Document Type : Exploratory

Authors

1 Assistant Professor, Institute for Science and Technology Studies, Shahid Beheshti University, Tehran, Iran

2 Ph.D Candidate, Department of Public of Administration, University of Tehran, Tehran, Iran.

Abstract

Achieving the goals and mission of the organization as well as competitiveness in the chaotic world today is only realized in the light of the attention paid to organizational vulnerability. This research is one of the first attempts to provide a model for assessing the vulnerability of organizations to various types of disorders. To this end, in order to identify the indicators of organizational vulnerability assessment, textbooks, articles and research projects related to the subject, they were analyzed and institutionalized and the main indicators and sub-indicators were identified. Then, in order to observe the indicators and evaluate the indicators that were identified in the previous stage, semi-structured interview technique and fuzzy seven-dimensional questionnaire were used. Ultimately, the Ishikawa Fuzzy Delphi technique was used to reach consensus on the indices. Finally, three main dimensions and 13 main indicators were identified as indicators of organizational vulnerability assessment.


Keywords

Adger, W. N. (2006). “Vulnerability”. Global environmental change, 16(3), 268-281.
Aleksić, A., Stefanović, M., Tadić, D. & Arsovski, S. (2014). “A fuzzy model for assessment of organization vulnerability”. Measurement, 51, 214-223.
Andersson, T., Cäker, M., Tengblad, S. & Wickelgren, M. (2019). “Building traits for organizational resilience through balancing organizational structures”. Scandinavian Journal of Management, 35(1), 36-45.
Arboleda, C. A., Abraham, D. M., Richard, J. P.,& Lubitz, R. (2009). “Vulnerability assessment of health care facilities during disaster events”. Journal of Infrastructure Systems, 15(3), 149–161.
Baker, S. M. (2009). “Vulnerability and resilience in natural disasters: a marketing and public policy perspective”. Journal of Public Policy & Marketing, 28(1), 114-123.
Baltar, F. & Ignasi, B. (2012), “Social research 2.0: virtual snowball sampling method using Facebook.” Internet Research, 22(1), 57-74.
Braun, V. & Clarke, V. (2006). “Using thematic analysis in psychology.” Qualitative Research in Psychology, 3(2), 77-101.
Burnard, K., Bhamra, R. & Tsinopoulos, C. (2018). “Building Organizational Resilience: Four Configurations”. IEEE transactions on engineering management, 65(3), 351-362.
Cardona, O.D., van Aalst, M.K., Birkmann, J.,  Fordham, M., McGregor, G., Perez, R., Pulwarty, R.S., Schipper, E.L.F.  & Sinh, B.T. (2012). Determinants of risk: exposure and vulnerability. In: Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation [Field, C.B., V. Barros, T.F. Stocker, D. Qin, D.J. Dokken, K.L. Ebi, M.D. Mastrandrea, K.J. Mach, G.-K. Plattner, S.K. Allen, M. Tignor, and P.M. Midgley (eds.)]. A Special Report of Working Groups I and II of the Intergovernmental Panel on Climate Change (IPCC). Cambridge University Press, Cambridge, UK, and New York, NY, USA, 65-108.
Chang, Y. H. (1998). Transportation plan appraisal and decision making-discussion and application of the fuzzy theory, Hwatai, Taipei.
Chen, M. K. & Wang, S. C. (2010). “The use of a hybrid fuzzy-Delphi-AHP approach to develop global business intelligence for information service firms,” Expert Systems with Applications. 37, 7394-7407.
Clusel S., Guarnieri, F., Martin, C. & Lagarde, D. (2013). Assessing the vulnerability of SMEs: a qualitative analysis. in: 22nd European Safety and Reliability Conference – ESREL 2013, Amsterdam, Netherlands.
Clusel, S., Guarnieri, F., Martin, C. & Lagarde, D. (2013). Assessing the vulnerability of SMEs: a qualitative analysis. In 22nd European Safety and Reliability Conference-ESREL 2013 (pp. 8-pages). CRC Press.
Creswell, J. & Miller, D.  (2000). “Determining Validity in Qualitative Inquiry”. Theory into Practice, 39(3), 124–30.
Cutter, S. L., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E. & Webb, J. (2008). “A place-based model for understanding community resilience to natural disasters”. Global environmental change, 18(4), 598-606.
Dabson, B., Colleen, M. H. & Kathleen, K. M. (2012). Regional Resilience, RUPRI Rural Futures Lab Harry S Truman School of Public Affairs, University of Missouri, February 2012.
Davies, M.A.P.(1994). “A Multicriteria Decision Model Application for Managing Group Decisions”. The Journal of the Operational Research Society, 45. 47-58.
Ezell, B. C. (2007). “Infrastructure Vulnerability Assessment Model (I‐VAM)”. Risk Analysis, 27(3), 571-583.
Gaillard, J. C. (2010). “Vulnerability, capacity and resilience: perspectives for climate and development policy”. Journal of International Development, 22(2), 218-232.
Gallopín, G. C. (2006). “Linkages between vulnerability, resilience, and adaptive capacity”. Global environmental change, 16 (3), 293-303.
Haimes, Y. Y. & Longstaff, T. (2002). “The role of risk analysis in the protection of critical infrastructures against terrorism”. Risk Analysis, 22(3), 439-44.
Hosseini, A., Zolfagharzadeh, M.M., Sadabadi, A.A., Aslani, A. & Jafari, H. (2018). “Social Acceptance of Renewable Energy in Developing Countries: Challenges and Opportunities”. Distributed Generation & Alternative Energy Journal,  33(1), 31-48.
Hsu T.H. & Yang, T.H. (2000) “Application of fuzzy analytic hierarchy process in the selection of advertising media.” Journal of Management and Systems, 7, 583-99.
Ishikawa, A., Amagasa, M., Shiga, T., Tomizawa, G., Tatsuta, R. & Mieno, H. (1993). “The max–min Delphi method and fuzzy Delphi method via fuzzy integration”. Fuzzy Sets and Systems, 5, 241–53.
ISO, Risk management-principles and guidelines, ISO 31000:2009
Jagli, M. & Temkar, M. (2013). The Unified Approach For Organizational Network Vulnerability Assessment. arXiv preprint arXiv:1310.2365.
Klir, G. & Yuan, B. (1995). Fuzzy sets and fuzzy logic – Theory and application. New Jersey: Prentice-Hall Inc.
Kuo Y.-F. & Chen P. C. (2008). “Constructing performance appraisal indicators for mobility of the service industries using fuzzy delphi method.” Journal of Expert Systems with Applications, 35, 1930-39.
Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Sage Publications, Thousand Oaks California.
Lin, C. H., Chen, C. H. & Laih, C. S. (2008). A study and implementation of vulnerability assessment and misconfiguration detection. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE (pp. 1252-1257). IEEE.
Liu, W., Zhu, Y. & Wang, Y. (2011, May). Organizational vulnerability: New perspective in risk management research. In Business Management and Electronic Information (BMEI), 2011 International Conference on (Vol. 1, pp. 708-712). IEEE.
Mayunga, J. S. (2007). Understanding and Applying the Concept of Community Disaster Resilience: A capital-based approach. Summer academy for social vulnerability and resilience building, 1-16.
Mikhailov, L. (2003). “Deriving priorities from fuzzy pairwise comparison judgements”. Fuzzy Sets and Systems, 134. 365-385.
O'Brien, K., Sygna, L. & Haugen, J. E. (2004). “Vulnerable or resilient? A multi-scale assessment of climate impacts and vulnerability in Norway”. Climatic change, 64(1-2), 193-225.
Okoli C. & Pawlowski, S.D. (2004). “The Delphi method as a research tool: an example, design considerations and applications.” Information and Management, 42, 15-29.
Smith, D. (2005). “Business (not) as usual: crisis management, service recovery and the vulnerability of organisations”. Journal of Services Marketing, 19(5), 309-320.
Solano, E. (2010). Methods for assessing vulnerability of critical infrastructure. Research Triangle Park, NC.
Wagner, S. M. & Neshat, N. (2010). “Assessing the vulnerability of supply chains using graph theory”. International Journal of Production Economics, 126(1), 121-129.
Zolfagharzadeh, M. M., Alirez Aslani. A. R. Sadabadi, A. A.,  Sanaei, M., Lesan Toosi, F.,   Hajari,  M. (2017). “Science and Technology Diplomacy: a Framework at the National Level”. Journal of Science and Technology Policy Management, 8(2) 92-128.