Main article: Risk assessment
Risk assessment is a method for dealing with uncertainty. For it to be beneficial to the overall risk management and decision making process, it must be able to capture extreme and catastrophic events. Risk assessment involves two parts: risk analysis and risk evaluation, although the term “risk assessment” can be seen used indistinguishable with “risk analysis”. In general, risk assessment can be divided into these steps:8
Naturally, the number of steps required varies with each assessment. It depends on the scope of the analysis and the complexity of the study object.9 Because these is always varies degrees of uncertainty involved in any risk analysis process, sensitivity and uncertainty analysis are usually carried out to mitigate the level of uncertainty and therefore improve the overall risk assessment result.
Main article: Network theory
A network is a simplified representation that reduces a system to an abstract structure. Simply put, it is a collection of points linked together by lines. Each point is known as a “vertex” (multiple: “vertices”) or “nodes”, and each line as “edges” or “links”.10 Network modeling and studying have already been applied in many areas, including computer, physical, biological, ecological, logistical and social science. Through the studying of these models, we gain insights into the nature of individual components (i.e. vertices), connections or interactions between those components (i.e. edges), as well as the pattern of connections (i.e. network).
Undoubtedly, modifications of the structure (or pattern) of any given network can have a big effect on the behavior of the system it depicts. For example, connections in a social network affect how people communicate, exchange news, travel, and, less obviously, spread diseases. In order to gain better understanding of how each of these systems functions, some knowledge of the structure of the network is necessary.
Small-World Effect
Further information: Small-world network
Degree, Hubs, and Paths
Centrality
Components
Directed Networks
Main article: Directed graph
Weighted Network
Main article: weighted network
Trees
Main article: Social Network
Early social network studies can be traced back to the end of the nineteenth century. However well-documented studies and foundation of this field are usually attributed to a psychiatrist named Jacob Moreno. He published a book entitled Who Whall Survive? in 1934 which laid out the foundation for sociometry (later known as social network analysis).
Another famous contributor to the early development of social network analysis is a perimental psychologist known as Stanley Milgram. His "small-world" experiments gave rise to concepts such as six degrees of separation and well-connected acquaintances (also known as "sociometric superstars"). This experiment was recently repeated by Dodds et al. by means of email messages, and the basic results were similar to Milgram's. The estimated true average path length (that is, the number of edges the email message has to pass from one unique individual to the intended targets in different countries) for the experiment was around five to seven, which is not much deviated from the original six degree of separation.14
See also: ecological network
A food web, or food chain, is an example of directed network which describes the prey-predator relationship in a given ecosystem. Vertices in this type of network represent species, and the edges the prey-predator relationship. A collection of species may be represented by a single vertex if all members in that collection prey upon and are preyed on by the same organisms. A food web is often acyclic, with few exceptions such as adults preys on juveniles and parasitism.15
Main article: epidemic model
Further information: compartmental models in epidemiology
Epidemiology is closely related to social network. Contagious diseases can spread through connection networks such as work space, transportation, intimate body contacts and water system (see Figure 7 and 9). Though it only exists virtually, a computer viruses spread across internet networks are not much different from their physical counterparts. Therefore, understanding each of these network patterns can no doubt aid us in more precise prediction of the outcomes of epidemics and preparing better disease prevention protocols.
The simplest model of infection is presented as a SI (susceptible - infected) model. Most diseases, however, do not behave in such simple manner. Therefore, many modifications to this model were made such as the SIR (susceptible – infected – recovered), the SIS (the second S denotes reinfection) and SIRS models. The idea of latency is taken into accounts in models such as SEIR (where E stands for exposed). The SIR model is also known as the Reed-Frost model.16
To factor these into an outbreak network model, one must consider the degree distributions of vertices in the giant component of the network (outbreaks in small components are isolation and die out quickly, which does not allow the outbreaks to become epidemics). Theoretically, weighted network can provide more accurate information on exposure probability of vertices but more proofs are needed. Pastor-Satorras et al. pioneered much work in this area, which began with the simplest form (the SI model) and applied to networks drawn from the configuration model.17
The biology of how an infection causes disease in an individual is complicated and is another type of disease pattern specialists are interested in (a process known as pathogenesis which involves immunology of the host and virulence factors of the pathogen).
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.2 ↩
National Research Council (NRC). Red Book Paradigm. Risk Assessment in the Federal Government: Understanding the Process. Washington D.C.: National Academy Press, 1983. ↩
Pielke Jr., Roger A. Policy, Politics and Perspective. Nature 416 (2002): 367-68. ↩
Slovic, Paul. Perception of Risk. Science 236 (1987): 280-85. ↩
National Research Council (NRC). Orange Book Paradigm. Understanding Risk: Informing Decisions in a Democratic Society. Washington D.C.: National Academy Press, 1996. ↩
Rausand, Marvin. Risk Assessment: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons, 2011. p.295. ↩
Rausand, Marvin. Risk Assessment: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons, 2011. p.266-302. ↩
Rausand, Marvin. "Chapter 5 Risk Management." Risk Assessment: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons, 2011. p.117-36. ↩
Rausand, Marvin. Risk Assessment: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons, 2011. p.124. ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.1 ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.241 ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.243 ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.168 ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.54-58 ↩
Newman, Mark E. J. “Chapter 5.3 Ecological Networks”. Networks: an Introduction. Oxford: Oxford UP, 2010. p.99-104 ↩
http://www.stat.columbia.edu/~regina/research/risk.pdf [bare URL PDF] http://www.stat.columbia.edu/~regina/research/risk.pdf ↩
Newman, Mark E. J. Networks: an Introduction. Oxford: Oxford UP, 2010. p.657-664 ↩