410
Views
4
CrossRef citations to date
0
Altmetric
Articles

Project vulnerability analysis: A topological approach

ORCID Icon, , &
Pages 1233-1242 | Received 24 Mar 2018, Accepted 04 Apr 2019, Published online: 18 Jun 2019

References

  • Aleksić, A., Stefanović, M., Tadić, D., & Arsovski, S. (2014). A fuzzy model for assessment of organization vulnerability. Measurement, 51, 214–223. doi: 10.1016/j.measurement.2014.02.003
  • Arianos, S., Bompard, E., Carbone, A., & Xue, F. (2009). Power grid vulnerability: A complex network approach. Chaos (Woodbury, NY), 19(1), 013119. doi: 10.1063/1.3077229
  • Boccaletti, S., Buldu, J., Criado, R., Flores, J., Latora, V., Pello, J., & Romance, M. (2007). Multiscale vulnerability of complex networks. Chaos (Woodbury, NY), 17(4), 043110. doi: 10.1063/1.2801687
  • Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., & Hwang, D.-U. (2006). Complex networks: Structure and dynamics. Physics Reports, 424(4–5), 175–308. doi: 10.1016/j.physrep.2005.10.009
  • Bompard, E., Wu, D., & Xue, F. (2011). Structural vulnerability of power systems: A topological approach. Electric Power Systems Research, 81(7), 1334–1340. doi: 10.1016/j.epsr.2011.01.021
  • Cho, J. G., & Yum, B. J. (1997). An uncertainty importance measure of activities in PERT networks. International Journal of Production Research, 35(10), 2737–2758. doi: 10.1080/002075497194426
  • Costa, L. D. F., Rodrigues, F. A., Travieso, G., & Villas Boas, P. R. (2007). Characterization of complex networks: A survey of measurements. Advances in Physics, 56(1), 167–242. doi: 10.1080/00018730601170527
  • Deng, X., Pheng, L. S., & Zhao, X. (2014). Project system vulnerability to political risks in international construction projects: The case of Chinese contractors. Project Management Journal, 45(2), 20–33. doi: 10.1002/pmj.21397
  • Dwivedi, A., & Yu, X. (2013). A maximum-flow-based complex network approach for power system vulnerability analysis. IEEE Transactions on Industrial Informatics, 9(1), 81–88. doi: 10.1109/TII.2011.2173944
  • Ellinas, C. (2019). The domino effect: An empirical exposition of systemic risk across project networks. Production and Operations Management, 28(1), 63–81. doi: 10.1111/poms.12890
  • Ellinas, C., Allan, N., & Johansson, A. (2018a). Toward project complexity evaluation: A structural perspective. IEEE Systems Journal, 12(1), 228–239. doi: 10.1109/JSYST.2016.2562358.
  • Ellinas, C. (2018b). Modelling indirect interactions during failure spreading in a project activity network. Scientific Reports, 8, 4373. doi: 10.1038/s41598-018-22770-3.
  • Ellinas, C., Allan, N., Durugbo, C., & Johansson, A. (2015). How robust is your project? From local failures to global catastrophes: A complex networks approach to project systemic risk. PLoS One, 10(11), e0142469. doi: 10.1371/journal.pone.0142469
  • Ellinas, C., Allan, N., & Johansson, A. (2016). Project systemic risk: Application examples of a network model. International Journal of Production Economics, 182, 50–62. doi: 10.1016/j.ijpe.2016.08.011
  • Elmaghraby, S., Fathi, Y., & Taner, M. (1999). On the sensitivity of project variability to activity mean duration. International Journal of Production Economics, 62(3), 219–232. doi: 10.1016/S0925-5273(98)00241-2
  • Ezell, B. C. (2007). Infrastructure vulnerability assessment model (I-VAM). Risk Analysis, 27(3), 571–583. doi: 10.1111/j.1539-6924.2007.00907.x
  • Fidan, G., Dikmen, I., Tanyer, A. M., & Birgonul, M. T. (2011). Ontology for relating risk and vulnerability to cost overrun in international projects. Journal of Computing in Civil Engineering, 25(4), 302–315. doi: 10.1061/(ASCE)CP.1943-5487.0000090
  • Flyvbjerg, B., Bruzelius, N., & Rothengatter, W. (2003). Megaprojects and risk: An anatomy of ambition. Cambridge, UK: Cambridge University Press.
  • Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 35–41. doi: 10.2307/3033543
  • Gol’dshtein, V., Koganov, G., & Surdutovich, G. I. (2004). Vulnerability and hierarchy of complex networks. arXiv:cond-mat/0409298.
  • Hagberg, A. A., Schult, D. A., & Swart, P. J. (2008). Exploring network structure, dynamics, and function using NetworkX. Proceedings of the 7th Python in Science Conference (SciPy2008), 11–15.
  • Jun, K. S., Chung, E. S., Kim, Y. G., & Kim, Y. (2013). A fuzzy multi-criteria approach to flood risk vulnerability in South Korea by considering climate change impacts. Expert Systems with Applications, 40(4), 1003–1013. doi: 10.1016/j.eswa.2012.08.013
  • Kermanshah, A., & Derrible, S. (2016). A geographical and multi-criteria vulnerability assessment of transportation networks against extreme earthquakes. Reliability Engineering & System Safety, 153, 39–49. doi: 10.1016/j.ress.2016.04.007
  • Kleindorfer, G. B. (1971). Bounding distributions for a stochastic acyclic network. Operations Research, 19(7), 1586–1601. doi: 10.1287/opre.19.7.1586
  • Latora, V., & Marchiori, M. (2001). Efficient behavior of small-world networks. Physical Review Letters, 87(19), 198701. doi: 10.1103/PhysRevLett.87.198701
  • Latora, V., & Marchiori, M. (2005). Vulnerability and protection of infrastructure networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics, 71(Pt 2), 015103. doi: 10.1103/PhysRevE.71.015103
  • Madadi, M., & Iranmanesh, H. (2012). A management oriented approach to reduce a project duration and its risk (variability). European Journal of Operational Research, 219(3), 751–761. doi: 10.1016/j.ejor.2012.01.006
  • Neumayer, S., Zussman, G., Cohen, R., & Modiano, E. (2011). Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Transactions on Networking, 19, 1610–1623. doi: 10.1109/TNET.2011.2128879.
  • Newman, M. E. J. (2003). The structure and function of complex networks. Siam Review, 45(2), 167–256. doi: 10.1137/S003614450342480
  • Newman, M. E. (2004). Analysis of weighted networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics, 70(Pt 2), 056131. doi: 10.1103/PhysRevE.70.056131
  • Newman, M. E. (2008). The mathematics of networks. The New Palgrave Encyclopedia of Economics, 2, 1–12.
  • Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32(3), 245–251. doi: 10.1016/j.socnet.2010.03.006
  • Palomo, J., Rios Insua, D., & Ruggeri, F. (2007). Modeling external risks in project management. Risk Analysis: An Official Publication of the Society for Risk Analysis, 27(4), 961–978. doi: 10.1111/j.1539-6924.2007.00935.x
  • Turner, R. J., Huemann, M., Anbari, F. T., & Bredillet, C. N. (2010). Perspectives on projects. Routledge.
  • Vidal, L. A., & Marle, F. (2012). A systems thinking approach for project vulnerability management. Kybernetes, 41, 206–228. doi: 10.1108/03684921211213043
  • Zhang, H. (2007). A redefinition of the project risk process: Using vulnerability to open up the event-consequence link. International Journal of Project Management, 25(7), 694–701. doi: 10.1016/j.ijproman.2007.02.004
  • Zhu, G., Bard, J. F., & Yu, G. (2005). Disruption management for resource-constrained project scheduling. Journal of the Operational Research Society, 56(4), 365–381. doi: 10.1057/palgrave.jors.2601860

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.