with pressure from information security, privacy and safety legislation, is increasing the need for adequately tested and managed information security solutions in telecommunications, industrial and software-intensive systems and networks. Evidently, practical and scalable information security assurance tools and methods are needed. VTT is actively developing solutions for information security assurance. INTRODUCTION Professional software security assurance consists of the planned utilisation of several different assurance methods, e.g. security analysis, security testing, security monitoring and security auditing. Security testing itself is not in general enough to provide sufficient confidence We have developed a framework for integration of threat and vulnerability analysis, information security testing tools and monitoring tools into different phases of product development this takes into account the different trade-offs. In addition, we have developed a systematic and iterative method for security metrics development in this framework. The basic idea is to take information security issues into account proactively – as early as possible in the product development. This applies especially to new technology development and architectural design. We have carried out practical information security assurance in use cases from telecommunications networks and mobile platforms, in co-operation with industrial companies. Various set-ups of commercial and open tools have been used in the practical assurance activities [1]. RESULTS Our results show that the core activity in security assurance is the defi nition of security requirements based on INCREASING THE SECURITY OF CITIZENS AND SOCIETY risk, threat and vulnerability analysis, policies, as well as on technical and architectural information of the environment where system under investigation resides [2]. Fig. 1 depicts an example how the information flow in security testing can be planned as a part of security assurance activities. The security requirements “defi ne” what security actually means in the system under investigation and which security objective dimensions – confidentiality, integrity, availability, non-repudiation, authentication or authorization – are emphasized and how. Building security requirements is often a process of making trade-off decisions between high information Security, high Usability and high Cost effectiveness. The adequate level of security typically lies in the center region of the resulting “S-UC pyramid”, but of course this is strongly dependent on the particular industrial sector and security properties of the underlying development platform. Various stakeholders are needed in making the tradeoff decisions, such as managers, developers, security experts and end users. When security requirements are managed well, suitable security assurance activities can be planned in a systematic way to offer enough completeness. development process. The business potential for practical security assurance tools is promising as the business partners and legislation set higher security requirements for products and services. REFERENCES DISCUSSION AND CONCLUSIONS We have developed a practical framework for systematic software security assurance that can be integrated to the product or service development process and to the full product lifecycle. The framework consists of various methods and tools for information security analysis, testing and monitoring of software-intensive systems. Furthermore, we have developed a method for development of information security metrics, supporting the different phases in security assurance and offering evidence of the security level. Further work is needed in further experimentation of different tool set-ups and adjusting them to fit the requirements of different kinds of software-intensive, telecommunication and industrial systems. Based on the experimentation results, types of tool set-ups can be classified and further suggested to the security assurance practitioners. EXPLOITATION POTENTIAL The framework can be adapted and integrated to the software-intensive or telecommunication product or service [1] Savola, R. 2009. Software Security Assurance of Telecommunication Systems, Proceedings of the 2009 Int. Conf. on Multimedia Computing and Systems ICMCS 2009, 2-4 April, 2009. Ouarzazate, Morocco. 6 p. [2] Savola, R. 2008. A Framework for Security Modeling and Measurement, Proceedings of the IFIP TC 11.1 Annual Working Conf. on Information Security Management, 16-17 October, 2008. Richmond, Virginia. 12 p. CONTACT Reijo Savola Senior Research Scientist, Business Development Manager reijo.savola@vtt.fi Tel. +358 20 722 2138 15 16 INFORMATION SECURITY AND TRUST METRICS DEVELOPMENT Reijo Savola ty metrics available, but it has been difficult to see their feasibility and completeness, and how they represent the security dimensions the claim. In addition, the state-ofpractice of defi ning information security requirements has been poor if not non-existent. There has been a need to bridge gaps between threat and vulnerability analysis, information security requirement engineering and security engineering in product development. METHODS The lack of adequate information security solutions in software-intensive systems can have serious consequences for businesses and stakeholders. Carefully and systematically designed information security and trust metrics can be used to offer evidence of the system under development or operation. A requirement-centric decomposition method to develop feasible security metrics has been developed to fulfil this need. We have developed a systematic and scalable method for information security metrics development. The phases of the methods are summarized in Fig. 1. The method starts from threat and vulnerability analysis, emphasizes the importance of information security requirements and identifies basic measurable components of the system by requirement decomposition. Security measurement architecture for on-line metrics and evidence collection mechanisms for off-line metrics are developed together with the requirement decomposition process in order to increase the feasibility of metrics. The metrics to be developed in detailed level will be chosen by their relative importance and feasibility. The method includes also means to assess the confidence level of the measurement. INTRODUCTION The method has been applied to development of information security and trust metrics for Mobile Ad Hoc Networks (MANETs) [1] and for a resilient distributed communication system GEMOM utilizing adaptive security functionalities [2]. In order to obtain evidence of the information security and trust performance of systems, services or products, systematic approaches to measuring security and trust are needed. Security and trust metrics and measurements can be used for decision support, especially in assessment and prediction, and for automated security and trust management in the systems. The field of developing these kinds of metrics is young. In the literature, there are hundreds of scattered information securi- Our results show that information security and trust requirements are in the core role of metrics development, and the whole information security engineering process. If the requirements emphasize adequately the type of countermeasures to information security threats, it is quite straightforward to identify suitable sub-components that can be measured. The requirements should be RESULTS INCREASING THE SECURITY OF CITIZENS AND SOCIETY developed carefully and clearly, and the decomposition process should be carried out by evaluating the issues, “sub-components”, that contribute most to the success of their composition. For instance, the following measurable sub-components contribute in general to the authentication level: the authentication mechanism reliability and integrity and the structure, uniqueness and integrity of the identity concept. Evidently, widely-known metrics from reliability engineering can be utilized to offer partial evidence to authentication. Cryptographic security metrics can be applied to the development of integrity metrics. DISCUSSION AND CONCLUSIONS ACKNOWLEDGEMENTS We have developed a novel method for information security and trust metrics development based on threats, security requirements and requirement decomposition. The method is highly iterative, adaptive and scalable. The author wishes to thank Dr Habtamu Abie of the Norwegian Computing Center (Norsk Regnesentral), Oslo, Norway, for collaboration and contribution to the work. The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation), the European Commission and VTT. Further work is needed in the development and validation of generic and application and domain specific security requirement model decompositions based in realistic use cases, ways to defi ne measurement architectures, evidence collection and selection of feasible measurable sub-components. EXPLOITATION POTENTIAL The method can be integrated to the product development and lifecycle management activities by implementing it in a special tool or a part of requirement engineering tool. The most value could be achieved via an integrated information security assurance framework containing different analysis and assurance tools and methods. The framework should include means for threat and vulnerability analysis, requirements engineering, metrics development, security testing and monitoring. The business potential is high; practical and scalable information security assurance solutions are needed widely by the software-intensive systems development industry. REFERENCES [1] Savola, R. & Abie, H. 2009. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks, Journal of Networks, Special Issue on Security of Wireless Communication Systems, 15 p. (in press) [2] Savola, R. & Abie, H. 2009. Identification of Basic Measurable Security Components for a Distributed Messaging System. Proceedings of SECURWARE 2009, Athens, Greece, 18-23 June, 2009. 8 p. CONTACT Reijo Savola Senior Research Scientist, Business Development Manager reijo.savola@vtt.fi Tel. +358 20 722 2138 17 18 CRITICAL INFRASTRUCTURE PROTECTION - EMERGING SECURITY RISKS OF COMPLEX SYSTEMS - TODAY AND TOMORROW Teuvo Uusitalo, Heimo Pentikäinen, Raija Koivisto Critical infrastructures (CIs) are highly interconnected and complex systems. The existing knowledge of the dependencies and interdependencies and related potential risk of cascading effects is still insufficient to provide immediate solutions. Therefore, new, systematic tools for risk assessments and management are needed. Foresight and scenario methods and new approaches for threat identification have been applied in order to investigate the novel risk factors of CIs and their implications. INTRODUCTION The development of new technologies is enabling the design and construction of increasingly complex and interlinked systems, which may even operate worldwide. Although this development has many benefits, it also has introduced new emerging risks. Critical infrastructures are typically complex systems – including new technologies and new combinations of technologies – which are typically associated with a substantial amount of data. In addition to the complexity another challenge is related to the assessment of events with low probability and high impact. In our recent research related to CIs, foresight and scenario methodologies were used to identify interdependencies and emerging risks within telecommunication and electricity systems. To support risk management and provide added value for security audits, the identification of information security threats in energy systems has also been studied. METHODS Scenario analysis was utilised with the aim of developing and formulating various future scenarios related to telecommunication and electricity infrastructures. The scenarios were to describe the possible different states of the infrastructures and their environments in 2015. Preliminary identification of the possible factors influencing the future worlds to be considered was fi rst car- ried out based on different public sources. Next these factors were processed by two analysis phases, i.e. impact-uncertainty analysis and influence analysis. The main purpose of the application of these analysis methods was to analyse the importance of each factor and select the ones to be taken into account in the actual scenarios. Threat analysis was applied to identify information security related threats in energy infrastructure. The identified information security threats were assessed and classified by experts so that the result is useful as such, but in addition the information was used to provide input for the risk management and other processes. RESULTS The scenario process resulted in four different scenarios. Based on the consistency analysis, two of these were selected for the detailed scenario description. The main characteristics of these scenarios are the following: • The Internet-driven open market describes a scenario where the progress has been towards increasing liberalisation and exploitation of sophisticated and converging networks. Liberalisation has lead to an efficient EU market and CIs have grown to the international level together. Free trade throughout Europe is facilitated by open markets, harmonised rules and transparent trading procedures. One major challenge is the interdependency of the infrastructures and services. This has to be considered by conducting thorough risk analyses and designing appropriate back-up systems • Concentration and private networks scenario describes a situation where the rate of change in the liberalisation and in the sophisticated and converging networks is low. The general development is slow compared to the fi rst scenario. Due to insufficient standardisation and harmonisation, the markets are fractionalised, therefore limiting the competition and increasing the development and mainte- INCREASING THE SECURITY OF INFRASTRUCTURES AND UTILITIES Human preference towards certainty and definition Modelling: Explicit Knowledge & representation of the reality in detail; Incremental refining of the models due to improved knowledge of the context nitions / empirical insights in Decrease of well-founded defi Simulation: Integration of hypotheses / limited uncertainty into models increasing uncertainty models Scenarios: only implicit knowledge concerning topics to be analysed - Gain of insights; general understanding to be established increasing uncertainty / dec reasing knowledge Increasing certainty and knowledge improve definitions / empirically based values, and vice versa Figure 1. Iterative scenario approach. nance costs. The interoperability between networks becomes more difficult – specifically in relation to the associated technical and contractual problems. The risk management in a “low probability – high impact” world requires very close cooperation between experts of risk management and experts of the domain in question. It also requires a good understanding of the future development, including e.g. technical, business and social trends. The required level of details needed in the information security threat analysis depends strongly on the case. When threat identification and analysis is adapted for the case in question and done by experts in those domains, it provides added value for the management and operation of business. ly when assessing emerging risks. In addition, the methods are applicable for analysing and improving existing systems. The identification of information security related threats brings added value to existing methods and it can be utilised, for example, when auditing information security systems. ACKNOWLEDGEMENTS The research has been funded by the EC within the IRRIIS and OCTAVIO projects, and by VTT. The authors wish to thank Walter Schmitz (IABG) for his contribution to this work. DISCUSSION AND CONCLUSIONS The scenario work can be used to produce a description of the potential future systems’ technological structure and function. The narratives of the scenarios describe the interdependencies of the networked technical systems and the service providers and other stakeholders. These can be further analysed by conducting a more thorough risk analysis of the system to be built. EXPLOITATION POTENTIAL The methods of scenario analysis and threat identification can be used in the design of new systems, especial- CONTACT Teuvo Uusitalo Senior Research Scientist teuvo.uusitalo@vtt.fi Tel. +358 20 722 3266 19 20 SINGLE LOCATION SURVEILLANCE POINT Tomi Räty, Mikko Nieminen, Mikko Lindholm, Janne Vehkaperä, Markus Niirainen, Lassi Lehikoinen Recent progress in computing, communication, and sensor technologies are expediting the development of multiple new applications [1]. Homeland security is a fundamental concern for governments worldwide, which must protect their people and the critical infrastructures [2]. Based on these fundamental concepts, we have created the SLSP (Single Location Surveillance Point) distributed automatic surveillance system. The focus turned to the scrutiny on how best to collect, correlate and analyze the automatically distributed data resulting from the range of distinct devices, and instantaneously provide the security personnel innate, accurate information within distributed multi-sensor intelligent surveillance systems for public locations. INTRODUCTION RESULTS The creation of a distributed automatic surveillance system by developing multi-camera or multi-sensor surveillance systems, and the fusion of information procured from an array of cameras or by creating an integrated system is also an intensive sphere of research. A distributed multi-agent approach may provide numerous advantages. Intelligent cooperation between agents may enable the use of inexpensive sensors, therefore a numerous amount of sensors may be deployed over a large area. [3] A functional prototype for a distributed multi-sensor intelligent surveillance system, which is called the SLSP (Single Location Surveillance Point) system, was established. (Figure 1) The sensors are situated in an indoor area for surveillance. Each sensor obtains data from its environment and transmits the crude data to the session server. The fi ngerprint sensor conveys access information each time a fi ngerprint is read, while the video camera distributes visual data of the surveyed area, and the audio sensor relays the associated aural data. The network analyzing monitor perceives the entire SLSP network and transmits data apropos to the network and the devices attached to it. The session server addresses all the connections among the components of SLSP, and conveys the received data from the sensors to the LDMS (Logical Decision Making Server) and the Security Manager Server. The LDMS automatically deduces the surveillance point’s situation predicated in accordance with the data it receives from the sensors routed by the session server. The deductions are then relayed to the surveillance personnel’s end device. The augmenting demand for safety and security has resulted in more research in constructing more efficacious and intelligent automated surveillance systems. A future challenge is to establish a wide-area distributed multisensor surveillance system which has robust, real-time computer algorithms able to execute with minimal manual reconfiguration on variable applications. [3] METHODS Two specific difficulties inherent to the work of security personnel are: 1) the abundant amount of information that is distributed to them, and 2) the identification of significant events from this information. As a resolution to the aforementioned predicaments, two requirements have been formulated: 1) the abatement of excessive information distributed to the end user, and 2) sensor data fusion and situation deduction. The resolution of these challenges imposes stringent requirements on surveillance systems. Nevertheless, it was determined that the resolutions could be achieved through the implementation and rigid validation of a realized prototype. The intent of the SLSP system is to ultimately automatically collect sensor data and convey it to the LDMS for automatic logical decision making of the surveyed area for security personnel. The operability of the constructed SLSP system prototype attests that this endeavour is attained. The intent of developing the SLSP system was to reduce the often-excessive amount of information ren- INCREASING THE SECURITY OF INFRASTRUCTURES AND UTILITIES Figure 1. The SLSP system. dered to the modern surveillance personnel, and simultaneously ameliorate the capabilities of identifying and registering authentic alarms instantaneously, resulting in a greater proportion of authentic alarms and a reduction in false alarms. DISCUSSION AND EXPLOITATION POTENTIAL The future research will commence with extending the comprehensiveness of the SLSP system. In order to attain the utmost from a surveillance system, it must be applied to authentic and exhaustive use case scenarios. The commercialization of all such future work also needs to be considered. ACKNOWLEDGEMENTS The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation) and VTT. REFERENCES [1] Bramberger, M., Doblander, A., Maier, A., Rinner, B. & Schwabach, H. 2006. Distributed Embedded Smart Cameras for Surveillance Applications. Computer, February 2006. pp.68-75. [2] Reiter, M. & Rohatgi, P. 2004. Homeland Security Guest Editor’s Introduction. IEEE Internet Computing, November/December 2004. pp.16-17. [3] Valera, M. & Velastin, S.A. 2005. Intelligent distributed surveillance systems: a review. IEE Proc.Vis. Image Signal Process., Vol.152, No.2, April 2005. pp.192-204. CONTACT Tomi Räty, Dr Senior Research Scientist, Team Leader tomi.raty@vtt.fi Tel. +358 20 722 2131 21 22 SAFETY OF INFRASTRUCTURE IN A CHANGING CLIMATE Lasse Makkonen, Maria Tikanmäki RESULTS Methods for estimating the probability of extreme events have been developed and regional climate model simulations analysed in order to reveal the effects of global climate change on the safety of the built environment in Europe. The results show that many measures are required in improving the structural safety and reliability of the current infrastructure, as well as upgrading the transport system. Various problems with the commonly used extreme value analysis methods have been revealed and corrected [1,2,3]. As an example, it was shown that the plotting positions of the extreme value analysis are independent of the parent distribution [3]. An improved objective method to fit a distribution to the plotted data has also been developed. INTRODUCTION The new statistical methods were applied to the analysis of simulated climate data. An example of the results is shown in Fig. 1. Global climate change is expected to affect the return periods of extreme events, which will in turn have a direct effect on structural safety and the reliability of infrastructure. Significant climate change is predicted to occur already within the typical service life of certain infrastructures. Therefore, the necessary steps in the adaptation to climate change must be taken immediately. These steps will include updating engineering practices, recommendations and building codes based on climate model projections for the probabilities of extreme events in the future climate. METHODS A new probabilistic method has been developed to estimate the return periods of natural hazards [1,2,3]. This was necessary because the commonly used theoretical extreme value distributions are inappropriate when analysing very rare events, and because theoretical foundations for the so-called plotting positions of the extreme value analysis have been missing. The new statistical methods were applied to evaluate the effects of climate change on the occurrence of natural hazards [4,5,6]. The climate data utilised are from numerical simulations by the Nordic regional climate model of the Swedish Meteorological and Hydrological Institute (SMHI). Extreme events were selected from the simulated climate data and analysed, and also extrapolated to the 50 year return values. According to the results, the most significant reduction in the reliability of infrastructure in Finland, if no changes in the design are made, will concern: • Drainage systems, particularly in urban areas. Short-term precipitation extremes will increase significantly. • Water reservoir flooding and dam safety. Overall precipitation amounts will increase. • Long term service life of building components. Climate will become wetter and driving rain will increase considerably, so that corrosion of steel and decay of wood will increase [6,7]. • Transportation system operability in winter. The intensity of extreme snowfalls will increase in spite of the general reduction in snowfall. In other parts of Europe different effects will appear. For example, in some areas the increase in extreme wind speeds needs to be taken into account in structural design. The climate change will also partly improve safety. For example, in most parts of Finland the extreme snow loads on roofs will decrease. DISCUSSION AND CONCLUSIONS The use of conventional methods of extreme value analysis typically results in underestimation of the risk [1,2]. Adoption of the new statistical methods developed at INCREASING THE SECURITY OF INFRASTRUCTURES AND UTILITIES VTT will thus improve the safety of the built environment worldwide. The climate simulations showed that several adaptation measures are necessary in order to secure the reliability of infrastructure in the future climate. The required measures are different in different areas. European maps of the change in the extreme weather conditions have been produced at VTT to assist in evaluating those requirements. EXPLOITATION POTENTIAL The results of the theoretical part of the work will be used in re-analysing the probabilities of natural hazards. This will improve the risk analysis already in the existing climate. The fi rst step towards adaptation to climate change in the building sector must be re-evaluation of engineering practices, recommendations and building codes. The results of this work will have a key role in this process. The research outlined here will next be exploited in a large European Commission project “Extreme weather impacts on the European network of transport” (EWENT) launched in 2009 and managed by VTT. Figure. 1. Example of the results for Finland and the surrounding countries. Projected change (in %) during this century in the 50-year return value of the precipitation amount in five days. ACKNOWLEDGEMENTS The author wishes to thank Markku Rummukainen from SMHI in Sweden, as well as Leena Ruokolainen and Jouni Räisänen, from the University of Helsinki for their assistance in producing climate model data. This work was supported by the Finnish Ministry of Environment. REFERENCES [1] Makkonen, L. 2006. Plotting positions in extreme value analysis. Journal of Applied Meteorology and Climatology. 45, pp.334-340. [2] Makkonen, L. 2008. Problems in the extreme value analysis. Structural Safety. 30(5), pp.405-419. [3] Makkonen, L. 2008. Bringing closure to the plotting position controversy. Communications in Statistics Theory and Methods, 37(3). pp.460-467. [4] Makkonen, L., Ruokolainen, L., Räisänen, J. & Tikanmäki, M. 2007. Regional Climate model estimates for changes in Nordic extreme events. Geophysica, 43(12). pp.19-42. [5] Saarelainen, S. & Makkonen, L. 2007. Adaptation to climate change in the road management. Finnish Road Administration, Finnra Reports, 4/2007. 53 p. [6] Saarelainen, S. & Makkonen, L. 2007. Adaptation of railway management to climate change, preliminary study. Finnish Rail Administration, Publications A16/2008. 46 p. [7] Viitanen, H., Toratti, T., Peuhkuri, R., Makkonen, L., Ojanen, T., Ruokolainen, L. & Räisänen, J. 2009. Modelling of durability of wooden structures. European Journal of Wood and Wood Products. (submitted). CONTACT Lasse Makkonen, Dr Chief Research Scientist lasse.makkonen@vtt.fi Tel. +358 20 722 4914 23 24 REMOTE SENSING TECHNIQUES TO IMPROVE SECURITY AND SAFETY Tuomas Häme, Yrjö Rauste Monitoring of the environment using instruments aboard airborne or space borne platforms offers reliable and fast way to predict natural disasters and increased security risks. Remote sensing techniques also help damage mitigation activities. INTRODUCTION Airborne and particularly space borne observations can be collected from any location on Earth continuously. Also, specific observation actions can be started with short notice in case of emergency. We have designed frameworks for monitoring of natural disasters [1] and a nuclear repository [2]. Additionally we have developed or are developing security and safety applications that are based on remote sensing data. These applications include an operative system for automatic forest fi re alerting [3], flood forecasting and control, landslide prediction, winter sea traffic safety, and nuclear site monitoring. ENVIRONMENT INFORMATION AND MONITORING SYSTEMS Comprehensive Envimon information and monitoring system was designed for the continuous monitoring of the environment to alert about natural disasters and to help the rescue operations and other mitigation measures after the disaster has occurred [1]. The key data source of the Envimon system is space borne imaging with optical and radar sensors. Imaging radar (Synthetic Aperture Radar or SAR) data are important data sources because they allow image acquisition also during night time and through cloud cover. The Envimon Figure 1. Thermal imagery from Olkiluoto nuclear power plant (relative rainbow scale from coolest to warmest blue, green,yellow, red) combined with red visible band [2]. Aster satellite image August 6, 2002. Thermal band resolution 90 m, red band resolution 15 m. Data © JAXA, processed by VTT. system also involves terrestrial data sources such as cell phone camera images. A software module of the system, also called Envimon, is available for the basic processing of the data from the most common satellites. Another system was designed for the monitoring of a nuclear repository site with airborne and space-borne sensors (Figure 1). A baseline database is fi rst generated using satellite and airborne imagery as well as digital map data on buildings and elevation. The site is frequently monitored and possible anomalies are found applying change detection against the baseline [2]. One of our change detection methods, the AutoChange, has been installed to the premises of the European Space Agency ESA. RESULTS OF SPECIFIC APPLICATIONS A system to alert on forest and other ground fi res has been operative since 1996. The system is interfaced with the satellite receiving station. It processes the raw data from several satellites to geo-located images, masks out clouds, searches for ground fi res, and submits an alert message. The alert message is delivered (automatically) INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Figure 2. Composite of three radar images to test an algorithm that separates stable and unstable objects on the ground. The algorithm is meant among other things to reveal small land movements before a land slide occurs. ALOS/PALSAR data © JAXA and METI 2007-2008. Processed by VTT. through facsimile and e-mail to civil rescue authorities in Finland and neighbouring countries [3]. The fi re alerts can also be seen on the internet https://virpo.fmi.fi/metsapalo_public/fi remap/fi res.html We have studied on study sites in Malaysia so called interferometric techniques to satellite radar data to detect small land movements that often precede a land slide (Figure 2). A decision support system has been developed to support the navigation of icebreakers and commercial ships. Radar images from satellites are transmitted to workstations aboard ships. As areas of ice ridges and areas of open water can be seen in SAR images, safe and efficient routes can be selected by the personnel operating icebreakers and other ships. EXPLOITATION POTENTIAL Our forest fi re monitoring system and winter sea navigation support systems are already being applied operatively. In the further development and operationalization of the disaster monitoring systems the key challenge is to develop a smooth and easy-to-use user interface. The disaster monitoring system concepts designed can be used also for purposes other than strictly in the field of disasters. Also, the disaster monitoring systems can adapt practices from other environment monitoring systems that are being developed. [2] Häme, T. 2003. Use of satellite and airborne remote sensing in the safeguards of a nuclear waste repository site. Safeguards for fi nal disposal of spent nuclear fuel. Methods and technologies for the Olkiluoto site. Olli Okko (Ed.). Säteilyturvakeskus. http:// www.stuk.fi/julkaisut/tr/stuk-yto-tr199b.pdf [3] Rauste, Y., Herland, E.-A., Frelander, H., Soini, K., Kuoremäki, T. & Ruokari, A. 1997. Satellite-based forest fi re detection for fi re control in boreal forests. International Journal of Remote Sensing. Vol.18, 12. pp.2641-2656. Future remote sensing applications combine data from a multitude of airborne and satellite sensors with data from terrestrial measurements systems into a networked decision support facility. REFERENCES CONTACT [1] Louhisuo, M., Veijonen, T., Ahola, J. & Morohoshi, T. 2007. A disaster information and monitoring system utilizing earth observation. Management of Environmental Quality. Vol.18, 3. pp.246-262. Tuomas Häme Research Professor tuomas.hame@vtt.fi Tel. +358 20 722 6282 25 26 NEW UV, VISIBLE AND INFRARED MULTISPECTRAL IMAGING PLATFORMS FOR SECURITY APPLICATIONS Heikki Saari, Jouko Malinen, Ville Moilanen, Christer Holmlund The multispectral imaging in surveillance systems is a powerful tool but the unavailability of cost effective equipment has prevented its use in many cases. We have developed a new hyperspectral imaging platform based on Piezo actuator tuneable Fabry-Perot Interferometers [1, 2, 3, 4] whose manufacturing cost is much less than cost of the existing systems. This platform can be used for example in the target specific spectral imaging which provides a means to identify the areas whose spectral characteristics are known a priori. The new system can perform a multispectral imaging at the target specific weighting of spectral transmissions [4] in a single exposure. This system could provide a new innovative low-cost hyperspectral camera for videosurveillance. INTRODUCTION Cosofret et.al. defi ned the methodology and demonstrated the ability to use passive infrared multispectral imaging to track and quantify chemical clouds via computed tomography (CT) [5]. This group used three AIRIS Tunable Fabry-Perot multispectral imagers [6] in the wavelength range 8 – 11 µm for the locating of the artificial chemical cloud. VTT has developed in an European Space Agency (ESA) project an aircraft compatible breadboard of a programmable line imaging correlation spectrometer, named Imaging Spectral Signature Instrument (ISSI) [8] that could be used for safety and security applications. The use of light weight Unmanned Aerial Vehicles (UAV) for environmental monitoring is increasing very rapidly. Presently these platforms carry as a payload digital still cameras operating in the visible-NIR spectral range (400 – 1100 nm). In some cases cameras have been modified for a dedicated application chancing the blue channel (400 – 500 nm) to NIR channel (700-1100 nm). The existing hyperspetral imagers, which provide high resolution spectral images of the target cannot be applied on light weight UAV platform because of their relatively high mass. VTT has developed a new concept based on the Piezo actuated Fabry-Perot Interferometer to enable recording of 2D spatial images at the selected wavelength bands simultaneously and to reduce the size of the hyperspectral spectrometer to be compatible with light weight UAV platforms. METHODS In our light weight VIS-NIR imaging spectrometer the multiple orders of the Fabry-Perot Interferometer are used at the same time matched to the sensitivities of the image sensor channels. For example in a Bayer pattern RGB sensor or in a three CCD videocamera based on a wavelength separation prism there are different types of pixels for three wavelength channels. Figure 1. VIS-NIR hyper spectral imaging spectrometer (Finnish Patent, FI119830B). INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Excedrin™ tablet images of predicted concentrations with spatial averages scaled to Caffeine: 12%, Aspirin: 44%, Acetaminophen: 44% Figure 2. Chemical Imaging Spectrometer prototype and typical measurement results for pharmaceutical samples. RESULTS ACKNOWLEDGEMENTS We have built prototypes of the new spectrograph fitting inside of a 30 mm cube and with a mass less than 50 g (see Figure 1.). The operational wavelength range of built prototypes can be tuned in the range 400 – 1100 nm and spectral resolution is in the range 5 – 10 nm @ FWHM. The hyperspectral imager records simultaneously a 2D image of the scenery at three narrow wavelength bands. The new low cost hyperspetral imager can be applied on UAV, aircraft and on fi xed platforms requiring low cost, small volume, mass and power consumption. The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation) and VTT. We have also built a prototype of chemical imaging spectrometer based Piezo actuated tuneable Fabry-Perot Interferometers operating in the wavelength range 1000 – 2500 nm. The spectral resolution is 10..20 nm @ FWHM. We have successfully measured the Excedrin™ tablet images of predicted concentrations with spatial averages scaled to Caffeine: 12%, Aspirin: 44%, Acetaminophen: 44% (see Figure 2.). DISCUSSION AND EXPLOITATION POTENTIAL We have been able to build prototypes of low cost, light weight, multispectral imagers VIS-NIR spectral range (400 – 1100 nm) which can be used for example in surveillance and monitoring systems and on light weight UAV platforms. The test results of the developed Chemical Imaging Spectrometer prototype show that it is possible to make an IRrange (wavelength 1 …13 µm) multispectral imager for the surveillance and monitoring applications. REFERENCES [1] Ollila J, et.al., 2008. Finnish patent application FI20085947, Fabry-Perot interferometer and a method for producing the same, pp. 1-18 [2] Saari H, 2007. PCT/FI2007/050290, Spectrometer and Interferometric Method, pp. 1-18 [3] Saari H, 2009, Finnish Patent FI119830B, pp 1-17. [4] Holmlund C., et.al., 2009, Finnish patent application FI20095356, System and Method for Optical Measurement of a Target, pp. 1-30. [5] Cosofret B.,R., et.al., 2009, Imaging sensor constellation for tomographic chemical cloud mapping, Applied Optics, Vol. 48, No. 10, pp. 1835-1852. [6] Marinelli, W.J., 1998, Frequency-agile bandpass fi lter for direct detection LIDAR receivers, Applied Optics, Vol. 37, No. 36, pp. 8327- 8335. [7] Kantojärvi U. & et.al. 2007, Performance of the imaging spectral signature instrument (ISSI) breadboard, Sensors, Systems, and Next-Generation Satellites XI, Proc. of SPIE Vol. 6744. Heikki Saari, Dr Chief Research Scientist heikki.saari@vtt.fi Tel. +358 20 722 4360 27 28 DEVELOPING OF LAND- AND SEAPORT BORDER CHECKPOINT SECURITY Kaj Helin, Tuuli Järvi, Sirra Toivonen Illicit material transport and illegal immigration are growing concerns at European borders. Europol assesses that facilitated illegal immigration to the EU is stable or has even increased, and that organised criminal groups are heavily involved in that business [1]. There has also been an increase in recent years in the number of victims trafficked into the EU. INTRODUCTION To manage the present and future threats – concerning illicit material transport and illegal immigration – land, sea and air checkpoints security must be particularly efficient against any kind of threat. The controlled flows (people, cars, buses and luggage) are often diverse, and a large number of travellers can arrive simultaneously. An effective control must be guaranteed while maintaining a smooth flow of persons through the checkpoint. Land and seaport checkpoints differ from airport checkpoints. The operations and technological functionality in seaports and land checkpoints is demanding, because checkpoints are not located in a controlled indoor environment, passengers can carry a diverse variety and amount of luggage, and often travel in cars or buses. (MATERIALS AND) METHODS New solutions for cross border checkpoints are being developed in the EU project EFFISEC (2009-2013). The solutions include equipment for checking pedestrians and car and bus travellers. Also new detection technologies, mobile equipment and intelligent surveillance will be incorporated (Figure 1). The overall reliability of the solutions will be investigated and include end-users’ requirement identification (border operators and travellers), threat evaluation, technological development, ergonomic studies, and legal aspects. The ergonomics development will focus on ensuring that products respond to the end-users’ characteristics so that the products can be used more safely, easily and effectively. The reliability and ergonomics of the equipment developed will be assured with novel methods such as virtual environment modelling. The impact of the solutions and equipment on the overall security, ergonomics and legal aspects of the research’s technological results will also be carefully evaluated on a multi-criteria basis. For example, efficiency – fluent flow and screening capacity, ergonomics, costs, integration to other systems, customers privacy protection. RESULTS EFFISEC will provide the border authorities with more efficient technological equipment: • providing a higher security level for the identity and luggage control of pedestrians, and passengers inside vehicles, at land and maritime checkpoints, • while maintaining or improving the flow of people crossing borders, and • improving the working environment of the border inspectors (i.e. supplying them with more powerful capabilities, less repetitive tasks, and better ergonomics). The novel border security system to be developed should allow for the accurate checking of identities and at the same time be able to identify the transit of a wide range of illicit materials (e.g. explosives, weapons and drugs), while maintaining the swift processing flow and minimising the impact of these controls on travellers. To ensure a better and safer working environment for the border officers, careful attention will be paid to the ergonomic aspects of any new equipment. The quality and suitability for the working conditions will be guaranteed by comprehensively modelling the working conditions and procedures. The development and prototyping of the equipment is to be done with aid of a virtual environment and user-centred development. INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Figure 1. Land and seaport border control checkpoints according to the EFFISEC framework. DISCUSSION AND CONCLUSIONS The EFFISEC project will develop innovative and ergonomic solutions to help secure and ensure effi cient management of border crossings at land and sea borders. EXPLOITATION POTENTIAL The project aims to develop and demonstrate innovative and ergonomic solutions that can be exploited at all border crossing checkpoints. The solutions will obviously extend to other security scenarios, for example, where illicit substances’ detection is needed for screening an audience entering a stadium. ACKNOWLEDGEMENTS The study is funded by the EU and VTT under the EFFISEC project. REFERENCES CONTACT [1] Europol. 2008. Facilitated illegal immigration into the European Union. http://www.europol.europa.eu/ publications/Serious_Crime_Overviews/Facilitated_ illegal_immigration_2008.pdf Sirra Toivonen Research Scientist sirra.toivonen@vtt.fi Tel. +358 20 722 3778 29 30 VIRTUAL MODEL FOR LAND BORDER SURVEILLANCE BY MOBILE ROBOTS Annemarie Hjelt, Hannu Lehtinen, Eija Parmes, Pertti Peussa, Kari Rainio, Ari Virtanen A virtual model provides a framework for simulation and distributed development of an UGV-based system for border patrolling. INTRODUCTION A conventional border protection system is mainly based on expensive ground facilities which are installed along the entire length of the border and complemented by human patrols. In the TALOS project (2008-2012), the objective is to develop and demonstrate a transportable and adaptable system for protecting land borders [1]. The system consists of mobile elements: Unmanned Ground Vehicles (UGV) and Unmanned Air Vehicles (UAV), sensor antennas mounted on mobile platforms, and the mobile command and control centre, providing communication between all the elements. A virtual model of the TALOS concept is being built at VTT to simulate UGV and terrain interactions and radio network solutions during the system development. Also software and interface solutions will be technically tested with the virtual model. METHODS Previous projects have shown that almost fully operational software can be developed for autonomous vehicles with simulated test environments [2]. An offl ine simulation model of the UGV vehicle was created by integrating two commercial software packages: A Multi Body System software package to model the vehicle dynamics, and another commercial software package to model the hydraulic system. The initial version of real-time vehicle simulation was made in the OpenSceneGraph [3] environment. The terrain models were generated from aerial and satellite imagery, laser scanner data, and the Shuttle radar elevation model. The tree layers were derived from satellite images (Figure 1). The reflectance values in visible and near infrared are calibrated for actual atmospheric aerosol optical depth so that generic models can applied to estimate forest parameters [5]. The communication between the elements of TALOS will work with alternative network standards depending on the availability and capacity needs (Mobile WIMAX, WLAN, CDMA450). The coverage of the radio systems using different frequency bands and transceiver locations is predicted offl ine with the Validation Tool. The propagation models and the 3D terrain model are taken into account. Figure 1. Commercial satellite images with resolution from 0.5 to 10 metres with sophisticated calibration provide valuable information to update vegetation and tree cover of terrain models. INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Figure 2. Command centre display with overview of the area, UGV front/back camera view, status information box, and radio coverage around the UGV. RESULTS The virtual model (Figure 2) consists of a real-time UGV model, terrain model, radio coverage model, and features related to the control, monitoring and operation of the UGV and the UGV payload. Its visualisation including several gigabytes of terrain data utilises also OpenSceneGraph modules [6]. Current features include: • Tele-operation of UGV by keyboard or steering wheel with pedals • Simulation of UGV motion in contoured terrain • Obstacle detection and collision alarming • Simulation of radio coverage in UGV surroundings • UGV payload camera downstream. DISCUSSION AND CONCLUSIONS The virtual model will be utilised in TALOS system development with the TALOS test site terrain model, for instance, to the following tasks: • Pre-assembly testing with hardware-in-the-loop concept [7] • Simulation of UGV motion in different soil types • SLAM development using UGV camera downstreams • Radio network simulations • Video streaming from UGV • JAUS interface design • Path planning. funded by the EU and VTT. Terrasolid Oy has provided the elevation data and aerial imagery of Otaniemi area. REFERENCES [1] http://talos-border.eu/ [2] Kauppi, I., Lehtinen, H., & Kaarmila, P. 2006. Speeding up software development for mobile robots with flexible partial simulation environment. Proc. of the Joint Conference on Robotics, ISR 2006, 37th Int. Symp. on Robotics and ROBITIK 2006, 4th German Conf. on Robotics. Munich. 15-17 May, 2006. VDI Wissensforum IWB GmbH. Düsseldorf. Vol. 22, No: 4-2006, 46-47, CD. 7p. {& VDI Berichte (2006) No: 1956, 19} [3] http://www.openscenegraph.org/projects/osg/ [4] http://www.ode.org/ [5] Parmes, E. & Rainio, K. 2007. Production of vegetation information to 3D city models from SPOT satellite images, ISPRS Hannover Workshop 29.5 1.6.2007, High Resolution Earth Imaging for Geospatial information. [6] Niinimäki, T. 2007. Interactive multi-scale visualization of built areas, Master’s Thesis, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Espoo 2007. [7] http://en.wikipedia.org/wiki/Hardware-in-the-loop/ EXPLOITATION POTENTIAL The virtual model can be used in training and development of other similar applications, where mobile robots complement human patrolling, like for the survey of large or dangerous areas or rescue operations in natural disasters. ACKNOWLEDGEMENTS CONTACT The authors wish to thank the following colleagues for their contribution to this work: Kaj Andersson, Petri Kaarmila, Pekka Rahkola, Lotta Tuomimäki, BritaVeikkanen and Ville Vidqvist. The study has been Eija Parmes Research Scientist Eija.Parmes@vtt.fi Tel. +358 20 722 6284 31 32 SYSTEM FOR ENHANCED COASTAL SECURITY AND MARITIME SAFETY (SeaSAFE) Seppo Horsmanheimo, Juha Zidbeck, Lotta Tuomimäki Enhanced coastal surveillance and communications infrastructure will improve the operational cost-efficiency and reaction time and therefore is vital for overall coastal security and maritime safety. INTRODUCTION Illegal trafficking is an acknowledged problem worldwide. Border controls struggle to halt drug smuggling and illegal immigration. At the same time, the growth in sea traffic has increased the risk of maritime accidents, such as collisions and oil spills. An integrated remote monitoring and control system is essential for border controls and maritime authorities in their efforts to ensure the coastal security and maritime safety. METHODS A non-interceptive surveillance system concept [1] relies on intelligent aids to navigation (AtoNs). AtoNs are ideal for surveillance purposes, because they are already geographically well-distributed near coastlines and along fairways. In this concept, AtoNs will be equipped with sensing capabilities to monitor surroundings and collect information. They are able to pre-process, analyse and make autonomous decisions based on the monitored data, and they are able to exchange information with other AtoNs and relay the data to existing surveillance systems. Figure 1. Security and safety related incidents. (Pictures from http://www.sextan.com/article.php3?id_ article=957 and http://www.krb.nl/demonstratie2006/ Heliacties/img_0297.html) The structure of the intelligent AtoN is designed to be very modular, so that future changes and enhancements are easy to support. The physical parts of the AtoN including communication antenna, positioning antenna, light, radar reflector construction [2], sensors and power supply, are separated from the control unit, so that these parts can be developed independently. RESULTS A standardised remote surveillance system exploiting intelligent AtoNs is designed to be distributed and autonomic while operating in all weather conditions using state-of-the-art satellite, radar, telecommunication and sensor technologies. The system concept can be foreseen as part of the technical development where new sensor, telecommunication, positioning technologies, and image and data analysis techniques are integrated and harmonised to existing coastal surveillance and maritime navigation infrastructure. Figure 2. View of the iAtoN network. INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS Coastal security and maritime experts have identified the following requirements for the system: • ability to detect and track different types of boats, especially small low-profi le ones • modular and reliable module that can be installed on fi xed and floating AtoNs • utilisation of sensor networking and distributed sensor technologies to gather versatile information from surroundings • support for autonomic anomaly detection and decision-making • utilisation of satellite images to detect anomalies at open sea • ability to communicate with other AtoNs, bypassing ships, and onshore control stations. Figure 3. Remote surveillance and control system. DISCUSSION AND CONCLUSIONS The non-interceptive surveillance system is applicable to a variety of tasks enhancing the safety, security and environmental protection. The following areas are seen as possible adaptations of the concept: • Identification of small crafts and homeland security. • Assisting search and rescue (SAR) operations. • Assisting oil and chemical spill countermeasures. • Receiving and delivering accurate weather and wave information. EXPLOITATION POTENTIAL This concept contributes to a significant improvement of existing surveillance systems in order to enhance maritime border security. The proposed system utilizes integrated and cost-effective solutions and technologies for controlling illegal immigration and trafficking of drugs, weapons and illicit substances, capable of providing accurate situational awareness including early identification, confi rmation and classification of possible threats and illegal actions. Expected impacts are: • Significant improvement of the sea border surveillance systems, in line with European border security strategy, by providing novel and reliable solutions to efficiently identify illegal movements, ensuring at the same time flow of legitimate vessels. • Reinforce European security industry’s potential to create important market opportunities, evolving technologies to the benefit of civil European security, and reinforce their competitiveness. • Contribution to standardisation, regulation and legislation through testing, evaluation and certification activities. ACKNOWLEDGEMENTS The authors wish to thank Risto Joro from the Finnish Maritime Administration, Jorma Rytkönen from the Kotka Maritime Research Centre, and all those who provided contributions to the paper. REFERENCES [1] Horsmanheimo, S., Backman, W., Tuomimäki, L., Zidbeck, J., Joro, R., & Rytkönen, J.2008. Remote Monitoring and Control of Intelligent Aids to Navigation. AGA´08. [2] Horsmanheimo, S., Backman, W., Tuomimäki, L., Hautio, J., Hujanen, A., Toivanen, H., Joro, R., & Rytkönen, J. 2007. Estimating Radar Visibility with Computer Modelling. European Journal of Navigation, Vol. 5, Nr. 3. CONTACT Seppo Horsmanheimo Senior Research Scientist seppo.horsmanheimo@vtt.fi Tel. +358 20 722 5616 33 34 VISUAL ANALYTICS Paula Järvinen, Hannu Kuukkanen, Pekka Siltanen, Markus Ylikerälä Visual analytics provides visual and interactive tools for analytical reasoning and decision making from data. The basic idea of visual analytics is to combine the strengths of automatic data analysis with the visual perception and analysis capabilities of the human user. It is a new and active research field that has its origins in US national security. Application areas are anywhere where there is a need for decision making based on accumulated data. For the security field, it is a promising new technology. INTRODUCTION Visual analytics has been defi ned as “the science of analytical reasoning supported by the interactive visual interface” [4]. The approach has been proposed as a means to tackle the information overload problem, by providing visual tools to support analytical reasoning and decision making from data with interactive visualizations, optimized for efficient human perception. It is a multi-disciplinary research area, combining information visualization science, data mining, mathematical and statistical methods, data management, user interface techniques, human perception and cognition research. Visual Analytics has its origins in US national security, and the US Department of Homeland Security (DHS) started a research initiative on visual analytics for homeland security. The “National Visualization and Analytics Center” (NVAC)1, founded in 2004, coordinates these research efforts. The agenda for the US visual analytics research programme is laid out in the book “Illuminating the Path” [8], which describes visual analytics research challenges focusing on security applications such as border security. The report does not delve deeply into the concept but since then several other publications have appeared which further introduce the idea and the related challenges. The increasing international importance of the topic is reflected by the strong presence of visual analytics at 1 http://nvac.pnl.gov/ leading international conferences and in journals. In October 2006, the fi rst IEEE Symposium on Visual Analytics Science and Technology2 was organized. Special issues on visual analytics have appeared in IEEE Transactions on “Visualization and Computer Graphics”, “Computer Graphics”, the “International Journal for Geographical Information Science”, and “SIGKDD Explorations”. Visual analytics has been an active research area in VTT since 2007. VTT, TKK and Helsinki Institute of Information Technology (HIIT) had a joint project centred on the topic in 2008. The fi nal report of the project [3] introduces the concept, the state-of-the-art, a demonstration tool, and roadmaps for industrial and consumer applications. METHODS Visual analytics uses visualizations, user interaction and data analysis techniques to obtain insights from complex, confl icting and dynamic information. Visual analytics is especially applicable in situations where the extensive amount of data and the complexity of the problem make automatic reasoning impossible without human interaction. A visual analytics tool (Figure 1) combines data from heterogeneous data sources and provides several ways to view, explore and analyze the data. The tool supports rapid decision making, reasoning, and identifying unexpected fi ndings, and gaining insights into the underlying phenomena. EXPLOITATION POTENTIAL Due to the novelty of the research field, no full-scale visual analytics tools exist on the market yet. Some examples of visual analytics research in the security area are reported in IEEE Computer Graphics and Application 2007. In “Visual Discovery in Computer Network Defense” [1] visual analytics is used for locating patterns of network activity in large volumes of data. Another example is “Insights Gained through Visualization for Large Earthquake Simulations” [2] where visualization techniques based on massive data sets are applied to predict the future. 2 http://conferences.computer.org/vast/vast2006/ INTELLIGENT SURVEILLANCE AND SECURITY SYSTEMS In the security field, visual analytics offers great potential. In addition to the original purpose, terrorist attacks and border security, there are many other promising application areas in the security field, including: • combating organized crime, e.g. analyzing communication networks, • predicting natural disasters by creating and visualizing models based on geographical, physical and monitored data, e.g. earthquakes, floods and high winds, • predicting the consequences of industrial catastrophes, e.g. the distribution of poisonous substances, • planning safety measures related to the catastrophes, simulating and comparing alternatives, and • predicting, monitoring and analyzing epidemics. VTT has long expertise in the technologies applied in visual analytics, for example, in user interface and interaction studies, visualizations in virtual and augmented reality, data mining, information management and application integration. The integration of the security knowledge and the visual analytics skills may lead to completely new kinds of solutions in the security area. REFERENCES [1] D’Amico, A.D., Goodall, J.R., Tesone, D.R. & Kopylec, J.K. 2007. Visual Discovery in Computer Network Defense. IEEE Computer Graphics and Applications, Vol.27, No.5. pp.20-27. [2] Chourasia, A., Cutchin, S.M., Olsen, K.B., Minster, B., Day, S., Cui, Y., Maechling, R., Moore, R. & Jordan, T. 2007. Visual insights into high-resolution earthquake simulations. IEEE Computer Graphics and Applications, Vol.27, No.5. pp.28-24. doi:10.1109/ MCG.2007.138 [3] Järvinen, P., Puolamäki, K., Siltanen, P. & Ylikerälä, M. 2009. Visual Analytics. VTT Working papers 117. http://www.vtt.fi /inf/pdf/workingpapers/2009/ W117.pdf [4] Thomas, J. & Cook, K. (Eds) 2005. Illuminating the Path: The Research and Development Agenda for Visual Analytics, IEEE Press. 194 p. http://nvac.pnl. gov/agenda.stm CONTACT Paula Järvinen Senior Research Scientist paula.jarvinen@vtt.fi Tel. +358 20 722 6297 35 36 TECHNICAL OPPORTUNITIES TO SUPPORT CRISIS MANAGEMENT Pertti Broas, Anna-Mari Heikkilä, Satu Paiho, Marja-Leena Pykälä The EU markets for crisis and emergency management are very heterogeneous. The current tools and technologies are not interoperable and the renewal rate is slow. These factors not only hinder the cooperation in crisis and emergency situations between EU-countries, but also at the national and local levels. Thus, there is a clear need for mutual understanding between various stakeholders on common demands for interoperable and functional tools and procedures. INTRODUCTION The need for improving the management and cooperation in various crisis and emergency situations within the EU area has recently again been emphasised. The aim is for better multi-organisational and multi-national cooperation during crisis situations, and as a result, more efficient restoration of basic services in abnormal conditions. Projects funded by the EU [1,2,3] have studied the needs and gaps in technologies and procedures, and proposed methods and solutions to better take into account the current and future needs of real end-users in crisis situations. METHODS VTT has participated in several EU-projects within which we have arranged workshops, prepared questionnaires and conducted interviews on: end-user requirements in crisis management; identified technology gaps; and the market challenges and opportunities on crisis and emergency management tools and systems. Also the results of VTT led roadmaps [e.g. 4,5] on various technological areas have provided input on the challenges faced in the management of crisis and emergency situations. within the EU. One particularly large problem is that the current systems are not interoperable within the EU, or even within a member state. This results in response delays and prevents cooperation in, for example, multi-organisational or cross-border crisis and emergency situations. Two aspects that especially hinder the adoption of new tools and systems include the different fi nancing systems in EU member states and earlier adverse experience related to implementation of immature technologies. It has been suggested that the use of everyday-solutions in a crisis situation would improve the end-user familiarity, and subsequently increase both the availability and reliability of systems and tools in when used in abnormal conditions. Procedures for planning the restoration of basic services during and after a crisis situation have also been recommended. DISCUSSION AND CONCLUSIONS The crisis and emergency management procedures and capabilities, as well as the role of public and private stakeholders, differ greatly in the EU member states. As a consequence, the market for crisis and emergency management tools and systems is extremely heterogeneous, and EU-wide interoperability is limited. There is emerging need to generate a common and agreed overview of basic services that need to be restored after a crisis incident, the existing procedures in fi rst responder mechanisms and current best practices. Further identification of the information and technology gaps between stakeholders is required, and the potential for technology development in existing solutions and in new products and solutions for gradual restoration of basic services needs to be investigated. RESULTS EXPLOITATION POTENTIAL Gaps in technologies and services have been identified, based on the end-user needs. It can be seen that the current practices and technologies are very heterogeneous The knowledge of user requirements, current and required technologies, and related networks ensures a solid basis for the: RESTORING SECURITY AND SAFETY IN CASE OF CRISIS Figure 1. Gradual restoration of basic services - case water supply. (by Satu Paiho) - development of new technologies and their interoperability, construction of functional development networks and consortia in this field. New methods and advanced tools for training and information sharing are required to enable better preparedness and capabilities for international crisis management, especially also in relation to an increased understanding of the effects of soft aspects like cultural differences. ACKNOWLEDGEMENTS larged Network for an r&D rOadmap) project – funded by EU’s Framework Programme 7 Security Programme Call 1. [4] Martikainen, A., Pykälä, M-L. & Farin, J. 2007. Recognizing climate change in electricity network design and construction. Espoo. VTT Research Notes 2419. 106p. + app. 80p. [5] Paiho, S., Ahlqvist, T., Piira, K., Porkka, J., Siltanen, P., Tuomaala, P. & Kiviniemi, A. 2008. Roadmap for ICT-based Opportunities in the Development of the Built Environment. Espoo. VTT Research Notes 2444. 58p. + app. 33p. The research has been funded by the EU and VTT. REFERENCES [1] SeNTRE (Security Network for Technological Research in Europe) project – funded under EU’s Preparatory Action for Security Research (PASR) 2004. http://www.asd-europe.org/content/default. asp?PageID=23 [2] STACCATO (STAkeholders platform for supply Chain mapping, market Condition Analysis and Technologies Opportunities) project – funded by EU’s Preparatory Action for Security Research (PASR) 2006. http://www.asd-europe.org/Content/Default. asp?PageID=34 [3] CRESCENDO (Coordination action on Risks, Evolution of threatS and Context assessment by an En- CONTACT Anna-Mari Heikkilä, Dr Research Scientist anna-mari.heikkila@vtt.fi Tel. +358 20 722 3490 37 38 UHHA – A FRAMEWORK FOR EMERGENCY MANAGEMENT IN CHEMICAL ACCIDENTS Henrik Huovila, Ville Kotovirta, Riitta Molarius, Nina Wessberg, Jussi Yliaho Despite the vast amount of information available concerning natural and man-made accidents, rescue forces are generally not able to utilise the existing information efficiently in their decision making. The purpose of the UHHA project was to create a framework for an emergency management system. It should collect practical data from an emergency situation, merge the data in order to get a better overall view of the situation, and send the analysed information, for example, to the rescue services. COMMON OPERATIONAL PICTURE (COP) AND SITUATIONAL AWARENESS The term COP is associated with gaining an overview of an incident by all relevant parties. A COP is especially important in a crisis situation as it enables the Incident Commander and any supporting organisations to make effective, consistent, and timely decisions [1]. Today, crisis management and responses typically engage several organisations. In emergency situations it is necessary to utilise all these different organisations and their available resources as well as possible and this can be done by improving the situational awareness. METHODS The UHHA framework was developed, together with a related analyses and pilot test case, in co-operation with four research centres and over 20 enterprises, stakeholders and other interest groups. Three different analyses for better situational awareness of chemical spill accidents were produced in the project; a vulnerability analysis of the chemical industry (based on former VTT research [2,3], a chemical dispersion model developed by Finnish Meteorological Institute (FMI), and a spatiotemporal population model developed by Helsinki University of Technology (TKK). Figure 1. The information flow within UHHA. Figure 2. Wireless gas sensor network. RESTORING SECURITY AND SAFETY IN CASE OF CRISIS The information flow was tested during a simulated emergency, where the experts then analysed the data for rescue services use. A wireless sensor network had initially been set up at a chemical site in Kuusankoski. The UHHA server received the real-time data from the site, before transferring it for example to FMI. The obstacles preventing the flow of information from the emergency to the decision makers in the rescue forces were recognised and analysed. The pilot test defi ned what kind of wireless sensor network could give the best feedback for our testing (e.g. Figure 1) and how best the information would flow from the chemical accident site to the rescue authorities and decision makers (e.g. Figure 2). Figure 3. The UHHA framework. RESULTS The main objective of the UHHA project was to develop and then test the new concept (Figure 3). UHHA merges all the received raw data into a developed analysis and the relevant analysed data are then conveyed to the appropriate emergency response actors and stakeholders. DISCUSSION AND EXPLOITATION POTENTIAL The results show that it is possible to provide real-time information for crisis management by combining chemical measurements with dispersion and population modelling. Attention must especially be paid to the use of shared vocabularies and ontology-based knowledge representation in the demanding defi nition of complex information. The core challenge the within UHHA COP concept is ultimately centred on who will pay for the system. An assurance that the alarm systems and data lines function during emergencies is essential. Overall, the decision making procedure could be improved, and discussions cited that the use of multichannel communications from the emergency site to, and between, the organisations should be intensified. Various other aspects should also be studied further. ACKNOWLEDGEMENTS The project is funded by the TEKES Security programme and it involved ten company partners and eight public partners. The project is coordinated by FMI and the work has been done in co-operation with VTT, TKK and Helsinki University. REFERENCES [1] FEMA 2009. Glossary of FEMA (Federal Emergency Management Agency) of the US government tasked with Disaster Mitigation, Preparedness, Response and Recovery planning. http://www.w3.org/2005/ Incubator/eiif/wiki/Fema [2] Wessberg, N., Molarius, R., Seppälä, J., Koskela, S. & Pennanen, J. 2008. Environmental risk analysis for accidental emissions. Journal of Chemical Health & Safety, January/February 2008. doi:10.1016/j. jchas.2007.07.001 [3] Molarius, R., Nissilä, M. & Virolainen, K. 2009. The method for assessing the threat for citizens and environment due to chemical sites. VTT Report VTTR-02167-09. CONTACT Riitta Molarius Research Scientist riitta.molarius@vtt.fi Tel. +358 20 722 3480 39 40 INTEROPERABLE SIMULATION FRAMEWORK FOR PLANNING AND TRAINING OF CRISES/ EMERGENCIES MANAGEMENT Pertti Broas Simulation platform for planning and training, which can link organisations, disparate data sources and incompatible regional ways of working, would allow rescue and crisis management centres work with realistic crisis scenarios to train co-operation across European nations for response actions in cross-border hazards. INTRODUCTION It is recognised that there is a lack of efficient national and trans-border cooperation between the diverse organisations and services involved in hazard, disaster and emergency response actions. VTT has presented a solution for a de-centralised, distributed crisis/emergency management planning and training system utilising virtual environment, which • enables cooperation of organisations and nations involved through Internet • assures efficient information sharing and decision support for crisis management • enables collaborative simulation based training with a number of emergency scenarios will be adopted • reduces need for costly live exercises and travelling METHODS The training system concept relies on Interoperable Simulation Framework. The core of the training system will be a management simulation linked with several management centres, different data sources and onsite simulators and equipped with communication system simulation between participating organisations. All these simulations will represent the real world and will stimulate the crisis management centres with the required information to trigger the information and decision-making processes. The distributed on-site simulators connected to the management centres also enable the training of rescue teams involved in different phases of the training. The training simulation concept envisages to link existing operational equipment and/or existing simulators with the virtual training environment which will feed these devices with information generated by the simulation. In that way crisis managers and staffs will be enabled to train under the most realistic conditions and will get information through the operational devices and will send orders, requests, etc using systems familiar to them. A multi-dimensional visualization helps to show crisis managers vivid images from the location of the crisis event, thus enhancing their understanding of situations and their development. RESULTS A distributed simulation system for crisis management training provides a platform using state-of-the-art management simulators, data fusion from various sources (simulated sensors and real databases), simulated telecommunication and on-site simulator. The system concept can be foreseen as integrated and harmonised means to international training over national and organisational borders. Figure 1. View of the training simulation framework. The following objectives for the development have been recognised: RESTORING SECURITY AND SAFETY IN CASE OF CRISIS Figure 2. Crisis/Emergency scenarios and influencing parameters. der training between authorities and industry. The proposed system utilizes simulated information and scenario development for providing accurate situational awareness describing natural or man-made disasters covering large geographical areas. Crisis managers can use familiar interfaces and real systems for communication and decision making. EXPLOITATION POTENTIAL • • • • • • • Develop a flexible and open service integration architecture that allows the integration of different information sources and interoperability between distributed simulations /simulators. Decisions and measures of crisis managers entered into the simulation will drive the evolution of the crisis Develop new tools for management centres, for example. visual user interface to create a multi-layer virtual environment of the target area Develop risk analysis and data fusion methods to add the value of available data in realistic timescales Use and extend existing standardisation initiatives in the security and modelling application domain. Implement a pilot system involving at least two crises management centres in different European countries and demonstrate training with a realistic emergency scenario and test training evaluation methods. The development of the situation will be represented in a dynamic and interactive way (Consequently such as simulation is a dynamic model of crisis scenarios and not just an automatic script). DISCUSSION AND CONCLUSIONS This concept contributes to a significant improvement of existing training systems in order to enhance cross-bor- • The expected impacts envisage exploitation potential among authorities and service providers because: • Distributed training will save training costs directly in time and money, and by reducing the need for expensive live training. • New tools for linking information and communication systems to enable efficient information sharing create possibilities for commercial service providers to support authorities and training institutes Enable better preparedness and capabilities to international crisis management and increase understanding the effects of soft aspects like cultural differences. ACKNOWLEDGEMENTS The author wish to thank all who have contributed the development of the training concept at VTT and organisations who participated to the proposal (1). REFERENCES [1] Broas, P., & Kuukkanen, H. 2009. (Editors). Prepare for Crisis/Emergency Management Interoperable Simulation Framework for Planning and Training of Crises/Emergencies Management. Proposal for FP7SEC-2009-1. CONTACT Pertti Broas Senior Research Scientist pertti.broas@vtt.fi Tel. +358 20 722 4548 41 42 BUSINESS CONTINUITY MANAGEMENT IN ABNORMAL CONDITIONS Anna-Mari Heikkilä, Kari Komonen, Teuvo Uusitalo Management of complex technical infrastructures and business networks demand systematic business continuity evaluations and capability building for abnormal as well as normal conditions. An extensive approach is required in order to support the survival and sustainability of a business in the face of new vulnerabilities arising from changing business and production environments. INTRODUCTION Business management is facing new challenges in line with changing business and production environments. Services and products are nowadays created to make use of increasingly networked value chains, which can generate new vulnerabilities (Figure 1) such as complex interdependencies. They may be critical for the business but are no longer under the control of the individual business unit itself. At the same time, the market conditions and competition are changing faster than ever and creating unforeseen situations. Traditional business risk management tools do not systematically cover these new phenomena and especially the interdependencies that can threaten the continuity of a business and its capabilities to survive and succeed. There has been a need to develop methods for supporting the managers of complex businesses to evaluate their business continuity capabilities especially in abnormal, unpredictable conditions. METHODS Business continuity management in all conditions is based on a thorough understanding of the business, its environment and vulnerabilities (Figure 1). The aim is to restore the normal conditions and return to businessas-usual in the shortest possible time, as well as to minimise any consequences to the business and its properties. The developed approach adapts the standard BS 259991:2006 “Code of practice for business continuity management”, adaptive risk controlling strategies, and guidelines for capability maturity modelling. The main phases of our approach in business continuity management are: 1. Business impact analysis, 2. Identification and classification of critical factors, 3. Identification and assessment of potential solutions, 4. Recovery planning. The approach is step-wise and it identifies and evaluates the weak points of the business and the business’ capabilities to react and sustain the normal conditions in different scenarios. The aspects to be analysed cover all activities and their interdependencies from the production to marketing and strategic leadership including internal and external phenomena that may disrupt the normal business. Based on the evaluation results, the actions related to the removal of the weak points or mitigation of the associated impacts are planned and decided upon. Obviously not all weak points are under the control of the business itself, and so related weak signals need to be identified and early warning tracking arranged. RESULTS In a large Finnish corporation, the approach has been used for building-up overall continuity management procedures for every level of the corporation. These procedures cover internal and external as well as expected and unexpected threats. The procedures and related tools have enabled the gathering of knowledge from various hierarchical levels of the enterprise to the corporation risk manager for creating the corporation continuity strategy. The approach has been found to be especially efficient in identifying synergies between both business units and also production plants in relation to required actions and associated preventative investments. DISCUSSION AND CONCLUSIONS The approach for business continuity management covers both internal and external phenomena that can affect the continuity of a business. When used systematically RESTORING SECURITY AND SAFETY IN CASE OF CRISIS Figure 1. Internal and external dependabilities make complex businesses vulnerable to unexpected interruptions. and extensively, the method can support the early recognition and prevention of business discontinuities. It will support building up the preparedness and capabilities of the business in order to survive and sustain its normal operations within its critical recovery time. Moreover, it can also guide the selection process for alternative actions to improve the resilience of the business against abnormal conditions. The strength of this approach is that it can be carried out in cooperation with existing risk assessment tools such as Enterprise Risk Management (ERM) or risk and safety analyses carried out in industry. The results of the performed risk analysis can be used as an input for business continuity evaluations. And the identified weak points and their possible consequences can then be introduced and processed in different steps of the ERM, for instance. EXPLOITATION POTENTIAL Based on the reference cases, the feedback from companies has been very positive. The approach can benefit a diverse range of businesses from one company corporations to multi-company value chains. The management of complex critical infrastructures and services that are owned by various stakeholders can benefit from the systematic business continuity evaluations and capability building. ACKNOWLEDGEMENTS The research has been funded by Tekes and VTT in two separate projects. CONTACT Anna-Mari Heikkilä, Dr Research Scientist anna-mari.heikkila@vtt.fi Tel. +358 20 722 3490 43 44 ROBUSTNESS OF STRUCTURES Ludovic Fülöp, Tomi Toratti Building structures should have the intrinsic ability (structural robustness) to limit the damage in case of unplanned or unforeseen exposure/loading scenarios. This applies both for naturally occurring unforeseen exposure, and for deliberate attack on the integrity of the structure. In the first case robustness is related to structural safety, while in the second case to security. To achieve robust structures has to be a design objective from the earliest planning stage of the building. INTRODUCTION/CONCEPTS The failure of a building structure due to unexpected exposure can have catastrophic consequences. Unexpected exposure can be an unplanned or unforeseen event, not considered in the design; or when the structure itself has properties not conforming to the design specification. The exposure can be natural, or result of a deliberate attack. “The building”, in the robustness context, is a system which includes: the structural and non-structural construction elements, equipment for detection and warning, active and passive protection equipment, efficiency of the intervention by emergency responders, etc. It is this system which tries to overcome the exposure, and the performance of the elements of the system will influence the consequences. Figure 1. Robustness in 127 buildings which experienced failure of some structural elements Many elements of the system are not related to the building structure or its design; but the behavior of the structure is one link in the chain which influences the performance of the whole. If other elements of the chain fail, the structure itself should survive the exposure with reasonable damage. Of course, reasonable means “reasonable in proportion to the exposure”. Most importantly, local damage should not result in cascading failure, or as is often called “progressive collapse”. This ability of the building structures to arrest local damage, and to resist progressive collapse, is called structural robustness. One of the goals of the building design process should be to produce robust structures; and the scope of research to develop tools for the designer to achieve this goal. DIFFICULTIES OF IMPLEMENTATION Paradoxically, the risk of progressive collapse is increasing in modern structures. In broad terms, this is because more specialization (i.e. concentrating on fulfi lling well defi ned purposes) tends to produce less robust solutions. E.g.: • Non-structural elements tend to be lighter and have less load-bearing capacity in modern buildings. Therefore, they are not capable to transmit loads in exceptional cases. • In order to increase construction speed and reduce costs, continuity between members judged to have no well defi ned function is often eliminated. Therefore, the degree of redundancy is reduced and alternative load transmission paths are eliminated. If the primary load path is not available (e.g. a column has been lost due to impact or explosion), a non-redundant structure has no means to redistribute forces and withstand the damage. • The safety factors in modern design standards are smaller in comparison with older standards. STRUCTURAL SAFETY • • • The use of high quality materials leads to more precise control of the material properties, meaning the elimination of the reserve strength that was typical to old buildings’. Structures become more slender and flexible, and therefore more sensitive to load variations. Construction errors often influence the properties of high quality materials more, compared to the effect on traditional materials and solutions. The review of 127 structural failures showed, that in 40% of the cases the robustness level was low (Figure 1). From the 79 cases when the failure resulted in collapse of the building, over 60% were judged to have low robustness, and only 3% high robustness [5]. Together with the lack of awareness among engineers of the importance of robustness and the inadequacy of the design methods, the above factors can cause unexpected behavior in modern buildings (Figure 2). CURRENT DESIGN PRACTICE Some robustness requirements are incorporated in modern design standards. E.g. in Europe, “a structure shall be designed and executed in such a way that it will not be damaged by events such as explosion, impact, the consequences of human errors, to an extent disproportionate to the original cause” [2]. However, the specified requirements are too general and difficult to apply in practice. Possible measures to increase robustness include: • The tying together of the structural elements. The ties may be designed as components which must sustain large deformations during catastrophic events. • Providing load-bearing interior partitions. • Creating redundant structural systems. • Ductile detailing, especially of connections, but also of members. • Compartmentalization, in order to isolate local failure and impede the spread of damage to other parts of the structure (i.e. sacrificing part of the structure in case of exceptional loading). R&D ACTIVITY At VTT, the work on structural robustness is integrated in the general topic of structural safety and security. The experimental and modeling background knowledge in the structural engineering field is used as platform for the development of the robustness concept. However, a fundamental reinterpretation of the existing knowledge and results is required. Figure 2. Collapse of the roof of a fair centre [1] VTT’s activity is in line with other European research, at the stage of development of concepts. The two main drivers of the robustness topic are participation in COST TU0601 “Robustness of structures” [3] and COST E55 “Modeling the Performance of Timber Structures” [4]. TU0601 focuses entirely on the development of the concept of robustness, and the raising of awareness to this topic within the construction industry; while E55 is concentrated on the implications of robustness on the design of timber structures. REFERENCES [1] Messuhallin katon romahtaminen Jyväskylässä 1.2.2003; Onnettomuustutkintakeskus, Helsinki, 2003 (http://www.onnettomuustutkinta.fi /uploads/ ggfjciwbanf.pdf) [2] EN1991-1-7 Eurocode 1: Actions on structures, Part 1-7: General actions - Accidental actions; European Committee for Standardization: Busseles, 2003; [3] http://www.cost-tu0601.ethz.ch/ [4] http://www.cost-e55.ethz.ch/ [5] Fruhwald, E.; Thelandersson, S.; Fulop, L.; Toratti, T. Robustness evaluation of failed timber structures; COST Office: ETH Zurich, 2008; [6] Toratti, T., Quality of timber construction - Guidance for buildings and load bearing structures, World Timber engineering conference, Miyazaki Japan 2008. [7] Toratti, T., Proposal for a Failure template, Cost E55 Workshop, Finland, 13-14.03.2008 CONTACT Ludovic Fülöp, Dr Senior Research Scientist ludovic.fulop@vtt.fi Tel. +358 20 722 6924 45 46 SAFETY RESEARCH ON IMPACT LOADED STRUCTURES Kim Calonius, Ilkka Hakola, Matti Halonen, Jouni Hietalahti, Erkki Järvinen, Juha Kuutti, Leo Lapinluoma, Jukka Mäkinen, Arja Saarenheimo, Ari Vepsä An aircraft impact on safety related structures, in spite of its low probability, has been for a long time recognised as a relevant loading case in designing modern nuclear power plants. Protective concrete walls of nuclear power plants are required to withstand the effects of impacts by projectiles, e.g. an aircraft crash or accidental missiles. The main concern in many cases is the fate of fuel. INTRODUCTION An aircraft impact is considered to be a relevant loading case in designing modern nuclear power plants. Numerical methods and models need to be verified against experimental data in order to guarantee the reliability of numerical results when simulating full scale applications. The main purpose of impact tests was to analyse and calculate test results, which have been done with the soft missile. The spreading of the fuel in a crash is also one main interest, because the explosion and fi re may also cause damage to structures, machines and electrical equipment. When considering the spreading of the fuel the main interest has been on the measurement of the velocities and sizes of fuel droplets during a crash. TEST METHODS A medium scale apparatus has been constructed to perform impact tests. The apparatus consist of a pressure accumulator, acceleration tube, piston catcher and a target. The piston inside the acceleration tube is forced by pressurised air and the piston pushes the missile above the tube via a fi n, which protrudes from the slot on the upper side of the acceleration tube (Figure 1) The missile geometry (in particular the cross-sectional shape) can be freely selected and the missile can be made of steel, stainless steel or aluminium. The main objective of the impact tests is to investigate the failure modes of concrete walls and to measure forces, deflections of the wall, and strains of the reinforcements. A water tank could also be installed inside the missile, making it then possible to research liquid dispersion and measure the size and speed of droplets dur- ing an impact. High speed video cameras, using a maximum of 1000 frames per second, can also be utilised. Figure 2 shows three still images of a steel missile crash during an impact test. The impact apparatus is capable of accelerating a missile with a maximum weight of 50 kg to a top speed of 200 m/s. NUMERICAL STUDIES Reinforced concrete is a challenging material from the numerical simulation point of view. Different kinds of methods for predicting the response of reinforced concrete structures subjected to impact loads caused by deformable missiles that may contain liquid have been studied and assessed. Also materially non-linear analyses using the finite element (FE) method have been conducted. Nonlinear analyses of reinforced structures are quite sensitive to the material parameters. Numerical studies on impact loaded reinforced concrete walls have been reported [2,3,4]. Simulation of liquid fuel dispersal and burning has been performed using FDS software in the geometry of laboratory impact tests. The purpose of the work was to study the feasibility of the FDS code for the simultaneous simulation of extremely fast fluid release, flame formation and progress of heat and combustion products. The results on fuel dispersal simulations showed, that sufficiently accurate predictions of spray propagation can be achieved, at least in the scale of the impact tests. The fi re simulation results were both qualitatively and quantitatively plausible, although some uncertainties existed and are difficult to estimate. Studies on liquid dispersal have also been reported [5]. RESULTS The safety of nuclear power plant containment against aircraft crash has been researched by impact apparatus and to date, almost 100 tests have been done. High speed video of the tests and numerical data have been analysed with the acquisition frequency of 100 000 Hz. The impact tests with soft missiles have been analysed and verified us- STRUCTURAL SAFETY Figure 1. Impact apparatus. Figure 2. Still images of steel missile crash in impact test. ing formulas and advanced numerical methods. Also the spreading of the fuel has been investigated in some tests by measuring the speed and size of droplets after a missile impact. DISCUSSION AND CONCLUSIONS Impact tests have been conducted in order to both research soft missile crashes against concrete walls and develop the associated analysing methods. The tests have provided valuable information about the failure modes, impact forces and subsequent spreading of the water. Impact research has been very important for the development of better analysis tools to increase the safety of structures. Tests to date have been conducted using quite simplified structures and future research should involve also more complicated structures. EXPLOITATION POTENTIAL The impact test apparatus and developed analysis methods and formulas can be utilised in all kinds of crash tests. Especially in the future the target can be made of a different material or even a combination of materials. It is also possible to perform tests with pressurised air, in order to estimate the safety of structures when considering explosions. REFERENCES [1] Lastunen, A, Hakola I., et al. 2007. Impact Test Facility, Proceedings of the 19th International Conference on Structural Mechanics in Reactor Technology. SMiRT 19. Toronto, Canada. [2] Saarenheimo, A., Calonius, K., et al. 2007. Numerical Studies on Impact Loaded Reinforced Concrete Walls, Proceedings of the 19th International Conference on Structural Mechanics in Reactor Technology. SMiRT 19. Toronto, Canada. [3] Saarenheimo, A., Tuomala, M., et al. 2007. Impact of Deformable Missiles on reinforced Concrete Walls, Proceedings of Consec´07. Concrete under severe conditions: Environment & Loading. Toutlemonde, F. et al. (Eds). Tours, France. [4] Saarenheimo, A., et al. 2007. Structure Mechanics Simulation of Phenomena During High Energetic Impact. EUROSAFE Forum 2007, “Securing Nuclear Safety in Future Years”, Cologne, Germany. 23 p. [5] Silde, A et al. 2007. Experimental and Numerical Studies of Liquid Dispersal from a Soft Projectile Impacting a Wall, Proceedings of the 19th International Conference on Structural Mechanics in Reactor Technology. SMiRT 19. Toronto, Canada. ACKNOWLEDGEMENTS The authors wish to thank all the researchers and assistants who have been working with the impact tests and analysis. Their excellent work, knowledge and co-operation has resulted in a successful series of and framework for impact tests with soft missiles. CONTACT Ilkka Hakola Senior Research Scientist ilkka.hakola@vtt.fi Tel. +358 20 722 6685 47 48 STRUCTURAL SAFETY IN SEISMIC REGIONS Ludovic Fülöp, Ilkka Hakola, Peter Hradil, Asko Talja, Matti Mielonen Earthquakes are one of the most dreadful natural disasters. They are the least predictable, with no or uncertain warning prior to occurrence. Defence against earthquakes can only be provided by the combination of preparedness and mitigation measures, together with efficient emergency response. The classic saying, “Earthquakes don’t kill people. (Poorly built) Buildings do!” is an overstatement; but structural safety for seismic loads is certainly a key to reducing risk, while poor construction practices can significantly increase the consequences of an earthquake. Therefore, good building practices, sustained and implemented over a long period of time, are crucial for building-up resilient buildings with good earthquake safety. The main task of the engineering professionals is to provide the technical knowledge of what good practice means; but also to keep society and decision makers alerted about the potential consequences of long term neglect. Advocacy, preparedness, prevention, and mitigation are all crucially important for low-probability highconsequence events like earthquakes [3]. METHODS, DISCUSSION OF SOME RESULTS INTRODUCTION Between 1974 and 2003, three earthquakes were listed in the Top 10 natural disasters with highest loss of human life [1]. The Great Tangshan Earthquake (27 July 1976, China) contributed the highest figure, a distressing 242 000 lives lost. In all, 82 million people were affected in the 660 earthquake disasters reported in the 30 year period. One important aspect of VTT’s work is to carry out consulting work when earthquake provisions are required for buildings and/or important equipment. The current research activity is focused on the development of efficient design concepts for new buildings with good earthquake performance [4], and the study of possibilities to rehabilitate and retrofit historic buildings which may be affected by earthquakes but have not been designed accordingly [5]. Economic loss is usually also very significant. After an earthquake event, entire communities typically need to be re-settled, and neighbourhoods rebuilt. A few important risk factors affect the consequences of an earthquake – population density and seismic activity being the ones more difficult to control. However, the vulnerability of the built environment is one risk factor which is controllable by good planning and construction practices. STRUCTURAL SAFETY A KEY FOCUS AREA The vulnerability of the built environment makes a real difference. A Richter 6.3 earthquake can be as devastating as the one in Bam, Iran (2003), which destroyed 90% of the city dwellings [1] made of mud bricks. It can have more moderate consequences like in l’Aquila, Italy (2009), where many old rubble masonry buildings were damaged or collapsed, or it can pass without special notice, like the magnitude 6.3 Kyushu, Japan, earthquake with reportedly injured eight people [2]. Figure 1. Historic masonry building proposed for investigation [6]. STRUCTURAL SAFETY (a) (b) Figure 2. Cracking pattern of (a) un-rehabilitated and (b) rehabilitated building due to seismic loads [7]. The new building typologies under investigation are lowrise buildings extensively used for industrial and commercial activities; acknowledging that these building typologies represent a very important segment of the construction sector. An equally important priority is the rehabilitation of old buildings. Most existing buildings are in need of seismic retrofit, because the original design was not in accordance with the required safety level (understanding the effects of earthquakes is quite recent), or the destination of buildings has been changed without regard to the different demands imposed by the new use. For example, sophisticated numerical analysis is carried out on masonry stone buildings, much like the ones damaged in recent earthquakes in Italy (Figure 1), in order to predict their seismic behaviour, and to propose rehabilitation procedures for improving earthquake safety (Figure 2). [2] [3] [4] [5] [6] [7] EXPLOITATION POTENTIAL VTT is working with an extended European partnership on the earthquake safety topic. Over 15 organisations, representing industry, research, universities and the public sector (e.g. the region of Tuscany). The newly developed design and rehabilitation procedures will complement and improve the current practice, contributing to increased earthquake safety of new and existing buildings. REFERENCES [1] Guha-Sapir, D., Hargitt, D. & Hoyois, P. 2004. Thirty years of natural disasters 1974-2003: The num- bers, Presses Universitaires de Louvaine, Louvainla-Neuve. ISBN 2-930344-71-7 ht t p://ear t hquake.usgs.gov/eqcenter/ eqinthenews/2006/usnvbf/#summary http://geohaz.org/ PRECSATEEL – Prefabricated steel structures for low-rise buildings in seismic areas (RFSRCT-2007-00038, Research Found for Coal and Steel) (Not available except the RFCS site: http://cordis.europa.eu/coal-steel-rtd/home_en.html) STEELRETRO – Steel solutions for seismic retrofit and upgrade of existing constructions (RFSRCT-2007-00050, , Research Found for Coal and Steel) (Not available except the RFCS site: http://cordis.europa.eu/coal-steel-rtd/home_en.html) Braconi, A., Osta, A., Nardini, L. & Salvatore, W. 2008. Defi nition of the masonry benchmark building for the execution of comparative performance analysis between steel intervention techniques; University of Pisa, RIVA Acciaio SpA. Fülöp, L. 2009 Upgrading/retrofitting proposals for masonry structure using steel solutions. VTTR-03074-09. p. 1-29 CONTACT Ludovic Fülöp, Dr Senior Research Scientist ludovic.fulop@vtt.fi Tel. +358 20 722 6924 49 50 QUALITY OF TIMBER CONSTRUCTION - GUIDANCE FOR BUILDINGS AND LOAD BEARING STRUCTURES Tomi Toratti This study describes briefly the main contents on aspects for controlling the quality for timber construction regarding the manufacture, the design, the building process and the maintenance process. As this topic is very wide, only some crucial parts are dealt with here. It is a main theme throughout this work that correctly timed decisions at different phases of a building project together with the flow of information is crucial for quality. Guidelines for this decision making are given in templates. INTRODUCTION Quality requirements are set for the design and construction of timber buildings, so that sufficient reliability, durability and overall usefulness of the building are ensured. The full document, ref [2], is particularly meant for the design, construction, use and maintenance of high span or otherwise demanding timber structures and joints. Considering timber buildings, the following should receive special attention: • Handling of information and communication between the building project partners • Security during construction, especially on temporary bracing of load bearing structures • Considerations on performance of connections and how these are affected by variable humidity • Swelling and shrinking of timber elements • Cracks caused by shrinkage of moist wood • Orthotropic strength of wood • Fire safety The scope of this study was on the quality assurance of the end-product quality, which is to be achieved by a functional cooperation among the project partners, sufficient coverage and quality of design and on the documentation to be produced in a building project. IDENTIFIED RISKS Here is a list of some typical cases, which have resulted in structural failures and which could have been avoid- ed with quality assurance. Such cases demand special attention. • Failures of inner ceilings, where in most cases the ceiling has been supported relying on the withdrawal strength of nails. Possibly additional hanging loads have been applied which have not been considered in the design. • Large connection areas constructed in a way that does not allow for shrinkage of the wood, thus checking is developed in the connection area. • Lack of stabilizing structures, either partly lacking or totally lacking. Especially in roofs of agricultural buildings and halls such failures have occurred. The structural performance has not been understood or the stabilization has not been designed to start with. • Agricultural buildings are normally large and are structurally demanding buildings and normal do-ityourself building is not recommended. • The modular network has been differently understood by the project partners. It is important that element designer and producer as well as the assembly contractor have a similar understanding of the modular network. PLANS AND DOCUMENTS NEEDED FOR QUALITY ASSURANCE The target levels of quality of a building project are drafted in documents together with the means on how these levels are achieved. Also in the usual design and building contract documents, quality is often referenced (for example in setting requirements, method descriptions and inspection plans). This report describes the contents and implementation of some crucial tasks and documents with respect to quality assurance: 1. Project description (The project description is a unique document of a building project specifying all the technical requirements and the initial information of the project. The project description gives quality requirements on the design and on the construction.) STRUCTURAL SAFETY Figure 1. Plans and documents related to the quality assurance of a building project. 2. 3. 4. 5. 6. 7. Initial risk assessment Structural design Risk analysis and external supervision of the design Moisture control plan Assembly plan Maintenance manual of the building Figure 1 shows a schematic diagram on the timing of the drafting of these documents. Some of these documents for constantly updated as the project progresses from initial planning to design and execution. The main objective is that in every stage of the project, the documents have sufficient updated information that certain design or execution phases can progress. Such documents needing updating are the project description and the moisture control plan. The procedures developed in this study, which are only partly described here, have received a varying feedback from the building professionals in Finland. In general, structural designers are most positive on these guidelines, as these help on their everyday design work on common problems encountered, which may be as simple as not having the necessary background information available when carrying out structural design or that sufficient human resources needed are not considered. Some professionals regard the template as too complicated, although the contents are on decisions which should be done in any case. The use of such templates would be easier to apply in practice when information technologies are more widely applied for the construction process. REFERENCES [1] Fruhwald, E., Serrano, E., Toratti, T., Emilsson, A., & Thelandersson S. 2007. Design of safe timber structures – How can we learn from structural failures in concrete, steel and timber? Report TVBK-3053. Lund, Sweden. [2] Toratti, T. 2007. Puurakenteiden laadunvarmistus, suunnittelu – valmistus – työmaatoteutus – käyttö. RIL 240-2006. Finnish civil engineering association. CONTACT Tomi Toratti, Dr Senior researcher tomi.toratti@vtt.fi tel + 358 20 722 4631 51 52 PROPOSAL FOR A EUROPEAN TEMPLATE TO BE USED IN ASSESSMENT OF STRUCTURAL FAILURES Tomi Toratti Failure studies on structures have recently been carried out in various countries in Europe. However, these failure assessments have not been done in a uniform manner, which makes comparisons between the studies and the development of common procedures a difficult task. The purpose of this paper is to propose a common format on gathering information from failure cases of timber structures. This topic is discussed in the research network of Cost E55 Modeling of Timber Structures. OBJECTIVES The objectives of a failure template are: • To help the person carrying out the assessment to fi nd the relevant questions that need answers. This is mainly when new cases are assessed, but it may be used also for a re-evaluation of past failure cases. • To produce a failure assessment that is more uniform and which is less dependant on the expertise, professional involvement or personal characteristics of the person carrying out the assessment. Clearly the human factor cannot be fully ruled out. • Produce material for further analysis to pinpoint weaknesses in the construction process, which need attention or further research. This may be to identify if design procedures need improvement, if our construction material is getting weaker if there are not enough human resources allocated for specific tasks as structural design, lack of communication in the construction site or misunderstandings or other similar deficiency BENEFIT OF THE FAILURE TEMPLATE When an expert is called for a failure assessment, he/she may use the template in gathering the relevant information. It is not always important that the template is fully completed and certain information can be missing. This could possibly be due to that the information is simply not there or that a certain part is restricted from public for whatever reason. The real benefit from a common template comes when a number of failures cases are investigated. This should reveal if there are deficiencies in the material, design, construction process etc. This provides the information needed to pinpoint where alerts and/or remedy actions are needed. The failure causes are in this draft classified based on a slightly developed version of the classification used in the Nordic studies. An additional question is posed under each failure cause class, in order to bring up further light on the backgrounds of the cause. Failure Cause classification used is as follows: Related to structural design a) Poor design/lack of design related to strength or environmental actions Quality control measures performed on the design (eg. external design check), describe b) Deficiency of code rules for prediction of capacity Identify the code design equation and the building codes (and national annex) used c) Extreme loading exceeding code values Identify the building codes (and national annex) used Related to construction on-site d) Poor principles during construction on site Describe quality control measures performed in construction Is the construction method known as best practice e) Alterations on-site of intended structural or detailing design Describe quality control measures performed during the construction works (eg. construction inspections) Related to building materials f) Inadequate quality of wood material used in construction Describe origin of material and quality control procedure applied on the material STRUCTURAL SAFETY Figure 1. Buckling of the roof structures due to insufficient bracing [1]. g) Poor manufacturing principles for wood products (glulam, fi nger-joints etc.) In this case best practice is not good, suggest improvements for best practice h) Manufacturing errors in factory on prefabricated products (elements) Quality control measures performed on manufacturing (eg. internal or external production control), describe Related to building use i) Is the building used as intended (as designed) Describe j) Is there lack of maintenance of the structure Was sufficient information on use or maintenance procedures given? REFERENCES [1] Fruhwald E., Serrano E., Toratti T., Emilsson A., Thelandersson S. 2007: Design of safe timber structures – How can we learn from structural failures in concrete, steel and timber? Report TVBK-3053 Lund. Sweden. [2] Toratti T. 2007: RIL 240-2006 Puurakenteiden laadunvarmistus, suunnittelu – valmistus – työmaatoteutus – käyttö. Publication RIL 240-2006, Finnish civil engineering association. CONTACT Tomi Toratti, Dr Senior researcher tomi.toratti@vtt.fi tel + 358 20 722 4631 53 54 INTERNET TOOL FOR CONTROLLING DOMESTIC FIRE RISKS Tuula Hakkarainen, Hanna Hykkyrä, Kimmo Kauvo, Tuomo Rinne, Kati Tillander An Internet tool “Palovara” has been developed at VTT for assessing and controlling domestic fire risks. Its main purpose is to improve fire safety attitudes at homes and to support the national initiative to reduce fire risks to private citizens. “Palovara” consists of three parts: a questionnaire on fire risks at home, a collection of Internet links to fire safety information, and fire simulations illustrating the development and spread of fire and smoke. The questionnaire responses have been analysed to detect weaknesses in domestic fire safety and focus areas for improvement measures. INTRODUCTION The annual number of building fi res in Finland is ca. 4 000. The number of fi re fatalities in Finland is ca. 20 incidents per million inhabitants per year. More than 95 % of fi re fatalities occur in residential buildings. An important factor increasing the fi re risks of residential environment is the alienation from the use of fi re. If not realising fi re risks at home, people may cause dangerous situations by imprudent action. Furthermore, knowledge on the rapid development of fi re and rational action in case of fi re can be inadequate. To improve fi re safety attitudes at homes and to enhance the initiative reduction of fi re risks of private persons, an Internet tool for assessing and controlling domestic fi re risks has been developed at VTT. The “Palovara” tool, www.palovara.fi , consists of three parts: a multiple-choice questionnaire on fi re risks at home, a collection of Internet links to fi re safety information, and fi re simulations illustrating the development and spread of fi re and smoke. METHODS The development of the multiple-choice questionnaire was two-phased. First, a trial version was prepared for testing and commenting by pilot users. More than 300 answers and about 50 written comments were received. On this basis, the questionnaire was revised and fi nalised. The purpose of the Internet links collected to Palovara is to facilitate the information search on different topics related to the fi re safety of home environment. The links arranged according to the topic lead to information on e.g. action in case of fi re, smoke alarms and extinguishers, electrical devices, grilling and campfi res, candles, and smoking. Fire simulations to illustrate the development and spread of fi re and smoke were performed using the Fire Dynamics Simulator (FDS) program developed by NIST and VTT [1]. The simulations describe the development of fi re originating from a deep fat fryer or a sofa, scenes in a smoky staircase, and flashover of a living room. The fi re load of a room and the ignitability of internal surfaces have been varied to demonstrate their effect on the fi re development. RESULTS AND DISCUSSION The Palovara tool for assessing and controlling domestic fi re risks was published in May 2008. Its most important message is that people themselves are in the key role in the improvement of fi re safety at home. The front page of Palovara is shown in Figure 1. The Palovara questionnaire gives immediate feedback to the user related to each answer. At the end of the questionnaire, a report with scores on different fi re safety topics is generated. The answers with voluntary background information are recorded in a database for analysis. The answers stored by the end of October 2008 have been statistically analysed [2]. On the basis of the results, the improvement measures of domestic fi re safety should be focused especially on fi re prevention and rescue, smoke alarms and fi rst extinguishing equipment, use of electrical devices, and smoking. The most evident fi nding was the inadequate knowledge of the youngest FIRE SAFETY Figure 1. Main page of the Palovara website. http://www.palovara.fi/ age groups in all topics of the questionnaire. Therefore, fi re safety guidance and education should be started already at nursery and school age. ish National Rescue Association SPEK, the Emergency Services College, and the Federation of Finnish Financial Services is gratefully acknowledged. An extensive collection of fi re safety information is provided via the Palovara Internet links. The link list can serve as a classified index when the user looks for information on a specific topic. REFERENCES Fire simulation videos in Palovara provide an illustrative presentation on the development of fi re. The videos help the viewer to realise that quick action and escape are important in case of fi re. Furthermore, they illustrate that, unlike in disaster movies, the visibility in a fi re room is very limited due to smoke. EXPLOITATION POTENTIAL [1] National Institute of Standards and Technology, Gaithersburg, Maryland, USA, and VTT Technical Research Centre of Finland, Espoo, Finland. Fire Dynamics Simulator, Technical Reference Guide, 5th edition, October 2007. NIST Special Publication 1018-5 (Four volume set). [2] Hykkyrä, H., Tillander, K. & Hakkarainen, T. 2009. Kotien paloturvallisuusriskien kartoitus Palovaraaineiston pohjalta. [Survey of domestic fi re risks on the basis of internet questionnaire data.] To be published in Pelastustieto magazine, August 2009. (in Finnish) About 10 000 individualised users have visited the Palovara site during the fi rst year after publication. The monthly number of visitors is currently ca. 500. The main beneficiary of Palovara is the general public in Finland. The Palovara tool can also be used for educational purposes. By storing the answers to the questionnaire, Palovara provides data for the authorities and researchers. CONTACT ACKNOWLEDGEMENTS The research was funded by the Finnish Fire Protection Fund, the Department for Rescue Services of the Ministry of the Interior, and VTT. The cooperation of the Finn- Tuula Hakkarainen, Dr Senior Research Scientist tuula.hakkarainen@vtt.fi Tel. +358 20 722 4828 55 56 FIRE SAFE BUILDING WITH WOOD Tuula Hakkarainen, Jukka Hietaniemi, Esko Mikkola, Tuuli Oksanen Fire Safety Engineering (FSE) methods and product performance knowledge have been applied to show improved or maintained fire safety together with increased possibilities for use of wood. Examples of these studies are use of timber beams in large halls, use of wood in facades and reduced minimum distances between low rise buildings. INTRODUCTION Fire safety is one of the essential requirements for safety building and thus a key aspect when considering an increase of wood use in building. Wood as a combustible material is often considered dangerous and difficult to manage as a building material. In the past this has caused regulations and interpretations to develop unreasonably restrictions for building with wood. RESULTS Analysis of wooden beams in large hall buildings has shown that wood structures are not usually critical to fi re safety. If fi re safety is to be improved, investments to e.g. faster detection or suppression systems would be much more efficient than investments to structural fi re protection. Wooden facades in concrete framed building (4 storeys) cause only a limited increase in the probability of fi re METHODS Application of performance based design methods enable judgement of fi re safety without prescriptive materialdependent engagements. These methods can be used for reviewing norms and for comparisons of fi re safety levels by showing significance and magnitude of different safety measures. For development of new products with improved fi re performance, physical relationships of effecting parameters are used in predicting needed functions. Figure 1. a) Flashover in a room scenario. Figure 1. b) External fire exposure scenarios. FIRE SAFETY Figure 2. Examples of charring depth results for different types of thin thermal barriers. spread to apartments above the origin of fi re. This increase is well within the limits also caused by variation in other parameters (distance to fi re brigade, room shape, window dimensions, etc.). Thus, a wooden facade does not practically increase the number of fi re fatalities, and property losses can be restricted by proper construction of ventilation cavities as well as eaves and roof structures. Based on studies of several fi re scenarios (see Figure 1) in dense and low-rise buildings it was concluded that for P3 fi re class buildings (detached and semi-detached houses) the minimum distance between buildings could be reduced from 8 m to 6 m [1,2]. duced with the help of assessment methods for product development. All of these factors result in an increased market share of buildings with wood while ensuring continued or improved fi re safety. ACKNOWLEDGEMENTS Practical guidance for design purposes is being developed in a European project entitled “Fire Resistance of Innovative Timber Structures (FireInTimber)” [3]. Key topics of this project are fi re design concepts for structures, calculation methods for structures including connections and new products. An example of studies concerning thermal barriers for decreasing charring rate of timber products is given in Figure 2. DISCUSSION AND CONCLUSIONS Results based on fi re safety engineering ensure that required safety levels are reached with the proposed solutions without prescribing which materials can or cannot be used. The used calculation and assessment tools provide practical methods for new design concepts as well as for product development of timber products with improved fi re resistance. The research has been funded by Tekes, several industry partners and VTT. REFERENCES [1] Hietaniemi, J. 2007.Fire safety of low-rise and densely built residential area. Espoo. VTT Tiedotteita. Research Notes 2415. 227 p. + att. 144 p. (in Finnish) http://www.vtt.fi/inf/pdf/tiedotteet/2007/T2415.pdf [2] Hietaniemi, J. 2007. Fire safety engineering design of densely built residential areas. Proceedings of the Interflam 2007 Conference, University of London, UK, 3-5 September, 2007. Interscience Communications Limited. London. [3] FireInTimber project: http://www.nexdo.com/view. do?w=579&page=FireInTimber. EXPLOITATION POTENTIAL The results provide background data for proposals of changes in regulations enabling wider use of wood in structures and in facades as well as reducing minimum distances between low-rise buildings. Practical guidance is provided for design purposes and testing needs are re- CONTACT Esko Mikkola, Dr Chief Research Scientist esko.mikkola@vtt.fi Tel. +358 20 722 4825 57 58 A NUMERICAL TOOL FOR EVACUATION SIMULATION Simo Hostikka, Timo Korhonen An evacuation simulation module has been developed at VTT for the Fire Dynamics Simulator fire model. The key features of the new computational tool include: 1) agent-based simulation of humans as individuals, 2) the ability to simulate large and dense crowds, 3) the identification of hazardous clogging situations by the inclusion of real physical forces appearing in the egress situations, 4) the capability to consider socio-psychological effects like small-groups, 5) exit selection, and 6) the interaction between fire and humans. A series of evacuation experiments has been performed to obtain validation data for the model. Two different types of evacuation situations were studied experimentally [4]. The fi rst type involved evacuation drills which are normally carried out as part of the safety training of the staff in public buildings and workplaces. In evacuation drills, careful preparation of the observations is possible. The second type involved actual evacuations, where the decision making processes are likely to be similar to what they would be in case of a real fi re. The main techniques used for the observation of evacuation drills were video cameras and Radio Frequency Identification (RFID). The utilisation of surveillance camera recordings was studied in the context of actual evacuations. INTRODUCTION RESULTS AND EXPLOITATION POTENTIAL Numerical simulation of fi re and evacuation processes is an essential part of the modern performance-based building design process. In this work, a new evacuation simulation tool has been developed with three main features: i) The tool can be used to simulate large and high density crowds where the movement dynamics is affected by the crowd pressure. ii) The interaction between the evacuees and fi re can be taken into account by simultaneous simulation. iii) The decision making processes of the evacuees are modelled taking into account socio-psychological aspects like the importance of familiar people (group dynamics) and places. The simulation tool has been implemented to the Fire Dynamics Simulator (FDS) software, and is called FDS+Evac, see Figure 1. The FDS+Evac tool has been validated against experimental results and other commercial evacuation codes. The tool was made publicly available as part of FDS for the whole fi re community. FDS+Evac can be used to perform evacuation simulations in a wide range of different applications. So far, in Finland it has been used in the analysis of, for example, a historical museum, a large shopping centre, a concert hall and a railway station. Applications in other countries are numerous. ACKNOWLEDGEMENTS The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation), the Finnish Fire Protection Fund, the Ministry of the Environment, the Academy of Finland and VTT. MODEL DEVELOPMENT In the FDS+Evac tool, each human is treated as an autonomous agent and followed by an equation of motion. This approach allows each agent to have its own personal properties and escape strategies [1, 2]. By using FDS as the platform of the evacuation calculation there is direct and easy access to all local fi re related properties, like temperature, smoke, and radiation levels. Game theoretic reaction functions and best response dynamics are applied to model the exit route selection of the evacuees [3]. REFERENCES [1] Korhonen, T., Hostikka, S. & Keski-Rahkonen, O. 2005. A proposal for the goals and new techniques of modelling pedestrian evacuation in fi res, Fire Safety Science, Vol.8. pp.557-569. [2] Korhonen, T., Hostikka, S., Heliövaara, S., Ehtamo, H. & Matikainen, K. 2007. FDS+Evac: Evacuation Module for Fire Dynamics Simulator, Interflam2007: 11th International Conference on Fire FIRE SAFETY Figure 1. A coupled fire and evacuation calculation. Science and Engineering, Interscience Communications Ltd, London, UK. pp.1443-1448. [3] Korhonen, T., Hostikka, S., Heliövaara, S. & Ehtamo, H. 2008. FDS+Evac: Modelling Social Interactions in Fire Evacuation, Proceedings of the 7th International Conference on Performance-Based Codes and Fire Safety Design Methods, SFPE, Bethesda, MD. pp.241-250. [4] Rinne, T., Hostikka, S., Paloposki, T., Korhonen, T., Saari, J.-M. & Heliövaara, S. 2009. Application of RFID and Video Imaging on Evacuation Observations in Offices and Public Buildings, Fire Safety Science. Vol.9. pp.329-340. CONTACT Timo Korhonen, Dr Researcher timo.korhonen@vtt.fi Tel. +358 20 722 4945 59 60 INTEGRATED RISK ASSESSMENT OF EMERGING RISKS IN LARGE INVESTMENT PROJECTS Yngve Malmén, Anna-Mari Heikkilä, Teuvo Uusitalo Here the emerging risks are defined as: • new risks; such as risks related to new technologies, • growing risks; for instance, risks that are expected to increase as certain technologies become more common, • re-evaluated risks; i.e. risks that have previously been underestimated. Aspects associated with safety and security, in addition to vulnerability and business continuity, are encountered at various stages during an investment project. Emerging risks must be addressed alongside more conventional risks. Typically due to a lack of data, most existing risk assessment methods and tools are not optimal for the assessment of emerging risks. In addition, local and national differences and priorities may affect the interpretation and actions on various emerging risks. This leads to a need to adapt generic models and methods to a national or even a local environment. METHODS Emerging risks are typically risks for which only a limited amount of data is available. As a consequence, these risks are often not foreseen or simply neglected during risk assessments. In major capital projects in industry such an oversight might have serious implications on the project itself or on the safety of the future operators and maintenance staff at the new installation. VTT is therefore focused on creating new risk assessment methods and tools that can be integrated with those currently in use. INTRODUCTION The aim of this line of research is to improve the management of emerging risks in large industrial investment projects by providing new and innovative risk management features to current tools and procedures used by process developers and engineers in these projects, by plant operators and maintenance staff in existing plants, and by the companies’ decision makers and project management. VTT’s vast experience in the application of current risk analysis, assessment and management principles and methods in a variety of contexts constitutes the basis of our development of improved methods and models for addressing emerging risks phenomena in large investment projects. Our work is also based on the integrated risk management and emerging risk paradigms as defined in the EU project known as iNTeg-Risk. The development work of generic solutions is done in cooperation with both national and international partners. The leading principle in the selection of the methods used in the development work is to satisfy the needs of the future users of the results. Thus, generic methods and models are, for instance, further developed to better support the demands associated with new technologies to be implemented in Finland. RESULTS Integrated risk management solutions are developed for: MANAGEMENT OF EMERGING RISKS • • • process developers and engineers working in investment projects, plant operators and maintenance staff, decision makers in large scale investment projects. traditional and emerging risks in large investment projects involving complex systems with technical, human and organisational risks. ACKNOWLEDGEMENTS The results of this ongoing line of research include: • innovative new risk management features to current tools – mainly to 3D modelling and virtual-/hyper- reality tools – used by process developers and engineers working in investment projects, • an integrated risk analysis method and models for risk assessment of complex systems including technical, human and organisational risks to support plant operators and maintenance staff, • a method with a focus on emerging risks for supporting the decision making of directors and managers in large scale investment projects. This line of research is funded by the European Union and VTT. DISCUSSION AND CONCLUSIONS Decision making at every stage of an investment project is becoming more difficult due to emerging risks, for which the probabilities and severities are not well known, undefined, or ambiguous. The new methods and models developed during VTT’s research projects supplement current decision making procedures: they add to the features of current tools and thus enable the systematic identification and assessment of emerging risks in an integrated manner, or they use the possibilities of the tools to visualise the results of risk management activities and to store data related to different risk scenarios. Feedback between the operating plants and their maintenance staff on the one hand, and process developers and design engineers on the other, will be assured. EXPLOITATION POTENTIAL Based on the experience of this line of research, VTT possesses up-to-date knowledge and excellent networks to support developers and engineers, plant operators and maintenance staff, as well as the decision makers of companies and project management in integrated management of both CONTACT Yngve Malmén Senior Research Scientist yngve.malmen@vtt.fi Tel. +358 20 722 3276 61 62 SAFETY-CONSCIOUS MODERNISING PROCESS OF AUTOMATED MACHINERY Marita Hietikko, Timo Malm, Markku Vanhala, Outi Venho Work is more efficient and disagreements less likely when the phases of the work are known and can be verified according to a checklist. When modernising machinery and related automation it is important to consider the working process, the responsibilities, and the risks related to the case. INTRODUCTION Instead of new investments, modernisation of machines and systems is more and more often chosen in Finnish industry. According to interviews in cooperating companies, automation is renewed twice as often as mechanical structures. [1] Modernisation of old machines provides more efficiency, and above all, the productivity can be significantly increased with new automatic functions. Modernisation can also be chosen for reliability and safety improvements, environmental requirements and maintenance reasons. Quite often, the target can be reached by modernising the system. Especially, automation is developing so rapidly that old-fashioned, non-compatible control system need to be renewed. Many goals can be reached by affecting only the automation. Modernisation is usually less expensive than building a completely new system. There are several directives and standards dealing with new investments, but the amount of requirements and guidelines for modernising machines and production lines is for the moment comparatively small. Therefore, the requirements for old machinery can also be unclear. The subject is topical also because the new Machinery Directive and Work Equipment Directive amendment (WED) are to be implemented in Europe in 2009. WED is related to the use of machines and therefore it is related to old machinery and modernisation [2]. The Directives provide a framework for safety issues in machinery, but much research and design are needed when implementing new safety principles to old machinery. The cases are always new. METHODS An interview study and a literature review provided extensive material which was subsequently analysed. The purpose of the interview study was to collect information on the wide range of procedures used by companies in a modernisation project. The objective of the study was to condense the information into a general model of the modernisation process. The model was iteratively reviewed and developed with the cooperating companies. The most common risks related to modernisation were also sought by interviewing designers. RESULTS It is important to clearly agree on the responsibilities in a modernising project. The modernisation model was introduced to present the phases of the modernisation process for machinery, at the same time indicating the party normally responsible for each task. Figure 1. Development of machinery safety. At the end of any modernising project, the supplier should also be able to state their responsibility for the work. A CE-marking or declaration of conformity for the modern- MANAGEMENT OF EMERGING RISKS Figure 2. Many kind of knowledge is needed in modernisation isation can not be provided. However, it would be valuable if the modernisation supplier could provide a written statement about what has been done and what requirements have been followed. The user could then continue the process by considering what still needs to be done. The ensuing report would basically provide an example of the safety description of a modernisation implementation as prepared by an executor of a modernisation process. The most common risks related to the modernisation of machinery have been compiled, and the listing provides information about common ways of minimising the risks and also guides the user to further related information. Typical safety issues related to modernisation include, for example, unexpected start-ups, separation of energy and inadequate safety devices. During the implementation phase, there are often new risks, especially when the modernisation work is performed while the machines are running. DISCUSSION AND CONCLUSIONS Modernising systems and automation has become an even more common phenomenon than building new production lines. This means that there are many modernisation projects ongoing. There is a strong need to obtain information about responsibilities and good working procedures, but the legislation does not declare who is responsible for the safety of the modernised system. The employer obviously always has some degree of responsibility to use safe equipment, but how much can be demanded of the supplier. This area of contention may be costly to both parties, so it is important to also agree on possibly unclear responsibilities and subjects. To ensure that typical responsibilities and unclear issues are addressed, a specific checklist was developed to support modernisation projects. EXPLOITATION POTENTIAL The focus in the fi rst phase of the research was the modernisation process of the machinery and production line, while the continuing research centres on machine automation. Machine automation is especially important since it is typically renewed more often than the equipment itself, and nowadays also has an enhanced role. Upcoming research will centre on the model and the material developed for machinery modernisation process. The report [1], in Finnish, can be obtained from the Internet, and an English version is forthcoming. ACKNOWLEDGEMENTS The research has been funded by the Finnish Work Environment Fund, VTT and several companies. Essential to obtaining good results has been the cooperation with companies. REFERENCES [1] Malm, T. & Hämäläinen, V. 2006. Safety-conscious modernization process of machinery and production lines. VTT Research Notes. 36p. + att. 15p. http:// www.vtt.fi /inf/pdf/tiedotteet/2006/T2359.pdf (in Finnish) [2] Work Equipment Decree VNa 403/2008. Based on Work Equipment Directive (89/655/EEC) and its amendments (95/63/EC, 2001/45/EC). 14p. (in Finnish) CONTACT Timo Malm Senior Research Scientist timo.malm@vtt.fi Tel. +358 20 722 3224 63 64 SAFETY-CRITICAL SOFTWARE IN MACHINERY Timo Malm, Marita Hietikko, Jarmo Alanen TTY: Timo Vepsäläinen, Mika Katara The importance of software in safety-critical machinery applications is increasing. New applications with more sophisticated safety features are imminent. Software is replacing relays and mechanical structures in older systems. Nowadays, there are many different methods available to ensure safe software, but at the same time there is an increasing need to use larger and more complex structures, and more economical developing procedures. These features contribute to the new challenges in safer software development. INTRODUCTION Software based safety functions are becoming increasingly common and thus companies have an growing need to prove the safe functionality of software. One reason to this trend is that often “iron is replaced by brains” (robust systems vs. monitored systems) because “brains” are cheaper than “iron”. In practice, this means a pipeline can be thinner if the pressure is well controlled or drive-bywire functions can replace mechanical solutions. In addition, many traditional safety functions, like emergency stopping, are realised using software based systems. A notable feature in machinery software is that there are many kinds of different systems with software. Safety-related software can be in different parts of the system and quite often it must be isolated from the standard software. Examples of programmable systems in machines include: safety PLC (programmable logic controller), safety busses, safety communication networks, distributed systems with or without PLCs, embedded systems with embedded software (microcontrollers, FPGA, ASICS, etc.), control systems with parameter programming, which are specific for automated machines, like machine tools, presses, paper machines, etc. systems with industrial PCs or computers for good interface or calculating capacity, - control systems for autonomous machines, like robots with automated code generation from photograph or CAD picture or AGVs with automated tasks. METHODS Currently, the safety of a programmable control system is often validated according to the IEC 61508 standard family. The basic idea of the standard is to guide the designer to do safety-related actions in each phase of the design; i.e. not to concentrate on laborious and often inefficient testing. The standard presents over 80 methods for programming and testing of software. In addition, there are variations of methods and the methods can be used to different extents. It is difficult for the designer to decide which methods are good, especially for the current software project. The increasing use of cost-effective software like “open source software”, “Commercial, off-the-shelf” (COTS), reused software, and agile software processes bring new challenges for the level of safety. The research aims to set criteria on how to choose methods for the process of designing safety-critical software. In this research the methods are classified according to their suitability to specific applications. “A toolbox” will be generated, which will provide tools (methods) for each type of machinery software project. Consequently, companies will be able to build up a software design process for their own use. This can speed up a software design process and result in significant cost savings. RESULTS It is important to follow accepted safety standards in producing safety-critical software. A typical feature in current standards is that there are a lot of requirements for all phases of the software development project. The reasoning behind this approach is that software testing cannot be comprehensive. The number of possible input combinations is typically too large to make complete testing feasible. Excellent testing is important, but it cannot MANAGEMENT OF EMERGING RISKS Figure 1. V-model according to IEC 61508-3. overcome poor design. Therefore, a procedure which covers the complete lifecycle of the software is needed. IEC 61508-3 presents requirements in the V-model (Figure 1) [1]. This is a good way to describe requirements, but in practice, this kind of straightforward ongoing development is (probably too) optimistic. Software development often includes new solutions (compared with the requirement specifications), steps backwards, prototypes, and incremental phases. er understand the process of making safety-critical software they can better help each other in the process. VTT continues research aimed to help companies create reliable safety-critical software more effectively. ACKNOWLEDGEMENTS The research is funded by Tekes (Finnish Funding Agency for Technology and Innovation), nine companies and VTT, and realised by VTT and in Tampere University of Technology: Department of Automation Science and Engineering and Department of Software Systems. DISCUSSION Ever since the fi rst computer programs were generated, it has been suggested that the amount of errors has been about 5 per 1000 well-tested source code rows [2]. Although this sounds like a poor history, it is still possible to make safe software. It is possible to prevent errors from becoming failures, which affect the safety features of the system severely, through various means, e.g. related to architecture, well-defi ned programming rules, adequate testing, etc. REFERENCES [1] IEC 61508-3. Functional safety of electrical/electronic/programmable electronic safety-related systems. Part 3: Software requirements. 95p. [2] Katara, M. 2007. Software Testing – Lecture notes. Tampere University of Technology. 510p. EXPLOITATION POTENTIAL According to IEC 61508-1 it is required that safety critical software should be validated by persons from another organisation. This would be an opportunity for small or medium sized enterprises to provide their knowledge in software projects. When both the user and the provid- CONTACT Timo Malm Senior Research Scientist timo.malm@vtt.fi Tel. +358 20 722 3224 65 66 QUALITY OF RISK ASSESSMENT AND ITS IMPLEMENTATION Anna-Mari Heikkilä, Mervi Murtonen, Minna Nissilä, Veikko Rouhiainen Predefined risk assessment procedures describe the desired behaviour model for managers and experts: what they are expected to do in a risk assessment, and with which tools and methods. In reference to these procedures, the risk assessment practices can then also be audited and further developed. Setting formal risk assessment procedures also accentuates the significance of the risk management. INTRODUCTION The use of formal risk assessment procedures in different organizations and industrial areas has increased, and in fact become common. A formal analysis has become a symbol for efficient information use, rational decisionmaking and a willingness to act, and may have four different purposes [1]: informational purposes, communication, direct and focus the attention, or symbolic reasons. These all can be seen in current risk assessment procedures. It has become obvious that the risk assessment results depend on the analysis leader and team, and not only on the commitment of the analysis owner in industry. The need for instructions on how to assure the quality of a risk analysis in practice has been acknowledged, and industry has sought quality criteria to support decision-making when selecting risk analysis experts and leaders. METHODS To create and develop new knowledge on risk assessment and management processes, the data collection followed the principles of “systematic combining” [2]. Based on the QUASA and a questionnaire to risk analysis experts and industry, the risk assessment process was evaluated and its shortcomings identified. The outcome formed a basis for quality criteria of risk analysis and assessment. For the criteria, the duties of both the risk analysis experts and the industrial partner subscribing the risk analyses were studied. RESULTS The quality criteria of formal risk analysis and assessment have been presented [3,4]. The criteria are presented as the following indicators that strongly influence the performance of a risk assessment and its quality: • Defi nition of the object • System defi nition and description, including limitations • Analysis methods – chosen according to the system and the objective of the analysis • Quality of the source and background information • Competence of the analysis leader • Availability of the required resources • Documentation • Results and the analysis process meet the objectives of the safety analysis • Communication of the results Alongside the quality criteria, instructions for performing a high-quality risk analysis were called for. The roles and responsibilities of the analysis leader, secretary and owner were emphasised. DISCUSSION AND CONCLUSIONS Formal risk assessment processes initiate routines for analysing and evaluating potential hazards and give a predetermined structure to different activities during the object life-cycle. At best, the formal methods are supplemented and modified by managerial judgement in a social process, where managers and engineers discuss and debate their judgements. Nevertheless, the essence of risk management is in the way in which we weave together the tacit and the explicit – the formal and the informal – risk assessment. It is about fi nding a balance between human beings and technological systems: not allowing hard data to drive soft understanding. EXPLOITATION POTENTIAL Quality criteria with instruction support risk assessment owners in industry in defi ning the objectives and TECHNO-ECONOMIC RISK MANAGEMENT Memory Connectivity Continuity Formal RM Process Visibility Response Figure 1. Strengths of a formal Risk Management (RM) process in comparison with informal risk assessments. frames of a risk analysis and in commissioning the analysis work and the obtained results to ensure that the defi ned objectives and quality criteria are met. The quality criteria also support risk analysis experts to develop the quality of their own work as well as the communication with their clients in industry. The criteria are also used in external evaluations to assess the quality of completed risk analyses. tioners. Technical Research Centre of Finland. Report 03718-07. Espoo. 48p. (in Finnish) [4] Rouhiainen, V. & Heikkilä, A.-M. 2008. Ensuring the quality of safety analyses in industry. PSAM 9. International Conference on Probabilistic Safety Assessment and Management. Hong Kong, China, 18-23 May, 2008. Edge Publication Group Limited. ACKNOWLEDGEMENTS The research has been funded by the Finnish Work Environment Fund, the Finnish Safety Authority, VTT and the following companies: Norilsk Nickel Harjavalta, Pöyry Engineering Oy, Rintekno Oy, Neste Jacobs Oy, and Neste Oil Oy. REFERENCES [1] Langley, A. 1996. In search of rationality: The purposes behind the use of formal analysis in organisations. Administrative Science Quarterly 34. pp.590631. [2] Dubois, A. & Gadde, L.-E. 2002. Systematic combining: an abductive approach to case research. Journal of Business Research 55. pp.553-560. [3] Heikkilä, A.-M., Murtonen, M., Nissilä, M., Virolainen, K. & Hämäläinen, P. 2007. The Quality of Risk Analysis – Guidelines for a Subscriber and Practi- CONTACT Anna-Mari Heikkilä, Dr Research Scientist anna-mari.heikkila@vtt.fi Tel. +358 20 722 3490 67 68 THE VALUE CREATION PROCESS OF SAFETY AND SECURITY Helena Kortelainen, Marinka Lanne, Teuvo Uusitalo Safety and security issues are a key concern of every organisation and company. The value creation process in the field of safety and security service business has been proposed. The value and earning principles related to corporate security will be developed and described in the “Value of Corporate Security Services” (ValueSSe) project. INTRODUCTION The safety of people, environment and property is a key concern of every organisation and enterprise. Safety management policies and methods together with safety engineering technologies are in fact well-known and widely applied for accident prevention. The economic consequences of industrial accidents may be extremely high, for instance, the direct losses of the explosion in an oil refi nery in Texas City in March 2005 were estimated to exceed 3 Billion USD. In addition to safety concerns, global operation and complex supply chains make the companies more vulnerable to security threats and natural hazards. Special emphasis must be placed on business continuity planning. There is a growing public concern on the security of the society and its critical infrastructure. The increasing dependence on interconnected infrastructures (e.g. transport, energy, and information) increases the vulnerability of societies. Quite often the probability of a natural hazard may be high, but the associated preventive measures may be insufficient, or may not be implemented at all. What is the value of safety and security in private companies, public organisations and society in general? Corporate values are principles that guide an organisation’s internal conduct as well as its relationship with the external world. Values are usually expressed in a mission statement and they should influence the corporate strategy and decisions. Economists link value to price through the mechanism of exchange. The value of safety and se- curity is often measured by the cost of accidents, which actually indicate a lack of safety instead of any perceived safety level. Cost-benefit analyses seem to be too limited and need to be supplemented by criteria dealing with other aspects and perceptions of value. Growing demands for safety and security together with the development of more sophisticated and complex technologies have created business opportunities for safety and security service providers. However, it is a challenge for the service providers to understand, describe and demonstrate the value of safety and security to the client. In order to understand the value, service providers need to evaluate the effects that security have on the client organisations’ core business and value perceptions. METHODS The value creation process in the field of service business related to corporate security is being studied in the ValueSSe (Value of Corporate Safety and Security Services) project together with eleven Finnish companies, public organisations and research partners. The 3-year project started 2009. The value perceptions of the service providers and the clients are studied by individual and group interviews. Transcription and qualitative analysis methods are used when interview data is analysed. The development work of models, methods and tools is based on interview data, groupwork data, company case studies and models used in other business branches. Multicriteria decision-making methods and the Quality Function Deployment (QFD) methodology will be utilised. The main steps in the project are presented in Figure 1. RESULTS As a fi rst step towards more profound value considerations, the ValueSSe project aims to create and demonstrate a methodology that will enable companies to de- TECHNO-ECONOMIC RISK MANAGEMENT Figure 1. Main steps in the ValueSSe-project. velop their safety and security services to global markets. Systematic methods for value evaluation will support the companies and their networks to develop their products, services and solutions. These methods will enable companies to justify the benefits and pricing of their safety and security services thus strengthening their position in the global markets. The results will show how a producer of safety and security services can create added value for its customers and how this value can best be described and produced. EXPLOITATION POTENTIAL The business volume of safety and security services is expected to grow in the future. The demand for corporate-wide solutions in global enterprises will increase. This development is driven, for example, by the following trends (e.g. [1], [2], & [3]): • increasing mobility of people and goods, • global operation and networking of companies, • natural hazards, environmental problems and easily transmitted diseases, • challenges of social security in demographical changes, • increased reliance of the society on critical infrastructure (especially on electricity and telecommunication networks), • information security and criminal actions in information networks. Collaboration and partner-based relationships between different service providers and clients will provide a better capability to create a common understanding and ena- ble a transfer towards more value-based thinking, instead of merely selling “manpower” and technical devices. ACKNOWLEDGEMENTS The author wishes to thank colleagues from VTT and also all the case companies. The research has been funded by Tekes (Finnish Funding Agency for Technology and Innovation), VTT and Helsinki School of Economics. REFERENCES [1] Amended proposal for a Decision of the European Parliament and the Council concerning the 7th Framework Programme of the European Community for research, technological development and demonstration activities (2006-2013). 2006. Brussels 23.6.2006. COM(2006) 364fi nal. [2] Lanne, M. & Kupi, E. 2007. Security as an area of business. Espoo. VTT Research Notes 2388. 52p. (in Finnish) [3] Homeland Security Advanced Research Projects Agency (HSARPA) 2006. SBIR Program. http://www. hsarpasbir.com/ CONTACT Helena Kortelainen Technology Manager helena.kortelainen@vtt.fi Tel. +358 20 722 3206 69 70 THE PREVENTION OF INDUSTRIAL ACCIDENTS WITH RISK ANALYSIS Jaana Keränen, Riitta Molarius, Minna Nissilä, Jari Schabel, Kimmo Virolainen, Nina Wessberg Many challenges exist in the management and governance of industrial accidents. Accidents can result in releases to the environment; resulting in harm to people, and damage to ecosystems, property and companies’ imago. Both the complexity of processes and control systems, and the dangerous nature of chemicals and extreme weather events in the future, for example, could lead to an increase in the risk of accidents. The management of these situations demands suitable, tailored risk analysis methods. In this paper four such risk analysis methods are described. INTRODUCTION It has recently been realised that process safety cannot simply be thought of as the creation of a component-bycomponent study, but rather the entire process as a sociotechnical complex system must be understood in order to make the process safe. Moreover, it has been seen that emerging risks, like risks due to extreme weather events, might be increasingly detrimental to industrial systems and result in both chemical releases to the environment and fi nancial losses. VTT, in cooperation with the organisations and other end users, has helped enterprises improve their risk management by developing new tailored risk analysis methods for various purposes. METHODS To develop technical risk analyses for enterprises and authorities VTT adheres to the standard IEC 60300-39:2000 Risk analysis of technological systems (Figure 1); tailoring it as desired for a variety of applications and scenarios. The development is typically partly done in brainstorming sessions with the end users. Some of the risk analysis methods are realised as MS-Excel based tools. RESULTS The environmental risk analysis for accidental emissions [1] was developed in co-operation with VTT, the Finnish Environment Institute (SYKE) and the Safety Technology Authority (Tukes). The method is delivered as a guideline for proactive environmental risk analysis when assessing accidental emissions. The guideline provides an overview of what environmental risk analysis should include and how the risk analysis process should be conducted. A consequence matrix together with a risk matrix also supports the decision making from the viewpoint of risk tolerability and acceptance. Figure 1. Risk analysis of technological systems (IEC 60300-3-9:2000). Risk assessment framework for future risks in hydropower plants [2] was developed in a Nordic Climate and Energy Project which was funded by Nordic Ministries. The method covers risks and opportunities due to climate change, and aims to help power plants take into account future climate scenarios and plan their future strategies more efficiently. The method introduces a fourfold table as a tool to simultaneously handle the likelihood of cli- TECHNO-ECONOMIC RISK MANAGEMENT Figure 2. The fourfold table. The numbers within the shapes correspond to the risks and opportunities identified in the Risk/ Opportunity table. mate scenarios and the likelihood of failing to address the risky situations in hydropower plants (Figure 2). Vulnerability analysis of chemical enterprises and storages [3] was developed in cooperation with the Finnish chemical authority, TUKES, and the Finnish Rescue Services. The method is directed towards assisting authorities in prioritizing the most dangerous chemical sites according to the threat they pose to the environment and nearby population. Rescue Services can then plan their strategies and response better in accordance with the spatial risk. Risk analysis method for Rescue Services [4] was developed to help rescue services to analyse the most critical major risks for which rescue services e must be prepared. The method uses statistical data collected from the Finnish authorities’ databases. The method includes accident data from fi res (factories, paper mills, storages, schools, elder people houses, etc.), chemical accidents, road and railroad accidents, and air and sea accidents. The method was established as an MS-Excel based application. DISCUSSION AND EXPLOITATION POTENTIAL VTT has been active in the field of risk analysis and the development of methods since the 1980s. The challenges have changed over time and new, emerging risks have arisen. VTT plans not only to develop its know-how in the future, in order to be able to continue to offer its customers valuable insight and expertise in the application of the current tools and approaches, but also to create and develop new risk analysis methods for other applications. Health & Safety, Vol.15, No.1. pp.24-31. doi:10.1016/j. jchas.2007.07.001 [2] Molarius, R., Wessberg, N., Keränen, J. & Schabel, J. 2008. Creating a climate change risk assessment procedure - Hydropower plant case, Finland. XXV Nordic Hydrological Conference - Northern Hydrology and its Global Role (NHC-2008). Reykjavik, 11-13 August, 2008. NHP Report No.50. Nordic Association for Hydrology. Vol.2. pp.597-606. [3] Molarius, R., Nissilä, M. & Virolainen K. 2009. The method for assessing the threat for citizens and environment due to chemical sites. (in Finnish). VTT Report VTT-R-02167-09. [4] Molarius, R., Virolainen, K. & Wallenius, J. 2006. Risk assessment method for rescue services. Symposium on chemical, biological, nuclear and radiological treats - A safety & security challenge. Tampere, Finland, 18-21 June, 2006. Defence Forces Technical Research Centre. Ylöjärvi. pp.36-40. CONTACT REFERENCES [1] Wessberg, N., Molarius, R., Seppälä, J., Koskela, S. & Pennanen, J. 2008. Environmental risk analysis for accidental emissions. Journal of Chemical Riitta Molarius Research Scientist riitta.molarius@vtt.fi Tel. +358 20 722 3480 71 72 ASSESSMENT OF VULNERABILITY AND ADAPTATION TO CLIMATE CHANGE BASED ON MULTI-CRITERIA DECISION ANALYSIS Riitta Molarius, Markus Porthin, Tony Rosqvist Vulnerability and adaptation assessment will increase in importance if climate changes and variability strengthens as predicted. The assessment requires a multi-criteria approach as the consequences of any adaptation alternatives are intangible and valued differently among stakeholders. Multi-Criteria Decision Analysis (MCDA) provides an analytic framework for making preference statements and valuations that reveal the ‘best’ compromise or consensus decision for adaptation. cluding hydrological scenarios and economic impact scenarios related to different building stock such as dwelling houses, production plants and infrastructure. The assessment framework is shown in Figure 1. The impact was assessed using the additive value function INTRODUCTION In Finland, floods in general occur in spring when the snow melts rapidly due to rain and warmer days. The phenomenon typically occurs in western coastal areas in river systems without larger buffering lakes. Extreme weather conditions might augment the phenomenon [1]. Our case study in the TOLERATE (TOwards LEvels of Required Adaptation To cope with Extreme weather events) -project concerns the coastal city, Pori, where flooding is a recurrent problem and through which the river Kokemäki runs. METHODS A multi-criteria decision analysis (MCDA) approach was adopted with input in the form of impact scenarios in- where w i, i  (1, 2, ..., n) corresponds to the relative weight of the attribute i. The attribute-specific values v i (x i ) of an alternative i indicates the subjective value of the consequence of an alternative on the attribute in question [2]. In a multi-stakeholder decision context there are basically as many value functions as there are stakeholders. The standard way to combine the views of the different stakeholders is to aggregate their individual overall values for each alternative with an additive aggregation function. However, a slightly different approach was used in our study. To support the subsequent discussions, a group value from experts’ attribute-specific value function scores was aggregated by weighting with the corresponding attribute weights. By aggregating (summing up) we arrive at a single result that reflects the best compromise alternative. If this alternative is accepted by all the experts, we may call it the consensus alternative. Sensitivity analyses would reveal how close some other alternatives would lie. RESULTS The MCDA method was used to evaluate the performance of predefi ned flood protection alternatives for two cliFigure 1. Vulnerability and adaptation assessment framework of the TOLERATE-project. TECHNO-ECONOMIC RISK MANAGEMENT Figure 2. Normalised group scores per flood protection alternative (0, 1a,…, 4) shown as a bar. The sizes of the coloured segments show the distribution of the alternative’s score over the criteria. The figure indicates that the expert panel preferred protection against the R250 flood scenario by use of additional dredging or improved embankment (1b, 2b). mate-hydrological scenarios R=50 and R=250, where R denotes the return period of a flood in years. The options were: 0 1a 1b 2a 2b 3 4 Zero – alternative (only maintenance of the currently adopted measures) stronger embankment to protect against R = 50 floods stronger embankment to protect against R = 250 floods dredging to protect against R = 50 floods dredging to protect against R = 250 floods new river arm building specific measures The subjective aggregated values that reflect the experts’ valuations of the considered adaptation alternatives are portrayed in Figure 2. The panel process was facilitated by the use of the group decision support “ThinkTank” system. The scores elicited from the experts were processed by the Web-HIPRE multi-criteria decision aid tool [3]. DISCUSSION AND CONCLUSIONS The general feedback of the stakeholders was that the approach gives a systematic and transparent way to analyse extreme events to support decision-making. The complexity of the approach requires, however, the processing of a substantial amount of basic data before being able to proceed to the group decision-making session. This is especially typical in the assessment of vulnerability and adaptation related to climate change and variability. ACKNOWLEDGEMENTS The authors wish to thank the TOLERATE project colleagues at the Finnish Environment Institute (SYKE), the Finnish Meteorological Institute (FMI) and the Government Institute for Economic Research (VATT). The main funding organisation was the ISTO research programme (2006-2010). REFERENCES [1] Silander, J., Vehviläinen, B., Niemi, J., Arosilta, A., Dubrovin, T., Jormola, J., Keskisarja, V., Keto, A., Lepistö, A., Mäkinen, R., Ollila, M., Pajula, H., Pitkänen, H., Sammalkorpi, I., Suomalainen, M. & Veijalainen, N. 2005. Climate change adaptation for inland and coastal waters, FINADAPT Working Paper 6. Finnish Environment Institute Mimeographs, Helsinki. [2] Keeney, L. & Raiffa, H. 1993. Decisions with Multiple Objectives: Preferences and Value Trade-offs. Cambridge University Press. 569 p. ISBN 0521438837. [3] Molarius, R., Perrels, A., Porthin, M. & Rosqvist, T. 2008. Testing a flood protection case by means of a group decision support system. VATT Discussion Paper 449. VATT Government Institute for Economic Research. Helsinki. EXPLOITATION POTENTIAL The methodology was developed to support regulatory decision-making related to land-use planning and engineering solutions for flood protection. It can be customised for industrial applications, in particular, for assessing the impacts of weather extremes on the performance of supply chains that are partly located in weather risk areas. CONTACT Tony Rosqvist, Dr Senior Researcher Tony.Rosqvist@vtt.fi Tel. +358 20 722 7077 73 74 COMPUTERISED RISK ANALYSIS WORKSHOPS Markus Porthin, Tony Rosqvist Complex systems in risk analysis can be tackled effectively by computerised expert workshops where new knowledge emerges from the combination and interaction of different kinds of expertise. INTRODUCTION Risk analysis often deals with poorly documented complex systems which are hard to overview and for which data is difficult to obtain. Expert workshops overcome the lack of information by exploiting and combining the different types of expertise and knowledge of the participants. The use of computerised Group Support Systems (GSS) results in more efficient, controlled and comprehensively documented workshops (Figure 1). METHODS The participants of a computerised risk analysis workshop must be carefully selected to cover all relevant views and fields of expertise in the examined system. The workshop process must be tailored to address the desired questions in an appropriate way. This includes planning of the workflow as well as preparation of clear instructions for each phase in close co-operation with the problem owner. If quantitative assessments are to be provided by voting, each question and the association voting scales must be clearly defi ned. A GSS consisting of networked computers and dedicated software is used in the workshop. VTT utilises the software package ThinkTank by GroupSystems. The internetbased program supports both face-to-face meetings and working distributed in time and space. At the beginning of a workshop, the aims, background information, and a description of the work process are introduced. The actual work consists of different modules, often starting with brainstorming, where all participants simultaneously type ideas into a shared working environment. They can view and comment all the inputs of one another as well as generate new ones if inspired. The inputs can be organised, edited and merged in order to achieve logically grouped, well-defi ned and nonoverlapping ideas. In addition, the inputs may be evaluated using different voting methods and the results immediately shown and assessed. Possible disagreements can easily be detected and discussed. Based on the results, a subset of the initial inputs can be chosen for further processing. The modules can be iterated throughout the workshop process until every theme has been covered. Because of the computerisation, all the information typed into the working environment is automatically included in the workshop documentation and can be easily used in the post-workshop analysis. Figure 1. All participants contribute simultaneously in a computerised workshop. TECHNO-ECONOMIC RISK MANAGEMENT of the experts alone. In addition, the results of the whole risk analysis are easily acceptable by the target group, since all the relevant stakeholders have participated and contributed to the process. In face-to-face workshops, the group and work process are easier to manage than in distributed settings. Although it is often a challenge to arrange for all the desired experts to be at the same place at the same time, the participants are usually highly motivated and can focus on the common task without external disruptions. Workshops realised entirely over the internet demand a higher clarity of the process and quality of the instructions. In addition, active participation might be more challenging. Figure 2. Example of evaluating risks by their likelihood and consequence. Computerisation makes a workshop more efficient. All participants can express their views simultaneously, even anonymously if desired, and no one can dominate the discussion. In addition, all inputs are documented in the system. RESULTS It is possible to conduct a complete risk analysis even in a one day workshop. Alternatively, one can instead focus on a part of a larger problem that may lack data or be hard to model, thus obtaining inputs for a more extensive model. The workshop results constitute of practical and tacit knowledge in the form of ideas, comments, quantitative or semi-quantitative assessments, and shared conclusions. Through brainstorming and organisation welldefi ned hazards can be identified, and consequences and likelihoods estimated by voting (Figure 2). Top priority risks can be identified by reviewing the voting results. Risk control measures can be generated and refi ned, and if desired, further assessed by their feasibility and effectiveness using brainstorming, organisation and voting. As a conclusion, the gained insight may be formed into action items with commonly agreed time schedules, goals and assigned responsibilities. EXPLOITATION POTENTIAL Complex and interdisciplinary systems, often poorly documented and from which data acquisition is difficult or expensive, can be tackled effectively by computerised expert workshops. Workshops help overcome the lack of information by exploiting and combining the different types of expertise and knowledge of the participants, and thus becomes a powerful tool both for risk analyses and other research areas. ACKNOWLEDGEMENTS The authors wish to thank Christer Lindberg from CHLconsulting Ltd and Bo Simoni from SQ1 Danmark for valuable support in running the programmes GroupSystem V and ThinkTank, respectively. REFERENCES [1] Rosqvist, T. 2003. On the use of expert judgement in the qualification of risk assessment, Doctoral thesis, VTT Industrial Systems, Espoo. DISCUSSION AND CONCLUSIONS VTT has performed computerised risk analysis workshops since 1997. The methodology has been applied to various research settings in, for example, industry, logistics, natural hazards, and the maritime field [1]. CONTACT The strength of a workshop-based approach is in the combination of the different kinds of expertise in an interactive setting. This leads to the emergence of new knowledge which is generally not able to be produced by any Markus Porthin Research Scientist, M.Sc.(Tech) markus.porthin@vtt.fi Tel. +358 20 722 6883 75 76 TRAFFIC ENFORCEMENT AND SAFETY EFFECTS OF AUTOMATIC SPEED ENFORCEMENT Veli-Pekka Kallberg, Harri Peltola, Riikka Rajamäki METHOD Field studies have been conducted to evaluate the effects of implemented camera enforcement sections and the effects of lowering the threshold of issuing sanctions on speeding offences. The safety effects have been evaluated by studying speed distributions and by utilising welldocumented effects of speed on accidents. RESULTS Photo: National Traffic Police of Finland Police enforcement is one of the most effective and cost-efficient means in improving traffic safety. In particular, automated speed enforcement by cameras has a great potential in reducing road accident fatalities. INTRODUCTION The prevailing national goal to reduce the annual number of road accident fatalities from the current 350 to 250 in 2010 and to 100 in 2025 calls for effective measures. The importance of enforcement has been recognised internationally and a recent European project PEPPER aimed to contribute to the efficiency and effectiveness of traffic law enforcement on EU roads. The focus was especially in the enforcement of speeding, drink-driving and the use of seat-belts. In Finland, several studies about the safety potential and effects of enforcement, and especially automated camera enforcement of speeding, have been conducted. At a 42 km long two-lane rural main road section with a speed limit 80 or 100 km/h, stationary speed cameras reduced the mean speed of traffic by 1.5–4.4 km/h immediately after implementation and after one year by 1.1–3.5 km/h. The average reduction was about 2 km/h. The proportion of vehicles exceeding the speed limit by more than 20 km/h was halved so that it was between 0.1 and 4.3% depending on the measuring point. The proportion of vehicles exceeding the speed limit by 10–20 km/h, however, remained rather high especially on sections with an 80 km/h speed limit, where it was still 10– 20% one year after the implementation. There was an estimated 12% reduction in the number of road accident fatalities. In speed camera enforcement, sanctions are typically issued only for speeding more than 10 km/h over the limit. When the tolerance was lowered to 4 km/h and accompanied by a media campaign, mean speeds in the above mentioned road section were reduced by a further 2–3 km/h and the proportion of vehicles driving faster than 10 km/h over the limit was reduced to 0.4%. The estimated effect on road accident fatalities was an additional 13– 16% reduction to what was achieved by speed cameras before the experiment. Overall, the annual number of road accident fatalities could be reduced by 40–60 by increasing automated speed enforcement by stationary cameras measuring spot speeds, and by introducing section speed control, where cameras are used to record mean speeds between camera IMPROVING ROAD AND RAILWAY SAFETY locations. The potential of intensified speed enforcement in reducing the annual number of road accident fatalities was high compared to other feasible measures. Other measures with similar potential reductions to speed enforcement include renewal of vehicle fleet (28 fatalities less) and lower speed limits (26 fatalities less). DISCUSSION AND CONCLUSIONS It seems clear that the prevailing road safety targets cannot be reached without an effective speed management system, which consists of speed limits, legislation, education, campaigns, enforcement, road environment design and telematic driver support systems. Enforcement has an important role in the current Finnish system, since speeding is frequent. Speed enforcement has a great safety potential, which could be exploited especially by developing automated enforcement methods. Most of this potential, however, is currently out of reach because the speeders detected by speed cameras must be identified from photos and that requires a significant amount of manual labour. The effectiveness and cost-efficiency of speed enforcement could be greatly enhanced if sanctions for minor offences could be issued to the holder of the vehicle instead of having to identify the driver. Policy and Programmes on European Roads (PEPPER), Final Report. http://www.pepper-eu.org/ [2] Malmivuo, M. & Rajamäki, R. 2008. Effect of intensified automatic speed control and decreased tolerance on traffic safety. LINTU Reports 1/2008. ISBN 978952-201-760-4. (in Finnish) [3] Peltola, H. 2007. Evaluation measures in order to achieve safety targets. Road Safety on Four Continents, Bangkok, Thailand. 14–16 November, 2007. Conference Proceedings, CD-ROM. Ministry of Transport Thailand. VTI, FERSI, TRB, ECTRI. [4] Rathmayer, R., Kallberg, V.-P., Koskinen, K., Mäkinen, T. & Viitanen, J. 2004. Assessment of the potential for enhanced police enforcement. Publications of the Ministry of Transport and Communications 49/2004. ISBN 951-723-735-9. (in Finnish) EXPLOITATION POTENTIAL The planning of the national road safety programme and a speed management system, and the development of traffic enforcement strategies and systems could all benefit from the results of the studies described. ACKNOWLEDGEMENTS The studies described were funded by the Ministry of Transport and Communication, the Ministry of the Interior, the Finnish Road Administration and the European Union. REFERENCES [1] Kallberg, V.-P., Zaidel, D., Vaa, T., Malenstein, J., Siren, A. & Gaitanidou, E. 2008. Police Enforcement CONTACT Veli-Pekka Kallberg Senior Research Scientist veli-pekka.kallberg@vtt.fi Tel. +358 20 722 4591 77 78 ADVANCED EVALUATION TOOLS IN ROAD SAFETY Harri Peltola, Risto Kulmala, Juha Luoma, Riikka Rajamäki Evaluation tools are needed to enable the accomplishment of ambitious safety targets. A tool has been designed to estimate the safety effects of road improvements. Another tool for evaluating the safety effects of road safety programmes combines the effects of different kinds of safety measures taking into account overlapping measures. INTRODUCTION Traffic safety work can be improved, but only if traffic safety is considered as a major target. Setting ambitious quantified road safety targets can help policy makers by making it easier to implement effective countermeasures and set priorities effectively. If the target is set without any associated safety programme and proper evaluation, however, it may not be realised. To be able to prioritise and plan the necessary measures, the evaluation of the effects of the measures is vital. Furthermore, to be able to share the responsibility of reducing fatalities, one has to be able to evaluate the safety effects of several measures and their combinations on fatalities. METHOD The fi rst tool was designed to help estimate the number of avoided accidents due to road improvements in two phases: 1) the current safety situation on a given road is estimated by combining information from simple accident models and accident history, and 2) the safety effect of road improvements is estimated using the current safety situation and safety impact coefficients based on most reliable research results available around the world (Figure 1). The other tool for combining safety programmes from separate measures includes fatality data from the past 5 years and it is capable of evaluating several measures that are very different in nature. Every measure included in the tool is represented by an impact coefficient and a magnitude of the implementation area. Even the overlapping measures can be evaluated reliably and the magnitude of different measures can be varied. RESULTS The results of the evaluations on road improvements are as follows: the current safety situation on the modified road network and safety effects of improvements (yearly injury accidents and fatalities). The results show the safety effects in total as well as which measures have produced them. The greatest safety effects by road improvements e.g. in 2005 were achieved by automatic speed camera enforcement, renovation of road lightning, rumbling road markings and new lightning with breakable poles. The other tool is used to combine scenarios for a traffic safety programme. Because of overlapping measures, the effect of one measure depends on the other measures implemented in that scenario which has to be taken into account. Top-ten measures designed for the current Finnish road safety plan included: renewal of the car fleet, introduction of a penalty point system, urban area sign including speed limit reduction from 50 to 40 kph, halving the number of unbelted car drivers, automatic speed enforcement on 1,800 km of main roads, traditional speed enforcement tripled, drunken driver enforcement tripled, mobile speed enforcement on streets in big cities, paying insurance bonus in cash to young drivers and safety campaign on run-off-the-road accidents. DISCUSSION Two tools for evaluating traffic safety effects were developed to be able to evaluate the individual effects of safety measures as well as their effect as a part of a safety programme. These kinds of tools are needed to be able to implement successful safety programmes. EXPLOITATION POTENTIAL The developed tools have been used extensively in Finland but they could easily also be utilised in other countries. IMPROVING ROAD AND RAILWAY SAFETY Injury accidents on a road section (5 years) Average accident rate and its variation on a road section Current number of accidents Change in safety situation (1 Forecast of the number of accidents (2 Measure and its impact coefficient Accident reduction 1) Reliable estimate of current safety situation 2) For example, traffic or land use change Average accident severity in road conditions in question and its change Traffic fatality reduction Figure 1. Traffic safety effects of road improvements – evaluation process ACKNOWLEDGEMENTS This research has been supported by the Finnish Road Administration and the Ministry of Transport and Communications Finland. REFERENCES [1] Peltola, H. & Kulmala, R. 2006. Accident models. NVF conference in Iceland. 7-8 September, 2006. Theme: Accident data. http://ptl.fi /NVFnorden/priv/ nvf52/seminarer.htm [2] Peltola, H. 2007. Evaluating measures in order to achieve safety targets. Road Safety on Four Continents, Bangkok, Thailand. 14-16 November, 2007. Conference Proceedings, CD-ROM. Ministry of Transport Thailand, VTI, Fersi, TRB, ECTRI. CONTACT Harri Peltola Senior Research Scientist harri.peltola@vtt.fi Tel. +358 20 722 6200 79 80 CURRENT SPEED MANAGEMENT ISSUES Harri Peltola, Veli-Pekka Kallberg, Riikka Rajamäki, Pirkko Rämä the effects of speed on safety in different kinds of environments and situations. There are today many methods for reliable speed measurement, including radar, video equipment together with Automatic number plate recognition (ANPR), and GPS based systems. The results of various speed studies have been combined using metaanalysis. RESULTS Avoiding the use of excessive speeds is one of the most successful and most studied safety measures in the world. Speeding drastically increases the risk of injury accidents, and especially the risk of fatal accidents as shown in Figure 1 [3]. High speeds are also often associated with greater speed variations, which also increases the accident risks. Several measures aimed at reducing road vehicle speed have been introduced during the past few decades, including 1) differentiated maximum speed limits according to road and traffic conditions, 2) lower speed limits during winter months, and 3) various forms of automatic speed enforcement [4]. Road vehicle speeds are one of the most important factors affecting road safety. The interdependence between safety and average speeds is exceptionally well studied and significant. INTRODUCTION High travel speeds are generally considered desirable, but small speed changes on the road network do not significantly affect the overall transportation time. The punctuality of the transport is often more important. Moreover, the benefits of speed reductions on safety are well known and wide-ranging [2]. METHOD The continuous follow up of road vehicle speeds and several before-after studies have made it possible to analyse New technologies have also been introduced for speed management; measures such as variable speed limits (that change according to automatically monitored road, traffic and weather conditions) [5] and intelligent speed adaptation (ISA). ISA systems can be voluntary (where the driver is given information) or mandatory (where the driver cannot use excessive speed without pushing an emergency button). Furthermore, especially in Finland different kinds of feedback systems have been tested to motivate drivers to obey the speed limits [1]. DISCUSSION The measures aimed at reducing speeding have probably been some of the most effective road safety measures in the world. They have been extensively studied and gradually achieved political acceptance only after scientifi- IMPROVING ROAD AND RAILWAY SAFETY Figure 1. Relationship between change in speed and change in the number of accidents according to the Swedish Power model. cally proved significant safety benefits were demonstrated in several countries. EXPLOITATION POTENTIAL The research done in the field of speed reductions and traffic safety has been extensively exploited and they have been a major factor in enhancing traffic safety. Nevertheless, many aspects require further study, e.g. related to intelligent speed adaptation systems (ISA), and various exploitation opportunities also still exist. ACKNOWLEDGEMENTS This research has been supported by the Finnish Road Administration, the Ministry of Transport and Communications of Finland, and the European Union. [3] Kallberg, V.-P., Allsop, R., van der Horst, R., Varhelyi, A. & Ward, H. 1999. MASTER - Managing speeds of traffic on European roads. http://virtual.vtt.fi /virtual/proj6/master/ [4] Peltola, H. 2000. Effects of seasonally changing speed limits on speeds and accidents. Paper No. 00 1482 Preprint. Transportation Research Board. Transportation Research Board, 79th Annual Meeting. Washington, DC. [5] Rämä, P. 2001. Effects of weather-controlled variable message signing on driver behaviour. VTT Publications 447. Espoo: Technical Research Centre of Finland. REFERENCES [1] Anttila, V. & Peltola, H. 2006. New ideas in intelligent speed adaptation – Measuring and recording driving style. ITS World Congress, 8-12 October, 2006. 13th World Congress and Exhibition on Intelligent Transport Systems and Services, London. CDROM. [2] Kallberg, V.-P., Zaidel, D., Vaa, T., Malenstein, J., Siren, A. & Gaitanidou, E. 2008. Final Report of project PEPPER (Police Enforcement Policy and Programmes on European Roads). PEPPER Deliverable 17. http:// www.pepper-eu.org/ CONTACT Harri Peltola Senior Research Scientist harri.peltola@vtt.fi Tel. +358 20 722 6200 81 82 DEVELOPMENT OF A ROAD SAFETY TEST FOR DRIVERS Juha Luoma, Harri Peltola, Mikko Virkkunen (Simsoft) METHOD The approach was based on drivers’ self-assessment and current knowledge about the effects of driver behaviour on serious road accidents. An online tool was developed for company staff. The test was limited to private driving, and covers all dimensions of road safety [1] (i.e. exposure, crash risk and risk of injuries in a crash) and levels of driver decision making [2] (i.e. strategic, tactical and operational). The respondent remains anonymous. RESULTS The topics of the survey form includes annual mileage (private driving), checking frequency of tyres, drinking and driving, weather issues, use of seatbelts, respect for pedestrians and bicyclists, compliance with speed limits on freeways/main roads/urban streets, passing behaviour and road rage, and identified means for improving road safety. Based on the responses, the tool fi rst shows an overall result as shown in Figure 1. An easy-to-use, reliable and compact test for car drivers to provide feedback about the effects of their own driving on road safety was developed. The online test will be available for drivers to improve their driving and thereby also the level of road safety. In addition, companies can use the test for improving the road safety of their personnel. Secondly, the tool provides a personalised and question-specific feedback to improve driving. The feedback is based on the individual responses and, in most cases, the feedback is explained by reliable and quantitative research results. Finally, recommendations for future driving are given. They concern two aspects of driving: annual mileage and risky characteristics of driving. INTRODUCTION Several online tests have recently been introduced in Finland for people to assess the effects of their own behaviour on various areas of life. Examples include lifetime prediction based on the way of life and living conditions, assessment of ones smoking habits; and an assessment of alcohol consumption. A corresponding test for drivers was assumed to be beneficial if it could provide specifi c feedback to improve driving. Consequently, this work aimed to develop an easy-to-use, reliable and compact test for car drivers to provide feedback about the effects of their own driving on road safety. The test was piloted by the staff (n=573) of Neste Oil Corporation. The results showed that there were no technical problems, and most users considered the content to be worthwhile. Specifically, 52% of the feedback was positive (e.g. useful test, appropriate questions, important issues and thoughtful feedback), 28% was neutral and 20% was negative (e.g. useless test, too easy questions and inappropriate to give feedback because of high mileage). DISCUSSION This work developed an easy-to-use, reliable and compact online road-safety test for car drivers. It provides IMPROVING ROAD AND RAILWAY SAFETY Figure 1. Overall safety assessment of driving. personalised and question-specific feedback to improve driving. To our knowledge, the test is unique as currently there is no other online test available for drivers. Corresponding tests for bicyclists and pedestrians will be developed in the future. EXPLOITATION POTENTIAL The developed online test will be available for any interested driver to improve his or her driving. In addition, companies can use the test for improving the road safety of their personnel. ACKNOWLEDGEMENTS This research was supported by the members of a research programme “Traffic Safety 2025”. The current members of the programme include: A-Katsastus Group, Finnish Rail Administration, Finnish Rail Agency, Finnish Road Administration, Michelin Nordic AB, the Ministry of Transport and Communications Finland, Neste Oil Corporation, VR-Group and VTT. More information about the programme is available at http://www.vtt.fi/ proj/tl2025/index.jsp?lang=en. REFERENCES [1] Elvik, R. & Vaa, T. 2004. The handbook of road safety measures. Oxford: Elsevier Science, 1078 p. [2] Michon, J.A. 1985. A critical view of driver behavior models: what do we know, what should we do? In: Human Behavior and Traffic Safety. Evans, L., & Schwing, R.C. (Eds) New York: Plenum Press. pp.485520. CONTACT Juha Luoma Research Professor juha.luoma@vtt.fi Tel. +358 20 722 4533 83 84 SAFETY INSPECTIONS OF RAILWAY-ROAD LEVEL CROSSINGS Veli-Pekka Kallberg, Antti Seise, Tapio Ahonen, Risto Öörni The objective of those inspections is to improve conditions for safe crossing of the railway for vigilant and motivated road users. In particular, the objective was to suggest improvements, which would make sure that road users have more time to cross the railway than it takes for the train to travel to the level crossing from the point at which the driver of the road vehicle can fi rst see it. METHOD Systematic inspections at Finnish railway-road level crossings have improved road users’ chances to cross the railway safely. INTRODUCTION Accidents at level crossings are a major safety issue for Finnish railways. There are 4,430 level crossings in Finland, 740 of which are equipped with automatic half barriers and 100 with flashing lights and bells. Most level crossings (3,600) are passive and usually have only crossbuck signs to warn road users. The annual number of level crossing accidents is approximately 50 and result in close to 10 fatalities per year. To improve the safety of level crossing the Finnish Rail Administration (RHK) has since 1999 commissioned VTT to carry out systematic safety inspections at selected level crossings. Specifically, VTT has inspected approximately 400 level crossings per year so that by October 2008 the total number of inspected level crossings was 3,934. The inspections carried out so far cover more than 95% of level crossings on main railway lines. The inspections at level crossings include systematic and extensive at-site recording of physical characteristics of the level crossing, estimation of traffic volumes on the railway and road, a number of photographs taken at fi xed locations to certain directions. GPS and inclinometer devices are used to trace the lateral and vertical profi le of the road surface near the crossing. Recent inspections contain also video clips describing how visibility from the road to the track changes as the road vehicle approaches the level crossing. Required crossing times are estimated for three vehicle categories: cars, lorries and lorries with trailers. The estimation of required crossing times is based on a large number of simulations with an advanced vehicle movement simulator. Available crossing times are calculated on the basis of maximum train speed and measured sight distances from the road to the track. RESULTS Overall, 95% of level crossing inspections resulted in recommendations for improvements. Specifi cally, recommended safety measures frequently included clearing of vegetation and other obstacles from the sight lines (Table 1). If adequate sight conditions could not be achieved by such measures, driving ban for long and slow vehicles and even reduced speed limit for trains were recommended as instant measures. Such restrictions can later be removed, if barriers are installed. IMPROVING ROAD AND RAILWAY SAFETY Table 1. Most frequently recommended safety measures (based on inspections of 3544 level crossings on main railway lines). Propotion of level crossings Measure 1 2 3 4 5 6 7 8 9 10 Clearing of vegetation Improvement of vertical aligment of road Driving ban for lorry and trailer combinations Removal of level crossing Removal of level crossing and building of new road connection Installation of crossbuck signs Driving ban for lorries and buses Reduced spot speed limit for trains Reneval of level crossing deck Installation of sandbin (for icy road conditions) The output from the safety inspections contains reports by road section, each report typically describing the results of inspections at 50 to 100 level crossings. By April 2009, 45 such reports have been completed and are publicly available at RHK’s website. Secondly, the results of the inspections are also saved to a level crossing database, which contain more than 100 variables describing each level crossing. Thirdly, a PC application for viewing some basic information of each level crossing and the photos and videos is updated regularly. The database includes detailed information of almost all level crossings on state railways. 75 % 21 % 18 % 18 % 8% 10 % 7% 6% 5% 4% ings. For example, RHK uses this data for the calculation of safety index for individual level crossings. Thirdly, the PC application for viewing the individual level crossings is a handy tool for RHK’s personnel responsible for level crossing management, e.g. in case of contacts from the public asking about conditions at or plans concerning certain level crossings. ACKNOWLEDGEMENTS The safety inspections at Finnish level crossings were funded by the Finnish Rail Administration. REFERENCES DISCUSSION AND CONCLUSIONS The conducted inspections have revealed significant deficiencies in the safety of level crossings. Consequently, the inspections have shown to be an effective tool to identify safety problems of level crossings and help to create conditions, where safe crossing is possible. In the future in-vehicle warning devices, which warn drivers if a train is approaching, may significantly improve safety at passive level crossings, where installation of barriers is not economically feasible. Such a system is being tested at VTT. [1] Kallberg, V.-P., Anila, M., Pajunen, K., Kallio, M. & Hytönen, J. 2002. Assessment and improvement of safety at Finnish railway-road grade crossings. Transportation research record 1801. pp.54-60. [2] Öörni, R. & Virtanen, A. 2007. In-vehicle warning system for railway level crossings. Proceedings of the 6th European Congress and Exhibition on ITS Systems and Services. Aalborg, Denmark, 18-20 June, 2007. EXPLOITATION POTENTIAL The added value of the described inspections is fi rst of all that they provide the infrastructure manager with necessary information for the upgrade of level crossings so that crossing the railway is safe for all vigilant and motivated road users. Secondly, the resulting database provides an excellent basis for different kinds of statistical analysis for further promotion of safety at level cross- CONTACT Antti Seise Research Engineer antti.seise@vtt.fi Tel. +358 20 722 4972 85 86 MOBILE WARNING SYSTEM FOR RAILWAY LEVEL CROSSINGS Ari Virtanen, Risto Öörni The aim of the work was to implement and test an in-vehicle warning system for railway level crossings. A prototype was built and tested on HankoKarjaa railway line in southern Finland. The prototype was based on GPS, GPRS and laptop computers. The operation of the invehicle warning system was compared to fi xed warning system installed on level crossings. During the day of testing there were four test situations. In three of them the operation of the in-vehicle device, operation on fi xed active warning systems on the level crossing, movements of the car and movements of a rail bus equipped with the train equipment could be documented with a video camera. During the day of testing there were no false or missed alarms. The piloted system can be said to implement the needed functionality. INTRODUCTION In Finland there was 3835 level crossing on the railroad network at the end of year 2004 (RHK 2004). Level crossings with gates were 794 of these (21 %) and without any warning devices were 3041 level crossings. Most of the unequipped crossings are located in tracks, where train traffic is low and irregular. During 2004 happened 52 accidents in level crossings and death toll was 8. This figure represent a half of the total amount of deaths on railroad accidents. A lot of these accidents happen to people who make crossings in regular basis and therefore their alertness may be reduced. ing of trains and mobile service to provide information to the customers. To test the system architecture a prototype of the system was built and tested. This feasibility study showed that system concept works. The next phase is to build larger pilot system, to study user behaviour to ensure that system increase safety. SYSTEM ARCHITECTURE The system architecture is shown in Figure 1. Application is divided in two parts; tracking system for the engines and mobile service for the users. Tracking system has to cover all railroad traffic, trains as well as different work machines. Tracking system for the engines contains positioning module, in-vehicle computer and wireless data channel. Positioning is based on satellite positioning. Engines current position, direction of movement and velocity is sent to server. On the basis of the real time location information on trains, the software calculates the states of level crossings. In-vehicle device knows its own location and the locations of the level crossings. When the user is driving to the level crossing, the system sends a query to the server (mobile service) and receives the state in that particular crossing. Then in-vehicle system warns the driver for coming trains if there is any. In-vehicle system is based on mobile phone, but the service can be integrated in professional applications as well. RESULTS OF THE FIELD TEST To improve safety, the best solution is to remove level crossings completely, which would be very expensive. The next best solution is to equip crossings with warning light and gates. This is again very expensive, because most of the crossings are located in places, where is no electricity nearby. In this project the aim was to develop a cost effective solution for this warning problem. The feasibility test was carried out in 2006 on a railway line from Karjaa to Hanko in southern Finland. The line is a single-track and not electrified. The maximum speed of trains during the field test was 120 km/h. The test engine was a rail bus, which runs this route several times in a day. The four tests took place in Raasepori and Lappohjan satama level crossings. Warning system is based on a wireless communication network, a client-server architecture, continuous track- The functionality of the in-vehicle equipment was estimated by comparing its function with the operation of IMPROVING ROAD AND RAILWAY SAFETY Figure 1. System architecture. the level crossing warning equipment and the movement of the rail bus. The in-vehicle equipment gave a warning in all four situations and didn’t give false warnings during the tests. The in-vehicle equipment activated itself and returned to the normal state almost simultaneously with the level crossing warning equipment in the three documented cases. FUTURE WORK Because the feasibility test show that proposed system is working, a larger pilot test phase was started at the beginning of the 2008. Pilot system cover all train traffic between Hanko and Hyvinkää and total 90 engines will be equipped with tracking system. Test persons are selected among people who lives near the track and professionals that have to drive over track during their duties (postmen, taxi and truck drivers). The system is capable to record driver behaviour on every crossing. The aim is to collect statistical data with and without warning system. Then one can say if warning system increase safety or not. At least it reminds every time when approaching the crossing and thus alerts the driver to check incoming trains. REFERENCES [1] (RHK, 2006) The Finnish Rail Administration (RHK). http://www.rhk.fi [referred 23rd October 2006) [2] (Öörni 2005) Öörni R., Pajunen K. 2005. Rautatien tasoristeykseen tulevasta junasta varoittaminen autossa. Esiselvitys. [Development of in-vehicle warning device for railway level crossings. Feasibility study]. AINO publications 17/2005. ISBN 952-201969-0 CONTACT Ari Virtanen Senior Research Scientist ari.virtanen@vtt.fi Tel. +358 20 722 3609 87 88 TRESPASSING ON FINNISH RAILWAYS Anne Silla investigate the trespassing behaviour and characteristics at selected sites, (c) to explore opinions about possible countermeasures to prevent trespassing, (d) to collect opinions on railway trespassing from people living close to railway line, and (e) to investigate what kind of effect three selected countermeasures – building a fence, landscaping and prohibitive signs – have on the frequency of trespassing and the characteristics of trespassing behaviour. METHOD The trespass problem in Finland has been quantified in a study, which enabled the problem to be visualised from the point of view of engine drivers, people living close to railway line and trespassers. The results help practitioners and researchers to better understand the problem and thus also help to allocate the available resources effectively. Sites with frequent trespassing were investigated through a survey directed at engine drivers and by site observations at the most suitable locations. The numbers of trespassers at the selected sites were monitored with the use of cameras equipped with motion detectors both before and after the countermeasures were implemented. In addition, the trespassers at the same locations were interviewed. The interview focused on determining the factors that affect trespassing, the frequency of trespassing, and the possible preventive measures. At the same time, a survey was sent to 1,500 households in the same area aiming to collect local people’s thoughts and observations related to trespassing. RESULTS AND DISCUSSION INTRODUCTION A study has been conducted which focused on the collisions between trains and pedestrians (i.e. trespassing accidents), since trespassing is one of the leading railway safety problems worldwide (e.g. [1], [2]). In Finland, 62% of all railway fatalities in 2004–2007 (excluding suicides) can, most probably, be attributed to trespassers. Trespassers include those who cross the railway lines at places which are not specifically marked for that purpose or people who are walking illegally or loitering in the railway area. The trespassers are usually adults and males. Trespassers are usually alone and do not carry anything large with them. According to the interviewees, the main reason for trespassing is for taking a short cut, which has already become a habit for many trespassers. Based on the measurements, the physical countermeasures (landscaping and building a fence) affect the characteristics of the trespassers, since at those sites the proportion of trespassers not carrying anything increased. Before the countermeasures were built, almost one third of the trespassers were carrying a bicycle. The specific aims of this study were (a) to identify the sites of frequent trespassing on Finnish railways, (b) to Overall, 83.5% of the respondents in the household survey considered trespassing to be fairly or highly dan- IMPROVING ROAD AND RAILWAY SAFETY gerous and 18.2% assumed it was legal. The corresponding numbers related to the dangerousness and legality of trespassing among the interviewed trespassers were 50% (Figure 1) and 15%. Each constructed countermeasure had a statistically significant effect on the amount of trespassing. Fencing reduced the amount of trespassing by 94.7%, landscaping by 93.5% and prohibitive sign by 30.7%. However, the effect of each countermeasure also varied according to local characteristics. Consequently, the results did not allow any general conclusions about the effectiveness of the countermeasures to be drawn. The results confi rmed the fi ndings from the earlier studies (e.g. [3],[4]) that there is no generic solution for preventing trespassing; on the contrary, trespassing tends to be specific to a location, and solutions should be tailored to specific locations and factors in order to ensure the implemented measures are effective. However, the main factor that determined the suggested type of countermeasures was the distance to the closest official crossing site. Specifically, the results suggest that people were more willing to accept physical countermeasures if the distance to the closest official crossing site was relatively short, but in the case of a relatively long distance they preferred an overpass or underpass. EXPLOITATION POTENTIAL The most effective measures seem to be the construction of underpasses or fencing the tracks. Furthermore, education at schools concerning the dangers of walking on or across railway tracks is important. Other suggested measures included the imposition of fi nes, prohibitive signs, landscaping, increasing the number of legal pedestrian crossings, camera surveillance and information campaigns in the media. This study gathered new information concerning the characteristics of trespassing in addition to the information based on reported incidents and fatalities. Figure 2. The dangerousness of trespassing based on the interviewed trespassers. ACKNOWLEDGEMENTS This research was funded by Finnish Rail Administration. REFERENCES [1] Lobb, B. 2006. Trespassing on the tracks: A review of railway pedestrian safety research. Journal of Safety Research, Vol.37, pp.359-365. [2] Pelletier, A. 1997. Deaths among railroad trespassers. The role of alcohol in fatal injuries. JAMA, Vol.277. pp.1064-1666. [3] Savage, I. 2007. Trespassing on the Railroad. Prepared for Research in Transport Economics: Railroad Economics. Amsterdam: Elsevier Science. [4] Law, W. 2004. Trespassing on Railway Lines - A Community Problem-Solving Guide. 8th International Level-Crossing Symposium & Managing Trespass Seminar. 13-16 April, 2004. Sheffield. CONTACT Anne Silla Research Scientist anne.silla@vtt.fi Tel. +358 20 722 111 89 90 NEW TRAFFIC MANAGEMENT AND SURVEILLANCE TECHNOLOGIES Harri Koskinen, Matti Kutila within the ASSET-Road EU funded initiative whose objectives are to improve road safety and sustainable traffic. The RSU will gather and process available road traffic and safety relevant information. Portable solutions make it possible to extend the surveillance to wide areas and change the observation location in a relatively short time in contrast to the state-of-the-art fi xed surveillance points, whose location is well known for motorists. In short, the main objectives are to exploit the possibilities and advantages, and address the shortcomings of the portable surveillance unit. In the long run the objective is to enhance the safety and ecology of road transport. METHODS A portable traffic surveillance and enforcement unit, presented in this paper, makes it possible to extend the surveillance to wide areas and change the observation location in a relatively short time, in contrast to the state-of-the-art fi xed surveillance points. The work aims to improve road safety and sustainable traffi c by preventing traffi c violations and informing motorists about more ecological driving manners. INTRODUCTION A novel concept for a portable traffic surveillance and enforcement unit has been investigated. The roadside unit (RSU) will be designed, constructed and evaluated The overall system consists of the actual surveillance unit, a data pool and connections to the police office, patrol cars, and the road operator. The main components of the system are the RSU and the data pool, and the secured wireless data connection between them (FlashOFDM at 450MHz in the demonstration case). The RSU is responsible for the data acquisition and transmitting it to the data pool, where it is analysed and stored. The data analysis includes the recognition of traffic violations such as speeding, or other abnormalities such as brake failures in heavy goods vehicles (HGV) or freezing road surfaces. The handling of abnormal situations will involve informing the responsible authorities, i.e. the police and road operators. The system will be demonstrated in the ASSET-Road project by focusing on the following applications and goals: • Vehicle speed recognition Enhance road safety by reducing speeding. • Distance between two vehicles Enhanced road safety and environment friendly speed maintenance with less accelerations and decelerations. • Road condition measurement [1] NEW TECHNOLOGIES FOR ROAD SAFETY • • Enhance the road safety by assisting to maintain roads in a good condition. Brakes, tyres and bearings state monitoring of HGVs Fuel consumption reduction due to the minimisation of brake failure problems and enhancement of the road safety by preventing tyre breaks. Weight-in-motion measurement of HGVs Enhanced safety and road condition by reducing the amount of overloaded vehicles. A future objective aims to obtain personal feedback on the driver concerning their driving behaviour and allowing them to meet requirements of environmental effective and safer driving habits. DISCUSSION AND CONCLUSIONS A portable autonomous traffic surveillance and enforcement unit capable of enforcing such a large palette of variables does not currently exist. Today fi xed speed measurement points are successfully used for enforcement. Other functions implemented in the portable RSU are rarely used even in fi xed observation points that are usually situated along high volume roads. With the portable RSU, it will also be possible to extend the enforcement to minor roads. loading is obviously a safety risk, but such vehicles also increase wearing of the road surface and can even damage the road structure. Especially in northern Europe, ice and snow on the road cause traffic accidents and congestion. Usually, the slipperiness is warded off by salting and ploughing the road. By applying the portable road surface monitoring system, the density of monitoring stations can be increased and the timing and allocation of slipperiness prevention becomes more effective. EXPLOITATION POTENTIAL In addition to the benefits for police and road operators, the data could be utilised also in systems available to the general public; such as Real Time Traffic Information Systems (RTIS). Even personalised data on drivers could be extracted from the data, where information on the driving style or condition of the vehicle could be monitored. Such information could be used by the drivers to enhance their driving habits to become more economical and ecological. ACKNOWLEDGEMENTS The research has been funded by the EU and VTT. REFERENCES The primary objectives of the system are to increase traffic safety and promote greener driving. With the vehicle speed measurement it will be possible to use the unit as an automatic portable speed trap and thus reduce speeding and reckless driving. Too short a distance between vehicles is a major safety risk, but it also increases the need for braking and acceleration, and. thus increases fuel consumption and emissions. [1] Kutila, M., Jokela, M., Burgoa, J., Barsi, A., Lovas, T. & Zangherati, S. 2008. Optical road-state monitoring for infrastructure-side co-operative traffic safety systems. In: Proceedings of the 2008 IEEE Intelligent Vehicles Symposium (IV’08). Eindhoven: IEEE. CONTACT The improper conditions of HGV brakes and bearings increase the risk for tyre damage and may subsequently result in road accidents. Aside from excessive wear of components, also fuel consumption may be increased. Over- Harri Koskinen Research Scientist harri.koskinen@vtt.fi Tel. +358 20 722 3624 91 92 SAFETY EFFECTS OF INTELLIGENT IN-VEHICLE SYSTEMS Pirkko Rämä, Risto Kulmala, Niina Sihvola, Juha Luoma, Anna Schirokoff Safety impacts of intelligent vehicle systems have been assessed with an advanced tool that was designed to cover the impacts in a structured and systematic way. The systems showed signifi cant potential to reduce fatalities and injuries in the transport system. for exceeding the speed limit, and accident-prone sites (MAPS&ADAS). The effects of ESC and MAPS&ADAS were substantial also in estimates for 2020. Because of low penetration levels of many systems, however, the estimated effects for 2020 were in general substantially lower in comparison with the potential. INTRODUCTION DISCUSSION AND CONCLUSIONS In the EU’s sixth framework programme, safety impacts of intelligent vehicle systems (IVS) were assessed [1,2,3]. The aim was to provide estimates for safety impacts of a selection of IVS for target years (2010, 2020 and 2030) and penetration scenarios. The most prominent systems showed considerable potential to contribute to a safer transport system. Even some individual systems showed considerable savings, e.g. ESC in the assumed high penetration in 2020 would contribute to avoid 2,900 fatalities and 50,000 injuries. Overall, the studies provided concrete, unified estimates of traffic and safety effects, and provided a central input for the cost-benefit calculations which estimated monetary value for these benefits. In the future, when more accurate data is likely to be available, the safety estimates can be further improved. METHOD The method developed for the safety impact assessments was based on previous understanding of the impact mechanisms of intelligent transport systems [4]. The three main dimensions of road safety – exposure, accident risk and severity of consequences – were covered by nine behavioural mechanisms: (1) direct in-car modification of the driving task; (2) direct influence by roadside systems; (3) indirect modification of user behaviour; (4) indirect modification of non-user behaviour; (5) modification of interaction between users and non-users; (6) modification of road user exposure; (7) modification of modal choice; (8) modification of route choice; and (9) modification of accident consequences. The power of the assessment tool was to systematically take into account the assessed effectiveness of the IVS to prevent the targeted fatalities and injuries, the share of relevant accidents, the assumed fleet penetration of the systems, and the assumed accident trend. EXPLOITATION POTENTIAL The results provided perspectives on the market introduction of IVS, and can be used to provide guidance in their deployment. The results support decision making for research programmes in terms of focus and funding, as well as awareness, promotion and deployment activities at the EU, national and regional levels. These outcomes could also be used by policymakers, road operators, and driver clubs as a basis for terms of investment, promotion and deployment decisions. Industry and insurance organisations may be able to use this research for developing product and innovation strategies. ACKNOWLEDGEMENTS RESULTS The IVS have considerable potential to decrease fatalities and injuries in road traffic (Figure 1). Specifically, the potential to prevent fatalities was highest for the electronic stability control (ESC), followed by the lane keeping support system, the warning system VTT’s activities for this study were funded by the European Commission and VTT. REFERENCES [1] Kulmala, R., Leviäkangas, P., Sihvola, N., Rämä, P., Francsics, J., Hardman, E., Ball, S., Smith, B., Mc- NEW TECHNOLOGIES FOR ROAD SAFETY Figure 1. Estimated safety impacts on fatalities (%) of 16 IVS. “Potential” assumed 100% fleet penetration of systems; “Year 2020 high penetration rate” assumed a promoted penetration in 2020. Crae, I., Barlow, T. & Stevens A. 2008. Co-operative systems Deployment Impact Assessment, Final study report. CODIA Deliverable 5. [2] Scholliers, J., Kutzner, R., Luoma, J., Sihvola, N., Leanderson, S., Netto, M., Blosseville, J-M., van Noort, M., Tango, F., Koskinen, S., Joshi, S., Noecker, G., Ljung Aust, M., Chen, J. & Gemou, M. 2008. IP_D12/ D16.4 Project fi nal report and recommendations for future assessments, PReVAL Final Report. [3] Wilmink, I., Janssen, W., Jonkers, E., Malone, K., van Noort, M., Klunder, G, Rämä, P., Sihvola, N., Kulmala, R., Schirokoff, A., Lind, G., Benz, T., Peters, H. & Schönebeck, S. 2008. Socio-economic Impact Assessment of Stand-alone and Co-operative Intelligent Vehicle Safety Systems (IVSS) in Europe: Impact assessment of Intelligent Vehicle Safety Systems, eIMPACT Deliverable D4. [4] Draskóczy, M., Carsten, O.M.J. & Kulmala, R. 1998. Road Safety Guidelines. CODE Project, Telematics Application Programme, Deliverable B5.2. CONTACT Pirkko Rämä, Dr Chief research scientist pirkko.rama@vtt.fi Tel. +358 20 722 4551 93 94 AFTERMARKET DEVICES ASSISTING DRIVERS Petri Mononen, Tapani Mäkinen The TeleFOT project investigates by means of Field Operational Tests (FOT) the impacts of functions provided by aftermarket and nomadic devices, including future interactive traffic services emerging within the next few years. Field operational tests developed within TeleFOT aim to obtain a comprehensive assessment overview of the efficiency, quality, robustness and user friendliness of in-vehicle systems such as ICT for smarter, safer and cleaner driving. INTRODUCTION TeleFOT Field Operational Tests respond to a need recognised by the European Commission and other European stakeholders to investigate the impacts of driver support functions on driving with large fleets of test drivers in real-life driving conditions. Through Field Operational Tests, TeleFOT assesses the impacts of functions provided by aftermarket and nomadic devices, including future interactive traffic services that will become part of driving environment systems within the next few years. TeleFOT investigates how retrofit- ted equipment, such as navigators and smart phones, can support the driver and the detailed effects of the information provided for this purpose on the driving task. The eCall functionality will be tested as well. The project also aims to speed up the penetration of systems able to support drivers’ field of vision in conditions where good situational awareness is needed. FIELD OPERATIONAL TESTS TeleFOT road tests aim to obtain a comprehensive assessment of the efficiency, quality, robustness and user friendliness of in-vehicle systems, such as ICT, for smarter, safer and cleaner driving. FOTs have been organised in three test communities in Northern (Finland, Sweden), Central (France, Germany and UK) and Southern (Greece, Italy, Spain) Europe. The tests are expected to be held over two phases. In the tests, the drivers will have access to smart phones and navigators, and the effects of the services they provide to support driving will be tested. Prior to any field operational tests, the usability and safe fitting, and the safety of the devices are to be carefully studied under laboratory conditions. A major task in conducting the tests will entail the development of the Data Management Centre, which is responsible for the centralised management and providing data coming from the Test Communities. Another important focus is on the safe integration of nomadic devices into the driving domain, taking into account the results of the crash tests performed and the guidelines for the safe introduction of nomadic devices in the vehicle environment of the updated ESoP on HMI (European Statement of Principles on Human-Machine Interfaces). Figure 1. A personal navigation device as used in the TeleFOT benchmarking tests. With its camera this device detects the road-side speed limit signs and conveys the information to the display. The functions specified in the initial phase are to be tested in the eight European countries. The duration of the long-term tests is about one year. The data collected from the FOT trials will be transmitted wirelessly from the test vehicles to the test centres for human factors, impacts and other assessments. NEW TECHNOLOGIES FOR ROAD SAFETY Figure 2. A smart phone with navigation may occasionally be a good alternative to a fi xed one. The field tests are today at the preparatory and ramping-up stage, and have been planned in two phases, with short and long term testing with a large number of drivers initially being performed. Secondly, detailed tests of a limited number of subjects using instrumented cars will be conducted. TRAFFIC SAFETY Revealing the behavioural and safety impacts of the use on nomadic and aftermarket devices constitutes the core of the work. Safety is addressed among other things through a traffic confl ict technique and accident models based on behaviour parameters. Aftermarket and nomadic devices bring in many features that may improve traffic safety, but the mere existence of them as well as a number of non-traffic related services and features available may also be detrimental to the overall level of safety. Navigators need to be assessed in terms of their position and mounting in the cockpit among other things. To increase understanding of the usage situations and their effect on safety, it is important to study the different devices during real use in actual traffic situations as well as in crash tests. Also the possible contribution of these devices to accident consequences is studied in crash tests. It is possible that certain ways of mounting devices in the cockpit may cause problems in crash situations when the devices break away from their mounts and strike the occupants. The deployment of air bags may also dislodge the devices resulting in injuries or increasing the severity of them. ACKNOWLEDGEMENTS This study is funded by the European Commission and VTT under the TeleFOT project. CONTACT Petri Mononen Senior Research Scientist Petri Mononen@vtt.fi Tel. +358 20 722 2325 95 96 HOW INTELLIGENT VEHICLES PREVENT AND MITIGATE COLLISIONS Sami Koskinen Collision mitigation by automatic braking is the latest vehicle safety innovation entering the market. When the vehicle is about to hit an obstacle and the driver can no longer avoid the impact, the vehicle initiates braking. INTRODUCTION Sensor technologies play a central role in the development of vehicle safety, such as in Advanced Driver Assistance Systems (ADAS). Vehicle safety systems are designed to monitor the driver, vehicle and their surroundings, inform and warn the driver of hazards, and possibly even eventually take momentary control of the vehicle. When a collision is deemed to be imminent and unavoidable, the vehicle is considered to have a permission to brake automatically. Upcoming Collision Mitigation Systems (CMS) are designed to fi rst warn the driver of any danger, and if no action is taken, these systems initiate braking with full power to mitigate the impact. COLLISION MITIGATION SYSTEMS Research of vehicle safety systems focus has recently shifted towards more active safety and the moments prior to a collision. If high risk situations and collisions can be reliably detected (Figure 1), this information can be used in several ways: • the vehicle can assist the driver in braking or brake automatically, • it can trigger alarms to the driver and other road users, • the vehicle can be prepared for an impact by, for example, tightening seat belts or using innovative actuators such as active bumpers. It is said that one third of drivers do not brake at all before an impending collision, one third brake inefficiently, and only one third brake with full power. A collision mitigation system could optimise the braking and also precharge the brakes in high risk situations to avoid any potential initial delay: the braking would start instantly with full power when a collision becomes unavoidable or the driver begins to brake. The moment when a collision is deemed to be unavoidable depends on the relative speed, the tyre–road friction, and the size and position of the obstacle. A time to collision value (TTC) of 0.5 seconds has sometimes been used as a rough estimate for when the braking is activated, to assess CMS safety impacts [1]. On dry asphalt, half a second of braking reduces the impact speed by approximately 18 km/h. If this performance can be achieved in a meaningful number of accident cases, the CMS could save numerous lives. This makes it one of the most interesting active safety systems being developed. However, the performance isn’t as good in every case: 1. CMS is not effective in collisions that involve only a part of the vehicle’s front – the collision can theoretically be avoided until very late and the vehicle cannot then start braking. 2. Current systems lose some of their effectiveness also on low friction surfaces, as they are unable to accurately estimate friction [2]. The braking distances and driver’s options to avoid a collision are usually calculated only for dry asphalt conditions. Preliminary simulations at VTT show a drop of up to 40 % in the ability to reduce collision energy on snow. The today’s vehicles are blind in the sense that they cannot estimate friction before starting to brake. VTT coordinated the EU “Friction” project to develop methods for measuring the friction. 3. At high speeds, even a reduction of 18 km/h is not sufficient to significantly reduce the remaining collision energy and the severity of impact. In many cases, an avoidance manoeuvre would be more helpful than driving straight and braking. NEW TECHNOLOGIES FOR ROAD SAFETY Figure 1. Estimating the risk of collision by calculating all potential trajectories. The future development of CMS involves more reliable detection of pedestrians and improved detection of, for example, side collisions by employing new sensor configurations. The overall cost of environmental sensing is also being addressed in line with the development of new, cheaper radars and laser scanners. VTT has recently initiated two EU projects for such sensor development. Future systems may even include driver monitoring and modelling to be able to detect when the driver is, for example, distracted and may have a slower reaction time than normal. In such cases a CMS could already start braking before an impact becomes mathematically unavoidable, thus increasing the safety potential of the system. Given that the reliability of environmental sensing will improve and the current legal issues associated with safety regulations for autonomous operations will be addressed, collision avoidance systems have the potential to dramatically improve traffic safety. COLLISION AVOIDANCE REFERENCES Collision avoidance algorithms have a long history especially in robotics. As vehicles start to carry a similar set of environmental sensors as autonomous robots have, options of introducing also autonomous manoeuvres to support the driver may soon be realised. [1] Scholliers, J. et al. 2008. Project fi nal report and recommendations for future assessments. Final Report of PReVENT IP subproject PReVAL. http://www.prevent-ip.org/en/public_documents/deliverables/d164_ preval_fi nal_report.htm [2] Koskinen, S. & Peussa, P. (Eds.) 2009. Friction project fi nal report. Deliverable 13 for the European Commission. Tampere, Finland. http://friction.vtt.fi/ The difference between collision mitigation and collision avoidance can be small. Collisions (especially at low speeds) can be avoided by braking a split second earlier. However, collision avoidance usually implies steering the vehicle around an obstacle, which requires extremely high reliability. Mathematically, computers can calculate effective ways to avoid a collision, but the introduction of associated systems is currently being held back by the risk that not all obstacles are detected with the environmental sensors, which may lead to a subsequent incorrect decision. Collision avoidance by active steering could be used to extend the functionality of collision mitigation systems in certain types of crashes, where a minor change in direction could help to avoid an impact (e.g. avoiding a bicycle which suddenly drifts a metre closer to the car). CONTACT Sami Koskinen Research Scientist sami.koskinen@vtt.fi Tel. +358 20 722 3636 97 98 CAMERA-BASED DRIVER WORKLOAD ESTIMATION Matti Kutila, Maria Jokela, Roberto Montanari Increasing number of Advanced Driver Assistance Systems (ADAS), communication devices and entertainment services are introduced in modern vehicles. This raise need of adaptive human machine interface (HMI) to keep the driver’s workload at a reasonable level. The study presented here extends driver’s workload detection beyond previous work. The analysing tool developed in the AIDE-EU-FP6-IP project will be applied to acquire data on driver workload while driving and using aftermarket devices. VTT is currently coordinating the TeleFOT-EU-FP7 project focusing on large scale Field Operational Tests (FOT) investigating the influence of aftermarket and nomadic devices on driving. The project will use a low cost camera vision system to automatically analyse the driver’s workload. INTRODUCTION An adaptive in vehicle HMI prototyped by the AIDE project, is a system able to provide information depending on the driving context and the fi nal users’ status. Therein, a Cockpit Activity Assessment (CAA) module was developed [1] to detect two types of inattention: visual and cognitive distraction [2]. In the AIDE project the facial features were captured by using a FaceLab stereo vision system from Seeing Machines providing a wide range of different eye and head parameters. Considering TeleFOT needs, an affordable system was developed. VTT implemented an eye tracking system based on the open source TrackEye software compatible with standard web cameras [3]. METHOD The core of the visual distraction detection is an attention mapping algorithm based on the driver’s head and gaze orientations. The view from the cockpit is divided into four clusters of interest: windscreen, and left and right exterior mirrors (Figure 2). Additionally, there is the road ahead-cluster, which is a sub-portion of the windscreen, for a more detailed analysis whether the driver is looking road in front of the vehicle. The analysing program includes a tool for capturing data and iteratively optimising the attention cluster. For the cognitive distraction detection, a support vector machine (SVM) was implemented with using the SVMlight algorithm [4]. The classifier is a machine learning algorithm in which the basic idea is to non-linearly map the training data to a higher-dimensional feature space where it can be separated linearly. Tuning the SVM classifier was performed iteratively by changing the input data configuration and the SVM criteria. A specific laboratory tool was developed to make modification of the learning parameters easier and achieve optimal balance with the true and false positive and negative detections. In addition, the developed laboratory tool visualises the cluster boundaries and performs the necessary adaptation according to the vehicle type. RESULTS Figure 1. The camera based driver monitoring equipment in the VTT’s instrumented vehicle The test data were gathered with a SEAT passenger car and a Volvo’s truck. The truck data was gathered by recruiting 12 professional. In the laboratory tests, the attention mapping algorithm performed well, providing a 72% detection rate for the road ahead-cluster (see. Fig- NEW TECHNOLOGIES FOR ROAD SAFETY ure 2). Therefore, the eyes-on-road target, which was the most important one, was well detected. The performance rate of other cluster is not as good but still acceptable from the TeleFOT project point of view. The performance achieved for the cognitive distraction detection was encouraging; especially in the passenger car case (86% of the induced cognitive tasks were detected). However, the outcome of the truck application (68%) was not as good as expected but is nonetheless promising. Figure 2. Driver attention clusters for detecting visual distraction DISCUSSION AND CONCLUSIONS The selected distraction detection technology has shown potentiality to be used for driver distraction detection. The proposed methodology is reliable enough but the major obstacle when considering large deployment is the price level of the current hardware. Since the new approach is to utilise cameras dedicated to the consumer products like web cameras significant price reduction is expected. This however, requires some further elaboration considering robustness of the analysing algorithm. The proposed system is dedicated only for distraction detection whereas driver monitoring is larger area and including stress and drowsiness. Therefore, fusion of vehicle seat or steering wheel sensors could be considered in the future system in order to obtain a more comprehensive view of the driver’s state. [2] Engström, J., Johansson, E. and Östlund, J. “Effects of visual and cognitive load in real and simulated motorway driving”, Transportation Research Part F: Traffic Psychology and Behaviour. 8, pp. 97–120, vol 8, 2005. [3] Savas, Z. “Real-Time Detection and Tracking of Human Eyes in Video Sequence”, Master of Science Thesis. Middle East Technical University, Turkey, 2005. [4] Joachims, T. “Making large-scale SVM learning practical”, In, B. Schölkopf, C. Burges & A. Smola (eds.). Advances in Kernel methods - support vector learning, B. MIT-Press, 1999. ACKNOWLEDGEMENTS This study was funded by the European Commission and VTT under the AIDE and TeleFOT projects. The original CAA module was co-developed and evaluated together with Mr. Gustav Markkula from Volvo Technology Corporation. REFERENCES CONTACT [1] Kutila, M. “Methods for machine vision based driver monitoring applications”, Dissertation thesis. VTT Publications 621. Tampere: VTT Technical Research Centre of Finland, 2006. Matti Kutila, Dr Senior Research Scientist matti.kutila@vtt.fi Tel. +358 20 722 3619 99 100 IN-VEHICLE ROAD FRICTION MONITORING Sami Koskinen, Pertti Peussa The contact friction between road and tyre is essential for driving, since it makes braking, steering and accelerating possible. Drivers usually learn to detect it. Vehicles should get the same on-line skill in order to make future safety systems like Collision Mitigation, Collision Avoidance, etc. behave correctly. INTRODUCTION Friction plays a crucial role in driving, since aside from the aerodynamic forces and gravity, all forces acting on a vehicle are put into action via the friction forces between the tyre and the road. Drivers unfortunately sometimes fail to estimate friction correctly and attempt unrealistic manoeuvres, thereby losing control of their vehicle. Along with driver behaviour and alertness, friction is one of the remaining key unknowns in the algorithms of future ADAS (Advanced Driver Assistance Systems) that calculate the risk of collision, or safe speed. For example, if a Collision Mitigation System always assumes high friction, it will have very poor performance on snow, since it will brake too late. METHODS There have been several approaches to determine the tyre–road friction [1]. The “friction used” will mainly be determined by using standard vehicle-based driving dynamics sensors like those already available for ABS or ESP systems. Using these online measurements, the current “friction used” can be estimated very precisely. However, it is more important to know the “friction potential”, i.e. the maximum friction coefficient on the current stretch of road. It cannot be measured directly during normal driving (unless one brakes or steers so hard that slipping begins). Vehicle driving dynamics sensors can estimate the friction potential, but rather “rough” driving (frequent 0.3 G braking/acceleration or steering) is required for a reliable estimation. Since the road surface condition has a huge influence on the friction value, an established approach is to use forward looking sensors to detect whether the road is covered by water, snow or ice. The applicability of a laser scanner, automotive radar, polarisation camera, and an optical sensor called RoadEye were studied successfully [2]. This approach is not dependent on any driving manoeuvres. Figure 1. Friction between road and tyre is essential for driving. An optical tyre sensor has also been studied [3]. It measures the small deflections in the tyre’s inner liner during rotation. This approach provides tyre forces, the length NEW TECHNOLOGIES FOR ROAD SAFETY Figure 2. The main result of the friction monitoring project was the data fusion architecture, and fusion algorithms. of the contact patch, vehicle slip angle, and can estimate the development of aquaplaning. RESULTS A substantial amount of effort has gone into developing a data fusion method which can combine all the information above with other dynamic information from the vehicle (like speed, brake pressure, etc.), to produce the best overall estimate of friction, slip angle, percentage of aquaplaning, tyre forces, and road conditions [4]. The method does not require full sensor configuration, but if fewer sensors are used, the estimation errors increase. This approach was tested in a Volvo truck, a Fiat Stilo, and an Audi A6 [4] in various conditions. The FRICTION system is estimated to be able to detect friction as well as an average and alert human driver; e.g. the friction coefficient error being less than 0.15. DISCUSSION AND CONCLUSIONS FRICTION system is crucial for all ADAS applications, which have to anticipate collision or other hazardous situation. A Collision Mitigation system has to know when to start braking, and for that the friction value has to be known. An Obstacle Avoidance has to know when to steer or brake (friction needed, again). Also applications like Curve Speed Warning, Safe Distance, Adaptive Cruise Control and Intersection Safety benefit if friction information is continuously available, especially on slippery roads. The gained understanding of friction measurement and data fusion methods can also be applied to heavy work machines. ACKNOWLEDGEMENTS The authors would like to thank the members of the EUfunded FRICTI@N project for fruitful teamwork, and the European Commission for its funding. REFERENCES [1] Peussa, P. et al. 2008. Fahrzeugbasierte Schätzung des Reifen-Fahrbahn-Kontaktes im FRICTI@NProject. Aachen Colloquium – Automobile and Engine Technology, Vol. 17, pp.591-619. (in English) [2] Haas, T. et al. 2008. Reibwerterkennung durch Sensorfusion zwischen Fahrdynamik- und Umfeldsensorik. Aachen Colloquium – Automobile and Engine Technology, Vol. 17, pp.621-646. (in English) [3] Tuononen, A. et al. 2008. Reifensensorik zur Reibwertschätzung. Aachen Colloquium – Automobile and Engine Technology, Vol. 17, pp. 647-657. (in English) [4] Peussa, P. et al. 2009. FRICTI@N Final Report. Deliverable 13 for the European Commission. Tampere, Finland. 116 p. (available from friction.vtt.fi) EXPLOITATION POTENTIAL A Collision Mitigation system, which is aware of current friction, can manage collision situations clearly safer than one without friction estimation: in snowy conditions crash energy reduction with “friction unaware” mitigation is 40% smaller than reduction achievable with “friction aware” mitigation system. Thus friction monitoring can reduce the severity of the accidents, and save lives. CONTACT Pertti Peussa Customer Manager pertti.peussa@vtt.fi Tel. +358 20 722 3601 101 102 MARITIME SAFETY RESEARCH AT VTT Robin Berglund, Tuula Hakkarainen, Seppo Horsmanheimo, Saara Hänninen, Sampo Karppinen, Kari Mäkelä, Leena Norros, Maaria Nuutinen, Tapio Nyman, Markus Porthin, Jukka Sassi Maritime safety is concerned with the protection of life, health, the marine environment and property through regulation, management and the technological development of all forms of waterborne transportation. INTRODUCTION The Laboratory of ship technology was established at VTT in 1975 and maritime safety research had from the start a strong position as one of the original research areas in the laboratory. These days several research scientists at VTT have specialised in maritime safety research forming a maritime safety virtual team covering a majority of the expertise needed in maritime safety research. RISK ANALYSES VTT has long experience in managing risks in different areas of the society. The general risk assessment methods are usable also in maritime but the Formal Safety Assessment, FSA, method recommended by the International Maritime Organization, IMO, is tailor-made for maritime risk management. The application of FSA at VTT is described in article “Improving maritime safety in Åland Sea using Formal Safety Assessment” later in this publication. Contacts: tapio.nyman@vtt.fi , markus.porthin@vtt.fi TRAFFIC ANALYSES Traffic analyses have been performed at VTT based either on port call statistics e.g. dealing with oil transportation in the Gulf of Finland [1] and chemical transportation in the Baltic Sea [2] or on historical data obtained from the Automatic Identification System AIS which is described in article “AIS data analysis for identification of close encounter situations of vessels” later in this publication. Contacts: saara.hanninen@vtt.fi , robin.berglund@vtt.fi FAIRWAY SAFETY Computational models for assessing and improving radar reflectors’ properties have been developed at VTT [3] [4]. The plan is to develop calculation models to assist the fairway planning and risk assessment. VTT has also car- ried out survey projects pertaining to a real-time remote monitoring system to collect status and location information from aids to navigation (AtoNs). Related to this, VTT has also studied the synchronization of light equipped AtoNs and the utilisation of EGNOS system. Contact: seppo.horsmanheimo@vtt.fi HUMAN FACTORS RESEARCH Human and organisational factors research includes e.g. studies on co-operation on the bridge, human-technology interaction, piloting practises, development of vessel traffic services and mandatory reporting systems eg. [5][6]. Human factors experts have also participated in several accident investigations [7][8]. VTT has comprehensive methods to analyse, assess and develop human and organisational activity in order to improve maritime safety, efficiency and wellbeing of marine professionals. Contacts: maaria.nuutinen@vtt.fi , leena.norros@vtt.fi ENVIRONMENTAL SAFETY In MARTOB [9] and EFFORTS [10] -projects several options were tested for onboard ballast water treatment. EFFORTS project also focuses on other environmental aspects relevant for ports. VTT is also involved in the type approval process of ballast water systems. In addition to the ballast water, VTT has studied the nutrient load derived from ships’ sewage [11]. Contact: jukka.sassi@vtt.fi LIPASTO-system developed by VTT presents total exhaust gas emissions as well as unit emissions of CO, HC, NOx, PM, CH4, N2O, SO2 and CO2 and energy and fuel consumption caused by Finnish waterborne traffic. Data is specified according to a type of ship, traffic service area, its origin and its tonnage. http://lipasto.vtt.fi Contact: kari.makela@vtt.fi FIRE SAFETY The “Survivability for ships in case of fi re” research project [12] has been carried out at VTT in 2007 - 2009. MARITIME SAFETY AND SECURITY In this project, scientifically justified information on the survivability of ships in case of fi re was created by using and developing the state-of-the-art methods of fi re safety analysis. The main topics of the research were materials used in ships, quantitative fi re risk analyses, critical situations for structures, and simultaneous simulation of fi re and evacuation onboard. Contact: tuula.hakkarainen@vtt.fi CUSTOMER VIEW Among others, Finnish Maritime Administration has widely exploited VTT’s expertise in several projects related to maritime safety. Design, implementation and further development of the Gulf of Finland Reporting System (GOFREP) is a good example of the fruitful cooperation between VTT and FMA. REFERENCES [1] Hänninen, S. & Rytkönen, J. 2004. Oil transportation and terminal development in the Gulf of Finland. VTT, Espoo. 141 p. + app. 6 p. VTT Publications 547. [2] Hänninen, S. & Rytkönen, J. 2006. Transportation of liquid bulk chemicals by tankers in the Baltic Sea. VTT, Espoo. 121 p. + app. 30 p. VTT Publications 595. [3] Horsmanheimo, S. et al. 2007. Radar Visibility Estimation for Radar Reflectors, IALA Bulletin 1/2007. pp. 24-27. [4] http://www.vtt.fi/cast/ [5] Nuutinen, M., Savioja, P. & Sonninen, S. 2007. Realising the present, acknowledging the past, and envisaging the future: Challenges of developing the complex socio-technical system of VTS. Applied Ergonomics 38. pp.513-524. [6] Sonninen, S., Nuutinen, M. & Rosqvist, T. 2006. Development Process of the Gulf of Finland Mandatory Ship Reporting System. Reflections on the Methods. VTT, Espoo. 120 p. VTT Publications 614. http:// www.vtt.fi/inf/pdf/publications/2006/P614.pdf [7] Nuutinen, M. & Norros, L. 2009. Core Task Analysis in accident investigation – analysis of maritime accidents in piloting situations. Cognition, Technology & Work. [8] Norros, L. & Nuutinen, M. 2009. Learning from accidents: Analysis of normal practices. In: Risky work environments. Reappraising human work within fallible systems. Owen, C., Béguin, P. & Wackers, G. (Eds). Ashgate: Farnham, England. pp.17-52. [9] Sassi, J., et al. 2005. Experiments with ultraviolet light, ultrasound and ozone technologies for onboard ballast water treatment. http://www.vtt.fi/inf/pdf/ tiedotteet/2005/T2313.pdf [10] Home page of the EFFORTS project: http://www.efforts-project.org/cms/ [11] Huhta, H.-K., et al. 2007. Estimated nutrient load from waste waters originating from ships in the Baltic Sea area. http://www.vtt.fi /inf/pdf/tiedotteet/2007/T2370.pdf [12] Hakkarainen, T., et al. 2009. Survivability for ships in case of fi re – Final report of SURSHIP-FIRE project. http://www.vtt.fi/inf/tiedotteet/2009/T2497.pdf CONTACT Tapio Nyman Senior Research Scientist tapio.nyman@vtt.fi Tel. +358 20 722 4546 103 104 IMPROVING MARITIME SAFETY IN ÅLAND SEA USING FORMAL SAFETY ASSESSMENT Tapio Nyman, Markus Porthin, Tony Rosqvist, Saara Hänninen, Sampo Karppinen, Robin Berglund, Jukka Sassi Formal Safety Assessment (FSA) is a framework for making cost efficient decisions to improve maritime safety. The Åland Sea FSA resulted in ship routeing measures with significantly improved safety and protection of environment. INTRODUCTION FSA is a risk analysis and cost benefit assessment framework for rule making in the International Maritime Organization (IMO). Its aim is to enhance maritime safety and enhance the protection of the marine environment by offering a way to make cost efficient safety measure decisions. The most recent FSA study performed by VTT was the Åland Sea FSA [1] realised as a part of the Baltic Sea Safety (BaSSy) project. Analysis tools developed in other parts of the project were utilised and harmonised FSA principles outlined. METHODS FSA consists of five steps: 1) identification of hazards, 2) risk analysis, 3) identification of risk control options, 4) cost benefit assessment and 5) recommendations for decision making. The process is iterative due to interlinked features of the steps. In the Åland Sea FSA, hazards were identified and prioritised (step 1) through computerised expert workshops and analysis of accident statistics. Expected collision and grounding frequencies were estimated (step 2) both in the current situation and after implementation of the proposed risk control options (RCOs) (step 3). The BaSSy tool1 , developed by the Danish Technical University (DTU) and Gatehouse A/S in the BaSSy project, was used in the estimation. Route and traffic volume information extracted from Automatic Identification System (AIS) data (figure 1) and electronic nautical chart material were used for modelling. To tune the estimates given by the model, judgements by experienced mariners were elicited using Baye1 sian networks to assess the effect of the RCOs on the ability of officers of the watch to avoid accidents. Risk control measures tackling the identified hazards were generated and grouped into realistic RCOs in computerised expert workshops (step 3). The cost effectiveness of the RCOs was estimated through cost benefit analysis (step 4). On one hand the implementation and maintenance costs of each RCO and on the other hand their benefits through averted accidents were monetarily evaluated. Vessel and cargo damages as well as consequences of oil spills including oil combating, damage of marine environment and sea dependent sources of livelihood were taken into account. The resulting prioritised list of RCOs formed the basis for the recommendations for decision making (Step 5). RESULTS The estimated collision and grounding frequencies in the current situation were 0.25 and 0.79 accidents per year, respectively. All RCOs were found to decrease accident risk, but two alternatives were the most cost effective: Figure 1. Two days of traffic on the Åland Sea recorded by AIS. Traffic in opposite directions marked with red and green. The BaSSy tool is also known as IALA Waterway Risk Assessment Programme (IWRAP) MkII. MARITIME SAFETY AND SECURITY Figure 2. A traffic separation scheme organises the traffic and makes it more predictable. (Source: Finnish Maritime Administration, Swedish Maritime Administration) Implementation of a traffic separation scheme (TSS) and deep-water (DW) route (figure 2) would decrease collision risk by 40% and grounding risk by 5%. Since the TSS and DW-route are inexpensive to implement, the investments were estimated to bring 83.4 times the money spent in form of averted accident costs. If the TSS and DWroute were complemented with a ship reporting system similar to that of the Gulf of Finland (GOFREP), the collision and grounding risks would decrease by 61% and 19%, respectively. This investment would give a 5.3 fold return. DISCUSSION AND CONCLUSIONS Based on the recommendations of the Åland Sea FSA, IMO approved the proposal by Finland and Sweden of a TSS and DW-route for the sea area, entering into force 1 January, 2010 [2, 3]. Implementation of a surveillance and reporting system is under consideration, too. especially Peter Friis Hansen and Erik Sonne Ravn from DTU. The research was funded by the Nordic Council of Ministers, and in Finland by the Ministry of Transport and Communications and the Finnish Maritime Administration. The FSA process is under continuous development. To harmonise the process, VTT has set up a www-portal in address: http://www.vtt.fi /proj/bassy/ containing useful information and references for performing FSAs. The introduction of AIS has enabled significantly increased accuracy of traffic modelling and FSA studies. The tools developed in the BaSSy project and used in the Åland Sea FSA, effectively take advantage of these new opportunities. REFERENCES EXPLOITATION POTENTIAL The IMO recommends the application of FSA in connection with proposals for regulatory measures. FSA offers a structured and systematic framework for making cost efficient decisions to improve maritime safety. The same principles can be utilised for risk analyses also in other fields. ACKNOWLEDGEMENTS The authors wish to thank Sanna Sonninen and HannaKaisa Huhta as well as the partners in the BaSSy project, [1] Nyman, T., Porthin, M., Sassi, J., Sonninen, S., Huhta, H.-K., & Hänninen, S. 2009. Åland Sea FSA study, VTT Research report VTT-R-08328-08. Espoo. [2] “New traffic separation scheme and deep-water route “Åland Sea””, submitted by Finland and Sweden to IMO, Sub-Committee on Safety of Navigation, 54th session, NAV 54/3/7, 2008. [3] “Åland Sea Formal Safety Assessment study”, related document to NAV 54/3/7, IMO, Sub-Committee on Safety of Navigation, 54th session, 2008. CONTACT Tapio Nyman Senior Research Scientist tapio.nyman@vtt.fi Tel. +358 20 722 4546 105 106 AIS DATA ANALYSIS FOR IDENTIFICATION OF CLOSE ENCOUNTER SITUATIONS OF VESSELS Robin Berglund, Markku Huttunen Increased ship traffic involving large tankers and passenger ships increase the risk of accidents. An indicator for the probability of a collision accident can be acquired by assessing the number of near miss situations. This study shows that these situations can be identified in a neutral and automatic manner by analyzing ship position data gathered through the Automatic Identification System (AIS). The method is suggested to be used as one parameter when measuring the effects of actions taken to reduce the probability of collision risk in open water areas. INTRODUCTION Ship traffic in the Gulf of Finland has steadily increased during the last decade. The main reasons include increased oil transportation to the oil terminals in Russia and increased passenger traffic between Helsinki and Tallinn. Measures have been taken to reduce the risks by improved traffic monitoring and reporting obligations for ships entering the Gulf of Finland (GOFREP). There are, however, very few indicators of the risk levels, because fortunately there have been very few reported incidents in this area. On the other hand, the Automatic Iden- tification System (AIS) provides a substantial amount of data for automatic analysis of how the ships have behaved at sea. Counting the number of crossings at close distance, and repeating this procedure over a longer period of time, could provide a neutral parameter for measuring changes in the level of risk. On behalf of the Finnish Maritime Administration VTT conducted a study in autumn 2008 to analyse the frequency of close encounters over three consecutive years. Focussing on the months May to July in 2006, 2007 and 2008, the study aimed to determine the closest distance between the ships in the encounter situation, grouping these distances in distance classes and then calculating the occurrences per month. METHODS The analysis was based on historical ship AIS data (position, speed and course) within an open sea area in the Gulf of Finland defi ned by a polygon. The method consisted of estimating the position of each ship at one minute intervals then calculating the pair-wise ship distances to detect distances below a given limit (1 nautical mile) for closer analysis. The encounters were categorized into three groups based on the shortest distance: 0.1 nM or below, 0.1 – 0.2 nM, and 0.2 – 0.3 nM. The position interpolation at one minute intervals was based on an average of linear interpolation between the closest observation points and extrapolation from the nearest observation point using the instantaneous speed and course information from the observation point. This also provided an estimate of the inaccuracy of the inter- Figure 1. Overview of the ship traffic: Ship tracks shown dimmed, and encounters as coloured spots. MARITIME SAFETY AND SECURITY polated position. The sensitivity of the results to inaccuracies in the interpolation could then be simulated. Due to technical reasons various gaps were contained within the AIS data. These were identified, however, and the results compensated with the total gap length being taken into account. The number of ships in the area was also counted at 10 minute intervals and the number of encounters was normalised with the average number of ships per month. Figure 2. Number of encounters per month in the defined area. RESULTS The main result from the study was that the number of close encounters, normalised with respect to the ship traffic density, has decreased during the last three years. This may be interpreted as an indication that the ships are taking fewer risks. Notably, the decrease is visible in all distance categories, and the same trend is also visible in the (possibly) dangerous encounters between passenger ships and tankers. At the same time, analysis of the traffic density and changes over the three years indicated that the ship traffic in the area has increased by about 2% annually. (On average there were 25.6 ships in the area with a standard deviation of 5.3.) DISCUSSION AND CONCLUSIONS Assuming that the probability of collision increases when the encounter distance decreases, the number of short distance encounters per month can be used as an indicator of the changes in risk level in a given sea area using the existing infrastructure (AIS). The analysis neither depends on incidence reporting procedures nor requires actual accidents to happen, and therefore the effect of implemented risk reduction measures could be monitored using this technique. Further studies are required in order to obtain an estimate on the actual dependency function between collision risks and the number of short distance encounters. There is nevertheless a clear indication that the risk reducing measures taken in the Gulf of Finland have had an impact on the probability of collisions. EXPLOITATION POTENTIAL Authorities planning new risk reducing actions, and their subsequent follow-up and monitoring, would be the main beneficiaries of this work. The method can be applied anywhere in the world in areas of open water, provided that AIS data covering the area to be studied is available. ACKNOWLEDGEMENTS The authors wish to thank Ms Sanna Sonninen and Mr Matti Aaltonen from the Finnish Maritime Administration for their contribution to this work. The research has been funded by the Finnish Maritime Administration and the Ministry of Transport and Communication. CONTACT Robin Berglund Senior Research Scientist robin.berglund@vtt.fi Tel. +358 20 722 6018 107 108 SAFER SEAFARING THROUGH IMPROVED INFORMATION EXCHANGE Markus Porthin, Sampo Karppinen New messages for automatically exchanging information through the Automatic Identification System were developed to decrease the workload of navigators and improve the preparedness of the authorities, thus improving the level of maritime safety and the protection of the environment. fully chosen. In 2004, the International Maritime Organization (IMO) selected seven messages to extend the information content in AIS. In the AISBALTIC project, the technical usability of these messages was tested and their information content evaluated in field tests between the Helsinki GOFREP Traffic Centre and dedicated vessels in the Gulf of Finland (Figure 2). INTRODUCTION The Automatic Identification System (AIS) has been developed to improve the safety and efficiency of the increasing marine traffic. AIS is a mandatory piece of navigational equipment for automatic data exchange between ships and with shore-based facilities, with the aim of assisting target tracking and simplifying information exchange (Figure 1). The Baltic AIS Trial project (AISBALTIC) was founded in 2007 as a part of the HELCOM Baltic Sea Action Plan to improve the information content in AIS [1]. In order to assess the need for changes in AIS, expert workshops were organised [2]. The operational information needs of the various authorities (for maritime safety, search and rescue, environment, prevention and control of pollution, and maritime security) representing the Baltic Sea countries, European Maritime Safety Agency (EMSA) and the European Commission, were collected. The most important needs were compared with the information presently available in AIS, and as a result, a series of new messages was compiled. METHODS The information transferred through AIS is arranged as a series of standardised messages. Because the VHF radio frequencies used in AIS data transmission have limited capacity, the content of the messages must be care- RESULTS According to the fi eld tests, the IMO defi ned messages contain relevant information, albeit not in an optimal form. It was also noted that the older versions of navigational systems were not compatible with the messages. As a result of the information need survey, five messages covering matters specifically lacking from the present AIS defi nitions were compiled [3,4]. Improvements to the current standard messages were also suggested [5]. The new messages improve the capability of ships to report their dangerous cargo. They also provide extended static and voyage related information, and transmit current information concerning specific areas or routes. Finally, one of the messages attaches additional free text information to other messages. Figure 1. Example of communication between ships and shore-based facilities. MARITIME SAFETY AND SECURITY Figure 2. The field tests were realised by connecting a laptop computer to the onboard AIS equipment. DISCUSSION AND CONCLUSIONS The five new messages compiled in the AISBALTIC project have been proposed as standardised international messages by the Baltic Sea countries [3]. The proposition submitted to IMO in 2009 is also supported internationally by countries such as USA, Japan, China, and Australia [4]. The new messages improve the preparedness of the authorities in case of an accident through more detailed information on ship types and dangerous cargo. Fulfi lment of the reporting obligations of ships is also substantially facilitated, thus decreasing the need for VHF radio communication. The new area and route messages provide a fast and convenient way to transmit up-to-date information concerning, for example, search and rescue operations, caution areas or recommended routes. However, in order to fully benefit from the improvements current navigational equipment needs to be updated. Based on emerging user experience and practical knowledge, the information content in AIS is likely to be even further refi ned and optimised in the future. EXPLOITATION POTENTIAL The proposed messages, if taken into international use, would decrease the workload of the navigators and improve the quality of up-to-date navigational and safety related information both on ships and ashore. They would effectively improve maritime safety and raise the level of protection of the marine environment. ACKNOWLEDGEMENTS The authors wish to thank Sanna Sonninen and Rolf Zetterberg for their contributions to this work, and the shipping companies, the experts from the Baltic Sea countries, and the United States Radio Technical Commission for Maritime Services (RTCM) for participation and co-operation. The project was funded by the Finnish, Swedish and Estonian Maritime Administrations, the Ministry of Transport and Communications Finland, the Finnish Environment Institute, and VTT. REFERENCES [1] Porthin, M., Zetterberg, R. & Sonninen, S. 2010. “AIS Binary Messages – Developments in the Baltic and progress in IMO”, approved to 17th Conference of the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA-AISM), Cape Town, South Africa. [2] “The Baltic AIS trial (AISBALTIC) project”, Submitted by Finland and Estonia, IMO, Sub-Committee on Safety of Navigation, 54th session, NAV 54/INF.8, 2008. [3] “Inclusion of fi ve new AIS binary messages developed in the Baltic AIS trial (AISBALTIC) project”, Submitted by Denmark, Estonia, Finland, Latvia, Lithuania, Poland and Sweden, IMO, Sub-Committee on Safety of Navigation, 55th session, NAV 55/14/2, 2009. [4] “Report from the AIS Binary Messages Correspondence Group”, Submitted by Sweden, IMO, Sub-Committee on Safety of Navigation, 55th session, NAV 55/14, 2009. [5] “Remarks on the use of AIS based on experience from the Baltic AIS trial (AISBALTIC) project”, Submitted by Finland, IMO, Sub-Committee on Safety of Navigation, 55th session, NAV 55/INF.11, 2009. CONTACT Markus Porthin Research Scientist markus.porthin@vtt.fi Tel. +358 20 722 6883 109 110 COOPERATION IN CORPORATE SECURITY MANAGEMENT Marinka Lanne The role of collaboration in the corporate security management process has been investigated, with a focus on internal collaboration and information exchange across the boundaries of several different sectors of corporate security. INTRODUCTION It is challenge for organisations to control various risks affecting people, the environment, and operations. In connection with corporate-wide risk management, organisations need to control several different sectors of corporate security including, for example, occupational health and safety, environmental safety, premises security, rescue operations and emergency planning, and information and personnel security. In larger organisations, the coordination is of these is often distributed. The dissertation study [1] presented in this article discussed the need for cooperation between the people responsible for different corporate security sectors. The main objective was to model cooperation and interaction in the corporate security management process. (MATERIALS AND) METHODS The study consisted of independent partial studies performed during the period 2001–2005. Initially, the improvement needs for corporate security management were studied by conducting an enquiry that consisted of open questions (n=26). The actual cooperation and the need for cooperation were examined using a questionnaire survey (n=276) and group interviews (n=70) at six large companies: a shipyard, a port operator, an offshore construction yard, a pharmaceutical manufacturer, a faucet manufacturer, and a real estate service provider. The overall response rate was 64.9%, with the respondents representing workers (42%), white collar workers (28%) line management (20%) and top management (10%). Most of the respondents mentioned that they have at least one specified assignment concerning corporate security. The results of the survey were analysed to determine the need for cooperation concerning safety and security performance. The survey included questions related to cooperation, responsibilities, problem areas, organisational practices and cultural aspects. Cross-tabulation, and the chi square and the Mann-Whitney tests were used to study the dependency of the organisational level and/or categorised functional title. The linear function between the problem areas and the need for cooperation was tested using the Parson’s correlation coefficient. The results of the survey were complemented with the results from the group interviews. RESULTS The results showed that within the companies the responsibilities and activities related to hazard identification and risk assessment were distributed among all the organisational levels. The responsibility of line management was recognised by 70% of respondents. Workers were mentioned by 62% and the top management by 46% of the respondents. In addition, 78% of the respondents recognised the responsibility of an internal occupational safety manager (and organisation), and 56% of an internal fi re and rescue manager (and organisation). Problems concerning hazard identification and risk assessment were recognised by 59% of the respondents. One third of the respondents wanted to increase internal collaboration in risk assessment. In these cases there were no statistical significance difference relating to organisational level. Parson’s correlation coefficient for internal cooperation needs and problems associated with 48 different corporate security activities was 0.886, and the problems can explain 78% of the variety in internal cooperation needs. The significance value was 0.000. When the respondents were queried about the organisational culture, 43% of the respondents did not regard it to be collaborative. Especially both blue and white collar workers (63% of them) thought that way. The p-val- HUMAN AND ORGANISATIONAL FACTORS IN SAFETY AND SECURITY ue pointing the statistically significant difference of that group was 0.000. In group interviews, respondents described aspects of cooperation by highlighting the following: group work, active individuals, participation, and daily communication. Significant company-related differences in openness and the appreciation of cooperation were also observed. DISCUSSION AND CONCLUSIONS According to the survey, an increase in cooperation was especially needed where operations, functions, and the various responsibilities overlap and when problems exists. The results show that the line management, upper white collar workers, chemical safety and environment personnel, and the quality management and security personnel cooperated the most actively. The workers participate especially in the areas associated with occupational safety and rescue operations within the organisation. ods for risk management and corporate security management are developed and management culture is consolidated. ACKNOWLEDGEMENTS The author wish to thank colleagues and advisors from Tampere University of Technology (TUT) and VTT. The research has been funded by The Finnish Work Environment Fund, TUT, the Emil Aaltonen Foundation and VTT. REFERENCES [1] Lanne, M. 2007. Yhteistyö yritysturvallisuuden hallinnassa. Tutkimus sisäisen yhteistyön tarpeesta ja roolista suurten organisaatioiden turvallisuustoiminnassa. Espoo: VTT. (VTT Publications 632, Doctoral Thesis) Even if the corporate security management depends on the character of the organisation’s function, business branch, networking, and the strategy, there are some basic processes that can be modelled at a general level. The model developed in the study guides organisations towards more comprehensive corporate security management by emphasising the importance of cooperation between all the safety and security actors. The benefits of cooperation are most evident in the coordination of responsibilities and functions, the setting of common visions and objectives, decision-making, problem-solving, and management of change. EXPLOITATION POTENTIAL The results of the study will be used in the quality evaluation of corporation security management. By means of the process model developed in this study, organisations can be guided towards more comprehensive and collaborative corporate security management. Collaborative aspects need to be recognised in the projects where meth- CONTACT Marinka Lanne, Dr Research Scientist marinka.lanne@vtt.fi Tel. +358 20 722 3633 111 112 SAFETY CULTURE IN COMPLEX SOCIOTECHNICAL SYSTEMS – INTEGRATION OF PEOPLE, TECHNOLOGY AND ORGANIZATION Pia Oedewald, Elina Pietikäinen, Teemu Reiman VTT has studied the challenges of safety critical organisations and developed a model for evaluating and developing their safety culture. - INTRODUCTION A safety critical organisation can be defi ned as any organisation that has to deal with or control such hazards that can cause significant harm to the environment, the public or personnel. The control of risks and management of safety are some of their primary goals. These organisations are expected to function reliably and to anticipate the operating risks caused by either the technology itself or the organisational structures and practices. The ability of the organisation to monitor its safety, anticipate possible deviations, react to expected or unexpected perturbations, and learn from weak signals and past incidents is critical for success [1,2]. In essence, they should have a well-functioning safety culture. Organisations have a tendency to gradually drift into a condition where they have trouble identifying their vulnerabilities and mechanisms or practices that create or maintain these vulnerabilities. Without reflection, organisations gradually become unsafe [6]. There is a strong practical need for approaches that enable the valid evaluation of an organisation’s safety culture. why workers commit unsafe acts, how different safety management practices contribute to the overall safety, and how organisations learn from incidents and weak signals. VTT’s safety culture work integrates organisational psychology models with system safety approaches. The work aims to improve the organisations’ capability to anticipate their vulnerabilities and manage their activities in changing conditions. Thus it contributes to the discussion of new safety paradigms, such as resilience engineering [6]. RESULTS VTT’s researchers have outlined a model of safety culture. The organisational structures and processes that are needed in safety critical organisations have been identified (Figure 1). Furthermore, the social processes, and the personnel’s psychological properties – which affect behaviour and decision making – have been identified [7,8]. The safety culture framework strives toward a dynamic and change-oriented model providing an opportunity for both safety evaluation and development [7]. The framework includes methods for data collection and analysis as well as approaches for organisational development based on the results. RESEARCH AND DEVELOPMENT THEMES VTT has been conducting both empirical research and theoretical work on safety culture for over a decade [3,4]. VTT’s human and organisational factors researchers have conducted case studies and development projects within, for example, the nuclear, maritime and aviation sectors, and healthcare [5]. Projects have addressed issues such as: how to identify the current strengths and weaknesses of the case organisation’s culture in terms of safety, how to evaluate the safety effects of organisational changes, EXPLOITATION POTENTIAL Safety culture can act as a proactive indicator of the overall functioning of the organisation. The safety culture framework helps in improving organisational performance by illustrating the critical elements and factors in terms of system safety. VTT is able to carry out projects to facilitate the development of safety culture at a particular organisation or within a broader organisational network. The safety culture framework is applicable for various industrial domains as well as for public services. HUMAN AND ORGANISATIONAL FACTORS IN SAFETY AND SECURITY Figure 1. The model of key organisational dimensions of safety culture. [7] REFERENCES [1] Hollnagel, E. 2004. Barriers and accident prevention. Aldershot: Ashgate. [2] Weick, K.E. & Sutcliffe, K.M. 2007. Managing the unexpected. Resilient performance in an age of uncertainty. Second Edition. San Francisco: Jossey-Bass. [3] Reiman, T. 2007. Assessing organizational culture in complex sociotechnical systems – Methodological evidence from studies in nuclear power plant maintenance organizations. VTT Publications 627. Espoo: VTT. [4] Reiman, T. & Oedewald, P. 2007. Assessment of Complex Sociotechnical Systems – Theoretical issues concerning the use of organizational culture and organizational core task concepts. Safety Science 45, pp.745-768. [5] Oedewald, P. & Reiman. T. 2007. Special characteristics of safety critical organizations. Work psychological perspective. VTT Publications 633. Espoo: VTT. http://www.vtt.fi/inf/pdf/publications/2007/P633. pdf [6] Hollnagel, E., Woods, D.D. & Leveson, N. 2006. Resilience Engineering. Concepts and Precepts. Aldershot: Ashgate, 2006. [7] Reiman, T. & Oedewald, P. 2009. Evaluating safety critical organizations. Focus on the nuclear industry. Research Report 2009:12, Swedish Radiation Safety Authority. [8] Reiman, T., Pietikäinen, E. & Oedewald, P. 2008. Safety culture – theory and assessment [in Finnish] VTT Publications 700. Espoo: VTT. (in Finnish) CONTACT Teemu Reiman, Dr Senior Research Scientist teemu.reiman@vtt.fi Tel. +358 20 722 6775 113 114 SAFETY IN HEALTHCARE – FOR THE WELL-BEING OF PATIENTS, PERSONNEL AND THE ORGANIZATION Marja-Leena Haavisto, Jouko Heikkilä, Pia Oedewald, Elina Pietikäinen, Teemu Reiman, Kaarin Ruuhilehto Safety in healthcare is a widely discussed topic. VTT has studied the challenges of healthcare organisations from the point of view of safety and developed approaches for improving the level of safety. INTRODUCTION Healthcare organisations are undergoing immense changes. Problems in the safety and well-being of healthcare personnel have been reported [1]. Patient safety has also become a concern both in Finland and internationally [2]. It is estimated that hundreds of Finnish people die as the result of medical errors [3] every year. A national patient safety strategy [4] has now been released in Finland and the forthcoming healthcare law will ensure that healthcare organisations establish a patient safety plan [3]. Theoretical approaches and practical tools are needed to support these organisations in their safety work. RESEARCH AND DEVELOPMENT THEMES In several recent research and development projects, VTT’s researchers have aimed to adapt the lessons learned from other safety critical domains (e. g. nuclear industry, aviation) to healthcare. In order to develop safety in healthcare, domain specific challenges need to be studied and basic safety development approaches adapted. RESULTS Case studies in three healthcare organisations revealed challenges in the way changes are managed from a safety perspective. For example, many informal roles and responsibilities in healthcare organisations are not taken into account when designing new technology and practices. A model for assessing and managing risks in healthcare units was developed [5]. A voluntary reporting system known as HaiPro was developed for reporting patient safety incidents and has now been implemented widely in Finnish healthcare organisations [6,7]. A theoretical model of patient safety culture was also created [8]. Based on the model, a safety culture assessment methodology was then created and tested in five organ- HUMAN AND ORGANISATIONAL FACTORS IN SAFETY AND SECURITY isations [9]. These approaches and tools were found to be useful. They can help organisations view and develop their safety in a systemic way. However, introducing these approaches in healthcare organisations is a change process in itself; it doesn’t happen overnight and needs facilitating. DISCUSSION AND CONCLUSIONS Approaching safety systematically is new in healthcare, especially with regards to patient safety. The main challenge in this work is the lack of systemic or organisational thinking. Safety is often viewed as something that is produced by individual professionals alone. An important challenge centres on how to effectively merge occupational safety work and the newer patient focused approach. EXPLOITATION POTENTIAL The results of VTT’s research projects offer support for healthcare organisations, consultants and authorities in their safety work. In the future VTT’s researchers will be able to assist different healthcare actors tackle new important safety questions such as how different safety approaches can be combined and fully utilised, and how a safety plan should be formulated so that it will genuinely promote safety. [2] WHO, 2008. World alliance for patient safety. Progress report. [3] Sosiaali- ja terveysministeriö, 2008. Uusi terveydenhuoltolaki. Terveydenhuoltolakityöryhmän muistio. Sosiaali- ja terveysministeriön selvityksiä. [4] Sosiaali- ja terveysministeriö, 2009. Edistämme potilasturvallisuutta yhdessä. Suomalainen potilasturvallisuusstrategia 2009-2013. Sosiaali- ja terveysministeriön julkaisuja 2009:3. [5] Knuuttila, J. & Tamminen, A. 2004. Turvallinen hoitoyksikkö – malli terveydenhuollon hoitoyksikön riskienhallintaan. Lääkelaitoksen julkaisusarja 2/2004 Terveydenhuollon laadunhallinta. Helsinki: Lääkelaitos. [6] Knuuttila, J., Ruuhilehto, K. & Wallenius, J. 2007. Terveydenhuollon vaaratapahtumien raportointi. Helsinki: Lääkelaitos. [7] Sosiaali- ja terveysministeriö, 2008. Terveydenhuollon vaaratapahtumien raportointijärjestelmän käyttöönotto. Sosiaali- ja terveysministeriön selvityksiä 2008:16. [8] Reiman, T., Pietikäinen, E. & Oedewald, P. 2008. Turvallisuuskulttuuri. Teoria ja arviointi. VTT Publications 700. [9] Pietikäinen, E., Reiman, T. & Oedewald, P. 2008. Turvallisuuskulttuurityö organisaation toiminnan kehittämisenä terveydenhuollossa. VTT Tiedotteita. ACKNOWLEDGEMENTS The author wishes to thank all the participating healthcare organisations for their contribution. The work has been funded by The Finnish Work Environment Fund, The Finnish Ministry of Social Affairs and Health, National Agency for Medicines, participating organisations and VTT. REFERENCES CONTACT [1] Sosiaali- ja terveysministeriö, 2008. Terveydenhuollon työsuojelun valvontahankkeen loppuraportti. Helsinki. Sosiaali- ja terveysministeriön selvityksiä. Elina Pietikäinen Research Scientist elina.pietikainen@vtt.fi Tel. +358 20 722 4311 115 116 HUMAN AND ORGANISATIONAL FACTORS IN SAFETY AND SECURITY 117 118 VTT Technical Research Centre of Finland is the largest multitechnological applied research organisation in Northern Europe. VTT provides high-end technology solutions and innovation services. From its wide knowledge base, VTT can combine different technologies, create new innovations and a substantial range of world class technologies and applied research services thus improving its clients’ competitiveness and competence. Through its international scientific and technology network, VTT can produce information, upgrade technology knowledge, create business intelligence and value added to its stakeholders. VTT is a non-profit-making research organisation. Kalevaprint Oy, 2009 VTT TECHNICAL RESEARCH CENTRE OF FINLAND Vuorimiehentie 5, Espoo P.O.Box 1000, FI-02044 VTT Tel. +358 20 722 111, Fax +358 20 722 7001 www.vtt.fi