Adger, W. N. (2006). “Vulnerability”. Global environmental change, 16(3), 268-281.
Aleksić, A., Stefanović, M., Tadić, D. & Arsovski, S. (2014). “A fuzzy model for assessment of organization vulnerability”. Measurement, 51, 214-223.
Andersson, T., Cäker, M., Tengblad, S. & Wickelgren, M. (2019). “Building traits for organizational resilience through balancing organizational structures”. Scandinavian Journal of Management, 35(1), 36-45.
Arboleda, C. A., Abraham, D. M., Richard, J. P.,& Lubitz, R. (2009). “Vulnerability assessment of health care facilities during disaster events”. Journal of Infrastructure Systems, 15(3), 149–161.
Baker, S. M. (2009). “Vulnerability and resilience in natural disasters: a marketing and public policy perspective”. Journal of Public Policy & Marketing, 28(1), 114-123.
Baltar, F. & Ignasi, B. (2012), “Social research 2.0: virtual snowball sampling method using Facebook.” Internet Research, 22(1), 57-74.
Braun, V. & Clarke, V. (2006). “Using thematic analysis in psychology.” Qualitative Research in Psychology, 3(2), 77-101.
Burnard, K., Bhamra, R. & Tsinopoulos, C. (2018). “Building Organizational Resilience: Four Configurations”. IEEE transactions on engineering management, 65(3), 351-362.
Cardona, O.D., van Aalst, M.K., Birkmann, J., Fordham, M., McGregor, G., Perez, R., Pulwarty, R.S., Schipper, E.L.F. & Sinh, B.T. (2012). Determinants of risk: exposure and vulnerability. In: Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation [Field, C.B., V. Barros, T.F. Stocker, D. Qin, D.J. Dokken, K.L. Ebi, M.D. Mastrandrea, K.J. Mach, G.-K. Plattner, S.K. Allen, M. Tignor, and P.M. Midgley (eds.)]. A Special Report of Working Groups I and II of the Intergovernmental Panel on Climate Change (IPCC). Cambridge University Press, Cambridge, UK, and New York, NY, USA, 65-108.
Chang, Y. H. (1998). Transportation plan appraisal and decision making-discussion and application of the fuzzy theory, Hwatai, Taipei.
Chen, M. K. & Wang, S. C. (2010). “The use of a hybrid fuzzy-Delphi-AHP approach to develop global business intelligence for information service firms,” Expert Systems with Applications. 37, 7394-7407.
Clusel S., Guarnieri, F., Martin, C. & Lagarde, D. (2013). Assessing the vulnerability of SMEs: a qualitative analysis. in: 22nd European Safety and Reliability Conference – ESREL 2013, Amsterdam, Netherlands.
Clusel, S., Guarnieri, F., Martin, C. & Lagarde, D. (2013). Assessing the vulnerability of SMEs: a qualitative analysis. In 22nd European Safety and Reliability Conference-ESREL 2013 (pp. 8-pages). CRC Press.
Creswell, J. & Miller, D. (2000). “Determining Validity in Qualitative Inquiry”. Theory into Practice, 39(3), 124–30.
Cutter, S. L., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E. & Webb, J. (2008). “A place-based model for understanding community resilience to natural disasters”. Global environmental change, 18(4), 598-606.
Dabson, B., Colleen, M. H. & Kathleen, K. M. (2012). Regional Resilience, RUPRI Rural Futures Lab Harry S Truman School of Public Affairs, University of Missouri, February 2012.
Davies, M.A.P.(1994). “A Multicriteria Decision Model Application for Managing Group Decisions”. The Journal of the Operational Research Society, 45. 47-58.
Ezell, B. C. (2007). “Infrastructure Vulnerability Assessment Model (I‐VAM)”. Risk Analysis, 27(3), 571-583.
Gaillard, J. C. (2010). “Vulnerability, capacity and resilience: perspectives for climate and development policy”. Journal of International Development, 22(2), 218-232.
Gallopín, G. C. (2006). “Linkages between vulnerability, resilience, and adaptive capacity”. Global environmental change, 16 (3), 293-303.
Haimes, Y. Y. & Longstaff, T. (2002). “The role of risk analysis in the protection of critical infrastructures against terrorism”. Risk Analysis, 22(3), 439-44.
Hosseini, A., Zolfagharzadeh, M.M., Sadabadi, A.A., Aslani, A. & Jafari, H. (2018). “Social Acceptance of Renewable Energy in Developing Countries: Challenges and Opportunities”. Distributed Generation & Alternative Energy Journal, 33(1), 31-48.
Hsu T.H. & Yang, T.H. (2000) “Application of fuzzy analytic hierarchy process in the selection of advertising media.” Journal of Management and Systems, 7, 583-99.
Ishikawa, A., Amagasa, M., Shiga, T., Tomizawa, G., Tatsuta, R. & Mieno, H. (1993). “The max–min Delphi method and fuzzy Delphi method via fuzzy integration”. Fuzzy Sets and Systems, 5, 241–53.
ISO, Risk management-principles and guidelines, ISO 31000:2009
Jagli, M. & Temkar, M. (2013). The Unified Approach For Organizational Network Vulnerability Assessment. arXiv preprint arXiv:1310.2365.
Klir, G. & Yuan, B. (1995). Fuzzy sets and fuzzy logic – Theory and application. New Jersey: Prentice-Hall Inc.
Kuo Y.-F. & Chen P. C. (2008). “Constructing performance appraisal indicators for mobility of the service industries using fuzzy delphi method.” Journal of Expert Systems with Applications, 35, 1930-39.
Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Sage Publications, Thousand Oaks California.
Lin, C. H., Chen, C. H. & Laih, C. S. (2008). A study and implementation of vulnerability assessment and misconfiguration detection. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE (pp. 1252-1257). IEEE.
Liu, W., Zhu, Y. & Wang, Y. (2011, May). Organizational vulnerability: New perspective in risk management research. In Business Management and Electronic Information (BMEI), 2011 International Conference on (Vol. 1, pp. 708-712). IEEE.
Mayunga, J. S. (2007). Understanding and Applying the Concept of Community Disaster Resilience: A capital-based approach. Summer academy for social vulnerability and resilience building, 1-16.
Mikhailov, L. (2003). “Deriving priorities from fuzzy pairwise comparison judgements”. Fuzzy Sets and Systems, 134. 365-385.
O'Brien, K., Sygna, L. & Haugen, J. E. (2004). “Vulnerable or resilient? A multi-scale assessment of climate impacts and vulnerability in Norway”. Climatic change, 64(1-2), 193-225.
Okoli C. & Pawlowski, S.D. (2004). “The Delphi method as a research tool: an example, design considerations and applications.” Information and Management, 42, 15-29.
Smith, D. (2005). “Business (not) as usual: crisis management, service recovery and the vulnerability of organisations”. Journal of Services Marketing, 19(5), 309-320.
Solano, E. (2010). Methods for assessing vulnerability of critical infrastructure. Research Triangle Park, NC.
Wagner, S. M. & Neshat, N. (2010). “Assessing the vulnerability of supply chains using graph theory”. International Journal of Production Economics, 126(1), 121-129.
Zolfagharzadeh, M. M.,
Alirez Aslani. A. R.,
Sadabadi, A. A., Sanaei, M.,
Lesan Toosi, F., Hajari, M. (2017). “Science and Technology Diplomacy: a Framework at the National Level”.
Journal of Science and Technology Policy Management, 8(2) 92-128.