Making the Connection
Chapter 8: Conclusions
The opportunity to rethink multiple objectives for transport, the environment, and security that are extensively networked builds on a very long history in each of these areas. Combining them in ways that achieve synergy or at least acknowledge and reconcile conflict is imperative. The trajectory of the deterioration of environmental conditions so eloquently put forth by Speth (2008) signals a collision between transport and the environment, even though in some areas the environment may be showing some improvement. These environmental conditions are coupled with growing challenges to security. Cities are becoming battlefields. As Savitch (2008) notes, most attacks occur in cities. Yet cities small and large remain always vibrant, given the ability to move within and among them. Thus, transport and the many services it represents help to weave a rich fabric that enables those who inhabit cities to retain their mobility and access in the context of the environment and security. Transport has an intricate relationship with environment and security. These three systems share key nodes and have links in common that when disrupted can have catastrophic effects. When such catastrophes occur, the individual systems are not only affected but also the connections among them, given how impacts are often transferred among them as the previous chapters have shown. In times of emergencies, compromises have been made, such as the ability to consume less and reorient behavior in ways that are not only less demanding on the environment but also provide security against a compromised resource. Behavior can change...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.