References
- Aleksić, A., Stefanović, M., Tadić, D., & Arsovski, S. (2014). A fuzzy model for assessment of organization vulnerability. Measurement, 51, 214–223. doi: 10.1016/j.measurement.2014.02.003
- Arianos, S., Bompard, E., Carbone, A., & Xue, F. (2009). Power grid vulnerability: A complex network approach. Chaos (Woodbury, NY), 19(1), 013119. doi: 10.1063/1.3077229
- Boccaletti, S., Buldu, J., Criado, R., Flores, J., Latora, V., Pello, J., & Romance, M. (2007). Multiscale vulnerability of complex networks. Chaos (Woodbury, NY), 17(4), 043110. doi: 10.1063/1.2801687
- Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., & Hwang, D.-U. (2006). Complex networks: Structure and dynamics. Physics Reports, 424(4–5), 175–308. doi: 10.1016/j.physrep.2005.10.009
- Bompard, E., Wu, D., & Xue, F. (2011). Structural vulnerability of power systems: A topological approach. Electric Power Systems Research, 81(7), 1334–1340. doi: 10.1016/j.epsr.2011.01.021
- Cho, J. G., & Yum, B. J. (1997). An uncertainty importance measure of activities in PERT networks. International Journal of Production Research, 35(10), 2737–2758. doi: 10.1080/002075497194426
- Costa, L. D. F., Rodrigues, F. A., Travieso, G., & Villas Boas, P. R. (2007). Characterization of complex networks: A survey of measurements. Advances in Physics, 56(1), 167–242. doi: 10.1080/00018730601170527
- Deng, X., Pheng, L. S., & Zhao, X. (2014). Project system vulnerability to political risks in international construction projects: The case of Chinese contractors. Project Management Journal, 45(2), 20–33. doi: 10.1002/pmj.21397
- Dwivedi, A., & Yu, X. (2013). A maximum-flow-based complex network approach for power system vulnerability analysis. IEEE Transactions on Industrial Informatics, 9(1), 81–88. doi: 10.1109/TII.2011.2173944
- Ellinas, C. (2019). The domino effect: An empirical exposition of systemic risk across project networks. Production and Operations Management, 28(1), 63–81. doi: 10.1111/poms.12890
- Ellinas, C., Allan, N., & Johansson, A. (2018a). Toward project complexity evaluation: A structural perspective. IEEE Systems Journal, 12(1), 228–239. doi: 10.1109/JSYST.2016.2562358.
- Ellinas, C. (2018b). Modelling indirect interactions during failure spreading in a project activity network. Scientific Reports, 8, 4373. doi: 10.1038/s41598-018-22770-3.
- Ellinas, C., Allan, N., Durugbo, C., & Johansson, A. (2015). How robust is your project? From local failures to global catastrophes: A complex networks approach to project systemic risk. PLoS One, 10(11), e0142469. doi: 10.1371/journal.pone.0142469
- Ellinas, C., Allan, N., & Johansson, A. (2016). Project systemic risk: Application examples of a network model. International Journal of Production Economics, 182, 50–62. doi: 10.1016/j.ijpe.2016.08.011
- Elmaghraby, S., Fathi, Y., & Taner, M. (1999). On the sensitivity of project variability to activity mean duration. International Journal of Production Economics, 62(3), 219–232. doi: 10.1016/S0925-5273(98)00241-2
- Ezell, B. C. (2007). Infrastructure vulnerability assessment model (I-VAM). Risk Analysis, 27(3), 571–583. doi: 10.1111/j.1539-6924.2007.00907.x
- Fidan, G., Dikmen, I., Tanyer, A. M., & Birgonul, M. T. (2011). Ontology for relating risk and vulnerability to cost overrun in international projects. Journal of Computing in Civil Engineering, 25(4), 302–315. doi: 10.1061/(ASCE)CP.1943-5487.0000090
- Flyvbjerg, B., Bruzelius, N., & Rothengatter, W. (2003). Megaprojects and risk: An anatomy of ambition. Cambridge, UK: Cambridge University Press.
- Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 35–41. doi: 10.2307/3033543
- Gol’dshtein, V., Koganov, G., & Surdutovich, G. I. (2004). Vulnerability and hierarchy of complex networks. arXiv:cond-mat/0409298.
- Hagberg, A. A., Schult, D. A., & Swart, P. J. (2008). Exploring network structure, dynamics, and function using NetworkX. Proceedings of the 7th Python in Science Conference (SciPy2008), 11–15.
- Jun, K. S., Chung, E. S., Kim, Y. G., & Kim, Y. (2013). A fuzzy multi-criteria approach to flood risk vulnerability in South Korea by considering climate change impacts. Expert Systems with Applications, 40(4), 1003–1013. doi: 10.1016/j.eswa.2012.08.013
- Kermanshah, A., & Derrible, S. (2016). A geographical and multi-criteria vulnerability assessment of transportation networks against extreme earthquakes. Reliability Engineering & System Safety, 153, 39–49. doi: 10.1016/j.ress.2016.04.007
- Kleindorfer, G. B. (1971). Bounding distributions for a stochastic acyclic network. Operations Research, 19(7), 1586–1601. doi: 10.1287/opre.19.7.1586
- Latora, V., & Marchiori, M. (2001). Efficient behavior of small-world networks. Physical Review Letters, 87(19), 198701. doi: 10.1103/PhysRevLett.87.198701
- Latora, V., & Marchiori, M. (2005). Vulnerability and protection of infrastructure networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics, 71(Pt 2), 015103. doi: 10.1103/PhysRevE.71.015103
- Madadi, M., & Iranmanesh, H. (2012). A management oriented approach to reduce a project duration and its risk (variability). European Journal of Operational Research, 219(3), 751–761. doi: 10.1016/j.ejor.2012.01.006
- Neumayer, S., Zussman, G., Cohen, R., & Modiano, E. (2011). Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Transactions on Networking, 19, 1610–1623. doi: 10.1109/TNET.2011.2128879.
- Newman, M. E. J. (2003). The structure and function of complex networks. Siam Review, 45(2), 167–256. doi: 10.1137/S003614450342480
- Newman, M. E. (2004). Analysis of weighted networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics, 70(Pt 2), 056131. doi: 10.1103/PhysRevE.70.056131
- Newman, M. E. (2008). The mathematics of networks. The New Palgrave Encyclopedia of Economics, 2, 1–12.
- Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32(3), 245–251. doi: 10.1016/j.socnet.2010.03.006
- Palomo, J., Rios Insua, D., & Ruggeri, F. (2007). Modeling external risks in project management. Risk Analysis: An Official Publication of the Society for Risk Analysis, 27(4), 961–978. doi: 10.1111/j.1539-6924.2007.00935.x
- Turner, R. J., Huemann, M., Anbari, F. T., & Bredillet, C. N. (2010). Perspectives on projects. Routledge.
- Vidal, L. A., & Marle, F. (2012). A systems thinking approach for project vulnerability management. Kybernetes, 41, 206–228. doi: 10.1108/03684921211213043
- Zhang, H. (2007). A redefinition of the project risk process: Using vulnerability to open up the event-consequence link. International Journal of Project Management, 25(7), 694–701. doi: 10.1016/j.ijproman.2007.02.004
- Zhu, G., Bard, J. F., & Yu, G. (2005). Disruption management for resource-constrained project scheduling. Journal of the Operational Research Society, 56(4), 365–381. doi: 10.1057/palgrave.jors.2601860