{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:18:35Z","timestamp":1762507115624,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"7","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2017,8,7]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to investigate the vulnerability of projects implemented in enterprises. The paper focuses on the issue of vulnerability assessment in the planning stages of a project, before its realization.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>In this paper, the realization of the project has been analyzed through the phases of delivery, and the fuzzy approach has been deployed for mathematical modeling of uncertainties. An appropriate expert and management team has assessed the variables of the project\u2019s vulnerability by using linguistic expressions, as this way of assessment is close to the human way of thinking. The model of project\u2019s vulnerability assessment has been verified on real life data by means of an illustrative example.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>A very significant part of business operations in enterprises all over the world is realized through the practice of project management. In daily business practice, project activities may be exposed to different risk sources. These risks may be studied from different perspectives, but without reevaluation, risk sources increase the vulnerability of projects as well as of the whole enterprise.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The results of the analysis of the obtained data gives good direction to future research in the scope of vulnerability management in the enterprises oriented to long-term sustainability.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/k-08-2016-0218","type":"journal-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T09:04:41Z","timestamp":1496912681000},"page":"1171-1188","source":"Crossref","is-referenced-by-count":12,"title":["Project management issues: vulnerability management assessment"],"prefix":"10.1108","volume":"46","author":[{"given":"Aleksandar","family":"Aleksic","sequence":"first","affiliation":[]},{"given":"Hrvoje","family":"Puskaric","sequence":"additional","affiliation":[]},{"given":"Danijela","family":"Tadic","sequence":"additional","affiliation":[]},{"given":"Miladin","family":"Stefanovic","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020120704500565700_ref001","first-page":"268","article-title":"Vulnerability","volume":"16","year":"2016","journal-title":"Global Environmental Change"},{"issue":"2","key":"key2020120704500565700_ref002","first-page":"159","article-title":"Sustainable management organization with example of passenger car sustainability assessment","volume":"3","year":"2009","journal-title":"International Journal for Quality Research"},{"key":"key2020120704500565700_ref003","doi-asserted-by":"crossref","first-page":"3561","DOI":"10.1016\/j.eswa.2009.10.035","article-title":"Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism","volume":"37","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"key2020120704500565700_ref004","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1016\/j.jlp.2013.06.004","article-title":"An assessment of organizational resilience potential in SMEs of the process industry, a fuzzy approach","volume":"26","year":"2013","journal-title":"Journal of Loss Prevention in the Process Industries"},{"key":"key2020120704500565700_ref005","doi-asserted-by":"crossref","first-page":"16483","DOI":"10.3390\/su71215828","article-title":"Modelling and enhancement of organizational resilience potential in process industry SMEs","volume":"7","year":"2015","journal-title":"Sustainability"},{"volume-title":"BSI Standards Publication Project management \u2013 Part 2: Vocabulary","year":"2000","author":"BS 6079-2:2000","key":"key2020120704500565700_ref006"},{"volume-title":"BSI Standards Publication, Project Management \u2013 Part 3: Guide to the Management of Business Related Project Risk","year":"2000","author":"BS 6079-3:2000","key":"key2020120704500565700_ref007"},{"key":"key2020120704500565700_ref008","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jss.2015.10.011","article-title":"Evaluating different families of prediction methods for estimating software project outcomes","volume":"112","year":"2016","journal-title":"Journal of Systems and Software"},{"issue":"6","key":"key2020120704500565700_ref009","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1016\/j.ijproman.2015.02.009","article-title":"Performance measurement and the prediction of capital project failure","volume":"33","year":"2015","journal-title":"International Journal of Project Management"},{"key":"key2020120704500565700_ref010","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.omega.2015.05.016","article-title":"A multiple objective optimization based QFD approach for efficient resilient strategies to mitigate supply chain vulnerabilities: the case of garment industry of Bangladesh","volume":"57","year":"2015","journal-title":"Omega"},{"issue":"2","key":"key2020120704500565700_ref011","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1002\/pmj.21397","article-title":"Project system vulnerability to political risks in international construction projects: the case of chinese contractors","volume":"45","year":"2014","journal-title":"Project Management Journal"},{"key":"key2020120704500565700_ref012","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/0377-2217(86)90266-3","article-title":"Fuzzy sets and statistical data","volume":"25","year":"1986","journal-title":"European Journal of Operational Research"},{"key":"key2020120704500565700_ref013","doi-asserted-by":"crossref","first-page":"3447","DOI":"10.1016\/j.jbusres.2016.01.041","article-title":"The role of top management involvement in firms performing projects: a dynamic capabilities approach","volume":"69","year":"2016","journal-title":"Journal of Business Research"},{"key":"key2020120704500565700_ref014","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/S2212-5671(15)01054-0","article-title":"Challenges for financial managers in a changing economic environment","volume":"27","year":"2015","journal-title":"Procedia Economics and Finance"},{"key":"key2020120704500565700_ref017","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ejor.2004.09.016","article-title":"A fuzzy optimization model for QFD planning process using analytic network process","volume":"171","year":"2006","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"key2020120704500565700_ref015","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1539-6924.1997.tb00881.x","article-title":"The words of risk analysis","volume":"17","year":"1997","journal-title":"Risk Analysis"},{"key":"key2020120704500565700_ref016","doi-asserted-by":"crossref","first-page":"6577","DOI":"10.1016\/j.eswa.2010.11.081","article-title":"Multicriteria decision making in energy planning using a modified fuzzy TOPSIS methodology","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"key":"key2020120704500565700_ref018","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.sbspro.2015.11.333","article-title":"Support of project management methods by project management information system","volume":"210","year":"2015","journal-title":"Procedia - Social and Behavioral Sciences"},{"issue":"9","key":"key2020120704500565700_ref020","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1061\/(ASCE)CO.1943-7862.0000717","article-title":"Managing project risk at enterprise level: exploratory case studies in China","volume":"139","year":"2013","journal-title":"Journal of Construction Engineering Management"},{"issue":"5","key":"key2020120704500565700_ref019","first-page":"20","article-title":"An extended TODIM method for multiple attribute group decision-making based on 2-dimension uncertain linguistic variable","volume":"21","year":"2014","journal-title":"Complexity"},{"key":"key2020120704500565700_ref021","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.ijproman.2013.05.009","article-title":"Project risk management methodology for small firms","volume":"32","year":"2014","journal-title":"International Journal of Project Management"},{"issue":"2","key":"key2020120704500565700_ref022","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.ijproman.2013.05.012","article-title":"Exploring the value of project management: linking project management performance and project success","volume":"32","year":"2014","journal-title":"International Journal of Project Management"},{"key":"key2020120704500565700_ref023","doi-asserted-by":"crossref","first-page":"2822","DOI":"10.1016\/j.eswa.2011.08.142","article-title":"Organizational strategy development in distribution channel manage-ment using fuzzy AHP and hierarchical fuzzy TOPSIS","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"key":"key2020120704500565700_ref024","first-page":"83","article-title":"Quantitatively assessing the vulnerability of critical information systems: a new method for evaluating security enhancements","volume":"28","year":"2008","journal-title":"International Journal of Information Management"},{"key":"key2020120704500565700_ref025","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1016\/j.measurement.2011.06.015","article-title":"Monitoring system of buildings with high vulnerability in presence of slow ground deformations (the Campi Flegrei, Italy, case)","volume":"44","year":"2011","journal-title":"Measurement"},{"key":"key2020120704500565700_ref026","volume-title":"A Guide to the Project Management Body of Knowledge","author":"PMBOK Guide","year":"2015","edition":"5 edn."},{"issue":"84","key":"key2020120704500565700_ref027","first-page":"1028","article-title":"Application of a fuzzy TOPSIS method based on modified preference ratio and fuzzy distance measurement in assessment of traffic police centers performance","volume":"10","year":"2010","journal-title":"Applied Soft Computing"},{"issue":"7\/8","key":"key2020120704500565700_ref028","first-page":"801","article-title":"An extension of TOPSIS for group decision making","volume":"45","year":"2007","journal-title":"Mathematical and Computer Modelling"},{"issue":"Part B","key":"key2020120704500565700_ref029","first-page":"437","article-title":"Project managers and risk management: a comparative study between Japanese and Korean firms","volume":"147","year":"2014","journal-title":"International Journal of Production Economics"},{"key":"key2020120704500565700_ref030","first-page":"13","article-title":"Evaluation and ranking of organizational resilience factors by using a two step fuzzy AHP and fuzzy TOPSIS","volume":"2014","year":"2014","journal-title":"Mathematical Problems in Engineering"},{"year":"2016","journal-title":"Total Quality Management & Business Excellence","article-title":"A model for evaluation of customer satisfaction with banking service quality in an uncertain environment","key":"key2020120704500565700_ref031"},{"key":"key2020120704500565700_ref032","doi-asserted-by":"crossref","first-page":"547","DOI":"10.3233\/IFS-120659","article-title":"An evaluation of quality goals by using fuzzy AHP and fuzzy TOPSIS methodology","volume":"25","year":"2013","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"year":"2016","first-page":"1066","article-title":"Critical Factors that Lead to Projects\u2019 Success\/Failure in Global Marketplace","key":"key2020120704500565700_ref033"},{"key":"key2020120704500565700_ref034","first-page":"845","article-title":"Fuzzy decision analysis for integrated environmental vulnerability assessment of the Mid-Atlantic region","volume":"29","year":"2002","journal-title":"Environmental Management"},{"issue":"14","key":"key2020120704500565700_ref035","doi-asserted-by":"crossref","first-page":"8074","DOI":"10.1073\/pnas.1231335100","article-title":"A framework for vulnerability analysis in sustainability science","volume":"100","year":"2003","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"1\/2","key":"key2020120704500565700_ref036","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1108\/03684921211213043","article-title":"A systems thinking approach for project vulnerability management","volume":"41","year":"2012","journal-title":"Kybernetes"},{"key":"key2020120704500565700_ref037","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ijpe.2009.10.007","article-title":"Assessing the vulnerability of supply chains using graph theory","volume":"126","year":"2010","journal-title":"International Journal of Production Economics"},{"issue":"3","key":"key2020120704500565700_ref038","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","article-title":"The concept of a linguistic variable and its application to approximate reasoning","volume":"8","year":"1975","journal-title":"Information Sciences"},{"key":"key2020120704500565700_ref039","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ssci.2011.08.042","article-title":"Application of a trapezoidal fuzzy AHP method for work safety evaluation and early warning rating of hot and humid environments","volume":"50","year":"2012","journal-title":"Safety Science"},{"volume-title":"Fuzzy Sets Theory- And Its Applications","year":"2001","edition":"4th ed.","key":"key2020120704500565700_ref040"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-08-2016-0218\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-08-2016-0218\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:49:40Z","timestamp":1753393780000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/46\/7\/1171-1188\/450548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,8,7]]}},"alternative-id":["10.1108\/K-08-2016-0218"],"URL":"https:\/\/doi.org\/10.1108\/k-08-2016-0218","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2017,8,7]]}}}