SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Jordan F. Int. J. Crit. Infrastruct. 2008; 4(1/2): 206.

Copyright

(Copyright © 2008, Inderscience Publishers)

DOI

10.1504/IJCIS.2008.016101

PMID

unavailable

Abstract

A vulnerability analysis of possible use in security studies is presented. The analysis of the London underground network suggests that the stations bombed on 7 July, 2005 may not have been chosen randomly. From the viewpoint of effectively disturbing the transport system, nearly the best choice was made out of roughly 3 million possible combinations for attacking three stations. By comparing the underground networks of London, Tokyo and Budapest, we discuss the vulnerability of their underground networks. It seems to be plausible that such calculations can be made by softwares used widely in social network analysis. The predictive power of network analysis can be helpful in setting priorities in defence.


KEYWORDS: network analysis; betweenness centrality; London; underground networks; terrorism; target prediction; target selection; terrorist threat; terrorist targets; critical infrastructures; security; Tokyo; Budapest; vulnerability; social network analysis; defence priorities; emergency management; terrorist attacks.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print