Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering
Journal Pre-proof
Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering Fangyu Chen, Hongwei Wang, Gangyan Xu, Hongchang Ji, Shanlei Ding, Yongchang Wei PII: DOI: Reference:
S0951-8320(19)30665-9 https://doi.org/10.1016/j.ress.2020.106806 RESS 106806
To appear in:
Reliability Engineering and System Safety
Received date: Revised date: Accepted date:
24 May 2019 29 September 2019 18 January 2020
Please cite this article as: Fangyu Chen, Hongwei Wang, Gangyan Xu, Hongchang Ji, Shanlei Ding, Yongchang Wei, Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering, Reliability Engineering and System Safety (2020), doi: https://doi.org/10.1016/j.ress.2020.106806
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2020 Published by Elsevier Ltd.
1
2
3
Highjlights • A data-driven framework for designing safety-enhancing strategies is proposed.
4
• The metrics for identifying critical risk factors are designed.
5
• The risk attributes of bridge-tunnel hybrid construction projects are
6
analyzed.
7
• The effectiveness of safety-enhancing strategies is verified.
8
• Critical conclusions and corresponding managerial suggestions are of-
9
fered.
1
Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering
10
11
12 13
14 15 16 17 18 19
20
Fangyu Chena , Hongwei Wangb , Gangyan Xuc , Hongchang Jia , Shanlei Dingd , Yongchang Weia,∗ a
Institute of Operations Management and System Engineering, School of Business Administration, Zhongnan University of Economics and Law, Wuhan, China b School of Management, School of Automation, Huazhong University of Science and Technology, Wuhan, China c School of Architecture, Harbin Institute of Technology, Shenzhen, China d China Construction Seventh Engineering Division. Corp. LTD
Abstract
21
Risk management is crucial and indispensable to the success of projects,
22
while identifying critical risks is the fundamental step in devising the cor-
23
responding safety measures. To fully exploit the value of richly accumu-
24
lated accidental cases, this paper presents a data-driven research framework
25
for proposing effective safety enhancing strategies based on risk networks in
26
construction engineering, spanning the whole process from extracting acci-
27
dent chains from accidents to construct a risk network to devising safety
28
measures. Aiming at the weighted heterogeneity of the risk network, both
29
the performance metrics at network level and critical-risk identification met-
30
rics at node level are deliberately designed. These metrics then enable the
31
proposing of a series of safety-enhancing strategies. In the case study, based
32
on the accident-related data in China’s bridge-and-tunnel hybrid projects,
33
different safety-enhancing strategies are compared through simulation ex-
34
periments and analyzed to verify their effectiveness on optimizing costs and ∗
Corresponding Author: Yongchang Wei. Email:
[email protected] Preprint submitted to Reliability Engineering and System Safety January 20, 2020
35
improving safety. Finally, based on results from simulations, relevant man-
36
agerial suggestions are proposed.
37
Keywords:
38
safety enhancing strategies, risk network, data-driven, construction
39
engineering
40
1. Introduction
41
In recent years, China has augmented its investment in infrastructure con-
42
struction, with the resultant launching of projects in various regions. As the
43
prerequisite for economic and social development, transport facilities have
44
drawn the most attention. In this regard, China’s complex geological con-
45
ditions translate into the concurrent need in many road-traffic projects for
46
connections by both bridges and tunnels (such as Hong Kong-Zhuhai-Macao
47
Bridge[1, 2]), for which the high risk of construction leads to susceptibil-
48
ity to accidents. More importantly, in the local governments’ attempt to
49
develop traffic construction, the blind pursuit of pace and progress – espe-
50
cially in bridge-tunnel construction – may result in safety risks. Not only for
51
China, Tuchsen et al.[3] conclude that bridge and tunnel workers generally
52
have a high mortality rate, and they are treated more often in hospitals,
53
which means the safety issues in such hybrid construction projects are more
54
worthy of attention. Moreover, accidents lead to significant human cost and
55
negatively affect the productivity of construction companies[4]. Accordingly,
56
engineering managers need to devise safety measures according to the charac-
57
teristics of engineering-related risks, for the threefold purpose of forestalling
58
accidents, reducing risks, and improving safety. Many related literature at3
59
tempts to design security enhancement strategies for single type projects or
60
specific activities, such as humanrobot collaboration[5] and job assignment[6].
61
However, limited by the resources such as cost and time, the chosen safety
62
measures can cover only part of the risks in most projects. The chief ques-
63
tion in devising such measures thus remains on finding a safety-enhancing
64
strategy to adopt most applicable safety measures.
65
An applicable safety-enhancing strategy should cover the critical risks
66
in projects. Based on the existing literature, risk factors identification has
67
been the ultimate goal of most accident analyses. To determine the critical
68
risk factors, the retrospective examination of failure-related lessons in past
69
accidents is crucial[7–9]. Any disregard of the said critical factors will trans-
70
late into the progressive triggers of contributing factors on the construction
71
site, one cascading in turn to another and eventually to the occurrence of
72
accidents – collectively, these represent the accident chain, as it is known in
73
accident analysis[10–12]. The profusion of accident cases demonstrate that
74
the risk factors and trigger processes involved in the accident chain in a given
75
case likewise exist in multiple cases; the conjoining of multiple such chains
76
yields a risk network[13]. Accordingly, the network theory has become an
77
important means in the analysis and research of accident cases[14–16]. How-
78
ever, it is noteworthy that the majority of such literature assumes that the
79
risk network is without weights. With the accumulation of cases, we can find
80
that the trigger process between some risk factors occur more frequently, sug-
81
gesting that the edges representing the correlation between such risk factors
82
in the network should be accorded weights. Such weights denote the num-
83
bers of occurrences of the trigger process in the repository of cases: a greater
4
84
weight for a given risk factor translates into the fact that it deserves more
85
attention. In addition, the analytical frameworks proposed in the relevant
86
literature [6, 17–19] mostly focus on the characteristics of specific risk fac-
87
tors or propose specific safety enhancement measures for these specific risks.
88
A universal framework is still lacking on how to ascertain critical risk fac-
89
tors from the accident cases and devise the corresponding safety-enhancing
90
strategies.
91
Challenges have arisen in identifying critical risk factors through a risk
92
network and developing safety-enhancing strategies based on identification
93
criteria. Firstly, the risk network is a weighted network. Critical risk factors
94
in an un-weighted network can be appraised by metrics such as the degree or
95
betweenness, but their counterparts in a weighted network should be rede-
96
fined with the consideration of the impacts of their weights. In this regard,
97
the critical trigger process of the risk factors should consider not only the
98
length of the routes but also their weights. Secondly, the constituent ele-
99
ments of the risk network are heterogeneous. These factors can be classified
100
into human factors, management factors, environmental factors, and other
101
types, based on their characteristics; such heterogeneity implies the different
102
underlying considerations in designing their corresponding safety-enhancing
103
strategies. The third challenge concerns the fact that the risk network may
104
contain loops. The occurrence of the risk factors in an accident case composes
105
a chain structure in a timeline. With the accumulation of cases, the risk fac-
106
tors may constitute into loops because of the variety of timelines in different
107
accidents. The initial risk factors of an accident case may be the resultant
108
event of another accident. These challenges post great some difficulties to
5
109
risk analysis and further designing safety enhancement strategies.
110
Therefore, based on network theory, this paper focuses on the weighted
111
heterogeneity of risk networks and developing a framework for devise safety-
112
enhancing strategies in construction engineering. Based on data of accidents
113
in bridge-and-tunnel hybrid construction projects in China, this paper an-
114
alyzes their risk attributes and identifies the critical risk factors in the risk
115
network. According to the identification criteria, this paper then designs a
116
series of safety-enhancing strategies and verifies their effectiveness. Based
117
on the experimental results, managerial suggestions are provided for the im-
118
provement of the overall safety of such hybrid construction projects.
119
This paper is novel in numerous aspects. Firstly, focusing on the com-
120
monality and heterogeneity of risk factors in hybrid construction projects,
121
this paper proposes a data-driven research framework for designing safety-
122
enhancing strategies in construction engineering based on a weighted risk
123
network. This framework, which relies on data from previous accident cases
124
and without affected by specific parameters, can be immediately applied to
125
other types of construction projects by switching data sources. Secondly, this
126
paper proposes a series of evaluative metrics for the weighted heterogeneous
127
risk network, such as the numbers of critical triggering routes, and the met-
128
rics to identify critical risk factors, such as the weighted betweenness. Based
129
on them, a series of safety-enhancing strategies are designed. Thirdly, in tan-
130
dem with data from actual accident cases, we analyze the risk attributes of
131
bridge-and-tunnel hybrid construction projects. We then verify the effective-
132
ness of two distinct types of safety-enhancing strategies through comparison,
133
namely, dynamic-enhancing strategy and static-enhancing strategy. Finally,
6
134
based on results of the case study, this paper suggests insightful managerial
135
suggestions for enhancing safety in bridge-and-tunnel hybrid construction
136
projects.
137
The other sections of this paper are organized as follows. Section 2 will
138
review the related literature in threefold. Section 3 introduces the research
139
framework for the safety-enhancing strategies in construction engineering,
140
including steps in constructing the risk network and metrics in identifying
141
the critical risk factors. Section 4 delineates the considerations underlying
142
the devising of safety-enhancing strategies based on identification metrics.
143
Presented in Section 5 is a case study, based on which this paper constructs
144
a risk network for bridge-and-tunnel hybrid construction projects, identifies
145
the critical risk factors in such projects, and verifies the effectiveness of the
146
strategies in the simulation experiment. Furthermore, the simulation results
147
enable us to recommend some managerial suggestions in practice. Section 6
148
offers some concluding remarks.
149
2. Literature Review
150
Two main streams of literature are closely related to this research: risk
151
identification and risk-defence strategies. In the following, due to its prelim-
152
inary importance, we will pay major attention on the risk factors causing
153
accidents. Then, we will simply review the risk-defence or safety-enhancing
154
strategies.
155
The risk factors causing accidents can be identified through case stud-
156
ies. On this regard, Dong et al.[7] reviewed the preliminary features of fa-
157
tal occupational injuries among construction workers in the United States 7
158
through case studies; they concluded that the risks faced by Hispanics in
159
the workplace were manifestly higher than non-Hispanics. Mitropoulos et
160
al.[20] explored the origins of hazards in the construction industry and an-
161
alyzed the conditional factors that triggered them. Based on case studies
162
and ergonomic considerations, Haslam et al.[8] proposed a model to examine
163
the process of how the workplace environment – as shaped by management,
164
design, and cultural factors – induced human behaviors leading to accidents.
165
Gambatese et al.[21], after analyzing 224 fatal cases in construction, found
166
an appreciable association between such accidents at construction sites and
167
the design of building-safety concepts. Chi et al.[22] developed a classifica-
168
tion scheme to encode 621 fatal falls from heights based on the influencing
169
factors, and then developed accident scenarios for recommending preventive
170
measures. Mearns et al.[23] used four samples to analyze the psychosocial
171
chain of the safety effects between safety response and perceived probability.
172
Rozenfeld et al.[24], based on their quantitative examination of 699 possible
173
loss-of-control events, developed the structured method known as Construc-
174
tion Job Safety Analysis (CJSA) for analyzing and assessing construction
175
hazards. Caffaro et al.[25] elucidated accidents involving tractor operators
176
and concluded that falls were the critical risk factor. Besides addressing risk
177
factors in accidents, some studies have attempted to identify critical suc-
178
cess factors from success projects: Aksorn and Hadikusumo[26] identified 16
179
critical success factors (CSFs) for safety programs from the literature, as
180
validated by construction-safety experts.
181
Case studies can be of great importance in identifying the common fac-
182
tors leading to accidents. However, the occurrence of accidents is generally
8
183
subsequently affected by a series of risk events. It is unsurprising that the
184
accident chain shows its great power in disclosing the propagation relation-
185
ship of risk factors. Reason[10] held that errant psychological precursors
186
(i.e. inattention, distraction, absent-mindedness, fatigue and stress) might
187
constitute the chain leading to accidents. Lindberg et al.[11], based on the
188
accident-chains model, suggested six quality standards for the post-accidents
189
experience feedback. Ouyang et al.[12] deployed the accident chain and the
190
control theory to propose a new systematic model for safety incidents, known
191
as the Systems-Theoretic Accident Models and Process (STAMP). The chain-
192
of-events model, being the most commonly-used tool for analyzing past ac-
193
cidents, has found utility in various areas, as exemplified hereafter. In their
194
elucidation of the accident chain between part-time farmers and machinery-
195
related accidents, Caffaro et al.[27] have contributed by advocating preven-
196
tive training interventions for part-time farmers who only occasionally used
197
the machinery. Rao and Marais[28] developed a method for identifying high-
198
risk accident chain based on general historical data of aviation accidents.
199
Sun et al.[29] engaged the Human Factors Analysis and Classification System
200
(HFACS) to establish a judicious and fitting index system for investigating
201
human errors; they elucidated the causal chain and the priority of the impor-
202
tance of human factors. Li and Wang[30] quantified the risks of accidents to
203
not only determine the chain of accidents but also monitor causes of accidents
204
in a timely and accurate manner, thus providing advice for system protection.
205
Kelman[31], in elucidating the process of disaster occurrence, found that both
206
disaster diplomacy and cascading disasters attempted to form focused causal
207
chains that were multitudinous, complicated, and intertwined.
9
208
The occurrence of a single accident can be described by a accident chain,
209
while the complicated interaction relationship of risk factors in a specific
210
type of projects should be characterized by a complex network. Recently,
211
the application of complex network theory to project risk management be-
212
gan to attract academic attention. For example, Zhou et al.[13] explored the
213
complexity of the network of train-construction accidents not only based on
214
analysis of individual cases, but also through the network theory. Deng et
215
al.[14] selected classical accidents as the data for analyzing accident chains,
216
and then integrated such chains into a consolidated network. Zheng et al.[32],
217
in their review of 63 social network analysis (SNA) papers published in eight
218
peer-reviewed journals from 1997 to 2015, elucidated the current state of
219
the application of SNA in construction project management (CPM). Zhou et
220
al.[15] determined time-series characteristics of near-miss in subway construc-
221
tion and the underlying mechanism based on the complex-network theory.
222
Zhou et al.[16] presented a network-modeling and analysis method of shield
223
tunneling performance based on the combination of multidimensional data-
224
mining and complex network methods. Wehbe et al.[33] appraised the safety
225
performance of construction teams and the resilience of the network to risks,
226
by studying the safety-related interaction between those teams. Xiong et
227
al.[34] identified potential opinion leaders among workers by conducting a
228
questionnaire survey of 586 scaffolding workers in Wuhan to determine their
229
views of influencing their colleagues as the basis for social network analy-
230
sis. Yuan et al.[35] studied social risks and stakeholders from the network
231
perspective, thereby providing superior risk-analysis methods for construc-
232
tion projects in high-density cities in China. Recent years have witnessed
10
233
the use of artificial intelligence-based methods in network analysis, of which
234
examples abound in the literature. Zhang et al.[36] studied the tunnel leak-
235
age in the construction of Wuhan Yangtze Metro Tunnel with the Fuzzy
236
Bayesian Network (FBN), delineating the causality between tunnel damage
237
and its influencing variables. Zhou et al.[37] proposed a risk-analysis model
238
for slurry-wall deflection based on Bayesian network to ensure safety during
239
excavation. Subsequently, Yang et al.[38] established a chain-of-events dia-
240
gram that considered synergies and multi-level domino effects, using Bayesian
241
networks to compute the probability of each chain.
242
Risk identification lays a foundation for safety enhancement. In contrast
243
to the literature on risk analysis, we noted that the number of literature on
244
risk-defence strategies is relatively few. Regardless of the analytical methods
245
– be it through the accident chain, network theory, time-series[39], process
246
hazard analysis[40], or artificial intelligence – the ultimate goal should be to
247
improve engineering-related safety through appropriate strategies. Raheem
248
and Issa[41], in their case study based in Pakistan, have verified that the im-
249
plementing safety-enhancing strategies effectively improved safety. Kumar et
250
al.[42], in studying safety measures in coal mines, have focused on reducing
251
human errors. Similarly, the introduction of new technologies can be applica-
252
ble, as exemplified by the introduction by Li et al.[17] of technologies such as
253
intrusion warning and BIM to improve safety at construction sites. Nonethe-
254
less, in practice, Shirali et al.[43] have concluded that safety enhancements
255
are subjected to cost and budgetary constraints, within the bounds of which
256
the managers must optimize safety.
257
From above, the existing literature begin to pay attention to the complex
11
258
interaction relationships among risk factors in the industry of construction
259
engineering. However, the previous literature only considers a single type
260
of engineering projects. Actually, there must simultaneously exist common
261
and differentiated characteristics in similar engineering projects. A more
262
comprehensive analysis on multiple project classes might help us develop
263
a unified framework. In addition, the literature on case studies and the
264
literature on risk network are relatively independent. Actually, as the data
265
extracted from accumulated cases become richer and richer, a data-driven
266
framework for risk analysis and response can be developed. To bridge this
267
gap, this paper will develop an integrated data-driven research framework
268
for risk identification and safety-enhancing.
269
3. Research framework
270
In this section, a data-driven framework for risk identification and safety-
271
enhancing is developed to make full use of the richly accumulated accident
272
cases in nowadays, as shown in Figure 1. In this framework, establishing the
273
risk network is the basis for identifying critical risk factors. Risk identification
274
is contingent upon the specific characteristics of risk networks. Therefore,
275
we need to design performance metrics at both network and node level. The
276
safety-enhancing strategies are developed based on our deliberately designed
277
metrics.
278
To ensure its universality in devising the safety-enhancing strategies, the
279
framework should rely solely on the initial cases of incidents to drive its data;
280
therein, there are no parameters that require managers to adjust for different
281
types of engineering. At the same time, considering the weighted heterogene12
282
ity of the risk network and real-time updates of the repository of cases, the
283
framework should be able to not only recommend safety-enhancing strategies
284
corresponding to the attributes of the network, but also be dynamic. Based
285
on the above characteristics, this paper presents the framework. Step 1 acquire accident case Step 2 code the case Step 3 input the database
Step 1 acquire the case data Step 2 risk factor identification Step 3 classify the risk factors Step 4 sequencing the risk factors Step 5 accident chains construction
Accident case database
Accident chain analysis
Case 1:
1
Case 2:
4
Case 3:
Case 1 Case 2 ...
Step 1 acquire the node set Step 2 acquire the edge set Step 3 risk network construction
2 5
1
3 4
2
3
5
Case 5:
1
4
6
Case 6:
2
5
6
Case 7:
3 3
5
6
Case 8:
1
:risk factor 3
5
Simulation
Managerial advices
2
6
Case 4:
1
1
Step 1 select enhancement policy Step 2 select the running mode Step 3 execute the policy
Security enhancement policy design
Risk network analysis
3
4
Step 1 select identification metric of critical risk factor Step 2 sequencing the risk factors according to the metric Step 3 security enhancement policy design according to the metric
3
2
4
2
5
2
6 4
2
Out-degree based In-degree based Betweeness-degree based
Dynamic Static
5
:risk 4 triggers risk 5 twice
:trigger
Figure 1: Framework for safety-enhancing strategies based on the weighted risk network
286
Firstly, for single-type or hybrid-type engineering, we need only to input
287
the relevant accident cases into the database, and then use the chain-of-events
288
method to convert them into a cluster with features of edges and vertices.
289
Since the same risk factors and trigger processes can occur across multiple
290
such cases, these common edges and vertices amalgamate all accident chains
291
and constitute a weighted risk network. To devise effective safety-enhancing
292
strategies, the risk factor in the greatest need of optimization has to be
293
identified from the network, and the optimization thereof effect has to be
294
evaluated. Thus, we have incorporated two aspects into the framework: the 13
295
evaluative metrics for the overall attributes of the network and the critical-
296
risk identification metrics. Finally, we propose the dynamic-enhancing and
297
static-enhancing mechanisms in the simulation of strategies to ensure that the
298
strategies can cope with the dynamic changes in the database of accidents.
299
3.1. Data processing of accident cases
300
Cases stored in the database contain the complete timeline of an acci-
301
dent from its initial cause to the final culmination. Therefore, the accident
302
chain comprises the chronological order of occurrence of the risk factors in
303
this timeline; in turn, both the factors constituting the chain and the trigger
304
processes will be integral parts of the risk network. Procedurally, the ex-
305
traction of a accident case from the database is followed by the chronological
306
arrangement of all the risk factors involved based on the archived records.
307
For delineating the responsibilities in the subsequent analyses, in examining
308
the safety-enhancing strategies for the various parties thus held responsible,
309
we divide the risk factors into five categories: human factors, management
310
factors, object factors, technical factors, and environmental factors[14]. For
311
a given accident case sample a(a ∈ A), if risks ri and rj are present, between
312
which there is a direct trigger relationship, such a relationship can be de-
313
noted as ria → rja in the accident chain; accordingly, the complete process of
314
the accident can be expressed as ria → rja → rka → rla .
315
3.2. Constructing the weighted risk network
316
Upon conversion of data of all cases into accident chains, such chains can
317
be amalgamated into a weighted risk network G = {N , E} in which the node
318
set N = {r1 , r2 , ...ri , ..., rm |1 ≤ i ≤ m} contains the risk factors in the chains, 14
319
whereas the edge set E = {hri , rj i|1 ≤ i, j ≤ m, i 6= j} contains the trigger
320
processes in the chains. If a trigger process leads from the risk factors ri to
321
rj in the chain, then hri , rj i ∈ E. Within the edge set, the elements can be
322
defined by a weighted adjacency matrix T = [tij ]m×m , where tij represents
323
the weight of the trigger relationship between risk factors ri and rj : a=|A|
tij =
X
taij
a=1
324
where 1, if risk factor r causes risk factor r in case a i j a tij = 0, otherwise
325
Based on the above definitions of node sets and edge sets in the network,
326
the weighted risk network can be constructed based on the common factors
327
in the accident chains. It is noteworthy that, in addition to the weighted
328
heterogeneity as aforementioned, loops may be found in the network. Their
329
presence owes its origins to the differences in the chronological occurrence of
330
different risk factors in the accident chains, due to which route ria → rja in
331
a given case a may be route rjb → rib in case b. This implies the necessity
332
of determining the relevant metrics that can characterize the weighted risk
333
network.
334
3.3. Evaluative metrics for risk network and critical-risk identification met-
335
rics
336
Notwithstanding the numerous evaluative metrics in the network theory,
337
we need to design and select metrics that can evaluate the attributes of
338
a weighted risk network, identify critical risk factors and offer managerial 15
339
insights. At the same time, these metrics should be able to cope with not
340
only the weighted heterogeneity of the risk network, but also the potential
341
loops in the network. Therefore, for evaluating the overall characteristics of
342
the network, we select three metrics: average degree, clustering coefficient,
343
and number of critical triggering routes.
344
Although a lot of metrics are available in measuring the significance of
345
nodes, the most direct ones are the out-degree, in-degree, and betweenness
346
of risks. For example, risk A triggers risk B, which means that risk A con-
347
stitutes the in-degree of risk B, and risk factor B constitutes the out-degree
348
of risk A. These three critical risk factors identification indicators constitute
349
the observational perspective of designing security enhancing strategies in
350
the three aspects of pre-prevention, post-remediation and process control.
351
Moreover, this study aims at offering a data-driven research framework for
352
proposing effective safety enhancing strategies, the computational simplicity
353
of these three indicators facilitates the real application. Therefore, for iden-
354
tifying critical risk factors, we select three vertex-related factors: out-degree,
355
in-degree, and betweenness.
356
For a given risk factor, the out-degree for its vertex represents the number
357
of other risk factors that can be triggered by it. In a weighted network, the
358
out-degree for risk factor ri can be denoted by j=m
Dout (ri ) =
X
tij .
(1)
j=1
359
A higher out-degree implies a greater number of risk factors that can be
360
triggered by the one in question, which thus deserves greater attention in
361
terms of implementing preemptive measures. Conversely, for a given risk 16
362
factor, the in-degree for its vertex represents the number of times it can be
363
triggered by other factors. In a weighted network, the in-degree for risk factor
364
ri can be denoted by j=m
Din (ri ) =
X
tji .
(2)
j=1
365
A higher in-degree implies a greater likelihood of the risk factor in question
366
being triggered, which thus deserves greater attention in terms of implement-
367
ing post-mortem remedial actions. When the in- and out-degrees of each risk
368
factor are obtained, the average degree of the entire network can be computed
369
as
i=m
Davg =
1 X (Dout (ri ) + Din (ri )). m i=1
(3)
370
A higher average degree of the network suggests not only a greater number
371
of interlinking relationships among the risk factors, but also greater resultant
372
complexity in their mutual triggering. Accordingly, the project corresponding
373
to such a network exhibits an elevated level of risks. Similarly, the clustering
374
coefficient reflects the degree to which risk factors tend to converge in the
375
network, as determined by the formula C=
|E| . |G|(|G| − 1)
(4)
376
A higher clustering coefficient also signifies an elevated level of overall risks
377
of the network.
378
From the perspective of triggering relationships, the betweenness is like-
379
wise an important indicator. For a given risk factor, its greater betweenness
380
implies a greater number of occasions on which critical triggering routes be-
381
tween risk factors in the network pass through this factor. Correspondingly, 17
3
Path α
3
1
Path β
Figure 2: Appraisal of the critical triggering routes
382
the risk factor in question is said to exhibit greater importance in the net-
383
work. However, in a weighted network, the critical triggering routes between
384
risk factors are determined not merely by the shortest route – apart from
385
distance, the frequency of triggers of a given route likewise deserves atten-
386
tion. For example, shown in Figure 2 are risks ri and rj , between which two
387
triggering routes are available: while route α is directly connected these two
388
factors, and the path β traverses risk rk . Notwithstanding the short distance
389
of the former, the frequency of triggers of the latter deserves greater atten-
390
tion. Based on such consideration, in the determination of critical triggering
391
routes, a balance has to be attained between the weights of the routes and
392
their lengths. Another noteworthy point is that not all triggering routes be-
393
tween the risk factors are critical triggering routes, since the attributes of
394
the accident chain determine that only a complete chain that can trigger the
395
final risk factor is worth examining. Therefore, this paper proposes a series
396
of steps to determine the critical triggering routes between risks ri and rj in
397
a weighted risk network, as follows:
398
Step 1: Identify the set containing the first K shortest loop-less routes
399
between risks ri and rj , denoted by P(P = {p1 , p2 , ..., pk , ...pK |1 ≤ k ≤ K}).
400
pk denotes the k th route between ri and rj such that pk = {Nk , Ek }, Nk 18
401
encompasses all vertices constituting the said route, and Ek encompasses all
402
triggering relationships constituting the route. Therefore, there must be a
403
set containing the weights of all triggering processes for the route, denoted
404
by Tk = {tgh |hrg , rh i ∈ Ek }.
405
Step 2: Calculate the weight indicator Wk for each route, pQ |Tk | tgh , tgh ∈ Tk . Wk = |Tk |
(5)
406
Step 3: Introduce a decreasing sequence based on the weight indicator,
407
such that the route pk with the largest indicator value Wk is the weighted
408
critical triggering route Sij between risks ri and rj .
409
Step 4: Obtain the third indicator that evaluates the overall attributes
410
of the network – the number of weighted critical triggering routes – denoted
411
by |S|, S = {Sij |1 ≤ i 6= j ≤ m}.
(6)
412
When the number of critical triggering routes in the network is deter-
413
mined, betweenness – the last identification criteria for critical risk factors –
414
can be determined through B(ri ) =
|S 0 | , |S|
(7)
415
where S 0 = {Sjk |hri , rp i ∈ Sjk ∨ hrq , ri i ∈ Sjk , i 6= p, i 6= q, 1 ≤ j, k, p, q ≤ m}.
416
The identification of critical risk factors through the out-degree, in-degree,
417
and betweenness forms the basis of the devising of the safety-enhancing
418
strategies, whose effectiveness will be appraised by the three evaluative met-
419
rics for the overall attributes of the network: average degree, clustering co-
420
efficient, and number of critical triggering routes. 19
421
4. Safety-enhancing strategy
422
Upon identifying the critical risk factors, managers should optimize safety
423
to curb the risk factors to avoid further accidents. The availability of three
424
ways to identify such critical factors (as aforementioned) means that, when
425
managers concern themselves with different risk factors in optimizing safety,
426
the priorities of the corresponding safety-enhancing strategies differ accord-
427
ingly. When the managers are interested in risk factors that tend to trigger
428
other risk factors, those with considerable out-degrees should be underlined.
429
When they are interested in risk factors with the greatest probability of oc-
430
currence, those with considerable in-degrees should be underlined. Lastly,
431
when they focus on the in-process risk factors that are most likely to occur
432
in all types of accidents, those with considerable betweenness should be un-
433
derlined. Upon discerning critical risk factors from the risk network, safety
434
should be optimized in a targeted manner. When such optimization is imple-
435
mented, the risk factor in question is considered to have been removed from
436
the network, as are the edges associated with it. With such removal, it is
437
noteworthy that the overall attributes of the risk network will change, leading
438
in turn to changes in not only the metrics of the remaining vertices, but also
439
the critical risk factors under the new resultant network. It follows that the
440
safety-enhancing strategies exist in two modes which differ in implementa-
441
tion: one optimizes the safety of critical risk factors identified from the initial
442
network, whereas the other operates in the midst of safety optimization and
443
dynamically determines the next risk factor pending optimization.
20
444
4.1. Static implementation of safety-enhancing strategies
445
In the static implementation of safety-enhancing strategies, critical risk
446
factors are identified based on identification metrics after the establishment of
447
the initial network. This is followed by the managers’ sequential optimization
448
of the safety for these factors. The steps are detailed as follows:
449
450
451
452
453
454
Step 1: Select metrics for identifying critical risk factors based on the out-degree, in-degree, and betweenness. Step 2: Arrange vertices in the network in an descending order based on values of the said metrics. Step 3: Optimize the safety of the most critical risk factor and remove its corresponding vertices and edges from the risk network.
455
Step 4: Calculate the overall risk level of the risk network.
456
Step 5: If the optimal target is reached, proceed to Step 6; otherwise,
457
458
459
revert to Step 3. Step 6: End the safety-enhancing operation. 4.2. Dynamic implementation of safety-enhancing strategies
460
In the dynamic implementation of safety-enhancing strategies, the critical
461
risk factors are first identified by managers based on identification metrics
462
during the optimization of the risk network. They are then improved in the
463
next round of optimization measures. The steps are detailed as follows:
464
465
466
467
Step 1: Select metrics for identifying critical risk factors based on the out-degree, in-degree, and betweenness. Step 2: Arrange vertices in the network in an descending order based on values of the said metrics.
21
468
469
Step 3: Optimize the safety of the most critical risk factor and remove its corresponding vertices and edges from the risk network.
470
Step 4: Calculate the overall risk level of the risk network.
471
Step 5: If the optimal target is reached, proceed to Step 6; otherwise,
472
revert to Step 2.
473
Step 6: End the safety-enhancing operation.
474
The static and dynamic safety-enhancing strategies can be represented
475
by a consolidated flowchart (Figure 3). Start Evaluate the initial risk network Select the identification metric of critical risk factors Sequencing all the risk factors according to the identification metric Design security enhancement policy for the most critical risk factor Eliminate this risk factor from the risk network Evaluate the current risk network Meet the enhancement goal? Y
Y
Finish
N Static enhancement? N
Figure 3: Implementation of safety-enhancing strategies
22
476
Therefore, after considering the metrics for identifying critical risk fac-
477
tors and the classification of implementing the safety enhancement, we pro-
478
pose six kinds of safety-enhancing: Out-degree-related Static Enhancement
479
(OSE), Out-degree-related Dynamic Enhancement (ODE), In-degree-related
480
Static Enhancement (ISE), In-degree-related Dynamic Enhancement (IDE),
481
Betweenness-related Static Enhancement (BSE) and Betweenness-related Dy-
482
namic Enhancement (BDE).
483
5. Data Analysis and Discussions
484
5.1. Data sources
485
With the assistance of the Engineering Department and the Safety and
486
Quality Inspection Department of our collaborative company, we have estab-
487
lished a database of accident cases involving construction of bridges and of
488
tunnels in China. A total of 67 bridge-related accidents and 64 tunnel-related
489
accidents are collected. Of the cases therein, the most serious occurred at
490
14:40 on the 22nd December 2005, when a gas explosion occurred on the
491
highway tunnel project, resulting in 44 deaths and 11 injuries. After the
492
processing such chains, we obtain 146 risk vertices, as outlined in Table 1
493
and Table 2 (important risk factors in this paper are detailed in the ap-
494
pendix). The vertices can be further categorized based of their risk type into
495
human factors(36), management factors(18), object factors(55), environmen-
496
tal factors(32), and technical factors(5). Since the cases involved bridges and
497
tunnels, we underline the type of accident corresponding to the risk factors
498
when disintegrating the accident chain into risk factors.
23
Table 1: Examples of accident-related data
Case id Case name
Case type
Accident chain
1
...
Bridge
ri1 → rj1 → rk1 → rl1
...
...
...
...
131
...
Tunnel
rk131 → rp131 → rq131
Table 2: Examples of risk factors
Risk id
Risk name
Risk type
Risk class
R1
...
Human factors
Common
R2
...
Environmental factors
Tunnel
R3
...
Technical factors
Common
R4
...
Object factor
Bridge
R5
...
Management factors
Common
...
...
...
...
24
499
500
Then, based on the procedure aforementioned, we obtain the following network (Figure 4):
:common risk factors :bridge risk factors :tunnel risk factors :human factors :management factors :object factors :environmental factors :technical factors
Figure 4: Risk network in bridge-and-tunnel hybrid construction engineering
501
To distinguish between the different types of risk factors, we employed
502
different polygons. Additionally, to distinguish between risk factors common
503
to both the two types of projects and project-specific risk factors, we em25
504
ployed different colors. The size of the vertices is dictated by the sum of the
505
out- and in-degrees of each risk factor.
506
5.2. Attributes of the network
507
The resultant risk network demonstrates the attributes of a small-world
508
network: its average weighted degree is 5.589; its clustering coefficient is
509
0.015; it comprises 8,208 routes; and its average route length of 3.659. Con-
510
cerning the risk factors, ”Violation operation” emerges as not only the most
511
critical factor under all three identification metrics, but also as a factor com-
512
mon to both bridge- and tunnel-related accidents (Table 3). Overall, common
513
factors account for the majority of the top 20 critical factors; this ensures
514
the applicability of the safety-enhancing strategies, of which the effectiveness
515
is ascertained in the subsequent simulation.
516
Based on the out-degrees and betweenness, among the five types of fac-
517
tors, human factors and management factors represent not only the main
518
causes underlying the accidents, but also the necessary factors for the occur-
519
rence of accidents. This suggests that, in terms of protection, optimizing the
520
management system can prevent accidents. On the other hand, based on the
521
in-degrees, human factors (e.g. personal injuries) and object-related factors
522
(e.g. property damage) are the most likely results when accidents occur. In
523
other words, in the event of an accident, the best response is to address the
524
personal injuries and property damage in a timely manner. As shown in
525
Table 4, 5, 6, 7, 8, accidents in bridge engineering are more likely caused
526
by human factors, management factors, and object factors, whereas those
527
in tunnel engineering are more likely caused by environmental factors,which
528
are common to many other types of projects [25, 27, 29]. This relatively ac26
Table 3: Top 20 critical risk factors out-degree
in-degree
betweenness
No.
Risk id
Value
Risk id
Value
Risk id
Value
1
R112
47
R112
30
R112
1069
2
R1
31
R104
27
R88
535
3
R49
24
R142
24
R58
502
4
R124
16
R58
12
R23
304
5
R88
14
R88
11
R5
286
6
R51
14
R5
11
R124
176
7
R4
12
R71
11
R20
169
8
R58
12
R47
10
R51
158
9
R5
12
R124
9
R138
156
10
R21
10
R1
8
R28
147
11
R114
9
R87
8
R142
131
12
R39
9
R45
7
R90
128
13
R20
8
R20
6
R71
116
14
R113
8
R113
6
R113
114
15
R83
5
R21
5
R21
110
16
R123
5
R23
5
R104
101
17
R23
5
R141
5
R1
82
18
R141
5
R80
5
R118
80
19
R118
4
R12
5
R45
78
20
R80
4
R74
5
R69
75
27
Table 4: Top 10 critical human risk factors out-degree
in-degree
betweenness
No.
Risk id
Value
Risk id
Value
Risk id
Value
1
R112
47
R112
30
R112
1069
2
R1
31
R142
24
R58
502
3
R58
12
R58
12
R142
131
4
R113
8
R71
11
R71
116
5
R123
5
R1
8
R113
114
6
R142
4
R113
6
R1
82
7
R10
4
R10
4
R10
45
8
R93
3
R123
3
R6
42
9
R117
3
R93
3
R123
42
10
R2
2
R117
3
R117
42
Table 5: Top 10 critical management risk factors out-degree No.
Risk id
Value
1
R49
2
R124
3
R88
4
R114
5
R39
6
R118
4
7
R12
3
8
R99
3
9
R100
3
10
R116
2
in-degree
betweenness
Risk id
Value
Risk id
Value
24
R88
11
R88
535
16
R124
9
R124
176
14
R12
5
R118
80
9
R114
4
R12
67
9
R118
4
R116
67
R49
3
R100
42
R99
3
R121
41
R100
3
R122
35
R116
2
R99
26
R122
2
R49
25
529
centuated causal role of the environmental factors in the tunnel engineering
530
owes its origins to the lack of control over geological aspects due to technical
531
constraints, which leads to greater likelihoods of unexpected situations and
532
challenging construction.
28
Table 6: Top 10 critical object risk factors out-degree
in-degree
betweenness
No.
Risk id
Value
Risk id
Value
Risk id
Value
1
R5
12
R104
27
R23
304
2
R23
5
R5
11
R5
286
3
R141
5
R47
10
R138
156
4
R35
4
R87
8
R28
147
5
R90
4
R23
5
R90
128
6
R74
3
R141
5
R104
101
7
R65
3
R74
5
R69
75
8
R138
3
R143
5
R15
69
9
R104
2
R67
4
R35
60
10
R67
2
R69
4
R77
48
Table 7: Top 10 critical environmental risk factors out-degree
in-degree
betweenness
No.
Risk id
Value
Risk id
Value
Risk id
Value
1
R51
14
R45
7
R51
158
2
R21
10
R21
5
R21
110
3
R83
5
R80
5
R45
78
4
R80
4
R132
5
R132
67
5
R96
4
R51
4
R96
58
6
R45
3
R96
4
R97
45
7
R91
3
R83
3
R83
42
8
R97
3
R91
3
R30
41
9
R132
2
R97
3
R18
41
10
R19
2
R41
3
R91
32
29
Table 8: Top 10 critical technical risk factors out-degree
533
in-degree
betweenness
No.
Risk id
Value
Risk id
Value
Risk id
Value
1
R4
12
R20
6
R20
169
2
R20
8
R4
3
R4
71
3
R36
1
R36
1
R64
15
4
R64
1
R64
1
R36
3
5
R135
1
R135
1
R135
0
5.3. Effects of safety-enhancing strategies
534
In the simulation, we remove the top 100 critical risk factors one by one
535
in the network based on different strategies, and obtain findings exhibiting
536
the dynamic changes of the metrics (Figure 5). It can be inspected that,
537
for any given strategy under any evaluative indicator, the risk level of the
538
whole network can be significantly reduced at the outset; however, with
539
increasing numbers of optimized risk factors, diminishing marginal benefits
540
gradually emerges, although the said risk level continues to decrease. Under
541
limited resources, it is impossible for engineering managers to remove all risk
542
factors. Nonetheless, if critical risk factors can be found and their safety
543
optimized, the risk of the projects can be reduced to acceptable levels. This
544
offers theoretical support for the design of safety-enhancing strategies that
545
are balanced in terms of both cost and effects.
30
Average weighted degree
6 5 4
OSE ODE ISE IDE BSE BDE
3 2 1 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100
0 Risk factors removed subsequently
7000 6000 5000
OSE ODE ISE IDE BSE BDE
4000 3000 2000 1000 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100
0 Risk factors removed subsequently
(b) Changes in the No. of critical triggering routes 0.018 0.016 0.014 0.012 0.01 0.008 0.006 0.004 0.002 0
OSE ODE ISE IDE BSE BDE 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100
Clustering coefficient
31
No. of critical triggering routes
(a) Changes in the average weighted degree
Risk factors removed subsequently
(c) Changes in the clustering coefficient Figure 5: Dynamic changes of the metrics
546
Based on the effects of the safety-enhancing strategies under different risk-
547
evaluation metrics, it is found that dynamic safety enhancement outperforms
548
static enhancement, because optimizing critical risk factors is a dynamic and
549
changing process: upon optimizing the safety of the current most critical risk
550
factor in the network, it is necessary to determine the next most critical one.
551
With the simulation, different critical risk factors are identified by different
552
strategies; hence, variations in the effects of the strategies are observed. In
553
terms of identifying critical risk factors, no one indicator is always optimal at
554
all times: depending on the in-degree, out-degree, and betweenness, different
555
dynamic protection strategies are observed to the optimal ones in different
556
stages in the simulation. At the outset, strategies based on in- and out-
557
degrees are generally superior to those based on betweenness. This implies
558
that, when budgetary constraints are stringent, complex identification crite-
559
ria are unnecessary in enhancing engineering safety. Examining the in- and
560
out-degrees enables the elucidation of risk factors prone to triggering other
561
factors and of risk factors that can easily be triggered by other factors; this
562
in turn allows preparation in terms of preemptive measures post-mortem re-
563
medial actions, which will be more effective than process controls to mitigate
564
the risk levels. However, dynamic protection strategies based on betweenness
565
enables the rapid global optimization of the risk network. This implies that,
566
when budgetary constraints are more relaxed, process controls favorably im-
567
prove the safety level.
568
5.4. Managerial Recommendations
569
570
Based on the nature of the risk factors, managerial recommendations are offered: 32
571
Firstly, in general, human-related and managerial factors are critical in
572
most accident cases, highlighting that, unsafe human behaviors are more
573
likely to cause accidents. Of these risk factors, ”Violation operation” is the
574
most critical. This underlines that strengthening the supervision and train-
575
ing of field operators can significantly and effectively improve safety. Based
576
on the in-degree metrics, ”falls from heights” are multi-occurrence accidents,
577
especially in bridge engineering, suggesting that managers should adopt more
578
stringent oversight of personnel working at heights. In addition to strength-
579
ening supervision and training, managers should pay attention to instituting
580
protective measures and standardized command processes. Object-related
581
factors play a more important role in accidents in bridge engineering than in
582
tunnel engineering, necessitating bridge-engineering managers to implement
583
on-site corrective measures for unsafe status due to objects.
584
Secondly, among the environmental factors, rainfall and geological defects
585
are the chief conditions causing most accidents. If such factors are encoun-
586
tered in the construction, managers and operators need to adopt preemptive
587
countermeasures. Likewise, fires are a probable environmental risk, for which
588
managers also need to devise emergency plans. More specifically, many en-
589
vironmental factors pertain exclusively to tunnel engineering, especially risk
590
factors related to geological hazards, thereby warranting that more atten-
591
tion should be paid to environmental changes in tunnel construction than in
592
bridge engineering. Lastly, although there are few technical factors, designs
593
that are not scientifically rigorous represent an important risk factor. As
594
the design phase precedes construction and as uncertainties in the construc-
595
tion can hardly be predicted, mismatches may arise in the design phase; this
33
596
thus requires more demonstration of the project during the design phase, e.g.
597
through the use of BIM technology to simulate the project implementation
598
to minimize late-stage risks.
599
6. Conclusions
600
Learning from past accidents can improve engineering safety with little
601
cost. Copious literature on the analysis of accident cases has focused on
602
the use of the network theory to determine critical risk factors. Lots of
603
literature on the analysis of accident cases has begun to investigate the risk
604
characteristics of different accidents as well [15, 16, 32, 33]. However, most
605
of it has assumed that the risk network is non-weighted and overlooked the
606
design of safety-enhancing strategies according to the critical factors. In
607
addition, the constituent elements of the risk network include not only the
608
intermediate process of the accident but also its final culmination, and these
609
factors can be ascribed to different parties that are accountable; this brings
610
some difficulties to the risk network analysis and safety enhancement.
611
Through the network theory and considering the weighted nature and
612
heterogeneity of risk networks, this paper constructs and proposes a data-
613
driven research framework for safety-enhancing strategies. The framework
614
can be applied to case analyses in multifarious construction projects to im-
615
prove the overall safety. To this end, this paper selects a series of metrics
616
both for overall evaluation and for identification of critical risk factors that
617
can characterize the attributes of the risk network; based on these metrics,
618
safety-enhancing strategies are thus devised. Then, based on accident cases in
619
bridge-and-tunnel hybrid construction projects in China, the risk attributes 34
620
in such hybrid engineering are analyzed, and critical risk factors in the risk
621
network identified. Similar to most of the single-type constructions, the hu-
622
man and management factors are the most critical risk factors for hybrid
623
construction.
624
In the subsequent simulation experiment, the effectiveness of the safety-
625
enhancing strategies proposed herein is verified through dynamic-enhancing
626
and static-enhancing methods. The experimental results demonstrate that
627
the dynamic-enhancing strategy exhibits favorable feasibility in both effect
628
and cost, especially when given limited resources: significant improvement
629
has resulted when primary risk factors are optimized in terms of safety
630
through adherence to the rule therein. Finally, this paper offers managerial
631
recommendations for improving safety in bridge-and-tunnel hybrid construc-
632
tion projects. Additionally, the proposed analytical framework can also be
633
applied in other single or hybrid construction projects by changing the data
634
source. With the accumulation of data from different types of projects, the
635
results will achieve have high applicability and reliability.
636
In future studies, the applicability of the research framework to other
637
types of construction works is worth further examination. Additionally, two
638
other research questions warranting further exploration include whether risk
639
factors in different types of engineering belong to only the five categories
640
discussed in this paper, and whether the safety-enhancing strategies are ap-
641
plicable to the structure of the risk network in different types of projects. In
642
addition, human-related factors have been observed to be one of the most
643
critical factors in accidents in the construction industry. This paper has not
644
elucidated the interactions between such human-related factors and other
35
645
types of factors, which represent the most challenging issue in future re-
646
search.
647
Acknowledgments
648
This work was supported by the National Natural Science Foundation of
649
China [grant numbers 71701213, 71401181, 71821001]; and the MOE (Min-
650
istry of Education in China) Project of Humanities and Social Sciences [grant
651
numbers 15YJC630008, 14YJC630136].
652
Conflict of Interest
653
The authors declare that they have no conflict of interest.
654
References
655
References
656
[1] H. Zhou, H. Wang, W. Zeng, Smart construction site in mega con-
657
struction projects: A case study on island tunneling project of hong
658
kong-zhuhai-macao bridge, Frontiers of Engineering Management 5 (1)
659
(2018) 78–87. doi:10.15302/J-FEM-2018075.
660
[2] W. Zeng, J. Zhang, H. Wang, H. Zhou, Supplier development and its
661
incentives in infrastructure mega-projects: A case study on hong kong-
662
zhuhai-macao bridge project, Frontiers of Engineering Management 5 (1)
663
(2018) 88–97. doi:10.15302/J-FEM-2018077.
664
[3] F. Tuchsen, H. Hannerz, S. Spangenberg, Mortality and morbidity
665
among bridge and tunnel construction workers who worked long hours 36
666
and long days constructing the great belt fixed link, Scandinavian Jour-
667
nal of Work Environment & Health 31 (2) (2005) 22–26.
668
[4] N. K. Kim, N. F. A. Rahim, M. Iranmanesh, B. Foroughi, The role of the
669
safety climate in the successful implementation of safety management
670
systems, Safety Science 118 (2019) 48–56. doi:10.1016/j.ssci.2019.
671
05.008.
672
[5] S. You, J.-H. Kim, S. Lee, V. Kamat, J. L. P. Robert, Enhancing per-
673
ceived safety in humanrobot collaborative construction using immersive
674
virtual environments, Automation in Construction 96 (2018) 161–170.
675
doi:10.1016/j.autcon.2018.09.008.
676
[6] A. A. F. Fini, A. Akbarnezhad, T. H. Rashidi, S. T. Waller, Enhancing
677
the safety of construction crew by accounting for brain resource require-
678
ments of activities in job assignment, Automation in Construction 88
679
(2018) 31–43. doi:10.1016/j.autcon.2017.12.013.
680
[7] X. Dong, J. W. Platner, Occupational fatalities of hispanic construction
681
workers from 1992 to 2000, American Journal of Industrial Medicine
682
45 (1) (2004) 45–54. doi:10.1002/ajim.10322.
683
[8] R. A. Haslam, S. A. Hide, A. G. Gibb, D. E. Gyi, T. Pavitt, S. Atkinson,
684
A. R. Duff, Contributing factors in construction accidents, Applied Er-
685
gonomics 36 (4) (2005) 401–15. doi:10.1016/j.apergo.2004.12.002.
686
[9] Z. Zhou, Y. M. Goh, Q. Li, Overview and analysis of safety management
687
studies in the construction industry, Safety Science 72 (2015) 337–350.
688
doi:10.1016/j.ssci.2014.10.006. 37
689
690
[10] J. Reason, Understanding adverse events: human factors, BMJ Quality & Safety 4 (2) (1995) 80–89.
691
[11] A.-K. Lindberg, S. O. Hansson, C. Rollenhagen, Learning from accidents
692
what more do we need to know?, Safety Science 48 (6) (2010) 714–721.
693
doi:10.1016/j.ssci.2010.02.004.
694
[12] M. Ouyang, L. Hong, M.-H. Yu, Q. Fei, Stamp-based analysis on the
695
railway accident and accident spreading: Taking the chinajiaoji railway
696
accident for example, Safety Science 48 (5) (2010) 544–555. doi:10.
697
1016/j.ssci.2010.01.002.
698
[13] Z. Zhou, J. Irizarry, Q. Li, Using network theory to explore the com-
699
plexity of subway construction accident network (scan) for promoting
700
safety management, Safety Science 64 (2014) 127–136. doi:10.1016/
701
j.ssci.2013.11.029.
702
[14] Y. Deng, L. Song, Z. Zhou, P. Liu, An approach for understanding and
703
promoting coal mine safety by exploring coal mine risk network, Com-
704
plexity (2017) Article–Number = 7628569doi:10.1155/2017/7628569.
705
[15] C. Zhou, L. Ding, M. J. Skibniewski, H. Luo, S. Jiang, Characterizing
706
time series of near-miss accidents in metro construction via complex
707
network theory, Safety Science 98 (2017) 145–158. doi:10.1016/j.
708
ssci.2017.06.012.
709
[16] C. Zhou, L. Y. Ding, M. J. Skibniewski, H. Luo, H. T. Zhang, Data based
710
complex network modeling and analysis of shield tunneling performance
38
711
in metro construction, Advanced Engineering Informatics 38 (2018) 168–
712
186. doi:10.1016/j.aei.2018.06.011.
713
[17] H. Li, S. Dong, S. Martin, Q. He, Q. Yin, Intrusion warning and as-
714
sessment method for site safety enhancement, Safety Science 84 (2016)
715
97–107. doi:10.1016/j.ssci.2015.12.004.
716
[18] M. Abbas, B. E. Mneymneh, H. Khoury, Assessing on-site construction
717
personnel hazard perception in a middle eastern developing country:
718
An interactive graphical approach, Safety Science 103 (2018) 183–196.
719
doi:10.1016/j.ssci.2017.10.026.
720
[19] G. K. Koulinas, P. K. Marhavilas, O. E. Demesouka, A. P. Vavatsikos,
721
D. E. Koulouriotis, Risk analysis and assessment in the worksites using
722
the fuzzy-analytical hierarchy process and a quantitative technique - a
723
case study for the greek construction sector, Safety Science 112 (2019)
724
96–104. doi:10.1016/j.ssci.2018.10.017.
725
[20] P. Mitropoulos, T. S. Abdelhamid, G. A. Howell, Systems model of con-
726
struction accident causation, Journal of Construction Engineering and
727
Management 131 (7) (2005) 816–825. doi:10.1061//ASCE/0733-9364/
728
2005/131:7/816.
729
[21] J. A. Gambatese, M. Behm, S. Rajendran, Designs role in construction
730
accident causality and prevention: Perspectives from an expert panel,
731
Safety Science 46 (4) (2008) 675–691. doi:10.1016/j.ssci.2007.06.
732
010.
39
733
[22] C. F. Chi, T. C. Chang, H. I. Ting, Accident patterns and prevention
734
measures for fatal occupational falls in the construction industry, Ap-
735
plied Ergonomics 36 (4) (2005) 391–400. doi:10.1016/j.apergo.2004.
736
09.011.
737
[23] J. L. Meli´a, K. Mearns, S. A. Silva, M. L. Lima, Safety climate responses
738
and the perceived risk of accidents in the construction industry, Safety
739
Science 46 (6) (2008) 949–958. doi:10.1016/j.ssci.2007.11.004.
740
[24] O. Rozenfeld, R. Sacks, Y. Rosenfeld, H. Baum, Construction job safety
741
analysis, Safety Science 48 (4) (2010) 491–498. doi:10.1016/j.ssci.
742
2009.12.017.
743
[25] F. Caffaro, M. Roccato, M. Micheletti Cremasco, E. Cavallo, Falls from
744
agricultural machinery: Risk factors related to work experience, worked
745
hours, and operators’ behavior, Human Factors 60 (1) (2018) 20–30.
746
doi:10.1177/0018720817738591.
747
[26] T. Aksorn, B. H. W. Hadikusumo, Critical success factors influencing
748
safety program performance in thai construction projects, Safety Science
749
46 (4) (2008) 709–727. doi:10.1016/j.ssci.2007.06.006.
750
[27] F. Caffaro, M. Roccato, M. Micheletti Cremasco, E. Cavallo, Part-
751
time farmers and accidents with agricultural machinery: a moderated
752
mediated model on the role played by frequency of use and unsafe
753
beliefs, Journal of Occupational Health 60 (1) (2018) 80–84.
754
10.1539/joh.17-0061-BR.
40
doi:
755
[28] A. H. Rao, K. Marais, High risk occurrence chains in helicopter ac-
756
cidents, Reliability Engineering and System Safety 170 (2018) 83–98.
757
doi:10.1016/j.ress.2017.10.014.
758
[29] Z.-Y. Sun, J.-L. Zhou, L.-F. Gan, Safety assessment in oil drilling work
759
system based on empirical study and analytic network process, Safety
760
Science 105 (2018) 86–97. doi:10.1016/j.ssci.2018.02.004.
761
[30] K. Li, S. Wang, A network accident causation model for monitoring rail-
762
way safety, Safety Science 109 (2018) 398–402. doi:10.1016/j.ssci.
763
2018.06.008.
764
[31] I. Kelman, Connecting theories of cascading disasters and disaster diplo-
765
macy, International Journal of Disaster Risk Reduction 30 (2018) 172–
766
179. doi:10.1016/j.ijdrr.2018.01.024.
767
[32] X. Zheng, Y. Le, A. P. C. Chan, Y. Hu, Y. Li, Review of the application
768
of social network analysis (sna) in construction project management
769
research, International Journal of Project Management 34 (7) (2016)
770
1214–1225. doi:10.1016/j.ijproman.2016.06.005.
771
[33] F. Wehbe, M. A. Hattab, F. Hamzeh, Exploring associations between
772
resilience and construction safety performance in safety networks, Safety
773
Science 82 (2016) 338–351. doi:10.1016/j.ssci.2015.10.006.
774
[34] C. Xiong, K. Liang, H. Luo, I. W. H. Fung, Identification of safety-
775
related opinion leaders among construction workers: Evidence from scaf-
776
folders of metro construction in wuhan, china, International Journal
41
777
of Environmental Research and Public Health 15 (10). doi:10.3390/
778
ijerph15102176.
779
[35] J. Yuan, K. Chen, W. Li, C. Ji, Z. Wang, M. J. Skibniewski, Social
780
network analysis for social risks of construction projects in high-density
781
urban areas in china, Journal of Cleaner Production 198 (2018) 940–961.
782
doi:10.1016/j.jclepro.2018.07.109.
783
[36] L. Zhang, X. Wu, M. J. Skibniewski, J. Zhong, Y. Lu, Bayesian-network-
784
based safety risk analysis in construction projects, Reliability Engineer-
785
ing and System Safety 131 (2014) 29–39. doi:10.1016/j.ress.2014.
786
06.006.
787
[37] Y. Zhou, C. Li, C. Zhou, H. Luo, Using bayesian network for safety risk
788
analysis of diaphragm wall deflection based on field data, Reliability
789
Engineering and System Safety 180 (2018) 152–167. doi:10.1016/j.
790
ress.2018.07.014.
791
[38] Y. Yang, G. Chen, P. Chen, The probability prediction method of
792
domino effect triggered by lightning in chemical tank farm, Process
793
Safety and Environmental Protection 116 (2018) 106–114. doi:10.
794
1016/j.psep.2018.01.019.
795
[39] H. Cao, Y. M. Goh, Analyzing construction safety through time
796
series methods, Frontiers of Engineering Managementdoi:10.1007/
797
s42524-019-0015-6.
798
[40] H. Wu, I. Penarrubia, L. Cui, J. Zhao, Process safety management con-
42
799
siderations for biofuel production, Frontiers of Engineering Management
800
4 (3, SI) (2017) 357–367. doi:10.15302/J-FEM-2017025.
801
[41] A. A. Raheem, R. R. A. Issa, Safety implementation framework for
802
pakistani construction industry, Safety Science 82 (2016) 301–314. doi:
803
10.1016/j.ssci.2015.09.019.
804
[42] P. Kumar, S. Gupta, M. Agarwal, U. Singh, Categorization and stan-
805
dardization of accidental risk-criticality levels of human error to develop
806
risk and safety management policy, Safety Science 85 (2016) 88–98.
807
doi:10.1016/j.ssci.2016.01.007.
808
[43] G. A. Shirali, V. Salehi, R. Savari, K. Ahmadiangali, Investigating the
809
effectiveness of safety costs on productivity and quality enhancement by
810
means of a quantitative approach, Safety Science 103 (2018) 316–322.
811
doi:10.1016/j.ssci.2017.12.017.
812
Appendix A. Information of risk factors concerned in this paper Risk id
Risk name
Risk type
Risk class
R1
Weak security awareness
Human factors
Common
R2
Blasting
Human factors
Tunnel
R4
Unscientific design
Technical factors
Common
R5
Instability pillar
Object factor
Common
R6
Stepping up the empty tilt
Human factors
Bridge
R10
Overload
Human factors
Common
R12
Improper disposal
Management factors
Common
R15
Force of single wire rope
Object factor
Bridge
R18
Insufficient bearing capacity of foundation
Environmental factors
Bridge
43
R19
Groundwater accumulation
Environmental factors
Tunnel
R20
Insufficient geological exploration
Technical factors
Common
R21
Geological defects
Environmental factors
Common
R23
Cable accidents
Object factor
Common
R28
Hoist capsized
Object factor
Bridge
R30
Gas
Environmental factors
Tunnel
R35
Wire rope fault
Object factor
Common
R36
Wire rope contact high voltage line
Technical factors
Tunnel
R39
Management negligence
Management factors
Common
R41
Landslide
Environmental factors
Tunnel
R45
Fire
Environmental factors
Tunnel
R47
Extrusion
Object factor
Common
R49
Imperfect regulation
Management factors
Common
R51
Rainfall
Environmental factors
Common
R58
Access to hazardous areas
Human factors
Bridge
R64
Unreasonable rod structure
Technical factors
Bridge
R65
Loosening of the connection
Object factor
Common
R67
Sliding slope
Object factor
Common
R69
Leakage
Object factor
Tunnel
R71
Drowning
Human factors
Common
R74
Template overturning
Object factor
Bridge
R77
Collision
Object factor
Common
R80
Falling rocks
Environmental factors
Tunnel
R83
Strong winds
Environmental factors
Common
R87
Overturn
Object factor
Bridge
R88
Inadequate protection
Management factors
Common
R90
Brake failure
Object factor
Common
R91
Unstable massif
Environmental factors
Tunnel
R93
Dismantling components
Human factors
Bridge
R96
Water leakage
Environmental factors
Tunnel
44
R97
Hydraulic
Environmental factors
Common
R99
Chaos in the construction process
Management factors
Common
R100
Inspection negligence
Management factors
Bridge
R104
Collapse
Object factor
Common
R112
Violation operation
Human factors
Common
R113
Welding violation
Human factors
Common
R114
Violation of command
Management factors
Common
R116
Failure to take protective measures
Management factors
Bridge
R117
Not wearing a life jacket
Human factors
Bridge
R118
No warning sign
Management factors
Total
R121
Safety switch not set
Management factors
Bridge
R122
No shutdown downtime
Management factors
Bridge
R123
Not wearing a seatbelt
Human factors
Bridge
R124
Inadequate training
Management factors
Common
R132
Dynamite explosion
Environmental factors
Tunnel
R135
The collapse of the support structure
Technical factors
Tunnel
R138
Unstable outrigger
Object factor
Bridge
R141
Unstable barycenter
Object factor
Bridge
R142
Falls from heights
Human factors
Bridge
R143
Falling objects
Object factor
Bridge
813
45
814
815
Conflict of Interest The authors declare that they have no conflict of interest.
46