Risk Control Through Evaluation of Catastrophic Scenarios

Author(s):  
José Vicente Amórtegui Gil

Abstract In sectors where pipelines cross areas exposed to severe hazards or where the consequences are serious, traditional analyses based on the Risk Analysis Matrix (RAM) do not reflect the effect of the works and actions taken for risk control. That condition induces the idea of ineffectiveness or uselessness of the works and actions taken for protection and reinforcement. In this paper, for those situations it is proposed the analysis of hypothetical scenarios to determine which of them can become catastrophic, in order to assess which situations can trigger a catastrophe, and in consequence to take actions regarding them and thus to avoid the catastrophic situation. The suggested method consists in proposing scenarios of damages, corresponding an event of loss of product containment of a hydrocarbon transport system. In those scenarios, the following consequences of the oil spill are determined: the behaviour of the product, its route, the site of rupture, the possible threats that affect it, and the triggers of the threatening processes. Critical or catastrophic scenarios are selected and the chain of events regarding them is determined as detailed as possible. When analysing that chain, it is possible to find actions that may modify it, such as the control of the route so that it does not reach the sensitive elements, the strengthening of the pipeline to bear the hazards, the reinforcement of the ground to prevent the action of the hazards and to avoid that the hazard takes place. It must be determined how to protect the exposed elements and how to handle the spilled product to avoid the affectation of the elements mentioned above. For this point, it is important to know the infrastructure of the Contingency Plan and therefore to evaluate the possibility of strengthening it.

2021 ◽  
Author(s):  
Fabrizio Zausa ◽  
Luigi Besenzoni ◽  
Alessandro Caia ◽  
Seda Mizrak

Abstract The disaster of Macondo of 2010 changed the rules in reliability and safety standards during drilling operations. New regulations were developed in order to improve the control level on blowout risk, and all upstream operators adopted innovative technologies capable to reduce the potential risk of uncontrolled release, either by decreasing its frequency of occurrence or the expected impacts. The objective of this paper is to present a Quantitative Risk Analysis (QRA) of well blowout and measure the beneficial contribution of intervention technologies in terms of expected reduction of spill volume and associated costs. The QRA is applied to any kind of well operation (drilling, completion, workover, light intervention) and well type. The methodology relies upon different risk analysis techniques able to quantify the residual blowout risk, as well as the mitigation provided by each technology. Through Fault Tree Analysis (FTA), a value of blowout probability is calculated for each well operation. The initial blowout condition is associated with a blowout flow rate, calculated with fluid dynamic computational models depending on well flow path and release point into the environment. The evolution of each release scenario is then studied with the use of Event Tree Analysis (ETA), where a set of events, able to reduce or stop the flow, are considered with their probability of success and occurrence time (well bridging, water coning, surface intervention through killing/capping techniques, relief well operations). The value of each intervention is estimated through Decision Tree Analysis (DTA), calculating the amount of spill volume reduction and avoided spill costs. Results of spill volume and cost reduction are calculated for a set of specific wells, considering the application of killing/capping systems as well as Eni innovative technologies. The benefit of these interventions is measured in terms of Expected Monetary Value (EMV) in relation to a potential release extinguished by a relief well, which is the decisive intervention to stop the blowout, considered as the worst case scenario. Surface interventions with killing/capping techniques are the major contributors to the reduction of blowout impacts, and all additional measures which can be adopted should act in the fastest way possible before the arrival of heavy capping stack system. The main innovative contribution of the proposed QRA methodology is the association of an expected economic value to post-blowout mitigation techniques, which takes into account all possible uncertainties related to their success and intervention time. Moreover, by evaluating an economic impact of the residual spill cost, it is possible to prioritize and increase the overall efficiency of the oil spill response plan for each operational and geographical context, and improve the control on blowout risk mitigation process.


1988 ◽  
Vol 25 (02) ◽  
pp. 145-159
Author(s):  
Robert A. Levine

Although the best method for handling an oil spill is to prevent its occurrence, the risk of a significant oil spill, from either a tank or other vessel, is always present. When a spill does occur, a good spill contingency plan will help to limit the adverse effects of the spill. This paper discusses the contents and development of Spill Contingency Plans, with emphasis on experience gained during the cleanup of the Port Angeles spill. Information pertinent to and details from ARCO Marine Inc.'s Spill Contingency Plan have been included to aid interested parties in their endeavors to develop suitable contingency plans.


2011 ◽  
pp. 234-248
Author(s):  
Enid Mumford

Participative systems design has, in the past, been seen as a positive group process of thinking through needs and problems and arriving at solutions for making the situation better. This improved situation then continues until new technology or new solutions provide an opportunity for making the situation better still. So far this book has concentrated on how to make the best use of the positive factors assisting change, especially change that involves the introduction and use of technology. It has described the importance of getting a clear understanding of the change problem and its complexity, of developing effective strategies to address this complexity, and of the creation of structures, often organizational, to facilitate the subsequent use of the new system. This last requires always keeping in mind the need to meet the dual objectives of achieving operating efficiency and a good quality of working life. This is often described as job satisfaction. Most of all there has been a continual stress on the importance of participation. This involves sharing the design tasks with those who will be affected by them and taking account of their opinions in design decisions. This chapter addresses the reverse of this positive objective. It considers the negative factors in a change situation which are likely to cause problems and to threaten the success of the change programme and of the new system. There are very many of these kinds of problems and it is only possible to discuss a few here. The ones I have selected are criminal threats which affect the future viability of the company, technical problems which reduce efficiency, unpleasant and stressful work that threatens employee health, and problems of morale which affect the individual’s happiness in the workplace. A consideration of negative factors brings us into the challenging areas of uncertainty and risk. Uncertainty is when we do not know what is going to happen and often contains an element of surprise. This is especially true today when so many decisions depend on forecasts of the future. A contributing factor here can be an overemphasis on the present as a means of forecasting the future. Uncertainty is also often a result of the behaviour of others rather than of events. This is hard to predict. Experts tell us that today we are living in a risk society (Beck, 1992). Complex design problems can have a high degree of uncertainty and easily become risks. They often have a subjective element, for what one person considers a problem or a risk, another will see as an opportunity. Complex problems also require information for their solution and this may be difficult to find. It requires the ability to search for, analyse and synthesise, relevant intelligence and relate it to past, current and future events. Threats to important institutions from terrorists are of a different nature and scale to those that have been experienced before. Many will take us completely by surprise. Bernstein (1996) suggests that the essence of risk management lies in maximising the areas which we have some control over while minimising those areas where we have no control over the outcome and the linkage between cause and effect is hidden. When we take a risk we are making a bet that a particular outcome will result from the decision we have made although we have no certainty that this will happen. Risk management usually starts with risk analysis, which attempts to establish and rank the most serious risks to be avoided so far as these are known. Here many companies attempt to achieve a balance between the benefits of greater security and the costs involved. Too high a level of security, while providing good protection, can result in a system that is both difficult to use and expensive to operate (Mumford, 1999). Risk analysis next moves on to risk assessment. This is an analysis of the seriousness of different risks by determining the probability and potential damage of each one. For example, major risks can come from a large concentration of data in one place that is accessed by many different people, not all of whom are known. There can be relationships between risks. Clifford Stoll’s (1990) book The Cuckoo’s Egg shows how the ability of a German hacker to enter a university laboratory computer made it possible for him to later enter into the computers of United States military bases. Risk analysis identifies the risks; risk assessment tries to estimate how likely they are to happen and how serious the consequences will be. Risk priorisation recognises that all companies cannot be protected from all risks and choices must be made. Risk impact is the likely magnitude of the loss if a system break-in, fraud or other serious problem occurs. Risk control involves further actions to reduce the risk and to trigger further defensive actions if a very serious problem occurs. Risk control also covers the monitoring of risk on a regular basis to check that existing protection is still effective. This can lead to risk reassessment. Very serious risks such as those coming from terrorist attack or criminal activity require monitoring. This, together with the detailed documentation of any problems or illegal activities when they occur, is essential to avoid complacency. An effective system must both prevent problems and detect when they have occurred. All of these activities to design security into a system require human vigilance if they are to be effective. All employees should accept some responsibility for checking that the system they work with continues to maintain its integrity and security. This chapter will place its main focus on protective problem solving and design directed at avoiding or minimising very serious risks. Today, it is unwise for managers to neglect this. Because of its growth in recent years and its prevalence today criminal activity will be examined first in some detail. Particular attention will be paid to how the involvement of employees in problem solving can play a part in reducing or avoiding this.


2011 ◽  
Vol 11 ◽  
pp. 3863-3867
Author(s):  
Zhu Li ◽  
Liu Chunling

Sign in / Sign up

Export Citation Format

Share Document