Road network vulnerability analysis: Conceptualization, implementation and application

•A three-step process for road network vulnerability analysis is described.•First, we define conceptual vulnerability measures.•Second, we derive and implement practical indicators and algorithms.•Third, we apply the methodology in case studies of the Swedish road network.•Considering the whole proc...

Full description

Saved in:
Bibliographic Details
Published inComputers, environment and urban systems Vol. 49; pp. 136 - 147
Main Authors Jenelius, Erik, Mattsson, Lars-Göran
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.01.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:•A three-step process for road network vulnerability analysis is described.•First, we define conceptual vulnerability measures.•Second, we derive and implement practical indicators and algorithms.•Third, we apply the methodology in case studies of the Swedish road network.•Considering the whole process connects different domains of research. The paper describes a process for road network vulnerability analysis, from (i) the conceptual definition of vulnerability measures, through (ii) the derivation of practical indicators and models adapted to available data and their implementation in computational procedures, to (iii) the application of the methodology in case studies. In the first step, the vulnerability concept is defined and quantified formally, and distinct user and technological perspectives are highlighted. In the second step, the conceptual measures are adapted and calculated according to the conditions, requirements and goals of a particular analysis. The paper describes practical indicators and algorithms developed for large-scale vulnerability analyses. For the third step, the paper analyzes both single link closures and area-covering disruptions and the distribution of impacts among different regions in a case study on the Swedish road transport system. The spatial patterns are put in connection with the regional variations in location and travel patterns and network density. Finally, the implications for policy and possible approaches to vulnerability management are discussed.
ISSN:0198-9715
1873-7587
1873-7587
DOI:10.1016/j.compenvurbsys.2014.02.003