Data-driven safety enhancing strategies for risk networks in construction engineering

Data-driven safety enhancing strategies for risk networks in construction engineering

Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering Journal Pre-proof Data-driven Safety Enhancing Strategies for ...

1MB Sizes 0 Downloads 11 Views

Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering

Journal Pre-proof

Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering Fangyu Chen, Hongwei Wang, Gangyan Xu, Hongchang Ji, Shanlei Ding, Yongchang Wei PII: DOI: Reference:

S0951-8320(19)30665-9 https://doi.org/10.1016/j.ress.2020.106806 RESS 106806

To appear in:

Reliability Engineering and System Safety

Received date: Revised date: Accepted date:

24 May 2019 29 September 2019 18 January 2020

Please cite this article as: Fangyu Chen, Hongwei Wang, Gangyan Xu, Hongchang Ji, Shanlei Ding, Yongchang Wei, Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering, Reliability Engineering and System Safety (2020), doi: https://doi.org/10.1016/j.ress.2020.106806

This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2020 Published by Elsevier Ltd.

1

2

3

Highjlights • A data-driven framework for designing safety-enhancing strategies is proposed.

4

• The metrics for identifying critical risk factors are designed.

5

• The risk attributes of bridge-tunnel hybrid construction projects are

6

analyzed.

7

• The effectiveness of safety-enhancing strategies is verified.

8

• Critical conclusions and corresponding managerial suggestions are of-

9

fered.

1

Data-driven Safety Enhancing Strategies for Risk Networks in Construction Engineering

10

11

12 13

14 15 16 17 18 19

20

Fangyu Chena , Hongwei Wangb , Gangyan Xuc , Hongchang Jia , Shanlei Dingd , Yongchang Weia,∗ a

Institute of Operations Management and System Engineering, School of Business Administration, Zhongnan University of Economics and Law, Wuhan, China b School of Management, School of Automation, Huazhong University of Science and Technology, Wuhan, China c School of Architecture, Harbin Institute of Technology, Shenzhen, China d China Construction Seventh Engineering Division. Corp. LTD

Abstract

21

Risk management is crucial and indispensable to the success of projects,

22

while identifying critical risks is the fundamental step in devising the cor-

23

responding safety measures. To fully exploit the value of richly accumu-

24

lated accidental cases, this paper presents a data-driven research framework

25

for proposing effective safety enhancing strategies based on risk networks in

26

construction engineering, spanning the whole process from extracting acci-

27

dent chains from accidents to construct a risk network to devising safety

28

measures. Aiming at the weighted heterogeneity of the risk network, both

29

the performance metrics at network level and critical-risk identification met-

30

rics at node level are deliberately designed. These metrics then enable the

31

proposing of a series of safety-enhancing strategies. In the case study, based

32

on the accident-related data in China’s bridge-and-tunnel hybrid projects,

33

different safety-enhancing strategies are compared through simulation ex-

34

periments and analyzed to verify their effectiveness on optimizing costs and ∗

Corresponding Author: Yongchang Wei. Email: [email protected] Preprint submitted to Reliability Engineering and System Safety January 20, 2020

35

improving safety. Finally, based on results from simulations, relevant man-

36

agerial suggestions are proposed.

37

Keywords:

38

safety enhancing strategies, risk network, data-driven, construction

39

engineering

40

1. Introduction

41

In recent years, China has augmented its investment in infrastructure con-

42

struction, with the resultant launching of projects in various regions. As the

43

prerequisite for economic and social development, transport facilities have

44

drawn the most attention. In this regard, China’s complex geological con-

45

ditions translate into the concurrent need in many road-traffic projects for

46

connections by both bridges and tunnels (such as Hong Kong-Zhuhai-Macao

47

Bridge[1, 2]), for which the high risk of construction leads to susceptibil-

48

ity to accidents. More importantly, in the local governments’ attempt to

49

develop traffic construction, the blind pursuit of pace and progress – espe-

50

cially in bridge-tunnel construction – may result in safety risks. Not only for

51

China, Tuchsen et al.[3] conclude that bridge and tunnel workers generally

52

have a high mortality rate, and they are treated more often in hospitals,

53

which means the safety issues in such hybrid construction projects are more

54

worthy of attention. Moreover, accidents lead to significant human cost and

55

negatively affect the productivity of construction companies[4]. Accordingly,

56

engineering managers need to devise safety measures according to the charac-

57

teristics of engineering-related risks, for the threefold purpose of forestalling

58

accidents, reducing risks, and improving safety. Many related literature at3

59

tempts to design security enhancement strategies for single type projects or

60

specific activities, such as humanrobot collaboration[5] and job assignment[6].

61

However, limited by the resources such as cost and time, the chosen safety

62

measures can cover only part of the risks in most projects. The chief ques-

63

tion in devising such measures thus remains on finding a safety-enhancing

64

strategy to adopt most applicable safety measures.

65

An applicable safety-enhancing strategy should cover the critical risks

66

in projects. Based on the existing literature, risk factors identification has

67

been the ultimate goal of most accident analyses. To determine the critical

68

risk factors, the retrospective examination of failure-related lessons in past

69

accidents is crucial[7–9]. Any disregard of the said critical factors will trans-

70

late into the progressive triggers of contributing factors on the construction

71

site, one cascading in turn to another and eventually to the occurrence of

72

accidents – collectively, these represent the accident chain, as it is known in

73

accident analysis[10–12]. The profusion of accident cases demonstrate that

74

the risk factors and trigger processes involved in the accident chain in a given

75

case likewise exist in multiple cases; the conjoining of multiple such chains

76

yields a risk network[13]. Accordingly, the network theory has become an

77

important means in the analysis and research of accident cases[14–16]. How-

78

ever, it is noteworthy that the majority of such literature assumes that the

79

risk network is without weights. With the accumulation of cases, we can find

80

that the trigger process between some risk factors occur more frequently, sug-

81

gesting that the edges representing the correlation between such risk factors

82

in the network should be accorded weights. Such weights denote the num-

83

bers of occurrences of the trigger process in the repository of cases: a greater

4

84

weight for a given risk factor translates into the fact that it deserves more

85

attention. In addition, the analytical frameworks proposed in the relevant

86

literature [6, 17–19] mostly focus on the characteristics of specific risk fac-

87

tors or propose specific safety enhancement measures for these specific risks.

88

A universal framework is still lacking on how to ascertain critical risk fac-

89

tors from the accident cases and devise the corresponding safety-enhancing

90

strategies.

91

Challenges have arisen in identifying critical risk factors through a risk

92

network and developing safety-enhancing strategies based on identification

93

criteria. Firstly, the risk network is a weighted network. Critical risk factors

94

in an un-weighted network can be appraised by metrics such as the degree or

95

betweenness, but their counterparts in a weighted network should be rede-

96

fined with the consideration of the impacts of their weights. In this regard,

97

the critical trigger process of the risk factors should consider not only the

98

length of the routes but also their weights. Secondly, the constituent ele-

99

ments of the risk network are heterogeneous. These factors can be classified

100

into human factors, management factors, environmental factors, and other

101

types, based on their characteristics; such heterogeneity implies the different

102

underlying considerations in designing their corresponding safety-enhancing

103

strategies. The third challenge concerns the fact that the risk network may

104

contain loops. The occurrence of the risk factors in an accident case composes

105

a chain structure in a timeline. With the accumulation of cases, the risk fac-

106

tors may constitute into loops because of the variety of timelines in different

107

accidents. The initial risk factors of an accident case may be the resultant

108

event of another accident. These challenges post great some difficulties to

5

109

risk analysis and further designing safety enhancement strategies.

110

Therefore, based on network theory, this paper focuses on the weighted

111

heterogeneity of risk networks and developing a framework for devise safety-

112

enhancing strategies in construction engineering. Based on data of accidents

113

in bridge-and-tunnel hybrid construction projects in China, this paper an-

114

alyzes their risk attributes and identifies the critical risk factors in the risk

115

network. According to the identification criteria, this paper then designs a

116

series of safety-enhancing strategies and verifies their effectiveness. Based

117

on the experimental results, managerial suggestions are provided for the im-

118

provement of the overall safety of such hybrid construction projects.

119

This paper is novel in numerous aspects. Firstly, focusing on the com-

120

monality and heterogeneity of risk factors in hybrid construction projects,

121

this paper proposes a data-driven research framework for designing safety-

122

enhancing strategies in construction engineering based on a weighted risk

123

network. This framework, which relies on data from previous accident cases

124

and without affected by specific parameters, can be immediately applied to

125

other types of construction projects by switching data sources. Secondly, this

126

paper proposes a series of evaluative metrics for the weighted heterogeneous

127

risk network, such as the numbers of critical triggering routes, and the met-

128

rics to identify critical risk factors, such as the weighted betweenness. Based

129

on them, a series of safety-enhancing strategies are designed. Thirdly, in tan-

130

dem with data from actual accident cases, we analyze the risk attributes of

131

bridge-and-tunnel hybrid construction projects. We then verify the effective-

132

ness of two distinct types of safety-enhancing strategies through comparison,

133

namely, dynamic-enhancing strategy and static-enhancing strategy. Finally,

6

134

based on results of the case study, this paper suggests insightful managerial

135

suggestions for enhancing safety in bridge-and-tunnel hybrid construction

136

projects.

137

The other sections of this paper are organized as follows. Section 2 will

138

review the related literature in threefold. Section 3 introduces the research

139

framework for the safety-enhancing strategies in construction engineering,

140

including steps in constructing the risk network and metrics in identifying

141

the critical risk factors. Section 4 delineates the considerations underlying

142

the devising of safety-enhancing strategies based on identification metrics.

143

Presented in Section 5 is a case study, based on which this paper constructs

144

a risk network for bridge-and-tunnel hybrid construction projects, identifies

145

the critical risk factors in such projects, and verifies the effectiveness of the

146

strategies in the simulation experiment. Furthermore, the simulation results

147

enable us to recommend some managerial suggestions in practice. Section 6

148

offers some concluding remarks.

149

2. Literature Review

150

Two main streams of literature are closely related to this research: risk

151

identification and risk-defence strategies. In the following, due to its prelim-

152

inary importance, we will pay major attention on the risk factors causing

153

accidents. Then, we will simply review the risk-defence or safety-enhancing

154

strategies.

155

The risk factors causing accidents can be identified through case stud-

156

ies. On this regard, Dong et al.[7] reviewed the preliminary features of fa-

157

tal occupational injuries among construction workers in the United States 7

158

through case studies; they concluded that the risks faced by Hispanics in

159

the workplace were manifestly higher than non-Hispanics. Mitropoulos et

160

al.[20] explored the origins of hazards in the construction industry and an-

161

alyzed the conditional factors that triggered them. Based on case studies

162

and ergonomic considerations, Haslam et al.[8] proposed a model to examine

163

the process of how the workplace environment – as shaped by management,

164

design, and cultural factors – induced human behaviors leading to accidents.

165

Gambatese et al.[21], after analyzing 224 fatal cases in construction, found

166

an appreciable association between such accidents at construction sites and

167

the design of building-safety concepts. Chi et al.[22] developed a classifica-

168

tion scheme to encode 621 fatal falls from heights based on the influencing

169

factors, and then developed accident scenarios for recommending preventive

170

measures. Mearns et al.[23] used four samples to analyze the psychosocial

171

chain of the safety effects between safety response and perceived probability.

172

Rozenfeld et al.[24], based on their quantitative examination of 699 possible

173

loss-of-control events, developed the structured method known as Construc-

174

tion Job Safety Analysis (CJSA) for analyzing and assessing construction

175

hazards. Caffaro et al.[25] elucidated accidents involving tractor operators

176

and concluded that falls were the critical risk factor. Besides addressing risk

177

factors in accidents, some studies have attempted to identify critical suc-

178

cess factors from success projects: Aksorn and Hadikusumo[26] identified 16

179

critical success factors (CSFs) for safety programs from the literature, as

180

validated by construction-safety experts.

181

Case studies can be of great importance in identifying the common fac-

182

tors leading to accidents. However, the occurrence of accidents is generally

8

183

subsequently affected by a series of risk events. It is unsurprising that the

184

accident chain shows its great power in disclosing the propagation relation-

185

ship of risk factors. Reason[10] held that errant psychological precursors

186

(i.e. inattention, distraction, absent-mindedness, fatigue and stress) might

187

constitute the chain leading to accidents. Lindberg et al.[11], based on the

188

accident-chains model, suggested six quality standards for the post-accidents

189

experience feedback. Ouyang et al.[12] deployed the accident chain and the

190

control theory to propose a new systematic model for safety incidents, known

191

as the Systems-Theoretic Accident Models and Process (STAMP). The chain-

192

of-events model, being the most commonly-used tool for analyzing past ac-

193

cidents, has found utility in various areas, as exemplified hereafter. In their

194

elucidation of the accident chain between part-time farmers and machinery-

195

related accidents, Caffaro et al.[27] have contributed by advocating preven-

196

tive training interventions for part-time farmers who only occasionally used

197

the machinery. Rao and Marais[28] developed a method for identifying high-

198

risk accident chain based on general historical data of aviation accidents.

199

Sun et al.[29] engaged the Human Factors Analysis and Classification System

200

(HFACS) to establish a judicious and fitting index system for investigating

201

human errors; they elucidated the causal chain and the priority of the impor-

202

tance of human factors. Li and Wang[30] quantified the risks of accidents to

203

not only determine the chain of accidents but also monitor causes of accidents

204

in a timely and accurate manner, thus providing advice for system protection.

205

Kelman[31], in elucidating the process of disaster occurrence, found that both

206

disaster diplomacy and cascading disasters attempted to form focused causal

207

chains that were multitudinous, complicated, and intertwined.

9

208

The occurrence of a single accident can be described by a accident chain,

209

while the complicated interaction relationship of risk factors in a specific

210

type of projects should be characterized by a complex network. Recently,

211

the application of complex network theory to project risk management be-

212

gan to attract academic attention. For example, Zhou et al.[13] explored the

213

complexity of the network of train-construction accidents not only based on

214

analysis of individual cases, but also through the network theory. Deng et

215

al.[14] selected classical accidents as the data for analyzing accident chains,

216

and then integrated such chains into a consolidated network. Zheng et al.[32],

217

in their review of 63 social network analysis (SNA) papers published in eight

218

peer-reviewed journals from 1997 to 2015, elucidated the current state of

219

the application of SNA in construction project management (CPM). Zhou et

220

al.[15] determined time-series characteristics of near-miss in subway construc-

221

tion and the underlying mechanism based on the complex-network theory.

222

Zhou et al.[16] presented a network-modeling and analysis method of shield

223

tunneling performance based on the combination of multidimensional data-

224

mining and complex network methods. Wehbe et al.[33] appraised the safety

225

performance of construction teams and the resilience of the network to risks,

226

by studying the safety-related interaction between those teams. Xiong et

227

al.[34] identified potential opinion leaders among workers by conducting a

228

questionnaire survey of 586 scaffolding workers in Wuhan to determine their

229

views of influencing their colleagues as the basis for social network analy-

230

sis. Yuan et al.[35] studied social risks and stakeholders from the network

231

perspective, thereby providing superior risk-analysis methods for construc-

232

tion projects in high-density cities in China. Recent years have witnessed

10

233

the use of artificial intelligence-based methods in network analysis, of which

234

examples abound in the literature. Zhang et al.[36] studied the tunnel leak-

235

age in the construction of Wuhan Yangtze Metro Tunnel with the Fuzzy

236

Bayesian Network (FBN), delineating the causality between tunnel damage

237

and its influencing variables. Zhou et al.[37] proposed a risk-analysis model

238

for slurry-wall deflection based on Bayesian network to ensure safety during

239

excavation. Subsequently, Yang et al.[38] established a chain-of-events dia-

240

gram that considered synergies and multi-level domino effects, using Bayesian

241

networks to compute the probability of each chain.

242

Risk identification lays a foundation for safety enhancement. In contrast

243

to the literature on risk analysis, we noted that the number of literature on

244

risk-defence strategies is relatively few. Regardless of the analytical methods

245

– be it through the accident chain, network theory, time-series[39], process

246

hazard analysis[40], or artificial intelligence – the ultimate goal should be to

247

improve engineering-related safety through appropriate strategies. Raheem

248

and Issa[41], in their case study based in Pakistan, have verified that the im-

249

plementing safety-enhancing strategies effectively improved safety. Kumar et

250

al.[42], in studying safety measures in coal mines, have focused on reducing

251

human errors. Similarly, the introduction of new technologies can be applica-

252

ble, as exemplified by the introduction by Li et al.[17] of technologies such as

253

intrusion warning and BIM to improve safety at construction sites. Nonethe-

254

less, in practice, Shirali et al.[43] have concluded that safety enhancements

255

are subjected to cost and budgetary constraints, within the bounds of which

256

the managers must optimize safety.

257

From above, the existing literature begin to pay attention to the complex

11

258

interaction relationships among risk factors in the industry of construction

259

engineering. However, the previous literature only considers a single type

260

of engineering projects. Actually, there must simultaneously exist common

261

and differentiated characteristics in similar engineering projects. A more

262

comprehensive analysis on multiple project classes might help us develop

263

a unified framework. In addition, the literature on case studies and the

264

literature on risk network are relatively independent. Actually, as the data

265

extracted from accumulated cases become richer and richer, a data-driven

266

framework for risk analysis and response can be developed. To bridge this

267

gap, this paper will develop an integrated data-driven research framework

268

for risk identification and safety-enhancing.

269

3. Research framework

270

In this section, a data-driven framework for risk identification and safety-

271

enhancing is developed to make full use of the richly accumulated accident

272

cases in nowadays, as shown in Figure 1. In this framework, establishing the

273

risk network is the basis for identifying critical risk factors. Risk identification

274

is contingent upon the specific characteristics of risk networks. Therefore,

275

we need to design performance metrics at both network and node level. The

276

safety-enhancing strategies are developed based on our deliberately designed

277

metrics.

278

To ensure its universality in devising the safety-enhancing strategies, the

279

framework should rely solely on the initial cases of incidents to drive its data;

280

therein, there are no parameters that require managers to adjust for different

281

types of engineering. At the same time, considering the weighted heterogene12

282

ity of the risk network and real-time updates of the repository of cases, the

283

framework should be able to not only recommend safety-enhancing strategies

284

corresponding to the attributes of the network, but also be dynamic. Based

285

on the above characteristics, this paper presents the framework. Step 1 acquire accident case Step 2 code the case Step 3 input the database

Step 1 acquire the case data Step 2 risk factor identification Step 3 classify the risk factors Step 4 sequencing the risk factors Step 5 accident chains construction

Accident case database

Accident chain analysis

Case 1:

1

Case 2:

4

Case 3:

  

Case 1 Case 2 ...

Step 1 acquire the node set Step 2 acquire the edge set Step 3 risk network construction

2 5

1

3 4

2

3

5

Case 5:

1

4

6

Case 6:

2

5

6

Case 7:

3 3

5

6

Case 8:

1

:risk factor 3

5

Simulation

Managerial advices

2

6

Case 4:

1

1

Step 1 select enhancement policy Step 2 select the running mode Step 3 execute the policy

Security enhancement policy design

Risk network analysis

3

4

Step 1 select identification metric of critical risk factor Step 2 sequencing the risk factors according to the metric Step 3 security enhancement policy design according to the metric

3

2

4

2

5

  

2

6 4

2

Out-degree based In-degree based Betweeness-degree based

 

Dynamic Static

5

:risk 4 triggers risk 5 twice

:trigger

Figure 1: Framework for safety-enhancing strategies based on the weighted risk network

286

Firstly, for single-type or hybrid-type engineering, we need only to input

287

the relevant accident cases into the database, and then use the chain-of-events

288

method to convert them into a cluster with features of edges and vertices.

289

Since the same risk factors and trigger processes can occur across multiple

290

such cases, these common edges and vertices amalgamate all accident chains

291

and constitute a weighted risk network. To devise effective safety-enhancing

292

strategies, the risk factor in the greatest need of optimization has to be

293

identified from the network, and the optimization thereof effect has to be

294

evaluated. Thus, we have incorporated two aspects into the framework: the 13

295

evaluative metrics for the overall attributes of the network and the critical-

296

risk identification metrics. Finally, we propose the dynamic-enhancing and

297

static-enhancing mechanisms in the simulation of strategies to ensure that the

298

strategies can cope with the dynamic changes in the database of accidents.

299

3.1. Data processing of accident cases

300

Cases stored in the database contain the complete timeline of an acci-

301

dent from its initial cause to the final culmination. Therefore, the accident

302

chain comprises the chronological order of occurrence of the risk factors in

303

this timeline; in turn, both the factors constituting the chain and the trigger

304

processes will be integral parts of the risk network. Procedurally, the ex-

305

traction of a accident case from the database is followed by the chronological

306

arrangement of all the risk factors involved based on the archived records.

307

For delineating the responsibilities in the subsequent analyses, in examining

308

the safety-enhancing strategies for the various parties thus held responsible,

309

we divide the risk factors into five categories: human factors, management

310

factors, object factors, technical factors, and environmental factors[14]. For

311

a given accident case sample a(a ∈ A), if risks ri and rj are present, between

312

which there is a direct trigger relationship, such a relationship can be de-

313

noted as ria → rja in the accident chain; accordingly, the complete process of

314

the accident can be expressed as ria → rja → rka → rla .

315

3.2. Constructing the weighted risk network

316

Upon conversion of data of all cases into accident chains, such chains can

317

be amalgamated into a weighted risk network G = {N , E} in which the node

318

set N = {r1 , r2 , ...ri , ..., rm |1 ≤ i ≤ m} contains the risk factors in the chains, 14

319

whereas the edge set E = {hri , rj i|1 ≤ i, j ≤ m, i 6= j} contains the trigger

320

processes in the chains. If a trigger process leads from the risk factors ri to

321

rj in the chain, then hri , rj i ∈ E. Within the edge set, the elements can be

322

defined by a weighted adjacency matrix T = [tij ]m×m , where tij represents

323

the weight of the trigger relationship between risk factors ri and rj : a=|A|

tij =

X

taij

a=1

324

where   1, if risk factor r causes risk factor r in case a i j a tij =  0, otherwise

325

Based on the above definitions of node sets and edge sets in the network,

326

the weighted risk network can be constructed based on the common factors

327

in the accident chains. It is noteworthy that, in addition to the weighted

328

heterogeneity as aforementioned, loops may be found in the network. Their

329

presence owes its origins to the differences in the chronological occurrence of

330

different risk factors in the accident chains, due to which route ria → rja in

331

a given case a may be route rjb → rib in case b. This implies the necessity

332

of determining the relevant metrics that can characterize the weighted risk

333

network.

334

3.3. Evaluative metrics for risk network and critical-risk identification met-

335

rics

336

Notwithstanding the numerous evaluative metrics in the network theory,

337

we need to design and select metrics that can evaluate the attributes of

338

a weighted risk network, identify critical risk factors and offer managerial 15

339

insights. At the same time, these metrics should be able to cope with not

340

only the weighted heterogeneity of the risk network, but also the potential

341

loops in the network. Therefore, for evaluating the overall characteristics of

342

the network, we select three metrics: average degree, clustering coefficient,

343

and number of critical triggering routes.

344

Although a lot of metrics are available in measuring the significance of

345

nodes, the most direct ones are the out-degree, in-degree, and betweenness

346

of risks. For example, risk A triggers risk B, which means that risk A con-

347

stitutes the in-degree of risk B, and risk factor B constitutes the out-degree

348

of risk A. These three critical risk factors identification indicators constitute

349

the observational perspective of designing security enhancing strategies in

350

the three aspects of pre-prevention, post-remediation and process control.

351

Moreover, this study aims at offering a data-driven research framework for

352

proposing effective safety enhancing strategies, the computational simplicity

353

of these three indicators facilitates the real application. Therefore, for iden-

354

tifying critical risk factors, we select three vertex-related factors: out-degree,

355

in-degree, and betweenness.

356

For a given risk factor, the out-degree for its vertex represents the number

357

of other risk factors that can be triggered by it. In a weighted network, the

358

out-degree for risk factor ri can be denoted by j=m

Dout (ri ) =

X

tij .

(1)

j=1

359

A higher out-degree implies a greater number of risk factors that can be

360

triggered by the one in question, which thus deserves greater attention in

361

terms of implementing preemptive measures. Conversely, for a given risk 16

362

factor, the in-degree for its vertex represents the number of times it can be

363

triggered by other factors. In a weighted network, the in-degree for risk factor

364

ri can be denoted by j=m

Din (ri ) =

X

tji .

(2)

j=1

365

A higher in-degree implies a greater likelihood of the risk factor in question

366

being triggered, which thus deserves greater attention in terms of implement-

367

ing post-mortem remedial actions. When the in- and out-degrees of each risk

368

factor are obtained, the average degree of the entire network can be computed

369

as

i=m

Davg =

1 X (Dout (ri ) + Din (ri )). m i=1

(3)

370

A higher average degree of the network suggests not only a greater number

371

of interlinking relationships among the risk factors, but also greater resultant

372

complexity in their mutual triggering. Accordingly, the project corresponding

373

to such a network exhibits an elevated level of risks. Similarly, the clustering

374

coefficient reflects the degree to which risk factors tend to converge in the

375

network, as determined by the formula C=

|E| . |G|(|G| − 1)

(4)

376

A higher clustering coefficient also signifies an elevated level of overall risks

377

of the network.

378

From the perspective of triggering relationships, the betweenness is like-

379

wise an important indicator. For a given risk factor, its greater betweenness

380

implies a greater number of occasions on which critical triggering routes be-

381

tween risk factors in the network pass through this factor. Correspondingly, 17

3

Path α

3

1

Path β

Figure 2: Appraisal of the critical triggering routes

382

the risk factor in question is said to exhibit greater importance in the net-

383

work. However, in a weighted network, the critical triggering routes between

384

risk factors are determined not merely by the shortest route – apart from

385

distance, the frequency of triggers of a given route likewise deserves atten-

386

tion. For example, shown in Figure 2 are risks ri and rj , between which two

387

triggering routes are available: while route α is directly connected these two

388

factors, and the path β traverses risk rk . Notwithstanding the short distance

389

of the former, the frequency of triggers of the latter deserves greater atten-

390

tion. Based on such consideration, in the determination of critical triggering

391

routes, a balance has to be attained between the weights of the routes and

392

their lengths. Another noteworthy point is that not all triggering routes be-

393

tween the risk factors are critical triggering routes, since the attributes of

394

the accident chain determine that only a complete chain that can trigger the

395

final risk factor is worth examining. Therefore, this paper proposes a series

396

of steps to determine the critical triggering routes between risks ri and rj in

397

a weighted risk network, as follows:

398

Step 1: Identify the set containing the first K shortest loop-less routes

399

between risks ri and rj , denoted by P(P = {p1 , p2 , ..., pk , ...pK |1 ≤ k ≤ K}).

400

pk denotes the k th route between ri and rj such that pk = {Nk , Ek }, Nk 18

401

encompasses all vertices constituting the said route, and Ek encompasses all

402

triggering relationships constituting the route. Therefore, there must be a

403

set containing the weights of all triggering processes for the route, denoted

404

by Tk = {tgh |hrg , rh i ∈ Ek }.

405

Step 2: Calculate the weight indicator Wk for each route, pQ |Tk | tgh , tgh ∈ Tk . Wk = |Tk |

(5)

406

Step 3: Introduce a decreasing sequence based on the weight indicator,

407

such that the route pk with the largest indicator value Wk is the weighted

408

critical triggering route Sij between risks ri and rj .

409

Step 4: Obtain the third indicator that evaluates the overall attributes

410

of the network – the number of weighted critical triggering routes – denoted

411

by |S|, S = {Sij |1 ≤ i 6= j ≤ m}.

(6)

412

When the number of critical triggering routes in the network is deter-

413

mined, betweenness – the last identification criteria for critical risk factors –

414

can be determined through B(ri ) =

|S 0 | , |S|

(7)

415

where S 0 = {Sjk |hri , rp i ∈ Sjk ∨ hrq , ri i ∈ Sjk , i 6= p, i 6= q, 1 ≤ j, k, p, q ≤ m}.

416

The identification of critical risk factors through the out-degree, in-degree,

417

and betweenness forms the basis of the devising of the safety-enhancing

418

strategies, whose effectiveness will be appraised by the three evaluative met-

419

rics for the overall attributes of the network: average degree, clustering co-

420

efficient, and number of critical triggering routes. 19

421

4. Safety-enhancing strategy

422

Upon identifying the critical risk factors, managers should optimize safety

423

to curb the risk factors to avoid further accidents. The availability of three

424

ways to identify such critical factors (as aforementioned) means that, when

425

managers concern themselves with different risk factors in optimizing safety,

426

the priorities of the corresponding safety-enhancing strategies differ accord-

427

ingly. When the managers are interested in risk factors that tend to trigger

428

other risk factors, those with considerable out-degrees should be underlined.

429

When they are interested in risk factors with the greatest probability of oc-

430

currence, those with considerable in-degrees should be underlined. Lastly,

431

when they focus on the in-process risk factors that are most likely to occur

432

in all types of accidents, those with considerable betweenness should be un-

433

derlined. Upon discerning critical risk factors from the risk network, safety

434

should be optimized in a targeted manner. When such optimization is imple-

435

mented, the risk factor in question is considered to have been removed from

436

the network, as are the edges associated with it. With such removal, it is

437

noteworthy that the overall attributes of the risk network will change, leading

438

in turn to changes in not only the metrics of the remaining vertices, but also

439

the critical risk factors under the new resultant network. It follows that the

440

safety-enhancing strategies exist in two modes which differ in implementa-

441

tion: one optimizes the safety of critical risk factors identified from the initial

442

network, whereas the other operates in the midst of safety optimization and

443

dynamically determines the next risk factor pending optimization.

20

444

4.1. Static implementation of safety-enhancing strategies

445

In the static implementation of safety-enhancing strategies, critical risk

446

factors are identified based on identification metrics after the establishment of

447

the initial network. This is followed by the managers’ sequential optimization

448

of the safety for these factors. The steps are detailed as follows:

449

450

451

452

453

454

Step 1: Select metrics for identifying critical risk factors based on the out-degree, in-degree, and betweenness. Step 2: Arrange vertices in the network in an descending order based on values of the said metrics. Step 3: Optimize the safety of the most critical risk factor and remove its corresponding vertices and edges from the risk network.

455

Step 4: Calculate the overall risk level of the risk network.

456

Step 5: If the optimal target is reached, proceed to Step 6; otherwise,

457

458

459

revert to Step 3. Step 6: End the safety-enhancing operation. 4.2. Dynamic implementation of safety-enhancing strategies

460

In the dynamic implementation of safety-enhancing strategies, the critical

461

risk factors are first identified by managers based on identification metrics

462

during the optimization of the risk network. They are then improved in the

463

next round of optimization measures. The steps are detailed as follows:

464

465

466

467

Step 1: Select metrics for identifying critical risk factors based on the out-degree, in-degree, and betweenness. Step 2: Arrange vertices in the network in an descending order based on values of the said metrics.

21

468

469

Step 3: Optimize the safety of the most critical risk factor and remove its corresponding vertices and edges from the risk network.

470

Step 4: Calculate the overall risk level of the risk network.

471

Step 5: If the optimal target is reached, proceed to Step 6; otherwise,

472

revert to Step 2.

473

Step 6: End the safety-enhancing operation.

474

The static and dynamic safety-enhancing strategies can be represented

475

by a consolidated flowchart (Figure 3). Start Evaluate the initial risk network Select the identification metric of critical risk factors Sequencing all the risk factors according to the identification metric Design security enhancement policy for the most critical risk factor Eliminate this risk factor from the risk network Evaluate the current risk network Meet the enhancement goal? Y

Y

Finish

N Static enhancement? N

Figure 3: Implementation of safety-enhancing strategies

22

476

Therefore, after considering the metrics for identifying critical risk fac-

477

tors and the classification of implementing the safety enhancement, we pro-

478

pose six kinds of safety-enhancing: Out-degree-related Static Enhancement

479

(OSE), Out-degree-related Dynamic Enhancement (ODE), In-degree-related

480

Static Enhancement (ISE), In-degree-related Dynamic Enhancement (IDE),

481

Betweenness-related Static Enhancement (BSE) and Betweenness-related Dy-

482

namic Enhancement (BDE).

483

5. Data Analysis and Discussions

484

5.1. Data sources

485

With the assistance of the Engineering Department and the Safety and

486

Quality Inspection Department of our collaborative company, we have estab-

487

lished a database of accident cases involving construction of bridges and of

488

tunnels in China. A total of 67 bridge-related accidents and 64 tunnel-related

489

accidents are collected. Of the cases therein, the most serious occurred at

490

14:40 on the 22nd December 2005, when a gas explosion occurred on the

491

highway tunnel project, resulting in 44 deaths and 11 injuries. After the

492

processing such chains, we obtain 146 risk vertices, as outlined in Table 1

493

and Table 2 (important risk factors in this paper are detailed in the ap-

494

pendix). The vertices can be further categorized based of their risk type into

495

human factors(36), management factors(18), object factors(55), environmen-

496

tal factors(32), and technical factors(5). Since the cases involved bridges and

497

tunnels, we underline the type of accident corresponding to the risk factors

498

when disintegrating the accident chain into risk factors.

23

Table 1: Examples of accident-related data

Case id Case name

Case type

Accident chain

1

...

Bridge

ri1 → rj1 → rk1 → rl1

...

...

...

...

131

...

Tunnel

rk131 → rp131 → rq131

Table 2: Examples of risk factors

Risk id

Risk name

Risk type

Risk class

R1

...

Human factors

Common

R2

...

Environmental factors

Tunnel

R3

...

Technical factors

Common

R4

...

Object factor

Bridge

R5

...

Management factors

Common

...

...

...

...

24

499

500

Then, based on the procedure aforementioned, we obtain the following network (Figure 4):

:common risk factors :bridge risk factors :tunnel risk factors :human factors :management factors :object factors :environmental factors :technical factors

Figure 4: Risk network in bridge-and-tunnel hybrid construction engineering

501

To distinguish between the different types of risk factors, we employed

502

different polygons. Additionally, to distinguish between risk factors common

503

to both the two types of projects and project-specific risk factors, we em25

504

ployed different colors. The size of the vertices is dictated by the sum of the

505

out- and in-degrees of each risk factor.

506

5.2. Attributes of the network

507

The resultant risk network demonstrates the attributes of a small-world

508

network: its average weighted degree is 5.589; its clustering coefficient is

509

0.015; it comprises 8,208 routes; and its average route length of 3.659. Con-

510

cerning the risk factors, ”Violation operation” emerges as not only the most

511

critical factor under all three identification metrics, but also as a factor com-

512

mon to both bridge- and tunnel-related accidents (Table 3). Overall, common

513

factors account for the majority of the top 20 critical factors; this ensures

514

the applicability of the safety-enhancing strategies, of which the effectiveness

515

is ascertained in the subsequent simulation.

516

Based on the out-degrees and betweenness, among the five types of fac-

517

tors, human factors and management factors represent not only the main

518

causes underlying the accidents, but also the necessary factors for the occur-

519

rence of accidents. This suggests that, in terms of protection, optimizing the

520

management system can prevent accidents. On the other hand, based on the

521

in-degrees, human factors (e.g. personal injuries) and object-related factors

522

(e.g. property damage) are the most likely results when accidents occur. In

523

other words, in the event of an accident, the best response is to address the

524

personal injuries and property damage in a timely manner. As shown in

525

Table 4, 5, 6, 7, 8, accidents in bridge engineering are more likely caused

526

by human factors, management factors, and object factors, whereas those

527

in tunnel engineering are more likely caused by environmental factors,which

528

are common to many other types of projects [25, 27, 29]. This relatively ac26

Table 3: Top 20 critical risk factors out-degree

in-degree

betweenness

No.

Risk id

Value

Risk id

Value

Risk id

Value

1

R112

47

R112

30

R112

1069

2

R1

31

R104

27

R88

535

3

R49

24

R142

24

R58

502

4

R124

16

R58

12

R23

304

5

R88

14

R88

11

R5

286

6

R51

14

R5

11

R124

176

7

R4

12

R71

11

R20

169

8

R58

12

R47

10

R51

158

9

R5

12

R124

9

R138

156

10

R21

10

R1

8

R28

147

11

R114

9

R87

8

R142

131

12

R39

9

R45

7

R90

128

13

R20

8

R20

6

R71

116

14

R113

8

R113

6

R113

114

15

R83

5

R21

5

R21

110

16

R123

5

R23

5

R104

101

17

R23

5

R141

5

R1

82

18

R141

5

R80

5

R118

80

19

R118

4

R12

5

R45

78

20

R80

4

R74

5

R69

75

27

Table 4: Top 10 critical human risk factors out-degree

in-degree

betweenness

No.

Risk id

Value

Risk id

Value

Risk id

Value

1

R112

47

R112

30

R112

1069

2

R1

31

R142

24

R58

502

3

R58

12

R58

12

R142

131

4

R113

8

R71

11

R71

116

5

R123

5

R1

8

R113

114

6

R142

4

R113

6

R1

82

7

R10

4

R10

4

R10

45

8

R93

3

R123

3

R6

42

9

R117

3

R93

3

R123

42

10

R2

2

R117

3

R117

42

Table 5: Top 10 critical management risk factors out-degree No.

Risk id

Value

1

R49

2

R124

3

R88

4

R114

5

R39

6

R118

4

7

R12

3

8

R99

3

9

R100

3

10

R116

2

in-degree

betweenness

Risk id

Value

Risk id

Value

24

R88

11

R88

535

16

R124

9

R124

176

14

R12

5

R118

80

9

R114

4

R12

67

9

R118

4

R116

67

R49

3

R100

42

R99

3

R121

41

R100

3

R122

35

R116

2

R99

26

R122

2

R49

25

529

centuated causal role of the environmental factors in the tunnel engineering

530

owes its origins to the lack of control over geological aspects due to technical

531

constraints, which leads to greater likelihoods of unexpected situations and

532

challenging construction.

28

Table 6: Top 10 critical object risk factors out-degree

in-degree

betweenness

No.

Risk id

Value

Risk id

Value

Risk id

Value

1

R5

12

R104

27

R23

304

2

R23

5

R5

11

R5

286

3

R141

5

R47

10

R138

156

4

R35

4

R87

8

R28

147

5

R90

4

R23

5

R90

128

6

R74

3

R141

5

R104

101

7

R65

3

R74

5

R69

75

8

R138

3

R143

5

R15

69

9

R104

2

R67

4

R35

60

10

R67

2

R69

4

R77

48

Table 7: Top 10 critical environmental risk factors out-degree

in-degree

betweenness

No.

Risk id

Value

Risk id

Value

Risk id

Value

1

R51

14

R45

7

R51

158

2

R21

10

R21

5

R21

110

3

R83

5

R80

5

R45

78

4

R80

4

R132

5

R132

67

5

R96

4

R51

4

R96

58

6

R45

3

R96

4

R97

45

7

R91

3

R83

3

R83

42

8

R97

3

R91

3

R30

41

9

R132

2

R97

3

R18

41

10

R19

2

R41

3

R91

32

29

Table 8: Top 10 critical technical risk factors out-degree

533

in-degree

betweenness

No.

Risk id

Value

Risk id

Value

Risk id

Value

1

R4

12

R20

6

R20

169

2

R20

8

R4

3

R4

71

3

R36

1

R36

1

R64

15

4

R64

1

R64

1

R36

3

5

R135

1

R135

1

R135

0

5.3. Effects of safety-enhancing strategies

534

In the simulation, we remove the top 100 critical risk factors one by one

535

in the network based on different strategies, and obtain findings exhibiting

536

the dynamic changes of the metrics (Figure 5). It can be inspected that,

537

for any given strategy under any evaluative indicator, the risk level of the

538

whole network can be significantly reduced at the outset; however, with

539

increasing numbers of optimized risk factors, diminishing marginal benefits

540

gradually emerges, although the said risk level continues to decrease. Under

541

limited resources, it is impossible for engineering managers to remove all risk

542

factors. Nonetheless, if critical risk factors can be found and their safety

543

optimized, the risk of the projects can be reduced to acceptable levels. This

544

offers theoretical support for the design of safety-enhancing strategies that

545

are balanced in terms of both cost and effects.

30

Average weighted degree

6 5 4

OSE ODE ISE IDE BSE BDE

3 2 1 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100

0 Risk factors removed subsequently

7000 6000 5000

OSE ODE ISE IDE BSE BDE

4000 3000 2000 1000 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100

0 Risk factors removed subsequently

(b) Changes in the No. of critical triggering routes 0.018 0.016 0.014 0.012 0.01 0.008 0.006 0.004 0.002 0

OSE ODE ISE IDE BSE BDE 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 100

Clustering coefficient

31

No. of critical triggering routes

(a) Changes in the average weighted degree

Risk factors removed subsequently

(c) Changes in the clustering coefficient Figure 5: Dynamic changes of the metrics

546

Based on the effects of the safety-enhancing strategies under different risk-

547

evaluation metrics, it is found that dynamic safety enhancement outperforms

548

static enhancement, because optimizing critical risk factors is a dynamic and

549

changing process: upon optimizing the safety of the current most critical risk

550

factor in the network, it is necessary to determine the next most critical one.

551

With the simulation, different critical risk factors are identified by different

552

strategies; hence, variations in the effects of the strategies are observed. In

553

terms of identifying critical risk factors, no one indicator is always optimal at

554

all times: depending on the in-degree, out-degree, and betweenness, different

555

dynamic protection strategies are observed to the optimal ones in different

556

stages in the simulation. At the outset, strategies based on in- and out-

557

degrees are generally superior to those based on betweenness. This implies

558

that, when budgetary constraints are stringent, complex identification crite-

559

ria are unnecessary in enhancing engineering safety. Examining the in- and

560

out-degrees enables the elucidation of risk factors prone to triggering other

561

factors and of risk factors that can easily be triggered by other factors; this

562

in turn allows preparation in terms of preemptive measures post-mortem re-

563

medial actions, which will be more effective than process controls to mitigate

564

the risk levels. However, dynamic protection strategies based on betweenness

565

enables the rapid global optimization of the risk network. This implies that,

566

when budgetary constraints are more relaxed, process controls favorably im-

567

prove the safety level.

568

5.4. Managerial Recommendations

569

570

Based on the nature of the risk factors, managerial recommendations are offered: 32

571

Firstly, in general, human-related and managerial factors are critical in

572

most accident cases, highlighting that, unsafe human behaviors are more

573

likely to cause accidents. Of these risk factors, ”Violation operation” is the

574

most critical. This underlines that strengthening the supervision and train-

575

ing of field operators can significantly and effectively improve safety. Based

576

on the in-degree metrics, ”falls from heights” are multi-occurrence accidents,

577

especially in bridge engineering, suggesting that managers should adopt more

578

stringent oversight of personnel working at heights. In addition to strength-

579

ening supervision and training, managers should pay attention to instituting

580

protective measures and standardized command processes. Object-related

581

factors play a more important role in accidents in bridge engineering than in

582

tunnel engineering, necessitating bridge-engineering managers to implement

583

on-site corrective measures for unsafe status due to objects.

584

Secondly, among the environmental factors, rainfall and geological defects

585

are the chief conditions causing most accidents. If such factors are encoun-

586

tered in the construction, managers and operators need to adopt preemptive

587

countermeasures. Likewise, fires are a probable environmental risk, for which

588

managers also need to devise emergency plans. More specifically, many en-

589

vironmental factors pertain exclusively to tunnel engineering, especially risk

590

factors related to geological hazards, thereby warranting that more atten-

591

tion should be paid to environmental changes in tunnel construction than in

592

bridge engineering. Lastly, although there are few technical factors, designs

593

that are not scientifically rigorous represent an important risk factor. As

594

the design phase precedes construction and as uncertainties in the construc-

595

tion can hardly be predicted, mismatches may arise in the design phase; this

33

596

thus requires more demonstration of the project during the design phase, e.g.

597

through the use of BIM technology to simulate the project implementation

598

to minimize late-stage risks.

599

6. Conclusions

600

Learning from past accidents can improve engineering safety with little

601

cost. Copious literature on the analysis of accident cases has focused on

602

the use of the network theory to determine critical risk factors. Lots of

603

literature on the analysis of accident cases has begun to investigate the risk

604

characteristics of different accidents as well [15, 16, 32, 33]. However, most

605

of it has assumed that the risk network is non-weighted and overlooked the

606

design of safety-enhancing strategies according to the critical factors. In

607

addition, the constituent elements of the risk network include not only the

608

intermediate process of the accident but also its final culmination, and these

609

factors can be ascribed to different parties that are accountable; this brings

610

some difficulties to the risk network analysis and safety enhancement.

611

Through the network theory and considering the weighted nature and

612

heterogeneity of risk networks, this paper constructs and proposes a data-

613

driven research framework for safety-enhancing strategies. The framework

614

can be applied to case analyses in multifarious construction projects to im-

615

prove the overall safety. To this end, this paper selects a series of metrics

616

both for overall evaluation and for identification of critical risk factors that

617

can characterize the attributes of the risk network; based on these metrics,

618

safety-enhancing strategies are thus devised. Then, based on accident cases in

619

bridge-and-tunnel hybrid construction projects in China, the risk attributes 34

620

in such hybrid engineering are analyzed, and critical risk factors in the risk

621

network identified. Similar to most of the single-type constructions, the hu-

622

man and management factors are the most critical risk factors for hybrid

623

construction.

624

In the subsequent simulation experiment, the effectiveness of the safety-

625

enhancing strategies proposed herein is verified through dynamic-enhancing

626

and static-enhancing methods. The experimental results demonstrate that

627

the dynamic-enhancing strategy exhibits favorable feasibility in both effect

628

and cost, especially when given limited resources: significant improvement

629

has resulted when primary risk factors are optimized in terms of safety

630

through adherence to the rule therein. Finally, this paper offers managerial

631

recommendations for improving safety in bridge-and-tunnel hybrid construc-

632

tion projects. Additionally, the proposed analytical framework can also be

633

applied in other single or hybrid construction projects by changing the data

634

source. With the accumulation of data from different types of projects, the

635

results will achieve have high applicability and reliability.

636

In future studies, the applicability of the research framework to other

637

types of construction works is worth further examination. Additionally, two

638

other research questions warranting further exploration include whether risk

639

factors in different types of engineering belong to only the five categories

640

discussed in this paper, and whether the safety-enhancing strategies are ap-

641

plicable to the structure of the risk network in different types of projects. In

642

addition, human-related factors have been observed to be one of the most

643

critical factors in accidents in the construction industry. This paper has not

644

elucidated the interactions between such human-related factors and other

35

645

types of factors, which represent the most challenging issue in future re-

646

search.

647

Acknowledgments

648

This work was supported by the National Natural Science Foundation of

649

China [grant numbers 71701213, 71401181, 71821001]; and the MOE (Min-

650

istry of Education in China) Project of Humanities and Social Sciences [grant

651

numbers 15YJC630008, 14YJC630136].

652

Conflict of Interest

653

The authors declare that they have no conflict of interest.

654

References

655

References

656

[1] H. Zhou, H. Wang, W. Zeng, Smart construction site in mega con-

657

struction projects: A case study on island tunneling project of hong

658

kong-zhuhai-macao bridge, Frontiers of Engineering Management 5 (1)

659

(2018) 78–87. doi:10.15302/J-FEM-2018075.

660

[2] W. Zeng, J. Zhang, H. Wang, H. Zhou, Supplier development and its

661

incentives in infrastructure mega-projects: A case study on hong kong-

662

zhuhai-macao bridge project, Frontiers of Engineering Management 5 (1)

663

(2018) 88–97. doi:10.15302/J-FEM-2018077.

664

[3] F. Tuchsen, H. Hannerz, S. Spangenberg, Mortality and morbidity

665

among bridge and tunnel construction workers who worked long hours 36

666

and long days constructing the great belt fixed link, Scandinavian Jour-

667

nal of Work Environment & Health 31 (2) (2005) 22–26.

668

[4] N. K. Kim, N. F. A. Rahim, M. Iranmanesh, B. Foroughi, The role of the

669

safety climate in the successful implementation of safety management

670

systems, Safety Science 118 (2019) 48–56. doi:10.1016/j.ssci.2019.

671

05.008.

672

[5] S. You, J.-H. Kim, S. Lee, V. Kamat, J. L. P. Robert, Enhancing per-

673

ceived safety in humanrobot collaborative construction using immersive

674

virtual environments, Automation in Construction 96 (2018) 161–170.

675

doi:10.1016/j.autcon.2018.09.008.

676

[6] A. A. F. Fini, A. Akbarnezhad, T. H. Rashidi, S. T. Waller, Enhancing

677

the safety of construction crew by accounting for brain resource require-

678

ments of activities in job assignment, Automation in Construction 88

679

(2018) 31–43. doi:10.1016/j.autcon.2017.12.013.

680

[7] X. Dong, J. W. Platner, Occupational fatalities of hispanic construction

681

workers from 1992 to 2000, American Journal of Industrial Medicine

682

45 (1) (2004) 45–54. doi:10.1002/ajim.10322.

683

[8] R. A. Haslam, S. A. Hide, A. G. Gibb, D. E. Gyi, T. Pavitt, S. Atkinson,

684

A. R. Duff, Contributing factors in construction accidents, Applied Er-

685

gonomics 36 (4) (2005) 401–15. doi:10.1016/j.apergo.2004.12.002.

686

[9] Z. Zhou, Y. M. Goh, Q. Li, Overview and analysis of safety management

687

studies in the construction industry, Safety Science 72 (2015) 337–350.

688

doi:10.1016/j.ssci.2014.10.006. 37

689

690

[10] J. Reason, Understanding adverse events: human factors, BMJ Quality & Safety 4 (2) (1995) 80–89.

691

[11] A.-K. Lindberg, S. O. Hansson, C. Rollenhagen, Learning from accidents

692

what more do we need to know?, Safety Science 48 (6) (2010) 714–721.

693

doi:10.1016/j.ssci.2010.02.004.

694

[12] M. Ouyang, L. Hong, M.-H. Yu, Q. Fei, Stamp-based analysis on the

695

railway accident and accident spreading: Taking the chinajiaoji railway

696

accident for example, Safety Science 48 (5) (2010) 544–555. doi:10.

697

1016/j.ssci.2010.01.002.

698

[13] Z. Zhou, J. Irizarry, Q. Li, Using network theory to explore the com-

699

plexity of subway construction accident network (scan) for promoting

700

safety management, Safety Science 64 (2014) 127–136. doi:10.1016/

701

j.ssci.2013.11.029.

702

[14] Y. Deng, L. Song, Z. Zhou, P. Liu, An approach for understanding and

703

promoting coal mine safety by exploring coal mine risk network, Com-

704

plexity (2017) Article–Number = 7628569doi:10.1155/2017/7628569.

705

[15] C. Zhou, L. Ding, M. J. Skibniewski, H. Luo, S. Jiang, Characterizing

706

time series of near-miss accidents in metro construction via complex

707

network theory, Safety Science 98 (2017) 145–158. doi:10.1016/j.

708

ssci.2017.06.012.

709

[16] C. Zhou, L. Y. Ding, M. J. Skibniewski, H. Luo, H. T. Zhang, Data based

710

complex network modeling and analysis of shield tunneling performance

38

711

in metro construction, Advanced Engineering Informatics 38 (2018) 168–

712

186. doi:10.1016/j.aei.2018.06.011.

713

[17] H. Li, S. Dong, S. Martin, Q. He, Q. Yin, Intrusion warning and as-

714

sessment method for site safety enhancement, Safety Science 84 (2016)

715

97–107. doi:10.1016/j.ssci.2015.12.004.

716

[18] M. Abbas, B. E. Mneymneh, H. Khoury, Assessing on-site construction

717

personnel hazard perception in a middle eastern developing country:

718

An interactive graphical approach, Safety Science 103 (2018) 183–196.

719

doi:10.1016/j.ssci.2017.10.026.

720

[19] G. K. Koulinas, P. K. Marhavilas, O. E. Demesouka, A. P. Vavatsikos,

721

D. E. Koulouriotis, Risk analysis and assessment in the worksites using

722

the fuzzy-analytical hierarchy process and a quantitative technique - a

723

case study for the greek construction sector, Safety Science 112 (2019)

724

96–104. doi:10.1016/j.ssci.2018.10.017.

725

[20] P. Mitropoulos, T. S. Abdelhamid, G. A. Howell, Systems model of con-

726

struction accident causation, Journal of Construction Engineering and

727

Management 131 (7) (2005) 816–825. doi:10.1061//ASCE/0733-9364/

728

2005/131:7/816.

729

[21] J. A. Gambatese, M. Behm, S. Rajendran, Designs role in construction

730

accident causality and prevention: Perspectives from an expert panel,

731

Safety Science 46 (4) (2008) 675–691. doi:10.1016/j.ssci.2007.06.

732

010.

39

733

[22] C. F. Chi, T. C. Chang, H. I. Ting, Accident patterns and prevention

734

measures for fatal occupational falls in the construction industry, Ap-

735

plied Ergonomics 36 (4) (2005) 391–400. doi:10.1016/j.apergo.2004.

736

09.011.

737

[23] J. L. Meli´a, K. Mearns, S. A. Silva, M. L. Lima, Safety climate responses

738

and the perceived risk of accidents in the construction industry, Safety

739

Science 46 (6) (2008) 949–958. doi:10.1016/j.ssci.2007.11.004.

740

[24] O. Rozenfeld, R. Sacks, Y. Rosenfeld, H. Baum, Construction job safety

741

analysis, Safety Science 48 (4) (2010) 491–498. doi:10.1016/j.ssci.

742

2009.12.017.

743

[25] F. Caffaro, M. Roccato, M. Micheletti Cremasco, E. Cavallo, Falls from

744

agricultural machinery: Risk factors related to work experience, worked

745

hours, and operators’ behavior, Human Factors 60 (1) (2018) 20–30.

746

doi:10.1177/0018720817738591.

747

[26] T. Aksorn, B. H. W. Hadikusumo, Critical success factors influencing

748

safety program performance in thai construction projects, Safety Science

749

46 (4) (2008) 709–727. doi:10.1016/j.ssci.2007.06.006.

750

[27] F. Caffaro, M. Roccato, M. Micheletti Cremasco, E. Cavallo, Part-

751

time farmers and accidents with agricultural machinery: a moderated

752

mediated model on the role played by frequency of use and unsafe

753

beliefs, Journal of Occupational Health 60 (1) (2018) 80–84.

754

10.1539/joh.17-0061-BR.

40

doi:

755

[28] A. H. Rao, K. Marais, High risk occurrence chains in helicopter ac-

756

cidents, Reliability Engineering and System Safety 170 (2018) 83–98.

757

doi:10.1016/j.ress.2017.10.014.

758

[29] Z.-Y. Sun, J.-L. Zhou, L.-F. Gan, Safety assessment in oil drilling work

759

system based on empirical study and analytic network process, Safety

760

Science 105 (2018) 86–97. doi:10.1016/j.ssci.2018.02.004.

761

[30] K. Li, S. Wang, A network accident causation model for monitoring rail-

762

way safety, Safety Science 109 (2018) 398–402. doi:10.1016/j.ssci.

763

2018.06.008.

764

[31] I. Kelman, Connecting theories of cascading disasters and disaster diplo-

765

macy, International Journal of Disaster Risk Reduction 30 (2018) 172–

766

179. doi:10.1016/j.ijdrr.2018.01.024.

767

[32] X. Zheng, Y. Le, A. P. C. Chan, Y. Hu, Y. Li, Review of the application

768

of social network analysis (sna) in construction project management

769

research, International Journal of Project Management 34 (7) (2016)

770

1214–1225. doi:10.1016/j.ijproman.2016.06.005.

771

[33] F. Wehbe, M. A. Hattab, F. Hamzeh, Exploring associations between

772

resilience and construction safety performance in safety networks, Safety

773

Science 82 (2016) 338–351. doi:10.1016/j.ssci.2015.10.006.

774

[34] C. Xiong, K. Liang, H. Luo, I. W. H. Fung, Identification of safety-

775

related opinion leaders among construction workers: Evidence from scaf-

776

folders of metro construction in wuhan, china, International Journal

41

777

of Environmental Research and Public Health 15 (10). doi:10.3390/

778

ijerph15102176.

779

[35] J. Yuan, K. Chen, W. Li, C. Ji, Z. Wang, M. J. Skibniewski, Social

780

network analysis for social risks of construction projects in high-density

781

urban areas in china, Journal of Cleaner Production 198 (2018) 940–961.

782

doi:10.1016/j.jclepro.2018.07.109.

783

[36] L. Zhang, X. Wu, M. J. Skibniewski, J. Zhong, Y. Lu, Bayesian-network-

784

based safety risk analysis in construction projects, Reliability Engineer-

785

ing and System Safety 131 (2014) 29–39. doi:10.1016/j.ress.2014.

786

06.006.

787

[37] Y. Zhou, C. Li, C. Zhou, H. Luo, Using bayesian network for safety risk

788

analysis of diaphragm wall deflection based on field data, Reliability

789

Engineering and System Safety 180 (2018) 152–167. doi:10.1016/j.

790

ress.2018.07.014.

791

[38] Y. Yang, G. Chen, P. Chen, The probability prediction method of

792

domino effect triggered by lightning in chemical tank farm, Process

793

Safety and Environmental Protection 116 (2018) 106–114. doi:10.

794

1016/j.psep.2018.01.019.

795

[39] H. Cao, Y. M. Goh, Analyzing construction safety through time

796

series methods, Frontiers of Engineering Managementdoi:10.1007/

797

s42524-019-0015-6.

798

[40] H. Wu, I. Penarrubia, L. Cui, J. Zhao, Process safety management con-

42

799

siderations for biofuel production, Frontiers of Engineering Management

800

4 (3, SI) (2017) 357–367. doi:10.15302/J-FEM-2017025.

801

[41] A. A. Raheem, R. R. A. Issa, Safety implementation framework for

802

pakistani construction industry, Safety Science 82 (2016) 301–314. doi:

803

10.1016/j.ssci.2015.09.019.

804

[42] P. Kumar, S. Gupta, M. Agarwal, U. Singh, Categorization and stan-

805

dardization of accidental risk-criticality levels of human error to develop

806

risk and safety management policy, Safety Science 85 (2016) 88–98.

807

doi:10.1016/j.ssci.2016.01.007.

808

[43] G. A. Shirali, V. Salehi, R. Savari, K. Ahmadiangali, Investigating the

809

effectiveness of safety costs on productivity and quality enhancement by

810

means of a quantitative approach, Safety Science 103 (2018) 316–322.

811

doi:10.1016/j.ssci.2017.12.017.

812

Appendix A. Information of risk factors concerned in this paper Risk id

Risk name

Risk type

Risk class

R1

Weak security awareness

Human factors

Common

R2

Blasting

Human factors

Tunnel

R4

Unscientific design

Technical factors

Common

R5

Instability pillar

Object factor

Common

R6

Stepping up the empty tilt

Human factors

Bridge

R10

Overload

Human factors

Common

R12

Improper disposal

Management factors

Common

R15

Force of single wire rope

Object factor

Bridge

R18

Insufficient bearing capacity of foundation

Environmental factors

Bridge

43

R19

Groundwater accumulation

Environmental factors

Tunnel

R20

Insufficient geological exploration

Technical factors

Common

R21

Geological defects

Environmental factors

Common

R23

Cable accidents

Object factor

Common

R28

Hoist capsized

Object factor

Bridge

R30

Gas

Environmental factors

Tunnel

R35

Wire rope fault

Object factor

Common

R36

Wire rope contact high voltage line

Technical factors

Tunnel

R39

Management negligence

Management factors

Common

R41

Landslide

Environmental factors

Tunnel

R45

Fire

Environmental factors

Tunnel

R47

Extrusion

Object factor

Common

R49

Imperfect regulation

Management factors

Common

R51

Rainfall

Environmental factors

Common

R58

Access to hazardous areas

Human factors

Bridge

R64

Unreasonable rod structure

Technical factors

Bridge

R65

Loosening of the connection

Object factor

Common

R67

Sliding slope

Object factor

Common

R69

Leakage

Object factor

Tunnel

R71

Drowning

Human factors

Common

R74

Template overturning

Object factor

Bridge

R77

Collision

Object factor

Common

R80

Falling rocks

Environmental factors

Tunnel

R83

Strong winds

Environmental factors

Common

R87

Overturn

Object factor

Bridge

R88

Inadequate protection

Management factors

Common

R90

Brake failure

Object factor

Common

R91

Unstable massif

Environmental factors

Tunnel

R93

Dismantling components

Human factors

Bridge

R96

Water leakage

Environmental factors

Tunnel

44

R97

Hydraulic

Environmental factors

Common

R99

Chaos in the construction process

Management factors

Common

R100

Inspection negligence

Management factors

Bridge

R104

Collapse

Object factor

Common

R112

Violation operation

Human factors

Common

R113

Welding violation

Human factors

Common

R114

Violation of command

Management factors

Common

R116

Failure to take protective measures

Management factors

Bridge

R117

Not wearing a life jacket

Human factors

Bridge

R118

No warning sign

Management factors

Total

R121

Safety switch not set

Management factors

Bridge

R122

No shutdown downtime

Management factors

Bridge

R123

Not wearing a seatbelt

Human factors

Bridge

R124

Inadequate training

Management factors

Common

R132

Dynamite explosion

Environmental factors

Tunnel

R135

The collapse of the support structure

Technical factors

Tunnel

R138

Unstable outrigger

Object factor

Bridge

R141

Unstable barycenter

Object factor

Bridge

R142

Falls from heights

Human factors

Bridge

R143

Falling objects

Object factor

Bridge

813

45

814

815

Conflict of Interest The authors declare that they have no conflict of interest.

46