(Received: December 29, 2021; Revised: March 8, 2022; Accepted: April 10, 2022)
Abstract
Natural and man-made disasters have increased the attention of practitioners and researchers to vulnerability. Identifying business vulnerability is one of the basic elements of strategic analysis and public policy. The purpose of this paper is to explore evolutionary pathways to reduce the vulnerability of technology-based businesses. The intellectual structure of this subject was examined using both bibliometric co-occurrence and co-citation analyses. We focused on 629 articles published between 1981 and 2021. This article identifies four specific areas, namely business performance, small business vulnerability, sources of sustainability in business, and adaptation policy assessment. A novel framework was developed based on the most prominent papers identified in co-citation as well as the highly cited papers. The proposed model includes drivers, vulnerability appearance, and vulnerability reduction. This study examines the basis of research concepts, themes, and communities in reducing the vulnerability of technology-based businesses. This article identifies business vulnerability as one of the relevant areas to disaster economics and sustainability studies.
Keywords: absorptive capacity, adaptive capacity, bibliometric analysis, business vulnerability, transformative capacity, vulnerability reduction strategy.
Introduction
Today, businesses are facing tremendous threats and challenges because of high economic, social, geographical, political, technological, and, environmental risks, such that all over the last decade, surviving and flourishing against and through troubling times (e.g., recession, natural disasters, armed global conflicts) has been one of the main considerations faced by businesses (Azusa & Hiroyuki, 2013). Natural and man-made disasters, such as the recent outbreak of COVID-19, have grabbed the attention of practitioners and researchers to vulnerability (Sharma et al., 2021). COVID-19 is the "Black Swan" which makes businesses vulnerable to unnatural external forces (He & Harris, 2020) (Kamalipoor et al., 2022). In a post-pandemic world, some of the entrepreneurs with great management skills may also be feeling particularly vulnerable. During COVID-19, entrepreneurs have been facing unprecedented setbacks. They grappled with extreme levels of vulnerability (Branzei & Fathallah, 2021). Terrible and frequent recent natural disasters have made studying catastrophic events very important and emergent, particularly for speeding business recovery and risk alleviation. These are known as principal research fields. Thus, it's of grave importance to explore factors alleviating risks and making businesses prepared to respond to crisis-caused challenges effectively (Morrish & Jones, 2020). Businesses may be disrupted by direct damage to property, the reduction or loss of support for critical infrastructure development, or the impact on social systems (such as human resources and customers). This business disruption may manifest as a reduction (or loss) in production and sales, or a temporary or permanent closure (Nocera & Gardoni, 2019). Vulnerability is a weakness in the organization that opens the way for threats to enter (Goel & Chen, 2008).
Organizations and businesses play a key role in social, economic, and ecological systems' dynamics (Orhan, 2016). The survival of the business after a disaster plays a vital role in the long-term well-being of society (Lee, 2019). Thus, one can facilitate business recovery by identifying domains that make survival harder and exacerbate business vulnerabilities. Through learning from past experiences of the impacted businesses, one can mitigate business vulnerability against future events and disasters, decrease shutdown frequencies, and improve sustainability (Sydnor et al., 2017). It should be mentioned that vulnerability varies according to environmental, economic, institutional, social, demographical, and cultural aspects (Li et al., 2015). Identifying business vulnerability is one of the basic elements of strategic analysis and public policy (Cowan & Wright, 2016). Marshall et al. (2015) believed that developing policies for relieving after-mass business is not the only important issue, but rather a policy development, planning, and backup operation to encourage businesses to take part in pre-disaster planning should be focused on. Moreover, the most vulnerable businesses need to be identified, too. Thus, mid-and long-term planning is of grave importance for re-equilibrium and economic recovery (Nicola et al., 2020).
Berrouet et al. (2018) also suggested that some concepts such as vulnerability, sensitivity, threat, exposure, and adaptive capacity are not homogeneously defined and are sometimes inconsistent, leading to confusion, instability, and inability to compare different studies taken place in different areas. They stated that vulnerability analysis requires a change in conceptual and methodological approach and call for the creation of a new framework for vulnerability assessment. Although the vulnerability has been discussed extensively from various spatial-temporal dimensions, there is no universally accepted model or theory (Jamshed et al., 2017). As a growing field, "business vulnerability to disasters and crises" is increasingly attracting scientists and researchers from practical and theoretical worlds, while how to define business vulnerability to disasters is an open question (Song et al., 2016). As vulnerability has been inserted into scientific discussions only in recent times, a clear definition is still missed (Lo et al., 2019). Branzei and Fathallah (2021) stated that vulnerability is a dark side of resilience that remains largely untold. Since disasters and crises impact organizations' and businesses' ability to realize their objectives, they consider them controversial and complicated affairs to deal with (Tarrant, 2010); thus, this issue is a real challenge, the evaluation of the characteristics and related theoretical framework of which is of grave necessity. While more researchers are interested in vulnerability assessment methods, they should be modified and integrated before being used in policies (Rana & Routary, 2018).
Technology-based businesses have played a major role in the economic growth of many countries and have been strongly encouraged as a source of competitive advantage as well as job creation (O'Regan & Sims, 2008). However, environmental shocks affect the performance of technology businesses and reduce their demand, and although environmental shocks are a challenge for any business, such a challenge is especially serious for high-tech entrepreneurial businesses. Few technology-based businesses can achieve superior performance after environmental shocks (Colombo, 2020).
Exploring the previous research using the bibliometric method, we found that research and attention to the category of vulnerability has a long history and has been paid more attention in social and natural sciences and less in management and entrepreneurship, especially in technology-driven business. There is no sufficient bibliographical research (BR) regarding this issue. In addition, little research on business vulnerability has often been done with a climatic approach, and other factors that lead to vulnerability have been neglected. Therefore, the first and most important achievement of this research is the development of a framework to reduce the vulnerability of technology-based businesses, which significantly impacts the continuity and sustainability of technology-based businesses.
Because the term business vulnerability has great potential for bringing together diverse disciplines, this research has scientific contributions to areas related to disaster planning and management (Venkateswaran et al., 2014), disaster risk reduction (Zhou et al., 2015), and resilience (Sheffi, 2005) via identifying drivers, vulnerability appearance, and vulnerability reduction. We contribute to the literature on business vulnerability by analyzing co-citation, co-occurrence of keywords, theme evolution, and future study directions. Eventually, the research acknowledges the theoretical contribution and the limits of the present study, and recommends further study directions.
Aiming at fixing the aforementioned shortcomings, the main purpose of this study is to identify the antecedents of business vulnerability and strategies to reduce business vulnerability. Accordingly, the following questions are proposed:
1) What is the main structure map of business vulnerability concerning its subfields relationships?
2) What is the thematic visualization of the business vulnerability?
3) What are the business drivers for vulnerability?
4) What are the elements of business vulnerability?
5) What strategies can reduce vulnerability?
To answer research questions, bibliographic research was conducted through analyzing the co-citation and co-occurrence of keywords. Web of Science Database's records (timeline: 1981-2021) was analyzed using Citespace, GunnMap2, and VOSviewer. Then, a vulnerability reduction model was designed. To our best knowledge, this research is one of the scarce efforts that try to look comprehensively at business vulnerability and its logical basics from the BR viewpoint.
The rest of the article is structured as follows. The second section describes the overview of vulnerability. The third section presents the research methodology. The fourth section offers the results. Finally, the paper discusses results and gives in the proposed future research directions.
Overview of Vulnerability
Vulnerability is a multifaceted and multidimensional phenomenon. There are different definitions and interpretations of vulnerability in the scientific literature (Rana & Routray, 2018). The term "vulnerability" is a derivative of the Latin word "vulnus," i.e., wound. That is, the word vulnerability refers to a wounded soldier who is already injured and vulnerable and is on the verge of death. Merriam Webster dictionary describes vulnerability as the "possibility of physical or psychological injury" (Cuevas, 2011). Many fields including economy, anthropology, psychology, and engineering use the vulnerability concept (Adger, 2006). The first instants of vulnerability application in risk and disaster management were about physical persistence of engineered structures, while recent applications are focused on the characteristics of environmental and social factors (Cardona et al., 2012). One can say that vulnerability is referring to a specific situation in which a public risk may turn into a disaster (Gaillard, 2010). Disaster occurs when an individual, a society, or an organization is driven away from relative stability or equilibrium.
Vulnerability is defined as the degree to which the ability of an ecological system to maintain the ecosystem functions is affected by the adverse effects of the threats of different types - punctual or continuous, endogenous or exogenous (Berrouet et al., 2018). Vulnerability can also be seen as the gaps and weaknesses in the coping strategies that are adopted by a community (Rana & Routray, 2018). Fussel (2005) believed six elements should be determined to describe a vulnerable phenomenon correctly: 1) time reference (now, future, and long-term); 2) scale (internal, external, internal-external); 3) domain (socioeconomic, biophysical, and mixed); 4) vulnerable system; 5) system's valuable characteristics; and 6) threats.
Yan and Zhou (2010) believe that vulnerability refers to quantitative and qualitative weaknesses of a business, i.e., lacking sufficient stability against any intervention and uncertainty. Song et al. (2016) explain business vulnerability to natural disasters considering geographical location, economic situation, and critical demographic characteristics in terms of responding to natural disasters and define them as made of four factors, namely business capital, labor, critical suppliers, and physical location. Aleksić et al. (2014) stated that vulnerabilities in the organization and business should be constantly examined, because in critical situations they can lead to disaster. They emphasized that the most appropriate way to overcome the vulnerability of the organization and business is to effectively manage the vulnerability in each of the business processes (operational, managerial, and supportive) in order to achieve the long-term sustainability of the business. Businesses' inadaptability indicates that they are heavily vulnerable to disasters (Davlasheridze & Geylani, 2017). Concerning the COVID-19 crisis, Giones et al. (2020) stated that entrepreneurs should take appropriate actions to reduce vulnerability in three stages of the crisis, including pre-crisis, in-crisis, and post-crisis.
Table 1 shows the definitions of vulnerability based on literature review.
Method
Selection of Papers
Choosing the appropriate databases is a critical element one should consider to have the right resources. According to Morant and Soriano (2016), identifying the more appropriate databases for the research is the first step in the bibliometric review. Thus, the Web of Science (WOS) database was selected because of many reasons among which one can point to the fact that it, compared to other databases, searches much more entries and gives in a larger sample (Dias, 2019). Moreover, it uses a great variety of bibliometric studies and covers social, art, and human sciences (Mulet-forteza et al., 2019).
Search keywords were chosen in a specific way such that the database can find the maximum number of the related findings. Keywords were linked using "OR" and "AND," according to expert recommendations. It should be mentioned that titles, abstracts, and keywords of English review and research papers published between 1981 and 2021 were searched for keywords since scarce studies have been conducted regarding this issue and that gaining the most possible data from journals was the main object. Finally, 629 papers were found.
TITLE: (vulnerability) AND TOPIC: (business) OR TITLE: (business) AND TOPIC: (vulnerability) OR TITLE: (vulnerability) AND TOPIC: (firm) OR TITLE: (firm) AND TOPIC: (vulnerability) OR TITLE: (vulnerability) AND TOPIC: (corporate) OR TITLE: (corporate) AND TOPIC: (vulnerability) Refined by: LANGUAGES: (ENGLISH) AND DOCUMENT TYPES: (ARTICLE OR REVIEW)
Bibliometric Analysis
Groos and Pritchard (1969), in "employing mathematical and statistical methods in the book and other communication tools," introduced the term "bibliometric." To identify various patterns of published papers in a specific domain, the bibliometric study analyzes empirical data empirically (De Bellis, 2009), which is used in qualitative analysis of the basic and critical literature (Suominen et al., 2019). To help researchers analyze and determine particular meanings of an issue, this method uses quantitative bibliographic elements, too (Danvila-del-valle et al., 2019). The bibliographic method reduces the bias seen in most traditional and professional surveys (Kovacs et al., 2015). The most common analysis methods used in the bibliography are co-citation, co-occurrence, and co-authorship analysis (Van Eck & Waltman, 2014). Co-occurrence and co-citations were used in this research.
Co-Citation Analysis
Co-citation analysis is the most common and popular bibliographic analysis technique (Ozç, 2015). Co-citation refers to two titles cited simultaneously in another article, and it's assumed there is some relation if they are co-cited in the same document (Small, 1973). If other papers cite these frequently, one can claim that these two references are irregular (Benckendorff & Zehrer, 2013). To reveal a significant mapping across the published data, this method links the published documents (Dzikowski, 2018). According to Chen et al. (2019), to recognize potential scientific knowledge developments, one can check citation of those documents which are not only referenced rapidly but also have intermediate centrality on the co-citation network; it's assumed that every article represents a specific issue and that any co-citation occurrence reveals the connection between two concepts through the knowledge base of a scientific field.
Co-Occurrence Analysis
Just as keywords reveal some information regarding document content, keyword matrix analysis can be used to find the research subject, conceptual-structural blocks, changing boundaries, and concept development (Zupic & Čater, 2015). A keyword analysis is created based on counting their co-occurrences, i.e., the number of articles in which both keywords occur simultaneously (Whittaker, 1989). Assessing the strength of keywords' co-occurrence relations, keyword review discovers and represents keywords interrelations (Lee & Su, 2010). However, keyword analysis is unstable because of term evolution over time (Leydesdorff, 1997). Using keyword co-occurrence, researchers can map and measure business vulnerability development. Given that every bibliographic method has its strengths and weaknesses, using various methods for conducting bibliometric research has become a norm in discovering research trends of a specific field (Chang et al., 2015). Therefore, to map a bibliographic plan, both co-occurrence and co-citation analyses were employed, the results of which are discussed later in this article.
Theme Evolution
To comprehend a theme thoroughly and rapidly, and to discover evolution pathways, the method used for uncovering theme evolution through reviewing a great deal of data is critical for specialists and researchers, such that theme evolution study across scientific literature has grown in importance in recent times (Ye et al., 2015). The theme evolution method can recognize keywords' developments through various periods (Wu et al., 2016).
Software
To review technology-based businesses, three software packages were used, namely CiteSpace, VOSviewer, and GunnMap2. Citespace, developed by the Korean scientist Chaomei Chen in 2004, is Java-based software with various capabilities, including visualizing and analyzing text trends using co-citation. CiteSpace illustrates a matrix consisting of institutions, contributing countries, cited journals, and authors (Chen et al., 2019). Matrices assist us in recognizing and visualizing core thinking societies to business vulnerability research evolution. VOSviewer software offers popular bibliographic analysis purposes, including co-authorship, co-occurrence, bibliographic coupling, and co-citation analysis. VOSviewer is used extensively in citation-based analyses (Baier-fuentes et al., 2019), and is useful for reviewing mutual relations between clusters (van Eck & Waltman, 2010). VOSviewer can analyze keywords co-occurrence and co-citation, thus making it possible to interpret themes related to business vulnerability. It was chosen by the researchers because of some reasons. This software can reveal the significance of intra-network relations and identify extant clusters automatically. To represent documents' universal distribution, GunnMap2 (http://lert.co.nz/map) was employed, too.
We used VOSviewer software for co-citation and co-occurrence keyword analysis. CiteSpace was used for the timeline view and GunnMap2 was used to show the global distribution of papers.
Results
The Time-Based Distribution of Studies
Using bibliometric analysis of the WOS database, this section determined the annual citation and distribution of papers published regarding business vulnerability between 1981 and 2021 (Figure 2). To this end, we analyzed the yielded total studies (TS: 629) and total citation (TC: 9435) records. Figure 2 indicates that the number of business vulnerability researches is growing and the annual citation rate is increasing gradually. Time-based distribution (Figure 2) is divided into three periods: 1) 1981-2004: the number of studies is relatively low, i.e., business vulnerability couldn't attract a great deal of scientific attention; 2) 2013-2005: gradually, more studies have been published during this period; and 3) 2014-2021: the number of published studies has increased significantly, such that it can be argued that business vulnerability has been focused on by a greater number of researchers.
Map of Countries Based on the Number of Citations
USA had the greatest number (N=218) of publications between 1981 and 2021. The UK, claiming the second rank, published 87 papers. Australia, China, Canada, South Korea, Italy, Germany, India, and France ranked third to tenth, respectively. As it is evident, these countries have published more papers in the business vulnerability research (Figure 3).
The Most Highly Cited Publications
Identifying the most cited publications in the business vulnerability field is a great guide to ranking the writers and a good foundation for deeper analysis. The most cited publications and citation frequencies between 1981 and 2021 are shown in Table 2. Among the most cited publications, Bacon (2005) has the most attention across the vulnerability field. Bacon (2005) has linked the development of international markets of coffee to farmers' living and points out the main factors causing the coffee crisis. Using organic networks and fair trade are two alternatives that provide small producers with appropriate opportunities, making farmers less vulnerable. Manova (2013) discussed how financial vulnerability influences firms' international affairs, and argued that credit constriction and financial market weakness lead to choosing more heterogeneous firms (than domestic producers), turning to local producers (only for export), and export volume. Cruz et al. (2010) is the third study in Table 2. In terms of family-owned firms, they have studied chief executive officer's (CEO) vulnerability. They expressed that smaller family ownership increases a family CEO's risk-bearing and, hence, decreases their willingness to become even more vulnerable to the possibly opportunistic behavior of the top management team (TMT). Details of the most highly cited documents in the last forty years are presented in Table 3.
Structures of the Field: A Document Co-Citation Analysis
Business vulnerability co-citations are shown in Figure 4, in which a relatively understandable net can be seen. The minimum number of citations was set to seven; accordingly, 39 papers were identified. Then, they were grouped in three clusters, to which specific colors were assigned. The most cited papers were Zhang et al. (2009), Smit and Wandel (2006), Webb et al. (2000), Webb et al. (2002), and Turner et al. (2003), respectively. An overview of the most cited papers regarding business vulnerability between 1981 and 2021 is presented in Table 4.
Cluster 1. Basics and Fundamental Theories Vulnerability
Cluster 1 included 21 papers, which are focused on the basics and fundamental theories of vulnerability. Specifying the dimensions of vulnerability, researchers in this cluster proposed a conceptual framework for vulnerability assessment. The researchers identified the dimensions of the vulnerability in exposure, sensitivity, and adaptive capacity. They agreed that there was an internal connection between these dimensions. Some related articles were discussed in Table 5.
Cluster 2. Factors Influencing Vulnerability and Business Improvement Strategies
Cluster 2 included 30 papers focused on business vulnerability and business improvement strategies. Researchers in this cluster introduced the characteristics of business and the factors that make them vulnerable to crises. Researchers also described what small businesses can do to improve and recover in times of crisis. In this cluster, authors focused more on small businesses and businesses exposed to natural disasters such as floods and earthquakes. Table 5 shows the results of some articles in this cluster.
Cluster 3. Supply Chain Vulnerability
Cluster 3 includes five papers. They are about the vulnerability concept and factors contributing to supply chain vulnerability. Due to the high vulnerability of today's supply chains to disruption, measuring and managing supply chain vulnerabilities has become very important. Now, more than ever, supply chain managers must manage supply chain risk and vulnerability to prevent costly disruptions and their negative consequences. Researchers have studied supply chain vulnerabilities in different ways. Including supply chain vulnerabilities as a conceptual, analytical, or normative recommendation on how to manage supply chain vulnerabilities (Wagner & Neshat, 2012). In Table 5, the articles are discussed and the authors' opinions are reviewed.
Co-occurrence Keyword Analysis
According to Waltman et al. (2009), network visualization is an effective and novel method for the visual representation of bibliometric analysis, since it enables researchers to recognize and interpret research boundaries. Keywords are words or terms which reflect the publication's content (Xiang et al., 2017). To pinpoint research points of vulnerability, keywords co-occurrence was examined using VOSviewer. The co-occurrence threshold was set at five, and 126 cases were visualized (Figure 5). In Figure 5, the occurrence of keywords is shown by a circle. The bigger the circle, the more the keywords are used in business vulnerability publications. Subject similarity and relative strength are reflected by inter-point distance. Points with the same colored and near clusters point to one subject in two publications and indicate a stronger relationship. Five distinctive separate clusters are shown in Figure 5. As it is evident in Table 6, keywords "vulnerability," "resilience," and "adaptation," all them from cluster 3, had the highest power, which indicates the importance researchers assign to these keywords. Table 7 shows cluster details.
Clusterl: Business Performance
This cluster was named "business performance" given the identified keywords: performance, market, growth, financial performance, consumer, vulnerability, financial vulnerability, productivity, behavior, quality. In almost all businesses, vulnerability is the main reason behind performance decline, and may even drive it to collapse (Aleksić et al., 2014). Dalziell and Mcmanus (2004) argue that system performance is a function of its vulnerability. The authors generally introduced vulnerability as a factor affecting organizational performance and among the types of vulnerability, customer vulnerability has been studied as one of the types of vulnerability.
Cluster 2. Risk Assessment
Given the following identified keywords, the second cluster was named "risk assessment": risk, risk management, prediction, prevention, vulnerability analysis, risk analysis, risk assessment. Liu et al. (2011) described the relationship between risk, hazard, and vulnerability as R= HV, where R refers to risk, H to hazard, and V to vulnerability. This means that risk is a function of hazard and vulnerability. Thus, one can claim that risk literature pays attention to vulnerability, too.
Cluster 3. Small Business Vulnerability
The third cluster was named "small business vulnerability" given the identified keywords: vulnerability, resilience, adaptive capacity, recovery, survival, small business, earthquake, natural disasters, and natural hazards. This cluster included threats and disasters as the vulnerability factors. The resilience approach and adaptive capacity for vulnerability reduction and business improvement have been studied in this cluster.
Cluster 4. Sources of Sustainability in Business
The following words were seen in the fourth cluster: business, innovation, sustainability, perspective, corporate social responsibility, absorptive-capacity, technology, companies, resource-based view, entrepreneurship, competitive advantage, sustainable development, enterprises, microfinance, opportunities. Thus, the cluster was named "sources of sustainability in business."
Cluster 5. Adaptation Policy Assessment
The fifth cluster was named "adaptation policy assessment" because of the existence of the following words in this cluster: adaptation, management, perceptions, policy, mitigation, vulnerability assessment, migration, adaptive capacity, social vulnerability, mitigative capacity. Adaptation was recognized as one of the main approaches to vulnerability reduction.
4.6. Thematic Visualization
To reflect the development pathway and current situation of all clusters and to review literation evaluation, the timeline visualization of the co-citation network was developed (Figure 6). The clusters are shown in the horizontal timeline of the timeline view in CiteSpace. According to the publication date, clusters are represented from left to right.
Cluster 1
This cluster covers papers published between 1996 and 2019 and includes 83 sources. In this cluster, the similarity index was 0.934, i.e., the cluster is highly robust. Cluster's core themes are turning points of business sustainability and recovery. The following concepts were distinguished in this cluster: small business survival, business disaster recovery, small business vulnerability, community business, firm survival, management strategies, resilience, vulnerability, recovery, and adaptive capacity. Pertaining to this topic is the findings of Lo et al. (2019a) who concluded that the greater the social capital is, the more the measures will be taken for the sake of adaptability. In addition, Lo et al. (2019b) identified factors contributing to business vulnerability and claimed that focusing on the following concepts through crises will make business recovery swifter and easier: capital dynamics, business size, capital ownership, capital intensity, easiness of employee replacement, dependence on critical infrastructure, inter-business dependence, and market diversification. Li et al. (2019) indicated that the following factors have significantly influenced the sustainable performance of a firm after the earthquake: financial conditions before the disaster, average post-disaster every month earnings, obtaining money from entourage, the gender of business owners, and government funding.
Cluster 2
This cluster covers the period between 2000 and 2015. In sum, 65 sources were identified in this fifteen-year cluster. The similarity index of this cluster was 0.971, i.e., the cluster is highly robust. Cluster's core themes are turning points of factors contributing to vulnerability reduction. The following concepts were distinguished in this cluster: assessing the vulnerability, risk assessment, vulnerability; climate change, vulnerability mitigation strategies, effects, measuring, disaster, threat, vulnerability management, economic sectors, and mitigation strategy. For example, Hyman (2014) has reviewed vulnerability dimensions to reduce coastal tourism vulnerability, including exposure, sensitivity, and adaptation capacity. Kurniawan et al. (2017) argued that alleviating vulnerability factors promotes supply chain productivity. They cited supply chain vulnerability drivers as global resources, lean management, and high dependence on suppliers and customers. Their research, supply chain perspective, supply chain flexibility, and supplier development were considered vulnerability reduction strategies with a positive effect on supply chain efficiency. Considering sensitivity, Willroth et al. (2012) have indicated vulnerability reduction factors. They have pointed to social media, income diversity, education, and income in terms of sensitivity. They believed that enhancing sensitivity would increase adaptability and decrease vulnerability.
Cluster 3
This cluster covers the 1995-2010 period. Fifteen sources are identified in this fifteen-year cluster. This cluster was robust enough too, given its similarity index of 0.991. Cluster's core themes are turning points of adaptability. The following terms were more prominent in this cluster: climate change, firm strategy, adaptation, adaptive response, vulnerability, adaptation strategies, environmental policy, uncertainty, and firm relocation.
Cluster 4
This cluster covers the 2005-2017 span. Sixteen sources are identified in this twelve-year cluster. In this cluster, the similarity index was 0.997, so it was highly robust. Cluster's core themes are turning points of assessment of software vulnerability. The following terms highlighted the cluster's more prominent approach: empirical analysis, vulnerability disclosure, evaluation, software vulnerabilities, modeling software patch management, selection, vulnerabilities, cybersecurity, information systems, security, and risks.
Cluster 5
This cluster begins in 2003 and concludes by 2017. Fourteen sources were in this eleven-year cluster. The similarity index of this cluster was 0.991, i.e., it was highly robust. Cluster's core themes are turning points of factors contributing to the social ecology system. The following terms highlighted cluster's more prominent approach: resilience, flood event, flood impacts, small businesses, social-ecological resilience, disasters, vulnerability, shock, capacity to cope, maladaptive resilience, impacts, social-ecological system, and re-conceptualizing societal-environment interaction.
5. Discussion and Conclusion
A small action in the right direction and at the right time before the disaster will play an important role by saving countless lives and assets. It should also be noted that disasters, as they can be a negative threat, can in some cases lead to positive results for a particular system (Rus et al., 2018). A novel framework was developed based on the most prominent papers identified in co-citation and the highly cited papers. The proposed model has consisted of three sections: drivers, vulnerability appearance, and vulnerability reduction (Figure 7).
Drivers
Many diverse factors, including natural and unnatural threats, make trade vulnerable. Climate change, technologies, and other social and demographic processes make human and social systems always exposed to surprises and sensitive to unpredicted consequences. These factors were drivers in this research. The drivers are divided into several groups:
* Natural drivers (Füssel, 2007; Gallopín, 2006; Smit & Wandel, 2006), including climate change, earthquake, volcano, flood, tsunami, drought, global epidemics, and COVID-19
* Social drivers (Füssel, 2007; Greiving et al., 2006),
* Technological drivers (Dalziell, 2005; Robertson et al., 2020; Rossignol et al., 2015)
* Economical drivers
* Institutional drivers (Adger, 2006; Birkmann, 2005).
Vulnerability Appearance
Literature review showed that most researchers consider the following as the main factors of vulnerability. First, exposure to threat and hazard, i.e., the nature and scale of environmental evolutions to which the system is exposed (Dabson et al., 2012; Füssel & Klein, 2006; Gallopín, 2006; Turner et al., 2003). A system is invulnerable only if it is exposed to no disruption (Smit & Wandel, 2006). Second, sensitivity to threat, i.e., the level of preparedness (Dabson et al., 2012) or the extent to which a system is affected /modified by inside or outside disruption or because of a combination of disruptions, and can be an overall transformation of the system in terms of disruption variance. Sensitivity is an intrinsic characteristic and is independent of response and exposure. Sensitivity exists before the occurrence of disruption (Gallopín, 2006). The third factor is adaptive capacity. Adaptive capacity plays a vital role in determining the ultimate vulnerability since it determines the final effects greatly (Moreno & Becken, 2009). Adaptation capacity indicates the capacity of the system to adapt to change and to respond to disturbances (Dabson et al., 2012; Gallopín, 2006; Liu et al., 2011). Füssel and Klein, (2006) define adaptation capacity as the capability of a system to adjust to changes and possible losses, modify the system's features and activities, adapt to external changes, take opportunities, and deal with consequences.
Vulnerability and its determinants are changing and evolving. Exposure and sensitivity are inseparable dimensions of any system and depend on the system features and characteristics of the drivers. Generally, the more the system is exposed to drivers and threats, the more vulnerable it will be. On the contrary, the more adaptable the system, the less the system vulnerability (Smit & Wandel, 2006).
Vulnerability Reduction
Four strategies can be considered for vulnerability reduction, according to the vulnerability domain (Sheffi, 2005) and literature review (Béné et al., 2012).
Situation 1. The probability of event occurrence is low, and consequences are negligible, so the business is least vulnerable. "Business as usual" is the best strategy for such a business (Figure 8, situation 1).
Situation 2. Using absorptive capacity, i.e., the capability to absorb the effects of events using pre-defined coping responses, is the second strategy (Cutter et al., 2008). Turner et al. (2003) identify coping response, as an element of resilience that reduces vulnerability, as a good option for responding to disasters. According to Ghedini and Ribeiro (2009), businesses choosing coping response strategy employ current resources to adapt to and manage unfavorable conditions or prepare for a prominent event. Thus, absorption capacity can be considered as the capacity to take deliberate protective measures and deal with known shocks and stressors. It is the capacity to "go back" after the shock. It includes prediction, planning, dealing with shocks, and recovery from short-term stressors. It means ensuring stability, since its main objective is limiting shocks' negative impact on individuals, households, societies, businesses, and authorities (Oxfam, 2017). This strategy is appropriate for situation 2 because the probability of occurrence is high and the event is almost comprehensively known (Figure 8, situation 2).
Situation 3. In this situation, occurrence probability is low, consequences are significant, and business is vulnerable moderately. The adaptive capacity is seemingly the good option. Adaptive capacity is the capacity to take deliberate incremental regulations to respond to predicted or actual changes/developments, leading to greater future flexibility. It does not modify operations or structural identities significantly. There are different incremental regulations (e.g., new methods, method change, diversity, engagement with new social media, etc.) (Béné et al., 2012). Accepting change as ongoing and highly unpredictable is among the main characteristics of adaptive capacity. Thus, adaptive capacity means flexibility and the capability to bring ongoing incremental changes through ongoing regulation, learning, and innovation (Oxfam, 2017). The adaptive capacity facilitates system reorganization, development, and learning against threats (Tierney, 2007). The adaptive capacity is proportional to special situations and differs from system to system (Smit & Wandel, 2006) (Figure 8, situation 3).
Situation 4. In situation 4, the probability of event occurrence is high, while business is vulnerable and needs fundamental change. According to Béné et al. (2012), if the required change is so deep that the adaptability capacity is decreased, incremental change cannot be a good option, and change is critical. The transformative approach changes system's main structure and operations (e.g., changing orientation: agriculture to the economy). The transformative approach can be a planned process, started by involved parties, or maybe imposed because of social, environmental, or economic conditions. Measures include new technological practices, institutional advances, cultural and behavioral developments, any measure which challenges the status quo, current values, and beliefs. Transformative capacity is distinguished by positive significant changes or society's measures in terms of reducing future risk and vulnerability (Hasan & Kadir, 2020) (Figure 8, situation 4).
As we move along the absorption-adaptation-transformation continuum, transaction costs and related hazards increase. The main point is "the greater the change, the higher the transaction cost." System change is more costly compared to maintaining the status quo or rebuilding it (Béné et al., 2012). As we know, societies with absorption capacity are adaptive and transformative. They also respond to disasters more effectively and have a higher capacity and chance to recover. Thus any system which has higher capacity in all dimensions is intrinsically more robust compared to systems with one capacity or without any capacity (Hasan & Kadir, 2020).
Implications
Although the importance and interest in technological entrepreneurship are increasing and technology-oriented companies have attracted a lot of attention, its research-oriented knowledge is still limited (Bailetti et al., 2012). These businesses are always looking for survival through innovation (Velucchi & Viviani, 2007) and technological entrepreneurial capabilities (Hejazi & Seifollahi, 2019).
Disasters can have a significant impact on all types of businesses, so governmental and non-governmental organizations need to be more supportive of these businesses (Asgary et al., 2012). This study helps reduce the adverse effects of disasters by understanding and identifying the main causes of business vulnerability (Venkateswaran et al., 2014) and helps provide policies for business survival and growth (Davlasheridze & Geylani, 2017). Disaster-related studies contribute to policymakers in local and national planning to increase business resilience, reduce risks in critical situations, and provide workable insights (Skouloudis et al., 2020). Creating a conceptual framework that considers the vulnerability of technology-driven businesses is essential to identify policymakers in identifying key components of vulnerability (Kamalipoor et al., 2022). Therefore, this study helps policymakers, experts, and researchers working in vulnerability reduction sectors.
Business continuity planning is another key measure to help businesses reduce the negative effects of disasters (Venkateswaran et al., 2014). This study also helps managers to measure the likelihood of events and their consequences and have a better understanding of the concept of business vulnerability to disasters. Then, based on this, thy can develop and implement four types of strategies to reduce vulnerability so they are better prepared when dealing with disasters. As a final achievement, this study can be used in any field of natural disasters at the business level.
Limitations and Directions for Future Research
This study, like other studies, has some limitations. The number of samples was one limitation. The search step found only 629 papers in the WOS database because there are few studies on the vulnerability of technology-based businesses. Using a combination of keywords to extract articles from WOS was the second limitation. Using different keywords may change the number and nature of the retrieved papers. Though the WOS database is the most extensive applied database for bibliometric research, it does not cover some publications. This was the third limitation. The search only has reviewed published papers up to 19 Feb 2021, and later papers are not included; this was another limitation.
Future studies may search other databases for other works, including books, notes, book chapters, and conference papers, to gain new insights. Later studies can consider the implications of business vulnerabilities in other languages and discover new issues. Future researchers might use other valid and comprehensive databases like Scopus and compare their results against the results we obtained. To understand this issue more thoroughly, future researchers may employ various imaging software. Their findings may provide additional and interesting information regarding developing business vulnerabilities. Past vulnerability studies have extensively used questionnaires and semi-structured interviews. To identify the vulnerability of technology-based businesses and obtain more comprehensive results, it is better to use both quantitative and qualitative methods. Moreover the system dynamics approach might be considered by researchers.
Future researchers are encouraged to examine the components and indicators of the vulnerability of technology-based businesses in three dimensions: exposure, sensitivity, and adaptive capacity. In addition, identifying the actions of technology entrepreneurs in the dimensions of absorptive capacity, adaptive capacity, and transformative capacity can be a research topic for the future. Given the prevalence of COVID-19 and its effects on businesses, researchers are advised to examine the vulnerability of technology-based businesses in the light of the COVID-19 crisis. Researchers can identify the vulnerabilities of technology-based businesses in their life cycle stages and suggest strategies to reduce vulnerabilities at each stage. Future research could focus on identifying innovative and technological capabilities and examining how these capabilities affect reducing the vulnerability of technology-based businesses.
* Corresponding Author, Email: [email protected]
References
Adger, W. N. (2000). Social and ecological resilience: Are they related?. Progress in Human Geography, 24 (3), 347-364.
Adger, W. N. (2005). Social-ecological resilience to coastal disasters. Science, 309, 1035-1039.
Adger, W. N. (2006). Vulnerability. Global Environmental Change, 16 (3), 268-281.
Adger, W. N., Arnell, N. W., & Tompkins, E. L. (2005). Adapting to climate change: Perspectives across scales. Global Environmental Change, 15, 75-76.
Adger, W. N., & Kelly, P. (1999). Social vulnerability to climate change and the architecture of entitlements. Mitigation and Adaptation Strategies for Global Change, 4, 253-266.
Aleksić, A., Stefanović, M., Tadić, D., & Arsovski, S. (2014). A fuzzy model for assessment of organization vulnerability. Measurement, 51 (1), 214-223.
Alesch, D. J., Holly, J. N., Mittler, E., & Nagy, R. (Octobor 2001). Organizations at risk: What happens when small businesses and not-for-profits encounter natural disasters. Public Entity Risk Institute. www.riskinstitute.org.
Asgary, A., Anjum, M. I., & Azimi, N. (2012). Disaster recovery and business continuity after the 2010 flood in Pakistan: Case of small businesses. International Journal of Disaster Risk Reduction, 2 (1), 46-56.
Azusa, K., & Hiroyuki, Y. (2013). Organizational resilience: An investigation of key factors that promote the rapid recovery of organizations. Academic Journal of Interdisciplinary Studies, 2 (9), 188-194.
Bacon, C. (2005). Confronting the coffee crisis : Can fair trade , organic , and specialty coffees reduce small-scale farmer vulnerability in northern Nicaragua ? World Development, 33 (3), 497-511.
Baier-fuentes, H., Merigó, J. M., Amorós, J. E., & Gaviria-marín, M. (2019). International entrepreneurship : A bibliometric overview. International Entrepreneurship and Management Journal, 15 (2), 385-429.
Bailetti, T., D. Bot, S., Duxbury, T., Hudson, D., McPhee, C., Muegge, S., Weiss, M., Wells, J., & Westerlund, M. (2012). An overview of four issues on technology entrepreneurship in the TIM Review. Technology Innovation Management Review, 2 (5), 28-34.
Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17 (1), 99-120.
Benckendorff, P., & Zehrer, A. (2013). A network analysis of tourism research. Annals Of Tourism Research, 43, 121 -149.
Béné, C., Wood, R. G., & Newsham, A. J. (2012). Resilience: New utopia or new tyranny? Reflection about the potentials and limits of the concept of resilience in relation to vulnerability reduction programmes. IDS Working Papers, 2012 (405), 1-61.
Berkhout, F., Hertin, J., & Gann, D. M. (2006). Learning to adapt: Organisational adaptation to climate change impacts. Climatic Change, 78, 135-156.
Berrouet, L. M., Machado, J., & Villegas-palacio, C. (2018). Vulnerability of socio - ecological systems : A conceptual framework. Ecological Indicators, 84 (February), 632-647. https://doi.org/10.1016/j.ecolind.2017.07.051
Birkmann, J. (2005). Danger need not spell disaster But how vulnerable are we? United Nations University, 1, 1-8.
Blundell, R., & Bond, S. (1998). Initial conditions and moment restrictions in dynamic panel data models. Journal of Econometrics, 87, 115-143.
Branzei, O., & Fathallah. R. (2021). The end of resilience? Managing vulnerability through temporal resourcing and resisting. Entrepreneurship Theory and Practice (December), 1-33. https://doi.org/10.1177/10422587211053809.
Cardona, O.D., M.K. van Aalst, J. Birkmann, M. Fordham, G. McGregor, R. Perez, R.S. Pulwarty, E.L.F. Schipper, and B.T. Sinh, 2012: Determinants of risk: exposure and vulnerability. In: Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation [Field, C.B., V. Barros, T.F. Stocker, D. Qin, D.J. Dokken, K.L. Ebi, M.D. Mastrandrea, K.J. Mach, G.-K. Plattner, S.K. Allen, M. Tignor, and P.M. Midgley (eds.)]. A Special Report of Working Groups I and II of the Intergovernmental Panel on Climate Change (IPCC). Cambridge University Press, Cambridge, UK, and New York, NY, USA, 65-108.
Chang, S. E., & Falit-Baiamonte, A. (2002). Disaster vulnerability of businesses in the 2001 Nisqually earthquake. Environmental Hazards, 4 (2-3), 59-71.
Chang, Y., Huang, M., & Lin, C. (2015). Evolution of research subjects in library and information science based on keyword, bibliographical coupling, and co-citation analyses. Scientometrics, 105 (3), 2071-2087.
Chen, K., Zhang, Y., & Fu, X. (2019). International research collaboration: An emerging domain of innovation studies ? Research Policy, 48 (1), 149-168.
Chen, H., Feng, Y., Li, Sh., Zhang, Y., & Yang, X. (2019). Bibliometric analysis of theme evolution and future research trends of the type a personality. Personality and Individual Differences, 150, 109507-. doi:10.1016/j.paid.2019.109507.
Christopher, M., & Peck, H. (2004). Building the resilient supply chain. The International Journal of Logistics Management, 15 (2), 1-14.
Colombo, M.G., Piva, E., Quas, A., & Rossi-Lamastra, C. (2020). Dynamic capabilities and high-tech entrepreneurial ventures performance in the aftermath of an environmental jolt. Long Range Planning, 28, 102026-. doi:10.1016/j.lrp.2020.102026.
Cowan, L., & Wright, V. (2016). An approach for analyzing the vulnerability of small family businesses. Systems, 4 (1), 3-26.
Cruz, C. C., Gómez-mejia, L. R., & Becerra, M. (2010). Perceptions Of benevolence and the design of agency contracts : Ceo-Tmt relationships in family firms. Academy of Management Journal, 53 (1), 69-89.
Cuevas, S. C. (2011). Climate change, vulnerability, and risk linkages. International Journal of Climate Change Strategies and Management, 3 (1), 29-60.
Cutter, S. L., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E., & Webb, J. (2008). A place-based model for understanding community resilience to natural disasters. Global Environmental Change, 18, 598-606.
Cutter, S. L., Carolina, S., Boruff, B. J., Carolina, S., Shirley, W. L., & Carolina, S. (2003). Social vulnerability to environmental hazards. Social Science Quarterly, 84 (2), 242-261.
Dabson, B., Heflin, C. M., & Miller, K. K. (2012). Regional Resilience: Research Policy Brief. In The National Association of Development Organizations (NADO) (Issue February).
Dahlhamer, J. M., & Tierney, K. J. (1998). Rebounding from disruptive events: Business recovery following the Northridge earthquake. Sociological Spectrum: Mid-South Sociological Association, 18 (2), 121-141.
Dalziell, E. P. (2005). Understanding the vulnerability of organisations. Te Papa, Wellington, New Zealand: The 1855 Wairarapa Earthquake Symposium, 8-10 Sep 2005. The 1855 Wairarapa Earthquake Symposium - Proceedings Volume, 130-135. University of Canterbury. Civil and Natural Resources Engineering.
Dalziell, E. P., & Mcmanus, S. T. (5-8 Dec 2004). Resilience , vulnerability , and adaptive capacity : Implications for system performance [Paper presentation]. 1st International Forum for Engineering Decision Making (IFED), Stoos, Switzerland.
Danes, S. M., Lee, J., Stafford, K., Kay, R., & Heck, Z. (2008). The effects Of ethnicity , families and culture on entrepreneurial experience : An extension of sustainable family business theory. Journal of Developmental Entrepreneurship, 13 (3), 229-268.
Danvila-del-valle, I., Estévez-mendoza, C., & Lara, F. J. (2019). Human resources training: A bibliometric analysis. Journal of Business Research, 101, 627-636.
Davlasheridze, M., & Geylani, P. C. (2017). Small business vulnerability to floods and the effects of disaster loans. Small Business Economics, 49 (4), 865-888.
De Bellis, N. (2009). Bibliometrics and citation analysis: From the Science citation index to cybermetrics. Scarecrow Press.
Dias, G. P. (2019). Fifteen years of e-government research in Ibero-America: A bibliometric analysis. Government Information Quarterly, 36 (3), 400-411.
Dimaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48 (2), 147-160.
Dzikowski, P. (2018). A bibliometric analysis of bom global fi rms. Journal of Business Research, 85, 281-294.
Füssel, H. (2005). Vulnerability in Climate Change Research: A Comprehensive Conceptual Framework. UC Berkeley: University of California International and Area Studies. Retrieved from https://escholarship.org/uc/item/8993z6nm.
Füssel, H., & Klein, R. J. T. (2006). Climate change vulnerability assessments: An evolution of conceptual thinking. Climatic Change, 75 (3), 301-329.
Füssel, H.. (2007). Vulnerability: A generally applicable conceptual framework for climate change research. Global Environmental Change, 17, 155-167.
Gaillard, J. (2010). Vulnerability, Capacity And Resilience: Perspectives for climate and development policy. Journal of International Development, 22 (2), 218-232.
Gallopín, G. C. (2006). Linkages between vulnerability, resilience, and adaptive capacity. Global Environmental Change, 16 (3), 293-303. https://doi.org/10.1016/j.gloenvcha.2006.02.004
Ghedini, C.G & Ribeiro, C.H. (2009). A framework for vulnerability management in complex networks. International Conference on Ultra Modern Telecommunications & Workshops, 2009, 1-8, doi: 10.1109/ICUMT.2009.5345578.
Giones, F., Brem, A., Pollack, J. M., Michaelis, T. L., Klyver, K., & Brinckmann, J. (2020). Revising entrepreneurial action in response to exogenous shocks: Considering the COVID-19 pandemic. Journal of Business Venturing Insights, 14 (May), e00186, https://doi.org/10.1016/jjbvi.2020.e00186
Goel, S., & Chen, V. (2008). Can business process reengineering lead to security vulnerabilities: Analyzing the reengineered process. International Journal of Production Economics, 15, 104-112.
Graebner, M. E. (2009). Caveat venditor: Trust asymmetries in acquisitions of entrepreneurial firms. Academy of Management Journal, 52 (3), 435-472.
Greiving, S., Fleischhauer, M., & Lückenkötter, J. (2006). A methodology for an integrated risk assessment of spatially relevant hazards. Journal of Environmental Planning and Management, 49 (1), 1-19.
Groos, O. L. E. V, & Pritchard, A. (1969). Documentation notes. Journal of Documentation, 25 (4), 344-349.
Hasan, M. H., & Kadir, S. B. (2020). Social assessment of community resilience to earthquake in Old Dhaka. Natural Hazards Review, 1 (3), 1-14.
He, H., & Harris, L. (2020). The impact of Covid-19 pandemic on corporate social responsibility and marketing philosophy. Journal of Business Research, 116 (May), 176-182. https://doi.org/10.1016/jjbusres.2020.05.030
Hejazi, S. R., & Seifollahi, M. R. (2019). Technology analysis & strategic management a fuzzy-based roadmapping model for enhancing high-tech small firms ' technological entrepreneurship capabilities : Cases of Iran. Technology Analysis & Strategic Management, 32 (6), 1-19.
Hoffmann, V. H., Sprengel, D. C., Ziegler, A., Kolb, M., & Abegg, B. (2009). Determinants of corporate adaptation to climate change in winter tourism: An econometric analysis. Global Environmental Change, 19, 256-264.
Hoiling, C. S. (1973). Resilience and stability of ecological systems. Annual Review of Ecology and Systematics, 4, 1-23.
Hong, W., Jiang, R., Yang, C., Zhang, F., Su, M., & Liao, Q. (2016). Establishing an ecological vulnerability assessment indicator system for spatial recognition and management of ecologically vulnerable areas in highly urbanized regions: A case study of Shenzhen, China. Ecological Indicators, 69, 540-547. https://doi.org/10.1016/j.ecolind.2016.05.028
Hyman, T. (2014). Assessing the vulnerability of beach tourism and non-beach tourism to climate change: A case study from Jamaica. Journal of Sustainable Tourism, 22 (8), 1197-1215.
Insinga, R. C., & Werle, M. J. (2000). Linking outsourcing to business strategy. Academy of Management Executive, 14 (4), 58-70.
Jamshed, A., Rana, I. A., Birkmann, J., & Nadeem, O. (2017). Changes in vulnerability and response capacities of rural communities after extreme events: Case of major floods of 2010 and 2014 in Pakistan. Journal of Extreme Events, 4 (3), 1750013. https://doi.org/10.1142/s2345737617500130
Jensen, C., & Meckling, H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, 3, 305-360.
Kamalipoor, M., Akbari, M., Hejazi, S.R. and Nazarian, A. (2022), "The vulnerability of technology-based business during COVID-19: an indicator-based conceptual framework", Journal of Business & Industrial Marketing, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/JBIM-0455-2020-10.
Kleindorfer, P. R., & Saad, G. H. (2005). Managing disruption risks in supply chains. Production And Operations Management, 14 (1), 53-68.
Kovacs, A., Van Looy, B., & Cassiman, B. (2015). Exploring the scope of open innovation: A bibliometric review of a decade of research. Scientometrics, 104 (3), 951-983. https://doi.org/10.1007/s11192-015-1628-0
Kurniawan, R., Zailani, S. H., Iranmanesh, M., & Rajagopal, P. (2017). The effects of vulnerability mitigation strategies on supply chain effectiveness: Risk culture as moderator. Supply Chain Management: An International Journal, 22 (1), 1-15.
La, R., Silanes, F. L. De, Shleifer, A., Vishny, R. W., Journal, S., December, N., & Vishny, R. W. (1998). Law and finance. Journal of Political Economy, 106 (6), 1113-1155.
Lee, H., & Su, P. (2010). Co-occurrence: A first look at journal papers in Technology Foresight. Scientometrics, 85, 65-79.
Lee, J. (2019). Business recovery from Hurricane Harvey. International Journal of Disaster Risk Reduction, 34, 305-315.
Leydesdorff, L. (1997). Why words and co-words cannot map the development. Ournal Of The American Society For Information Science, 48 (5), 418-427.
Li, Y., Xiong, W., Hu, W., Berry, P., Ju, H., Lin, E., Wang, W., Li, K., & Pan, J. (2015). Integrated assessment of China's agricultural vulnerability to climate change: A multi-indicator approach. Climatic Change, 128 (3-4), 355-366.
Li, F., Wang, L., Jin, Z., Huang, L., Xia, B. (2019). Key factors affecting sustained business operations after an earthquake: a case study from New Beichuan, China, 2013-2017. Natrual Hazards, 104 (1), 101-121. https://doi.org/10.1007/s11069-019-03597-1.
Lo, A.Y., Chow, A.S.Y., Liu, S., Cheung L.T.o.(2019a). Community business resilience: adaptation practice of micro- and small enterprises around the Pearl River Estuary. Climatic Change, 157, 565-585. https://doi.org/10.1007/s10584-019-02562-y.
Lo, A. Y., Liu, S., & Cheung, L. T. O. (2019b). Socio-economic conditions and small business vulnerability to climate change impacts in Hong Kong. Climate and Development, 11(10), 930-942. https://doi.org/10.1080/17565529.2019.1594665.
Lo, A. Y., Liu, S., & Cheung, L. T. O. (2019). Socio-economic conditions and small business vulnerability to climate change impacts in Hong Kong. Climate and Development, 11(10), 930-942. https://doi.org/10.1080/17565529.2019.1594665.
Linnenluecke, M. K. (2015). Resilience in business and management research : A review of influential publications and a research agenda. International Journal of Management Reviews, 19 (1), 30.
Linnenluecke, M. K., Griffiths, A., & Winn, M. I. (2013). Firm and industry adaptation to climate change : A review of climate adaptation studies in the business and management field. WIREs Clim Change, 4, 397-416.
Liu, W., Yongjie Zhu, & Wang, Y. (2011). Organizational vulnerability: New perspective in risk management research. Proceedings 2011 International Conference on Business Management and Electronic Information, 1 (71072008), 708-712.
Lo, A. Y., Liu, S., & Cheung, L. T. O. (2019). Socio-economic conditions and small business vulnerability to climate change impacts in Hong Kong. Climate and Development, 11 (10), 930-942.
Luders, J. (2006). The economics of movement success: Business responses to civil rights mobilization. American Journal of Sociology, 111 (4), 963-998.
Manova, K. (2013). Credit constraints, heterogeneous firms, and international trade. Review of Economic Studies, 80, 711-744.
Marshall, M. I., Niehm, L. S., Sydnor, S. B., & Schrank, H. L. (2015). Predicting small business demise after a natural disaster: An analysis of pre-existing conditions. Natural Hazards, 79 (1), 331-354.
Marshall, N. A., Tobin, R. C., Marshall, P. A., Gooch, M., & Hobday, A. J. (2013). Social vulnerability of marine resource users to extreme weather events. Ecosystems, 16 (5), 797-809.
Martin, K. D., BorahRobert, A., & Palmatier, P. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81 (1), 36-58.
Mayer, R. C., Davis, J. H., Schoorman, F. D., Mayer, R. C., & Davis, J. H. (1995). An integrative model of organizational trust. Academy of Management Review, 20 (3), 709-734.
Morant, G., & Soriano, D. (2016). A bibliometric analysis of international impact of business incubators. Journal of Business Research, 69 (5), 1775-1779.
McCarthy, J.J., et al. (Eds.) (2001). Climate Change 2001: Impacts, Adaptation, and Vulnerability: Scenario of the 21st Century. IPCC, Cambridge.
Moreno, A., & Becken, S. (2009). A climate change vulnerability assessment methodology for coastal tourism. Journal of Sustainable Tourism, 17 (4), 473-488.
Morrish, S. C., & Jones, R. (2020). Post-disaster business recovery: An entrepreneurial marketing perspective. Journal of Business Research, 113, 83-92.
Mulet-forteza, C., Genovart-balaguer, J., Mauleon-mendez, E., & Merigó, J. M. (2019). A bibliometric research in the tourism , leisure and hospitality fields. Journal of Business Research, 101, 819-827.
Murray, G., & Coeurderoy, R. (2015). environments regulatory decision: Evidence from market entries and the location foreign firms the early of new-technology-based. Journal of International Business Studies, 39 (4), 670-687.
Nazari Nooghabi, S., Fleskens, L., Sietz, D., & Azadi, H. (2019). Typology of vulnerability of wheat farmers in Northeast Iran and implications for their adaptive capacity. Climate and Development, 12 (9), 1-14. https://doi.org/10.1080/17565529.2019.1679072.
Nicola, M., Alsafi, Z., Sohrabi, C., Kerwan, A., Al-Jabir, A., Iosifidis, C., Agha, M., & Agha, R. (2020). The socio-economic implications of the coronavirus pandemic (COVID-19): A review. International Journal of Surgery, 78, 185-193.
Nocera, F., & Gardoni, P. (2019). A ground-up approach to estimate the likelihood of business interruption. International Journal of Disaster Risk Reduction, 41 (December), 1-13.
O'Regan, N., & Sims, M. A. (2008). Identifying high technology small firms: A sectoral analysis. Technovation, 28 (7), 408-423.
Orhan, E. (2016). Building community resilience: Business preparedness lessons in the case of Adapazari, Turkey. Disasters, 40 (1), 45-64.
Oxfam. (2017). The future is a choice absorb, adapt, transform resilience capacities. Oxfam International (January), 1-8.
Ozç, H. (2015). Mapping teacher education domain: A document co-citation analysis from 1992 to 2012. Teaching and Teacher Education Journal, 47, 42-61.
Papathoma, M., & Dominey-Howes, D. (2003). Tsunami vulnerability assessment and its implications for coastal hazard analysis and disaster management planning, Gulf of Corinth, Greece. Natural Hazards and Earth System Science, 3 (6), 733-747.
Polsky, C., Neff, R., & Yarnal, B. (2007). Building comparable global change vulnerability assessments: The vulnerability scoping diagram. Global Environmental Change, 17 (3-4), 472-485. https://doi.org/10.1016/j.gloenvcha.2007.01.005
Raddatz, C. (2006). Liquidity needs and vulnerability to financial underdevelopment. Journal of Financial Economics, 80 (1), 677-722.
Rana, I. A., & Routray, J. K. (2018). Multidimensional model for vulnerability assessment of urban flooding: An empirical study in Pakistan. International Journal of Disaster Risk Science, 9 (3), 359-375. https://doi.org/10.1007/s13753-018-0179-4.
Robertson, L. J., Munoz, A., Michael, K., & Member, S. (2020). Managing technological vulnerability of urban dwellers : Analysis, trends, and solutions. IEEE Transactions on Technology and Society, 1 (1), 48-59.
Rossignol, N., Delvenne, P., & Turcanu, C. (2015). Rethinking vulnerability analysis and governance with emphasis on a participatory approach. Risk Analysis, 35 (1), 129-141.
Runyan, R. C. (2006). Small Business in the face of crisis: Identifying barriers to recovery from a natural disaster. Journal Of Contingencies And Crisis Management, 14, 12-26.
Rus, K., Kilar, V., & Koren, D. (2018). Resilience assessment of complex urban systems to natural disasters: A new literature review. International Journal of Disaster Risk Reduction, 31, 311-330.
Scott, D., Dawson, J., & Jones, B. (2008). Climate change vulnerability of the US Northeast winter recreation - tourism sector. Mitigation and Adaptation Strategies for Global Change, 13, 577-596.
Sharma, S. K., Srivastava, P. R., Kumar, A., Jindal, A., & Gupta, S. (2021). Supply chain vulnerability assessment for manufacturing industry. Annals of Operations Research (12 June 2021), https://doi.org/10.1007/s10479-021-04155-4
Sheffi, Y. (2005). A supply chain view of the resilient enterprise. MIT Sloan Management Review, 47 (1), 41-48.
Skouloudis, A., Tsalis, T., Nikolaou, I., Evangelinos, K., & Filho, W. L. (2020). Small & medium-sized enterprises, organizational resilience capacity and flash floods: Insights from a literature review. Sustainability, 12 (18), 7437, https://doi.org/10.3390/su12187437 ...
Small, H. (1973). Co-citation in the scientific literature : A new measure of the relationship between two documents. Journal of the American Society for Information Science, 24 (4), 265-269.
Strauss, A., & Corbin, J. (1998). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Thousand Oaks, CA: Sage Publications, Inc.
Smit, B., & Wandel, J. (2006). Adaptation, adaptive capacity and vulnerability. Global Environmental Change, 16 (3), 282-292.
Smith, N. C., & Cooper-Martin, E. (1997). Ethics and target marketing: The role of product harm and consumer vulnerability. Journal of Marketing, 61 (3), 1-20.
Song, J., Peng, Z. R., Zhao, L., & Hsu, C. H. (2016). Developing a theoretical framework for integrated vulnerability of businesses to sea level rise. Natural Hazards, 84 (2), 1219-1239.
Stafford, K., Duncan, K. A., Dane, S., & Winter, M. (1999). A research model of sustainable family businesses. Family Business Review, 12 (3), 197-208.
Suominen, A., Seppänen, M., & Dedehayir, O. (2019). A bibliometric review on innovation systems and ecosystems : A research agenda. European Journal of Innovation Management, 22 (2), 335-360.
Sydnor, S., Niehm, L., Lee, Y., Marshall, M., & Schrank, H. (2017). Analysis of post-disaster damage and disruptive impacts on the operating status of small businesses after Hurricane Katrina. Natural Hazards, 85 (3), 1637-1663. https://doi.org/10.1007/s11069-016-2652-y
Tarrant, M. (2010). (2010). The organisation : Risk, resilience and governance. The Australian Journal of Emergency Management, 25 (2), 13-17.
Telang, R., & Wattal, S. (2007). An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33 (8), 544-557.
Thomas, K., Hardy, R. D., Lazrus, H., Mendez, M., Orlove, Ben., Rivera-Collazo, Isabel., Roberts, J. T., Rockman, M., Warner, B.p., & Winthrop, R. (2019). Explaining differential vulnerability to climate change: A social science review. Wiley Interdisciplinary Reviews Climate Change,10 (2), e565. doi:10.1002/wcc.565.
Tierney, K. J. (1997). Business impacts of the Northridge earthquake. Journal of Contingencies and Crisis Management, 5 (2), 87-97.
Tierney, K. J. (2007). Businesses and Disasters: Vulnerability, Impacts, and Recovery. Handbooks of Sociology and Social Research, 275-296. doi:10.1007/978-0-387-32353-4_16.
Turner, B. L., Kasperson, R. E., Matsone, P. A., McCarthy, J. J., Corell, R. W., Christensene, L., Eckley, N., Kasperson, J. X., Luers, A., Martello, M. L., Polsky, C., Pulsipher, A., & Schiller, A. (2003). A framework for vulnerability analysis in sustainability science. Proceedings of the National Academy of Sciences of the United States of America, 100 (14), 8074-8079.
Tzafrir, S. S. (2005). The relationship between trust, HRM practices and firm performance. International Journal of Human Resource Management, 16 (9), 1600-1622.
Van Der Veen, A., & Logtmeijer, C. (2005). Economic hotspots: Visualizing vulnerability to flooding. Natural Hazards, 36 (1-2), 65-80.
van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer , a computer program for bibliometric mapping. Scientometrics, 84, 523-538.
Van Eck, N. J. Van, & Waltman, L. (2014). CitNetExplorer: A new software tool for analyzing and visualizing citation networks. Journal of Informetrics, 8 (4), 802-823.
Velucchi, M., & Viviani, A. (2007). We would like to thank firms' survival and competitiveness: A case study in tuscany. Statistica Applicata, 19(4), 325-342.
Venkateswaran, A., Simon-Agolory, K., & Watkins, K. Z. (2014). Long term recovery from mega-disasters: Regional and business recovery periods, differential vulnerability, and business continuity. International Journal of Risk Assessment and Management, 17 (4), 332-360.
Wagner, S. M., & Bode, C. (2006). An empirical investigation into supply chain vulnerability. Journal of Purchasing and Supply Management, 12, 301-312.
Wagner, S. M., & Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory. International Journal of Production Economics, 126 (1), 121-129.
Wagner, S. M., & Neshat, N. (2012). A comparison of supply chain vulnerability indices for different categories of firms. International Journal of Production Research, 50 (11), 2877-2891.
Waltman, L., Van Eck, N. J., & Noyons, E. C. (2009). A unified approach to mapping and clustering of bibliometric networks. Journal of Informetrics, 4 (4), 629-635.
Webb, G. R., Tierney, K. J., & Dahlhamer, J. M. (2000). Businesses and disasters: Empirical patterns and unanswered questions. Natural Hazards Review, 1, 83-90.
Webb, G. R., Tierney, K. J., & Dahlhamer, J. M. (2002). Predicting long-term business recovery from disaster: A comparison of the Loma Prieta earthquake and Hurricane Andrew. Environmental Hazards, 4 (2), 45-58.
Whittaker, J. (1989). Creativity and conformity in science: Titles, keywords and co-word analysis. Social Studies of Science, 19, 473-496.
Willroth, P., Massmann, F., Wehrhahn, R., & Diez, J. R. (2012). Socio-economic vulnerability of coastal communities in southern Thailand: The development of adaptation strategies. Natural Hazards Earth System Sciences, 12, 2647-2658.
Wu, F., Li, R., Huang, L., & Miao, H. (2016). Theme evolution analysis of electrochemical energy storage research based on CitNetExplorer. Scientometrics, 11 (1), 113-139.
Xiang, C., Wang, Y., & Liu, H. (2017). A scientometrics review on nonpoint source pollution research. Ecological Engineering, 99, 400-408.
Yan, M., & Zhou, Z. (2010). An empirical study on diagnosing and overcoming business gene's vulnerability. In 2010 International Conference on Management and Service Science, 1-5. IEEE. doi: 10.1109/ICMSS.2010.5576780.
Ye, C., Liu, D., Chen, N., & Lin, L. (2015). Mapping the topic evolution using citation-topic model and social network analysis. In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2648-2653. IEEE. doi: 10.1109/FSKD.2015.7382375.
Zhang, Y., Lindell, M. K., & Prater, C. S. (2009). Vulnerability of community businesses to environmental disasters. Disasters, 33 (1), 38-57.
Zhou, Y., Liu, Y., Wu, W., & Li, N. (2015). Integrated risk assessment of multi-hazards in China. Natural Hazards, 78 (1), 257-280.
Zupic, I., & Cater, T. (2015). Bibliometric Methods in management and organization. Organizational Research Methods, 18 (3), 429-472.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Natural and man-made disasters have increased the attention of practitioners and researchers to vulnerability. Identifying business vulnerability is one of the basic elements of strategic analysis and public policy. The purpose of this paper is to explore evolutionary pathways to reduce the vulnerability of technology-based businesses. The intellectual structure of this subject was examined using both bibliometric co-occurrence and co-citation analyses. We focused on 629 articles published between 1981 and 2021. This article identifies four specific areas, namely business performance, small business vulnerability, sources of sustainability in business, and adaptation policy assessment. A novel framework was developed based on the most prominent papers identified in co-citation as well as the highly cited papers. The proposed model includes drivers, vulnerability appearance, and vulnerability reduction. This study examines the basis of research concepts, themes, and communities in reducing the vulnerability of technology-based businesses. This article identifies business vulnerability as one of the relevant areas to disaster economics and sustainability studies.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 PhD Student, Faculty of Entrepreneurship, University of Tehran, Tehran, Iran
2 Associate Professor, Faculty of Entrepreneurship, University of Tehran, Tehran, Iran
3 Associate Professor, University of Westminster, London, UK
4 Assistant Professor, Faculty of Entrepreneurship, University of Tehran, Tehran, Iran