Analysing analyses-An approach to combining several risk and vulnerability analyses

Jonas Borell, Kerstin Eriksson

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

The Swedish county council Region Skane is developing work processes for iterative risk and vulnerability analyses. This will be arranged in a distributed bottom-up manner, where analyses are performed and results reported through three hierarchical levels, ending at a central unit within the county council organisation. That unit is responsible for three tasks: 1) Establish a summary of the risks and vulnerabilities on the county level, 2) Send relevant information from the findings to national governmental agencies, and 3) Feed back relevant information to organisational units on lower levels. Based on the Region Skane case we describe some critical aspects of communication associated with such hierarchically organised systems of risk and vulnerability analyses. We also briefly discuss possible approaches to managing the critical aspects. Our results indicate that it is not enough to simply add the reports from different lower units. It is necessary to compare and merge the analysis results from lower levels.
Original languageEnglish
Title of host publicationSafety, Reliability And Risk Analysis: Theory, Methods And Applications, Vols 1-4
PublisherTaylor & Francis
Pages3061-3065
Publication statusPublished - 2009
EventEuropean Safety and Reliability Conference (ESREL)/17th Annual Meeting of the Society-for-Risk-Analysis-Europe (SRA-Europe) - Valencia, SPAIN
Duration: 2008 Sept 222008 Sept 25

Conference

ConferenceEuropean Safety and Reliability Conference (ESREL)/17th Annual Meeting of the Society-for-Risk-Analysis-Europe (SRA-Europe)
Period2008/09/222008/09/25

Subject classification (UKÄ)

  • Other Civil Engineering
  • Production Engineering, Human Work Science and Ergonomics
  • Building Technologies

Fingerprint

Dive into the research topics of 'Analysing analyses-An approach to combining several risk and vulnerability analyses'. Together they form a unique fingerprint.

Cite this