Network Theory in Risk Assessment
Encyclopedia
A network is an abstract structure capturing only the basics of connection patterns and little else. Because it is a generalized pattern, tools developed for analyzing, modeling
Mathematical model
A mathematical model is a description of a system using mathematical concepts and language. The process of developing a mathematical model is termed mathematical modeling. Mathematical models are used not only in the natural sciences and engineering disciplines A mathematical model is a...

 and understanding networks can theoretically be implemented across disciplines. As long as a system can be represented by a network, there is an extensive set of tools – mathematical, computational
Computation
Computation is defined as any type of calculation. Also defined as use of computer technology in Information processing.Computation is a process following a well-defined model understood and expressed in an algorithm, protocol, network topology, etc...

, and statistical – that are well-developed and if understood can be applied to the analysis of the system of interest.
Tools that are currently employed in risk assessment
Risk assessment
Risk assessment is a step in a risk management procedure. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat...

 are often sufficient, but model complexity and limitations of computational power can tether risk assessors to involve more causal connections and account for more Black Swan
Black swan theory
The black swan theory or theory of black swan events is a metaphor that encapsulates the concept that The event is a surprise and has a major impact...

 event outcomes (Black Swan events are events that are rare, quite impossible to predict, and yet capable of catastrophic impacts. September 11 attacks and Hurricane Katrina
Hurricane Katrina
Hurricane Katrina of the 2005 Atlantic hurricane season was a powerful Atlantic hurricane. It is the costliest natural disaster, as well as one of the five deadliest hurricanes, in the history of the United States. Among recorded Atlantic hurricanes, it was the sixth strongest overall...

 are two examples). By applying network theory
Network theory
Network theory is an area of computer science and network science and part of graph theory. It has application in many disciplines including statistical physics, particle physics, computer science, biology, economics, operations research, and sociology...

 tools to risk assessment, computational limitations may be overcome and result in broader coverage of events with a narrowed range of uncertainties.

Decision-making processes are not incorporated into routine risk assessments; however, they play a critical role in such processes. It is therefore very important for risk assessors to minimize confirmation bias
Confirmation bias
Confirmation bias is a tendency for people to favor information that confirms their preconceptions or hypotheses regardless of whether the information is true.David Perkins, a geneticist, coined the term "myside bias" referring to a preference for "my" side of an issue...

 by carrying out their analysis and publishing their results with minimal involvement of external factors such as politics, media, and advocates. In reality, however, it is nearly impossible to break the iron triangle among politicians, scientists (in this case, risk assessors), and advocates and media. Risk assessors need to be sensitive to the difference between risk studies and risk perceptions. One way to bring the two closer is to provide decision-makers with data they can easily rely on and understand. Employing networks in the risk analysis process can visualize causal relationships and identify heavily-weighted or important contributors to the probability of the critical event .

A "bow-tie" diagram, cause-and-effect diagram, Bayesian network
Bayesian network
A Bayesian network, Bayes network, belief network or directed acyclic graphical model is a probabilistic graphical model that represents a set of random variables and their conditional dependencies via a directed acyclic graph . For example, a Bayesian network could represent the probabilistic...

 (a directed acyclic network) and fault trees are few examples of how network theories can be applied in risk assessment.

In epidemiology risk assessments (Figure 7 and 9), once a network model was constructed, we can visually see then quantify and evaluate the potential exposure or infection risk of people related to the well-connected patients (Patient 1, 6, 35, 130 and 127 in Figure 7) or high-traffic places (Hotel M in Figure 9). In ecological risk assessments (Figure 8), through a network model we can identify the keystone species
Keystone species
A keystone species is a species that has a disproportionately large effect on its environment relative to its abundance. Such species play a critical role in maintaining the structure of an ecological community, affecting many other organisms in an ecosystem and helping to determine the types and...

 and determine how wide spread the impacts will extend from the potential hazards being investigated.

Risk Assessment Key Components

Risk assessment is a method for dealing with uncertainty. For it to be beneficial to the overall risk management and decision making process, it must be able to capture extreme and catastrophic events. Risk assessment involves two parts: risk analysis and risk evaluation, although the term “risk assessment” can be seen used indistinguishable with “risk analysis”. In general, risk assessment can be divided into these steps:
  1. Plan and prepare the risk analysis.
  2. Define and delimit the system and the scope of the analysis.
  3. Identify hazards and potential hazardous events.
  4. Determine causes and frequency of each hazardous event.
  5. Identify accident scenarios (i.e. even sequences) that may be initiated by each hazardous event.
  6. Select relevant and typical accident scenarios.
  7. Determine the consequences of each accident scenario.
  8. Determine the frequency of each accident scenario.
  9. Assess the uncertainty.
  10. Establish and describe the risk picture.
  11. Report the analysis.
  12. Evaluate the risk against risk acceptance criteria
  13. Suggest and evaluate potential risk-reducing measures.


Naturally, the number of steps required varies with each assessment. It depends on the scope of the analysis and the complexity of the study object. Because these is always varies degrees of uncertainty involved in any risk analysis process, sensitivity and uncertainty analysis are usually carried out to mitigate the level of uncertainty and therefore improve the overall risk assessment result.

Network Theory Key Components

A network is a simplified representation that reduces a system to an abstract structure. Simply put, it is a collection of points linked together by lines. Each point is known as a “vertex
Vertex (graph theory)
In graph theory, a vertex or node is the fundamental unit out of which graphs are formed: an undirected graph consists of a set of vertices and a set of edges , while a directed graph consists of a set of vertices and a set of arcs...

” (multiple: “vertices”) or “nodes”, and each line as “edges” or “links”. Network modeling and studying have already been applied in many areas, including computer, physical, biological, ecological, logistical and social science. Through the studying of these models, we gain insights into the nature of individual components (i.e. vertices), connections or interactions between those components (i.e. edges), as well as the pattern of connections (i.e. network).

Undoubtedly, modifications of the structure (or pattern) of any given network can have a big effect on the behavior of the system it depicts. For example, connections in a social network affect how people communicate, exchange news, travel, and, less obviously, spread diseases. In order to gain better understanding of how each of these systems functions, some knowledge of the structure of the network is necessary.

Basic Terminology

Small-World Effect
The small-world effect is one of the most remarkable network phenomena. It describes a finding that in many (perhaps most) networks the mean path distances between vertices are surprisingly small. It has many implications in various areas of network studies. For instance, in social network
Social network
A social network is a social structure made up of individuals called "nodes", which are tied by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige.Social...

, one can ruminate how fast a rumor (or a contagious disease) is spread in a community. From a mathematical point of view, since path lengths in networks are typically scale as log n (where n = number of network vertices), it is only logical it remains a small number even with large complex networks.

Another idea comes along with the small-world effect is called funneling. It was derived from a social network experiment
Small world experiment
The small world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small world type network...

 conducted by the experimental psychologist Stanley Milgram
Stanley Milgram
Stanley Milgram was an American social psychologist most notable for his controversial study known as the Milgram Experiment. The study was conducted in the 1960s during Milgram's professorship at Yale...

 in the 1960s. In that experiment he concluded, along with the small-world effect phenomenon, that in any given social network, there were always few that were especially well connected. These few individuals were therefore responsible for the connection between any members and the rest of the world.


Degree, Hubs, and Paths
Degree of a vertex is the number of edges connected to it. For example, on Figure 4, vertex 3 has a degree of five. Hubs are vertices in a network with a relatively higher degree. Vertex 3 again is a good example. In a social network, hubs can mean individuals with many acquaintances. In risk assessment, it can mean a hazardous event with multiple triggers (or the causal part of a bow-tie diagram). A path in a network is a route between a vertex and another across the network. From the same figure, an example of a path from vertex 1 to 6 can be 1→5→3→6.


Centrality
Centrality
Centrality
Within graph theory and network analysis, there are various measures of the centrality of a vertex within a graph that determine the relative importance of a vertex within the graph...

 is a measure of how important (or central) certain vertices are in a network. It can be measured by counting the number of edges connected to it (i.e its degree). The vertices with the highest degree therefore have a high degree centrality.
Degree centrality can have many implications. In a social network, a person with high degree centrality may have more influence over others, more access to information, or more opportunities than those with fewer connections. In a citation network, a paper with high degree centrality may suggest it is more influential and thus has a greater impact on its respective area of research.

Eigenvector centrality is an extension of the concept of degree centrality, based on the fact that in many networks not all vertices have the same weight or importance. A vertex's importance in its network increases if it has more connections to important vertices. Eigenvector centrality, therefore, can be view as a centrality scoring system for not just one but its neighboring vertices as well.


Components
Subgroups, or subsets of vertices, in a disconnected network. Disconnected network means in such network, there is at least a pair of vertices that no path connecting between them at all. Vice verse is known as a connected network, where all vertices within are connected by at least one path. One can therefore say a connected network has only one component.


Directed Networks

Networks of which each edge has a direction from one vertex to another. The edges are therefore known as directed edges. Example of such network include a link from the reference section on this page which will leads you to another, but not the other way around. In terms of food web, a prey eaten by a predator is another example.

Directed networks can be cyclic or acyclic. A cyclic directed network is one with a closed loop of edges. An acyclic directed network does not contain such loop. Since a self-edge – an edge connecting a vertex to itself – is considered a cycle, it is therefore absent from any acyclic network.

A Bayesian network
Bayesian network
A Bayesian network, Bayes network, belief network or directed acyclic graphical model is a probabilistic graphical model that represents a set of random variables and their conditional dependencies via a directed acyclic graph . For example, a Bayesian network could represent the probabilistic...

 is an example of an acyclic directed network.


Weighted Network
In reality, not all edges shares the same importance or weight (connections in a social network and keystone species in a food web, for example). A weighted network adds such element to its connections. It is widely used in genomic and systems biologic applications.


Trees
Undirected networks with no closed loops. A tree can be part of a network but isolated as a separate component. If all parts of a network are trees, such network is called a forest. An administrative body can sometime be viewed as a forest.

Social Network

Early social network studies can be traced back to the end of the nineteenth century. However well-documented studies and foundation of this field are usually attributed to a psychiatrist named Jacob Moreno. He published a book entitled Who Whall Survive? in 1934 which laid out the foundation for sociometry (later known as social network analysis).

Another famous contributor to the early development of social network analysis is a perimental psychologist known as Stanley Milgram
Stanley Milgram
Stanley Milgram was an American social psychologist most notable for his controversial study known as the Milgram Experiment. The study was conducted in the 1960s during Milgram's professorship at Yale...

. His "small-world" experiments
Small world experiment
The small world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small world type network...

 gave rise to concepts such as six degrees of separation
Six degrees of separation
Six degrees of separation refers to the idea that everyone is on average approximately six steps away, by way of introduction, from any other person on Earth, so that a chain of, "a friend of a friend" statements can be made, on average, to connect any two people in six steps or fewer...

 and well-connected acquaintances (also known as "sociometric superstars"). This experiment was recently repeated by Dodds et al. by means of email messages, and the basic results were similar to Milgram's. The estimated true average path length (that is, the number of edges the email message has to pass from one unique individual to the intended targets in different countries) for the experiment was around five to seven, which is not much deviated from the original six degree of separation.

Food Web

A food web
Food web
A food web depicts feeding connections in an ecological community. Ecologists can broadly lump all life forms into one of two categories called trophic levels: 1) the autotrophs, and 2) the heterotrophs...

, or food chain
Food chain
A food web depicts feeding connections in an ecological community. Ecologists can broadly lump all life forms into one of two categories called trophic levels: 1) the autotrophs, and 2) the heterotrophs...

, is an example of directed network which describes the prey-predator relationship in a given ecosystem. Vertices in this type of network represent species, and the edges the prey-predator relationship. A collection of species may be represented by a single vertex if all members in that collection prey upon and are preyed on by the same organisms. A food web is often acyclic, with few exceptions such as adults preys on juveniles and parasitism.
Note: In the food web
Food web
A food web depicts feeding connections in an ecological community. Ecologists can broadly lump all life forms into one of two categories called trophic levels: 1) the autotrophs, and 2) the heterotrophs...

 main article, a food web was depicted as cyclic. That is based on the flow of the carbon and energy sources in a given ecosystem. The food web described here based solely on prey-predator roles; Organisms active in the carbon
Carbon cycle
The carbon cycle is the biogeochemical cycle by which carbon is exchanged among the biosphere, pedosphere, geosphere, hydrosphere, and atmosphere of the Earth...

 and nitrogen cycles
Nitrogen cycle
The nitrogen cycle is the process by which nitrogen is converted between its various chemical forms. This transformation can be carried out by both biological and non-biological processes. Important processes in the nitrogen cycle include fixation, mineralization, nitrification, and denitrification...

 (such as decomposers and fixers) are not considered in this description.

Epidemiology

Epidemiology
Epidemiology
Epidemiology is the study of health-event, health-characteristic, or health-determinant patterns in a population. It is the cornerstone method of public health research, and helps inform policy decisions and evidence-based medicine by identifying risk factors for disease and targets for preventive...

 is closely related to social network. Contagious diseases can spread through connection networks such as work space, transportation, intimate body contacts and water system (see Figure 7 and 9). Though it only exists virtually, a computer viruses spread across internet networks are not much different than their physical counterparts. Therefore, understanding each of these network patterns can no doubt aid us in more precise prediction of the outcomes of epidemics and preparing better disease prevention protocols.

The simplest model of infection is presented as a SI (susceptible - infected) model. Most diseases, however, do not behave in such simple manner. Therefore many modifications to this model were made such as the SIR (susceptible – infected – recovered), the SIS (the second S denotes reinfection) and SIRS models. The idea of latency is taken into accounts in models such as SEIR (where E stands for exposed). The SIR model is also known as the Reed-Frost model.

To factor these into an outbreak network model, one must consider the degree distributions of vertices in the giant component of the network (outbreaks in small components are isolation and die out quickly, which does not allow the outbreaks to become epidemics). Theoretically, weighted network can provide more accurate information on exposure probability of vertices but more proofs are needed. Pastor-Satorras et al. pioneered much work in this area, which began with the simplest form (the SI model) and applied to networks drawn from the configuration model.

The biology of how an infection causes disease in an individual is complicated and is another type of disease pattern specialists are interested in (a process known as pathogenesis
Pathogenesis
The pathogenesis of a disease is the mechanism by which the disease is caused. The term can also be used to describe the origin and development of the disease and whether it is acute, chronic or recurrent...

 which involves immunology of the host and virulence factors
Virulence factor
Virulence factors are molecules expressed and secreted by pathogens that enable them to achieve the following:* colonization of a niche in the host...

of the pathogen).
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK