Abstract

In this chapter we discuss research findings from social network analysis relevant to vulnerability theory. Although the invention and use of network methods predates the creation of vulnerability theory by 40 years (Moreno, 1934; O’Keefe, Westgate, & Wisner, 1976) the application of network analysis to vulnerability theory has been quite recent and limited. Nevertheless, network methods are well suited to address several of the general assumptions underlying vulnerability theory. We expect vulnerability researchers in the future to make increasing use of network methods.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call