A Systems Thinking Approach For Project Vulnerability Management
A Systems Thinking Approach For Project Vulnerability Management
www.emeraldinsight.com/0368-492X.htm
K
41,1/2 A systems thinking approach for
project vulnerability management
Ludovic-Alexandre Vidal and Franck Marle
206 Laboratoire Genie Industriel, Ecole Centrale Paris, Malabry, France
Abstract
Purpose – The purpose of this paper is to develop the concept of project vulnerability in order to
focus on the weaknesses of a project system, instead of focusing on risk evaluation only. The paper
concentrates on a systems thinking-based view to highlight the potentially endangered elements of a
project, including its outcomes.
Design/methodology/approach – The paper gives a broad state of the art in many scientific
domains; a definition of project vulnerability; a description of a project vulnerability management
process, including identification, analysis and response plan; and a test on an industrial case
study.
Findings – The author’s project vulnerability management process permits one to concentrate
directly on the existing weaknesses of a project system, which may create potential damages
regarding the project values creation. By focusing on this system, response plans may be more
adapted to the existing short comings of the project.
Research limitations/implications – Some aspects of the vulnerability definition should be
refined, like the concepts of susceptibility or cruciality. Other promising works may focus on the
evaluation of the non-resistance and resilience, notably thanks to the introduction of interdependences
which exist in complex projects.
Practical implications – A case study was done on a decision support system (FabACT)
developed at Hôpital Européen Georges Pompidou Pharmacy department. The aim of this
project was to achieve a better balance between the workload and the efficiency of the compounding
unit.
Originality/value – The paper presents an innovative way to analyse a project’s vulnerability by
focusing on its existing weaknesses using a systems thinking-based approach.
Keywords Cybernetics, Project management, Risk management, Decision support systems,
Vulnerability, Complexity theory
Paper type Research paper
1. Introduction
As recent works or communications state it (Zhang, 2007), the concept of vulnerability
appears to be promising for efficient risk management, notably within the context of
project management. Indeed, it enables to have a more systems-oriented vision than the
traditional cindynics approach. This one focuses on the evaluation of risks, instead of
focusing on the weaknesses of a system facing these risks. Following a systemic
approach when coping with project risk management permits to reduce ambiguity by
increasing the awareness of the project system. We then aim at:
.
concentrating on a systems-thinking based view in order to highlight the
Kybernetes potentially endangered processes and elements of the project system, including
Vol. 41 No. 1/2, 2012
pp. 206-228
its outcomes; and
q Emerald Group Publishing Limited
0368-492X
.
focusing therefore on these elements in order to facilitate the identification and
DOI 10.1108/03684921211213043 analysis of potential negative events and damages on the system.
This paper aims at addressing the concept of project vulnerability by: Project
.
carrying out a broad state of the art in many scientific domains, in order to vulnerability
understand the concept of vulnerability and to implement it in the context of management
project management;
.
defining project vulnerability and its characteristics;
.
describing the steps of a project vulnerability management process in order to 207
permit the industrial application of the concept of vulnerability in projects;
. permitting the identification and analysis of project vulnerabilities thanks to a
systems thinking approach focusing on the potential degradation of the project
values creation processes; and
. testing the whole approach on a case study.
2. Background
Etymologically, being vulnerable means either being “capable of being physically or
emotionally injured, wounded or hurt”, either being “open to temptation, persuasion,
censure, etc.”, or being “liable or exposed to disease, disaster, etc.” Even though the
words vulnerable or invulnerable are thus commonly used in everyday life, little
insight has been given to the concept of vulnerability. This paragraph aims at drawing
a state of the art on the concept of vulnerability before applying it to project
management.
2.1 Quantitative analysis of recent publications in the field of vulnerability and in the
Web of Science database
As an illustration of the interest of the present research community for the notion of
vulnerability in different scientific fields, we carried out a review and classification of
the up to 2007 Web of Science publications which mentioned the world vulnerability in
their title. In total, 534 such publications were identified, which underlines the global
interest of the scientific community for this concept (Table I).
It must be noted that vulnerability seems to meet a growing interest in the scientific
community as shown on Figure 1.
Some conclusions appear to be interesting, even at a first reading of this short
survey of the Web of Science. Of these 534 publications, 86 per cent were related to only
two scientific topics (health, climatology and sustainable development) (Blaikie et al.,
2001). Moreover, this survey enlightens the lack of use of the concept of vulnerability in
industrial engineering (only 11 publications out of 534, i.e. 2 per cent), which motivates
even more to work on this concept in accordance with project management principles.
But following the general trends of this short survey, the following state of the art is
first carried out separately on the two most contributing topics: “health” and
“climatology and sustainable development”. Finally, it focuses on some works about
vulnerability in the fields of industrial engineering and project management.
2.2 Focus on the two most contributive fields: “health” and “climatology and sustainable
development”
As suggested by the short survey previously presented, a first literature review was
conducted over research works dealing with health or climatology and sustainable
development issues. First, it can be observed that some research works relate
K
Topic Total Global matter of interest Number of articles
41,1/2
Health 269 Psychology and psychiatry 91
(and behaviour factors)
Disease factors 85
Genetics 27
208 Response to treatment 21
Disease transmission 14
Diagnosis fiability 12
Global organs fragility 10
Healthcare management 9
Morbidity factors and 4
evaluation
Climatology and sustainable 193 Reaction of biological entities to 38
development environmental stresses and
biodiversity
Ethics and social development 36
Groundwaters, soils and source 35
waters pollution
Environmental management 26
Warming and climate change 25
Earthquakes and landslides 15
Floods and tsunamis 11
Storms, cyclones and rainfalls 5
Volcano eruptions and fires 2
Wind 1
Information technology 24 Communication and 11
information networks security
Software failure 7
Information systems 6
management
Military strategy and defence 13 Response to attacks 8
(terrorism, etc.)
Geopolotics and geostrategy 3
Military strategy 2
Industrial engineering 11 Industrial systems security 4
Knowledge management 3
Production management 2
Innovation management 1
Logistics 1
Project management 0
Construction and urbanism 11 Urban networks security 7
Structure resistance 4
Economics 4 Macroeconomics 3
Microeconomics 1
Physics 4 Nuclear science 1
Chaos 1
Electromagnetism 1
Table I. Materials resistance 1
Occurrences of the word Applied mathematics 4 Networks and graphs 2
vulnerability in the Insurance modelling 2
Web of Science Chemistry 1 Chemical reaction 1
publications in 2007 Total 534 534
700 Project
vulnerability
600
management
500
400 209
300
200
100 Figure 1.
Web of Science
publications the title of
0 which contains the word
vulnerability (1987-2007)
87
88
89
90
91
92
93
94
95
96
97
98
99
00
01
02
03
04
05
06
07
19
19
19
19
19
19
19
19
19
19
19
19
19
20
20
20
20
20
20
20
20
vulnerability to the presence of weaknesses (Luers et al., 2003; Scoones, 1998; Ellis,
2000). These weaknesses can be of different nature and can for instance impact the
activities, assets and outcomes of a system (Ellis, 2003).
Second, other papers insist on an aspect of vulnerability, which is the coexistence of
conditions of exposures to stresses/dangers and of a state of non-capacity to cope with
them. This is notably the case of (Maskrey, 1989) with natural hazards (Shi, 2001),
when addressing healthcare systems, or (Ezard, 2001) in the case of drug addiction.
Particularly, several works detail the notion of exposure (Watts and Bohle, 1993;
Blaikie et al., 1994), notably in contexts of crisis. This two-side aspect of vulnerability
can be synthesised using the definition of Chambers (1983): vulnerability is:
[. . .] the exposure to contingencies and stress, and difficulty coping with them. Vulnerability
has thus two sides: an external side of risk, shocks and stress to which an individual or
household is subject; and an internal side which is defencelessness, meaning a lack of means
to cope without damaging loss.
This expresses that damages (turned out consequences of risks) can be understood as
the coincidence between a dangerous event and a vulnerable ground. This coexistence
is notably modelled using stressor/receptor models (de Fur et al., 2007), with the
coexistence of environmental conditions (physical and social environment) and
receptor characteristics (at the individual level, or community level or population level).
Moreover, other works detail the non-capacity to cope with possibly damaging
events in terms of resistance and resilience, that is to say how individuals, groups or
parts of a system can resist to vulnerability, instantly or when recovering (Perry et al.,
2006; Dibben and Chester, 1999; Kelly and Adger, 1999). Finally, it can also be observed
in the literature that vulnerability is in essence context-dependent as underlined by
Strauss (1997) and Ellis (2003) who insist on its evolution over time and its
people-dependent perception.
K 2.3 Focus on industrial engineering, including project management
41,1/2 Theys (1987) underlines that in the field of industrial engineering and management,
“there are still too few languages and tools for analysing vulnerability”, which
motivates to develop them. However, some attempts were already done, like for
instance Bogataj and Bogataj (2007) who place the notion of vulnerability at the centre
of the value creation process, which is consistent with Schneider (2008). In order to
210 understand this possible degradations during the value creation process, systems
thinking-based models were developed (Hellström, 2007). Particularly, the works of
Durand (2007), which follow a complex systems approach, define vulnerability as
the “extent to which an organisation is able or not to cope with the dangers it is exposed
to”. This work explains that working on the notion of vulnerability permits to focus on
an organisation’s ability to resist to hazards and on the mechanisms that can weaken or
strengthen its overall functioning, behaviour and evolution. This also underlines that
possibly damaging events should be handled in accordance with their possible impact
on the core values of a project (or a system), given its complex structure.
Figure 2.
Project risk as an
impact due to coexistence
K (2) Project vulnerability analysis:
41,1/2 .
assigning a contribution rate of any of these elements to each value creation
process; and
.
identifying possible triggering events which can damage a given project
vulnerable element and analysing its resistance and resilience through a
stressor/receptor model.
212
(3) Project vulnerability response plan to cure the weaknesses of the project system
and prevent it from possible damages.
(4) Project vulnerability monitoring and control activity to watch over the project
evolution.
As a whole, these four steps are to constitute the project vulnerability management
process (Figure 3), which appears to be similar to the existing project risk management
processes as defined in IEC (1995), APM (1996), IEEE (2001), BSI (2002), AFNOR
(2003), ISO (2003), PMI (2004) and IPMA (2006). Each of them is developed in the
following paragraphs.
Vulnerability
Management
Planning
Vulnerability
Identification
Vulnerability
Analysis
Vulnerability
Response
Planning
Vulnerability
Monitoring
and Control
Figure 3.
The project vulnerability Lessons
management process learned
(1) the teleological pole of the project system, which permits to identify the Project
vulnerable stakes of the project (targeted created values); vulnerability
(2) the functional pole of the project system, which permits to identify the management
vulnerable processes/tasks of the project system; and
(3) the ontological pole of the project system, which permits to identify the
vulnerable elements (actors, resources, inputs of processes, etc.) of the project
system. 213
Then follows a reflexion on a stressor/receptor model to identify project process
vulnerabilities which are defined as triplets (value, process, event) and project
elementary vulnerabilities which are defined as triples (value, element, event).
This means that the genetic aspect (evolution of the project system) is also to be
considered. Indeed, whenever the project phase changes, or whenever considerable
changes in the project system occur during a project phase, the vulnerability
identification process is to be performed again, or at least refined/updated. As a whole,
this approach helps to reduce ambiguity and doubts on usefulness since everything is
drawn by the final objectives of the project, that is to say values creation.
4.1.1 Identification of vulnerable values, processes and elements through systems
thinking. A project is vulnerable if and only if one of its objective values may not reach its
target. That is why we argue that project vulnerability should be addressed regarding
each value of a given project, in order to underline the different possible kinds of
damages within the project. In the end, the first deliverable of the project vulnerability
identification step is a three-level hierarchical structure composed of (Figure 4):
(1) The project values which are likely to be damaged and make thus the project
vulnerable regarding them.
Figure 4.
Levels in the project
vulnerability
identification step
K (2) For each value Vi, the project processes/tasks which contribute to Vi creation.
41,1/2 These processes are likely to be altered (and thus to be vulnerable) by negative
events, which makes as a consequence the project vulnerable regarding Vi.
(3) For each process Pij, the project elements which permit to perform Pij (actors,
resources, other inputs). These elements are likely to be altered (and thus to be
vulnerable) by negative events, which alters Pij, which makes as a consequence
214 the project vulnerable regarding Vi.
Figure 5.
Project vulnerability
analysis
K As during any aggregation operation, part of information is lost. Indeed, several
41,1/2 different triplets can have the same value when multiplying the values of its
elements. As a consequence, when ranking according to the G(V) index, one may rank
at the same level several triplets which could not be handled the same way (for
example high non-resistance and low resilience versus low resilience and high
non-resistance with the same value of G(V)). In the end, this classification according
216 to G(V) should always be considered with the initial evaluation of NR, R and CR(V)
in order to make more relevant decisions during the project vulnerability response
plan step.
Identification step One step process as it identifies Two main step process as it first
possible triggering events, and often identifies existing tangible aspects of
their effects and their causes. Notice the project system which appear to be
these events can be either positive or vulnerable regarding the project
negative. Performed through values creation processes. Then it
expertise/experience/creativity identifies project process or
elementary vulnerabilities. First step
performed through expertise, second
one through expertise/experience/
creativity
Analysis step Evaluates risk probability and impact. Evaluates the resistance and resilience
Numerous methods to perform such of project vulnerabilities. First
quantitative or qualitative analysis. proposal is a qualitative analysis.
Classification is proposed to focus on Classification is proposed to focus on
high priority risks, notably thanks to high priority vulnerabilities thanks to
the definition of a criticality index. One the definition of a 0-100 cruciality
of the main difficulties is to assess index. One of the main difficulties is to
possible events assess resistance and resilience
regarding possible events
Response plan step Proposes strategies for risk responses. Proposes strategies for vulnerability
Leaves possibilities for risk mitigation, responses. Leaves possibilities for
avoidance on two factors (probability/ vulnerability mitigation, avoidance on
impact), acceptance, contingence or a single factor (resistance), acceptance, Table II.
transfer to a third party contingence and transfer within the Comparison between
project system project risk and
Monitoring and Very similar to one another Very similar to one another vulnerability
control step management processes
K vulnerability response plan may thus appear more relevant as the responses directly
41,1/2 focus on the project system instead of dealing with probabilistic events. The required
efforts (notably in terms of time and money) for these responses may thus appear more
necessary, for existing project weaknesses are underlined.
5. Case study
218 A case study is performed during the FabACT project (Vidal et al., 2009), a software
development project within the context of the pharmaceutical industry. This project
was executed in collaboration with the Georges Pompidou European Hospital.
5.1 Introduction
The French health system faces ever growing demands under very pressuring
conditions as it is much constrained in a complex environment. In our case, production
volumes at the chemotherapy compounding unit (UPIO) have drastically increased (5
per cent in a two years time). To support this increasing workload without extra staff,
pharmacists wanted to evaluate how anticipating the production of certain drugs may
help them in improving the organisation of the production process. Within this context,
the FabACT project (Figure 6) has been launched at HEGP Pharmacy Department in
2006. The aim was to achieve a better balance between the workload and the ability to
hold the admixture compounding burden while respecting constraints such as drug
stability and quality of service. The deliverable of the FabACT project was a decision
support tool in order to assist pharmacists while choosing the anti-cancer drugs that
FabACT Project
220
41,1/2
Table III.
values creation
contribution to project
Identifying project tasks
Profit for
Completion stakeholders Quality of project In. quality of Sc. quality of So. quality of
on-time (%) (%) processes (%) deliverables (%) deliverables (%) deliverables (%)
Table III.
221
K
222
41,1/2
Table IV.
quality creation
regarding scientific
Identifying the actors
Scientific quality Actor 1 0.41 Unclear software requirements and specifications 8 8 26.24
Scientific quality Actor 1 0.41 Error when encoding the software 6 8 19.68
Scientific quality Actor 1 0.41 New requirements appearing 8 6 19.68
Scientific quality Actor 1 0.41 Bad communication within the project team 6 6 14.76
Scientific quality Actor 1 0.41 Misunderstanding of previously carried out 6 6 14.76
studies
Scientific quality Actor 1 0.41 Lack of information 8 4 13.12
Scientific quality Actor 1 0.41 Uncorrect information 7 4 11.48
Scientific quality Actor 2 0.12 Unclear software requirements and specifications 8 8 7.68
Scientific quality Actor 3 0.11 Unclear software requirements and specifications 7 8 6.16
Scientific quality Actor 2 0.12 Illness 7 7 5.88
Scientific quality Actor 2 0.12 New requirements appearing 8 6 5.76
Scientific quality Actor 7 0.07 Misunderstanding of the publication target 9 9 5.67
requirements
Scientific quality Actor 7 0.07 Unclear software requirements and specifications 9 8 5.04
Scientific quality Actor 1 0.41 Too short test phase 6 2 4.92
Scientific quality Actor 6 0.06 Misunderstanding of the publication target 9 9 4.86
requirements
Scientific quality Actor 3 0.11 New requirements appearing 7 6 4.62
Scientific quality Actor 7 0.07 Misunderstanding of previously carried out 9 7 4.41
studies Table V.
Scientific quality Actor 2 0.12 Misunderstanding of the publication target 4 9 4.32 Excerpt of the FabACT
requirements project actor
Scientific quality Actor 6 0.06 Unclear software requirements and specifications 9 8 4.32 vulnerability analysis
K 5.2.4 Comparison with a traditional risk management process. Once can find hereunder
41,1/2 an excerpt of a traditional FMECA performed for the FabACT project (Table VI) to be
a point of comparison in order to underline the potential benefits of a project
vulnerability analysis.
First, one should notice that the lack of integration of project values does not permit
to understand properly the consequences of the potential failure modes, even though
224 there effects are likely to be mentioned. Vulnerability analysis permits to understand
better the possible damage chains which exist within a project. It must be noticed that
for instance, no aspect about publication target requirements had been mentioned in
the FMECA although it appeared to be a high potential source of vulnerability
regarding scientific quality creation. Second, by analysing the project system’s
weaknesses, one is to make better and more specific decisions when establishing a
response plan. Indeed, the FMECA mentions “unclear software requirements and
specifications” or “misunderstanding of software specifications” as potential causes of
important failure modes. This is consistent with the project vulnerability analysis
which was performed. However, the project vulnerability analysis permits to focus on
the project elements or processes which are impacted the most by this potential
cause/stressor event. For instance, actors did not appear equally vulnerable to these
events, which permitted to concentrate on the weakest parts/actors/processes of the
project.
1 Unsatisfying software development Error when encoding the software Unreliable results 9 6 54
2 Unsatisfying software development Too short test phase Too few comments 8 6 48
3 Unsatisfying software development Misunderstanding of software Errors in the software, no consistence 9 5 45
specifications with specifications
4 Unsatisfying software development Misunderstanding of the previously Misunderstanding of software 9 5 45
carried out studies specifications
5 Unsatisfying software development Bad communication with test teams Misunderstanding of specifications 6 7 42
6 Unsatisfying software development Conflicting comments given by the Bad integrating of the test phase 7 6 42
test teams comments
7 Unsatisfying software development Bad integrating of the test phase Errors in the software, no consistence 8 5 40
comments with specifications
8 Project delay Conflicting comments given by the test Bad coordination 6 6 36
9 Project delay Error when encoding the software Extra work 6 6 36
10 Unsatisfying software development Unclear software requirements Errors in the software, no consistence 9 4 36
and specifications with specifications
11 Project delay Bad communication with test teams Misunderstanding of specifications, 5 7 35
extra work
12 Unsatisfying software development Difficulty to understand the hospital Misunderstanding of specifications 7 5 35
13 Unsatisfying software development Low standard graphical user interface Non user friendliness of the software 5 7 35
14 Unsatisfying software development New requirements appearing Errors in the software, no consistence 7 5 35
with specifications
15 Low profit Unforeseen issues Overcost 7 5 35
16 Unsatisfying software development Errors in the previously carried out studies Errors in the software 8 4 32
17 Unsatisfying users guide development Misunderstanding of the previously Errors in users guide 8 4 32
carried out studies
18 Unsatisfying software development Too little information given by the test Unefficiency of the test phase 8 4 32
vulnerability
management
Project
Table VI.
K .
Moreover, the calculation of the Crucial Index G(V) is to be improved thanks to
41,1/2 the integration of multicriteria aspects.
.
Other promising works may focus on the evaluation of the non-resistance and
resilience of project vulnerabilities, notably thanks to the introduction of
interdependences which exist in complex project systems.
226
References
AFNOR (2003), FD X 50-117: Management de projet, Gestion du risque, Management des risques
d’un projet, AFNOR, La Plaine.
APM (1996), Project Risk Analysis & Management (PRAM) Guide, Association for Project
Management, High Wycombe.
Blaikie, P.M., Cameron, J. and Seddon, D. (2001), Nepal in Crisis: Growth and Stagnation at the
Periphery, Adroit Publishers, New Delhi.
Blaikie, P.M., Cannon, T., Davis, I. and Wisner, B. (1994), At Risk: Natural Hazards, People’s
Vulnerability and Disasters, Routledge, London.
Bogataj, D. and Bogataj, M. (2007), “Measuring the supply chain risk and vulnerability in
frequency space”, International Journal of Production Economics, Vol. 108 Nos 1/2,
pp. 291-301.
BSI (2002), ISO/IEC Guide 73:2002, Risk Management – Vocabulary – Guidelines for Use in
Standards, British Standard Institute, London.
Chambers, R. (1983), Rural Development: Putting the Last First, Longman, London.
de Fur, P.L., Evans, G.W., Cohen Hubal, E.A. and Kyle, A.D. (2007), “Vulnerability as a function
of individual and group resources in cumulative risk assessment”, Environmental Health
Perspectives, Vol. 115 No. 5.
Dibben, C. and Chester, D.K. (1999), “Human vulnerability in volcanic environments: the case of
Furnas, Sao Miguel, Azores”, Journal of Volcanology and Geothermal Research, Vol. 92,
pp. 133-50.
Durand, J. (2007), “Management des risques dans les organisations industrielles complexes:
prépondérance de la dimension managériale dans la genèse des vulnérabilités”, Thèse de
Doctorat, Ecole Centrale de Paris, Paris.
Ellis, F. (2000), Rural Livelihoods and Diversity in Developing Countries, Oxford University Press,
Oxford.
Ellis, F. (2003), “Human vulnerability and food insecurity: policy implications”, paper presented
at Forum for Food Security in Southern Africa.
Ezard, N. (2001), “Public health, human rights and the harm reduction paradigm: from risk
reduction to vulnerability reduction”, International Journal of Drug Policy, Vol. 12,
pp. 207-19.
Genelot, D. (2001), Manager dans la complexité – Réflexions à l’usage des dirigeants,
INSEP Consulting Editions, Paris.
Hellström, T. (2007), “Critical infrastructure and systemic vulnerability: towards a planning
framework”, Safety Science, Vol. 45 No. 3, pp. 415-30.
IEC (1995), CEI/IEC 300-3-9:1995 Risk Management: Part 3 – Guide to Risk Analysis of
Technological Systems, International Electrotechnical Commission, Geneva.
IEEE (2001), IEEE Standard 1540-2001: Standard for Software Life Cycle Processes – Risk
Management, Institute of Electrical and Electronic Engineers, New York, NY.
IPMA (2006), IPMA Competence Baseline (ICB), Version 3.0, March, International Project Project
Management Association, Nijkerk.
vulnerability
ISO (2003), ISO 10006 – Quality Management Systems – Guidelines for Quality Management in
Projects, International Organization for Standardization, Geneva. management
Kelly, P.M. and Adger, W.N. (1999), Assessing Vulnerability to Climate Change and Facilitating
Adaptation, Centre for Social & Economic Research on the Global Environment, School of
Environmental Sciences, University of East Anglia, Norwich. 227
Le Moigne, J. (1990), La théorie du système général. Théorie de la modélisation, Presses
Universitaires de France, Paris.
Luers, A.L., Lobell, D.B., Sklar, L.S., Lee Addams, C. and Matson, P.A. (2003), “A method for
quantifying vulnerability, applied to the Yaqui Valley, Mexico”, Global Environmental
Change, Vol. 13, pp. 255-67.
Maskrey, A. (1989), Disaster Mitigation: A Community-based Approach, Oxfam, Oxford.
Perry, M., Dulio, A. and Cubanski, J. (2006), “Voices of beneficiaries: Medicare Part D insights
and observations one year later”, Kaiser Family Foundation Report, Menlo Park, CA.
PMI (2004), A Guide to the Project Management Body of Knowledge (PMBOK), 4th ed., Project
Management Institute, Newton Square, PA.
Schneider, C. (2008), “Fences and competition in patent races”, International Journal of Industrial
Organization, Vol. 26 No. 6, pp. 1348-64.
Scoones, I. (1998), “Sustainable rural livelihoods: a framework for analysis”, Working Paper
No. 72, IDS, Brighton.
Shi, L. (2001), “The convergence of vulnerable characteristics and health insurance in the USA”,
Social Science Medicine, Vol. 53 No. 5, pp. 519-29.
Strauss, J.S. (1997), “Processes of healing and the nature of schizophrenia”, in Brenner, H.D.,
Boker, W. and Genner, R. (Eds), Towards a Comprehensive Therapy for Schizophrenia,
Hogrefe & Huber, Kirkland, WA.
Theys, J. (1987), “La société vulnérable”, in Louis Fabiani, J. and Theys, J. (dir.) (Eds), La société
vulnérable. Evaluer et maı̂triser les risques, Presses de l’Ecole Normale Supérieure, Lyon,
pp. 3-35.
Vidal, L.A. and Marle, F. (2007), “Modeling project complexity”, paper presented at International
Conference on Engineering Design, Paris, France.
Vidal, L.A. and Marle, F. (2008), “Understanding project complexity: implications on project
management”, Kybernetes: The International Journal of Systems, Cybernetics and
Management Science, Vol. 37 No. 8.
Vidal, L.A., Sahin, E., Martelli, N., Berhoune, M. and Bonan, B. (2009), “Using the AHP
to select anticancer drugs to produce by anticipation”, Expert Systems with Applications.
Watts, M.J. and Bohle, H.G. (1993), “The space of vulnerability: the causal structure of hunger
and famine”, Progress in Human Geography, Vol. 17 No. 1.
Zhang, H. (2007), “A redefinition of the project risk process: using vulnerability to open up the
event-consequence link”, International Journal of Project Management, Vol. 25 No. 7,
pp. 694-701.