{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:39:53Z","timestamp":1770748793017,"version":"3.50.0"},"reference-count":0,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:p>Given the high vulnerability of social system to disruptions, it is very critical to make scientific analysis on the vulnerability of social system and further manage its vulnerability, especially for today's highly networked society. The focus of this work is on the dynamic analysis for the vulnerability of social system under considering the cascading phenomenon. Considering that a social system with interconnected agents is better modeled as a network than as a linear chain, we introduce a networked approach to investigate the structural characteristics of social system first. Then a social system is modeled as a social network graph. Furthermore, a cascading model and a new vulnerability measurement based on the model are proposed to analyze the vulnerability of social network. Finally, the illustrative example of a real social system is given to indicate the effectiveness and usefulness of the proposed framework. The study provides some new insights about the vulnerability of social system, and is also helpful to discover the global potential behaviors during cascading failure spreading within social system.<\/jats:p>","DOI":"10.3233\/ifs-141289","type":"journal-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T19:21:12Z","timestamp":1575314472000},"page":"189-197","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["A networked approach to dynamic analysis of social system vulnerability"],"prefix":"10.1177","volume":"28","author":[{"given":"Yu","family":"Zeng","sequence":"first","affiliation":[{"name":"School of Automation, Huazhong University of Science and Technology, Wuhan, China"},{"name":"School of Science, Hubei University of Technology, Wuhan, China"}]},{"given":"Renbin","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Automation, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"179","published-online":{"date-parts":[[2015,1]]},"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-141289","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-141289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:22:47Z","timestamp":1770711767000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IFS-141289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.3233\/IFS-141289"],"URL":"https:\/\/doi.org\/10.3233\/ifs-141289","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}