title: use of the delphi method to prioritize events impacting operations in … · 2017. 10....

22
The Delphi Method 1 Use of the Delphi Method to Prioritize Events Impacting Operations in the Maritime Domain Victor Zaloom, Ph.D. & Vinit Subhedar Lamar University, Texas, USA

Upload: others

Post on 21-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

1

Use of the Delphi Method to Prioritize Events Impacting Operations in the Maritime Domain

Victor Zaloom, Ph.D. & Vinit Subhedar

Lamar University, Texas, USA

Page 2: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

2

ABSTRACT

The objective of this research is to demonstrate that the Delphi technique can be used to

gather expert opinion to identify and prioritize terrorist events, natural disasters, and failures

(equipment and people) in the maritime domain. A Delphi study was conducted to identify

events that could disrupt shipping and to rank their likelihood of occurrence on the Sabine-

Neches Waterway, a strategic maritime artery located in south east Texas. Participants in the

study included experts from five sectors of the maritime domain: public ports, United States

Coast Guard (USCG), shipping industry, private ports, and law enforcement. The study team that

managed the process included an engineering professor who is engaged in studying maritime

risks and a master of engineering student. Results indicate that a panel of experts were able to

achieve a high level of agreement regarding the types of events causing risks to shipping and

their relative likelihood

Key Words: Delphi Method, Maritime Risk

Page 3: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

3

INTRODUCTION

Terrorism and natural disasters have had a significant impact on our national priorities.

This fact is especially true since terrorist attacks on the World Trade Center, and the Pentagon,

and hurricanes Katrina [2005], Rita [2005], Wilma [2005], Gustav [2008], and Ike [2008]. Huge

investments have been made, and more will be made to reduce risks to our population,

infrastructure, and way of life. Risk must be properly assessed in order to get the best returns on

these investments.

In the next section, Maritime Risk Factors and Security Risk, the importance of

identifying and prioritizing events causing risks is explained. The section that follows, Delphi

Method, discusses the application of the Delphi technique to identify and prioritize events

causing risks in the maritime domain. Then implementation of the Delphi research study is

described as a ten step process including selection of a panel of experts. Survey results are

analyzed using the standard deviations to assess the level of convergence of the panel of experts.

Conclusions from the study are presented in the final section of the report.

Page 4: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

4

MARITIME RISK FACTORS AND SECURITY RISK

World trade is important to economic growth of the U.S. and global economies. The

maritime domain is vital for world trade and commerce. Its efficient supply chain including

super tankers and containerized shipping and seamless inter-modal connections are key driving

factors accelerating the flow of world commerce. Inter-modal connections refer to places in the

transportation system where the transportation mode changes such as ship to rail car or rail car to

truck. Consumer, commercial, and military goods are moved efficiently with great ease with the

help of advanced and efficient transportation modes. To secure the maritime domain is

challenging because of its inter-modal connections, long distances, and global nature. The

maritime domain’s safety and efficiency are a global responsibility further shared by

international, national, and local maritime organizations (International Maritime

Organization (IMO) 2006, Department of Homeland Security (DHS) 2004).

The maritime domain’s logistic chain for most international commerce begins at the

manufacturer and/or shipper in the country of origin and ends with the buyer in the destination

country. It includes customs at both the origin and destination countries, port operations in both

countries, and the maritime carrier. Stakeholders’ involvement from shipper to buyer and

customs, port operators of both origin and destination countries are responsible for the domain’s

safety and security. The United States uses a layered approach to security in the maritime

domain. Many security initiatives have been implemented as shown in the Figure 1. The

Container Security Initiative (CSI) and the Customs-Trade Partnership against Terrorism (C-

TPAT) focus on container security. They are the two principal American voluntary programs

(Barnes, 2004).

Page 5: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

5

The potential threat in the maritime domain includes containers, cargoes, people, ships,

vessels, port facility infrastructure, and, last but not the least, natural hazards. Barnes states, up to

90% of world cargo movement occurs in shipping containers with up to 250 million movements

each year and a mere 2% of this volume is physically inspected post-arrival (2004, Organization

for Economic Co-operation and Development 2003).

Figure 1. Maritime Domain’s Logistic Chain and Scope of IMO and U.S. Security Initiatives

Source: (Organization for Economic Co-operation and Development 2003)

The September 11, 2001, attack on the World Trade Center and the Pentagon attracted

much-needed attention to the subject of security risk. Different tools and methodologies can be

used for security risk assessment. Security related risk can be assessed by identifying internal

and external threat scenarios linked with a particular event and negative consequences caused by

that event.

DESTINATION COUNTRY

MANUFACTURER/

SHIPPER

CUSTOMS

PORT

OPERATOR

MANUFACTURER /

SHIPPER

CUSTOMS

Buying Agent

Transport Operator

( land / inland

waterway)

Freight Forwarder

Consolidator

NVOCC

Bank

Customhouse

Brokers

De-consolidator

Transport Operator

(land / inland

waterway)

Bank

IMO ISPS

US CSI

US C-TPAT

MARITIME

CARRIER

COUNTRY OF ORIGIN

PORT

OPERATOR

BUYER

Page 6: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

6

A recent paper (Mitchell and Decker 2004) entitled:“Applying Risk-based Decision-

making Methods/Tools to U.S. Navy Antiterrorism Capabilities” highlights the importance of

understanding the elements of “security risk” and its assessment. Security Risk associated with

an event can be expressed with the help of the traditional risk equation,

Risk = Probability (F) x Consequence (C) (EQ. 1)

In the case of security risks as opposed to risks from natural disasters the probability can be

separated into two parts: threat and vulnerability and equation EQ. 1 is modified as,

Security Risk = [Threat (T) x Vulnerability (V)] x Consequence (C) (EQ. 2)

Threat can be perceived as a possessed risk in a situation. A situation can have multiple

threat scenarios, and each scenario is very useful in the risk assessment stage. “Vulnerability” is

all about susceptibility or weakness. Each threat scenario will have different levels of

vulnerabilities depending on the safeguards or resilience provided for that particular situation or

scenario. What is important is that vulnerability for each threat scenario should be analyzed. The

third component of security risk is “Consequence”; it is the magnitude of the negative impact if

an unwanted event occurs. Total risk is the sum of all risks taken over all possible events.

The security improvement process can be explained with the help of Figure 2. The steps

are (1) identify risk, (2) prioritize risk, (3) allocate resources, (4) design risk mitigation

strategies, and (5) implement risk mitigation strategies.

There are many techniques and/or tools available to accomplish each of these steps. Risk

identification can result from a brainstorming meeting where experts from several domains or

different sectors within a domain are asked to identify risks associated with a specific property or

populations. Another technique for risk identification is to do a global search for certain types of

events and to determine which ones could happen in the domain of interest.

Page 7: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

7

Figure 2. Security Improvement Process

After risks are identified, they must be prioritized by considering factors: the probability

of occurrence of an “event” and expected damage resulting if that event occurs. The probability

of occurrence depends on a number of considerations including vulnerability and threat.

Vulnerability is a function of the degree of protection against the event. Threat is a function of

the attractiveness of the target. Blocks 1 and 2 of Figure 2 form the risk assessment stage and are

the focus of this research. Events causing risks are identified and prioritized with the use of

qualitative and/or quantitative methods. The third step is to allocate resources to reduce or

eliminate various threats or to reduce their associated vulnerability. Proper allocation of

resources holds the key for a successful security improvement process.

The fourth step is to design mitigation strategies. One example of mitigation strategy is to

increase the level of alertness. This might involve increasing the frequency of surveillance,

tightening the security on access to property or populations. Another strategy would be to guard

2. Prioritize Risks

3. Allocate

Resources

5. Implement Mitigation

Strategies

1. Identify Risks

4. Design Risk

Mitigation

Strategies

Risk Assessment

Page 8: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

8

a population or property. An example of a guard is to build a sea wall to prevent or mitigate

flooding from a hurricane. Another example would be to lock and guard the cockpit cabin of a

commercial airplane. One more strategy might be to install warning systems such as sirens,

flashing lights, labels, or public announcements. Risk mitigation techniques must be effectively

implemented to protect populations and/or property. In this study we are concentrating on the

risk associated with the maritime domain and concerned with the “events” that could disrupt

shipping on the Sabine – Neches Waterway for a period of twenty-four hours or more.

The Delphi Method, a structured process of collecting and using the qualitative

knowledge from a group of experts by means of a series of questionnaires was used to

accomplish blocks 1 and 2 of Figure 2. Subjective estimates from the experts were gathered,

analyzed, and used as suitable information for deciding what events are most likely to cause

security risks.

DELPHI METHOD

The Delphi concept was first initiated in early 1950’s by the California-based firm

RAND Corporation. The concept was used in defense research and was named Project Delphi.

The objective of the study was to “obtain the most reliable consensus of opinion of a group of

experts by a series of intensive questionnaires interspersed with controlled opinion feedback”

(Dalkey and Helmer 1963). The application of the Delphi Method was very specific in the field

of forecasting. The intention was to gather experts’ opinion into a consensus or a statement that

can be used as valid input in generating future scenarios. The justification of the Delphi’s

application in 1960’s for forecasting was based on the limitations in technological resources to

develop quantitative models or to conduct extensive data collection and analysis. The technique

Page 9: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

9

has been used in various fields such as environmental, health, and sales forecasting (Linstone and

Turoff, 1975).

The method incorporates two important elements. The first element is anonymity among

group members. This is required to encourage diverse opinions based on the expertise of each

individual. The second element is controlled feedback in which the responses from the group

members are gathered and summarized and then fed back to the group. Each panel member is

asked to consider his/her responses in relation to the responses of the rest of the group. Based on

this, they are asked to respond to the next round of the survey. The method can be viewed as a

“controlled debate”. Extreme opinions from the group members are made open and clear via the

controlled feedback, and estimates are achieved bypassing the problems of group dynamics

(Gordon 1994). In our study the rankings of each member of the panel of experts are presented

to every panel member without identifying who provided these rankings.

The study discussed below was of interest to the research team because the team leader

served on the National Maritime Security Advisory Committee (NMSAC) that is charged by the

Secretary of Homeland Security to advise the United States Coast Guard on matters of maritime

security.

DELPHI STUDY

Results of following the ten step procedure shown in Figure 3 are reported in this section.

The first step was to form a research team. Our research team was led by an engineering

professor who was a member on the inaugural National Maritime Security Advisory Committee

(NMSAC). This committee, mandated by the United States Congress, advises the Commandant

of the USCG on matters of maritime security. The other member of the study team was a Master

of Engineering Science student who selected this study for his masters’ thesis topic.

Page 10: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

10

1. Formation of a team to undertake and monitor a Delphi on a given subject.

2. Selection of one or more panels to participate in the exercise.

Customarily, the panelists are experts in the area to be investigated.

3. Development of the first round Delphi questionnaire.

4. Testing the questionnaire for proper wording (e.g. ambiguities).

5. Transmission of the first questionnaire to the panelists.

6. Analysis of the first round responses.

7. Preparation of the second round questionnaire (and possible testing).

8. Transmission of the second round questionnaire to the panelists.

9. Analysis of the second round responses (Steps 7 to 9 are reiterated as long as

desired or necessary to achieve stability in the results).

10. Preparation of a report by the analysis team to present the conclusions of the

exercise.

Figure 3. Ten Step Delphi Study Procedure; Fowles (1979)

The second step involved the selection of a panel of experts on maritime security. This

group defined and prioritized events causing maritime security risks. By law the United Stated

Coast Guard (USCG) controls shipping into and out of all U.S. ports. Therefore, they are

knowledgeable of all sectors of the maritime domain associated with ports and waterways. So the

research team leader met with representatives of the USCG to select sectors to be represented on

the panel and specific individuals from those sectors. The panel of experts used, to accomplish

Page 11: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

11

the project objective represented five core areas of the maritime domain. These areas, shown in

Figure 4, are public ports, the U.S. Coast Guard, the shipping industry, private ports/docks, and

law enforcement.

Figure 4. The Delphi Project Panel of Experts

A survey instrument (See Figure 5.) to use in the first round of the survey of the panel of

experts was developed in the third step of the Delphi procedure. This instrument was developed

by considering the various types of events causing maritime risks as shown in Figure 6. The

original survey consisted of ten events and space where participants could suggest additional

events. After reviewing this instrument with survey experts not on the panel (Step 5) it was

distributed by email to participants along with a request that they add additional events if needed

or suggest modifications to existing events. Additional information provided to survey

participants included historical data on past major hurricanes and natural disasters and detailed

instructions on ranking the likelihood of events. Results of the first round of the survey (Table 1)

were received by email or fax and analyzed (Step 6). The average, lowest, and highest priority

ranking for each event was tabulated and provided to survey participants with instructions for

Experts from the

Maritime Domain

Public Ports

U.S.C.G.

Shipping

Industry

Private Ports/

Docks

Law

Enforcement

Delphi Project

on the

Maritime

Domain

Affiliation

Experts’

Knowledge

Page 12: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

12

Sr.No.

List of “Events”

Likelihood Scale

1 (most likely) to

10 (least likely)

1

Major vessel accident causing waterway closure or

disruption of vessel traffic for more than one hour.

(Unintentional, Human Error)

2

Major oil spill/leakage affecting the Sabine – Neches

Waterway. (Unintentional)

3

Port facility infrastructure breakdown. (Unintentional)

4

Damage to port facility, from a vessel equipment

failure/malfunction. (Unintentional, Navigational)

5

Terror threat (hoax) – causing shutdown of port

facilities or parts of the Sabine – Neches Waterways.

6

Damage or destroy a large vessel or tanker with the help

of a small vessel approaching it with an explosive on

board. (Terrorist Acts, USS Cole-type Act)

7 Disruption of port facilities and/or operations by

destroying key assets or infrastructure such as cranes,

electrical power systems, etc.(Intentional, Terrorist

Acts)

8

Introduction into the United States of a weapon of mass

destruction via the Sabine – Neches Waterway.

(Intentional, Terrorist Acts)

9 Coastal storms and hurricanes up to category II (Natural

Disaster)

10 Category III, IV, or V hurricanes. (Natural Disaster)

Suggest Additional “Events” if you choose

A

B

Figure 5. Delphi Survey Round 1 Form

Page 13: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

13

Figure 6. Maritime Risk Categories

round 2 (Step 7). In survey round 1 (SR1), event 1, major vessel accident causing waterway

closure or disruption of vessel traffic for more than one hour (unintentional, human error) was

the most likely with an average ranking of 1.2 with highest ranking of 1 and lowest ranking of 2.

Event 2, major oil spill/leakage affecting the Sabine – Neches Waterway (unintentional), scored

an average 2.3 and was the second most likely event on the likelihood scale. Its highest rank was

1, and its lowest rank was 5. Event 9, coastal storms and hurricanes up to category II (natural

disaster), scored an average of 3.3 and was ranked the third most likely event with highest rank

Events Causing Maritime Risks

Natural Disasters Man–made Events

Tropical Storm,

Hurricane

Severe

Weather

Intentional

Unintentional

(Errors/Failures)

Fog

Tornado

Terrorism

Sabotage

Human Errors

Procedural

Lapses

Failures

Mechanical

Breakdown

Structured

Page 14: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

14

Table 1. Survey Round 1 (SR1) Summary Data

Panel

Members

Group 1 Group 2 Group 3 Group 4 Group 5 Survey Round 1 (SR1)

Analysis

Public Ports

U.S. Coast

Guard

Shipping Industry

Private Ports

Law Enforcem

ent

Quantitative tabulation of responses from participants

Responses for the

Rankings

SP1

SP2

SP1

SP2

SP1

SP2

SP1

SP2

SP1

SP2

Avg.

Low

High

Rank

Event 1

1

2

1

1

1

1

1

2

1.2

2

1

1

Event 2

5

1

2

2

4

2

2

1

2.3

5

1

2

Event 3

6

8

3

6

6

6

4

5

5.5

8

3

6

Event 4

4

5

4

7

5

3

3

4

4.3

7

3

4

Event 5

7

9

5

5

7

5

6

6

6.2

9

5

7

Event 6

8

6

9

9

9

9

7

9

8.2

9

6

9

Event 7

9

7

8

8

8

7

9

8

8.0

9

7

8

Event 8

10

10

10

10

10

10

10

10

10.0

10

10

10

Event 9

2

3

6

2

2

4

5

3

3.3

6

2

3

Event 10

3

4

7

4

3

8

8

7

5.5

8

3

5

SP1, SP2 = Survey Participant 1, 2 SP1, SP2 = Survey Participant 1 from Group 1 and Survey

Participant 2 from Group 5 opted out prior to completing Survey Round 1

of 2 and lowest 6. This event was rated high by group 3 (shipping industry) participants. Event 8,

introduction into the United States of a weapon of mass destruction via the Sabine – Neches

Waterway (intentional, terrorist acts) was ranked lowest by every participant and was the least

likely event on the list.

Page 15: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

15

Two suggestions were received for additional events to our original list of ten events that

might cause disruption of vessel traffic on the Sabine - Neches Waterway. One suggestion

referred to dense fog was received from one of the participants from the USCG. Therefore, dense

fog was explicitly added to the reworded event 9 on the survey round 2. Event 9 was changed to

read: “Dense fog, coastal storms, hurricanes up to category II and other similar weather

conditions.” This change was suggested by one of the participants from the shipping industry

group, and he gave the highest likelihood ranking to event 9. Another suggestion was to include

an event caused by underwater improvised explosive devices. It was suggested by a participant

from the private port, group 4. Based on the suggestion, this type of event was added to the

reworded event 6. It was reworded for survey round 2 as follows: “Damage or destroy a large

vessel or tanker with the help of a small vessel approaching it with explosives on board or by

underwater improvised explosive devices” (terrorist acts, USS Cole-type act). Another

modification to the survey form for round 2 is related to event 1. This event referred to

“disruption of vessel traffic for more than one hour.” The reworded event 1 reads: “Disruption of

vessel traffic for more than 24 hours.” This change was made because it was determined that

short term delays would not materially affect the flow of commerce on the Sabine – Neches

Waterway.

The survey round 2 contained the reworded events 1,6, and 9 and the average, lowest,

and highest ranking for each event from survey round 1. This completed the reiteration of Step 7.

The revised survey form was emailed to participants (Step 8 reiteration). They were asked to

review the summary data from round 1 and the reworded events and reconsider their rankings.

The results of survey round 2 appear in Table 2. The average, lowest, highest, and overall

ranking of each event was obtained and provided to survey participants.

Page 16: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

16

Table 2. Survey Round 2 (SR2) Summary Data

Panel

Members

Group 1 Group 2 Group 3 Group 4 Group 5 Survey Round 2 (SR2)

Analysis

Public Ports

U.S. Coast

Guard

Shipping Industry

Private Ports

Law Enforcem

ent

Quantitative tabulation of responses from participants

Responses for the

Rankings

SP1

SP2

SP1

SP2

SP1

SP2

SP1

SP2

SP1

SP2

Avg.

Low

High

Rank

Event 1

1

3

2

2

1

1

1

2

1.6

3

1

1

Event 2

5

2

3

3

4

2

2

1

2.7

5

1

3

Event 3

6

7

4

5

5

6

5

5

5.3

7

4

5

Event 4

4

4

5

4

3

3

3

4

3.7

5

3

4

Event 5

7

9

6

6

7

5

6

6

6.5

9

5

7

Event 6

8

6

9

8

9

9

8

9

8.2

9

6

8

Event 7

9

8

8

9

8

7

9

8

8.2

9

7

9

Event 8

10

10

10

10

10

10

10

10

10.0

10

10

10

Event 9

2

1

1

1

2

4

4

3

2.2

4

1

2

Event 10

3

5

7

7

6

8

7

7

6.2

8

3

6

SP1, SP2 = Survey Participant 1, 2 SP1, SP2 = Survey Participant 1 from Group 1 and Survey

Participant 2 from Group 5 opted out prior to completing Survey Round 1.

Page 17: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

17

ANALYSIS OF DELPHI SURVEY RESULTS

Standard deviation of the likelihood rankings for each event of the panel of experts was

used to measure level of agreement or convergence. Standard deviations of responses for each

event were compared on survey rounds 1 (SR1) and 2 (SR2) as shown in Figure 7. In all cases

except events 1 and 8, the standard deviations of the responses (rankings) decreased from survey

round 1 to survey round 2. The definition of event 1 was significantly changed from survey

round 1 to survey round 2, i.e., in survey round 2 the event called for a closure of the waterway

for twenty-four hours versus only one hour in survey round 1. This change in event 1 definition

resulted in three survey participants decreasing their ranking of this event while five participants

kept their ranking the same. Consequently variation (standard deviation) of event 1 rankings

increased from round 1 to round 2. Event 8 had no variation (standard deviation) on either round

1 or round 2. All participants agreed it was the least likely event to cause closure of the

waterway.

The fact that standard deviations of responses decreased or remained the same from

survey round 1 to survey round 2 for all events except for event 1, which had a change in

definition, indicates the panel members rankings were converging. The next most converged

events after event 8 were events 7 and 4 with standard deviations of 0.7 each. Events 1 and 3

were the next events that the group agreed upon with the standard deviations of 0.74 and 0.91

respectively. Five of ten events scored standard deviations of group responses for each event

between the range from 0 – 1.0. Events 6 and 5 had standard deviations of 1.03 and 1.19

respectively. Events 2 and 9 each had standard deviation of 1.28.

Page 18: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

18

Figure 7. Standard Deviations of Responses for Each Event on Survey Rounds 1 and 2 (SR1 and

SR2)

Four out of the ten events held the same ranking in survey round 2 as in survey round 1.

Event 3 (unintentional port facility infrastructure breakdown) increased in overall likelihood

ranking from number 6 to number 5. Event 6 (USS Cole type of terrorists act) increased in

overall likelihood ranking from number 9 to number 8, and event 9 (Coastal storms) increased

from number 3 to number 2. Event 2 (major oil spill) decreased in overall ranking from number 2

to number 3, event 7 (intentional port facility infrastructure breakdown) decreased from number

8 to number 9, and event 10 (Category III and higher hurricanes) decreased from number 5 to

number 6 from survey round 1 (SR1) to survey round 2 (SR2).

0.46

1.4

1.51

1.3

1.38

1.16

0.75

0

1.5

2.2

0.74

1.28

0.91

0.7

1.19

1.03

0.7

0

1.28

1.58

0

0.25

0.5

0.75

1

1.25

1.5

1.75

2

2.25

2.5

Event 1 Event 2 Event 3 Event 4 Event 5 Event 6 Event 7 Event 8 Event 9 Event 10

Events to occur on the Sabine - Neches Waterway

St. Dev. of Value (Rank)

SR1St. Dev SR2 St. Dev

Page 19: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

19

Table 3. Rankings of Each Event after Each Survey Round

Survey Results

Events Round 1

Rank

Round 2

Rank

Event 1(major vessel accident,E1) 1 1

Event 2(major oil spill,E2) 2 3

Event 3(facility damage due to navigational error) 6 5

Event 4(facility damage due to equipment failure) 4 4

Event 5(terror threat-hoax) 7 7

Event 6(USS Cole type terrorist act) 9 8

Event 7(facility damage due to terrorism) 8 9

Event 8(intro. of weapons of mass destruction) 10 10

Event 9(coastal storms) 3 2

Event 10(category III or above hurricane) 5 6

Page 20: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

20

CONCLUSIONS

• The Delphi method is a useful technique to use to assess the likelihood of events causing

risks in the maritime domain. Delphi panel members (maritime domain security experts)

were comfortable in ranking events that could disrupt operations on the Sabine – Neches

Waterway on the likelihood scale from the most likely to least likely to occur in a

calendar year.

• The analysis of rounds 1 and 2 questionnaires suggest that a consensus was reached on

identifying and prioritizing the events that could cause the closure of the Sabine – Neches

Waterway for twenty-four hours or more.

• Events from the man-made events: category, unintentional including human errors and

failures and natural disasters category scored high on the likelihood scale. The least likely

events were from the intentional - terrorist acts category.

• The findings of Delphi research indicated that subjective judgment on a collective basis

can be used to provide multidisciplinary expertise for a comprehensive security risk

assessment of the maritime domain.

• Since natural disasters, accidents, and failures are ranked so much higher than terrorist

acts on the likelihood and the probability scale, efforts and funds expended on detailed

recovery plans should reflect the relative likelihood.

REFERENCES

Page 21: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

21

Barnes, P. 2004. Security risk management issues in maritime trade: An analysis. Academy of

International Business (AIB) Southeast Asia Regional Conference. 2004.

http://eprints.qut.edu.au/archive/00001162/01/4_Barnes.pdf (accessed September 23,

2005).

Dalkey, N. and O. Helmer. 1963. An experimental application of the Delphi Method to the use of

experts. Management Science 9 (3): 458-467.

Department of Homeland Security. 2004. Secure Seas, Open Ports.

http://supplychainsecurity.biz/documents/DHSPortSecurityFactSheet-062104.pdf

(accessed February 26, 2007)

Fowles, J. 1978. The Delphi technique: Handbook of future research. London: Greenwood

Place.

Gordon, T. 1994. The Delphi Method in futures research methodology, AC/UNC Millennium

Project. http://www.futurovenezuela.org/_curso/5-delphi.pdf (accessed April 15, 2006).

International Maritime Organization 2006. http://www.imo.org ,

http://www.imo.org/includes/blastDataOnly.asp/data_id%3D16406/5.pdf

(accessed December 17, 2006).

Linstone, A. and M. Turoff (eds). 1975. The Delphi Method: Techniques and applications.

Massachusetts: Addison-Wesley. Also available online at http://is.njit.edu/turoff

Mitchell, C. and C. Decker. 2004. Applying risk-based decision-making methods/tools to U.S.

Navy antiterrorism capabilities. Journal of Homeland Security.

http://www.homelanddefense.org/journal/Articles/Mitchell_Decker.html (accessed

October 28, 2006).

Page 22: TITLE: USE OF THE DELPHI METHOD TO PRIORITIZE EVENTS IMPACTING OPERATIONS IN … · 2017. 10. 4. · The Delphi concept was first initiated in early 1950’s by the California-based

The Delphi Method

22

Murphy, M., N. Black, D. Lamping, C. McKee, C.F.B. Sanderson, J. Aksham, and T. Marteau.

1998. Consensus development methods and their use in clinical guideline development.

Health Technology Assessment 2(3).

http://www.hta.nhsweb.nhs.uk/fullmono/mon203.pdf (accessed April 21, 2006).

Organization for Economic Co-operation and Development (OECD). 2003. Security in maritime

transport: Risk factors and economic impact, Maritime Transport Committee, Directorate

for Science, Technology and Industry.

http://www.oecd.org/dataoecd/63/13/4375896.pdf (accessed October 7, 2005).

Woo, G. 2005. A Terrorism Risk Analyst’s Perspective on TRIA. Risk Management Solutions.

http://www.rms.com/Publications/RiskAnalystPersectiveTRIA_WooForCongress.pdf

(accessed October 7, 2005)