Professional Documents
Culture Documents
To cite this article: Kang Hou, Wendong Tao, Dan He & Xuxiang Li (2022) A new perspective
on ecological vulnerability and its transformation mechanisms, Ecosystem Health and
Sustainability, 8:1, 2115403, DOI: 10.1080/20964129.2022.2115403
Introduction
2009; Skondras et al. 2011). As an important part of
Ecological vulnerability is an estimate of the inability of Delineation of Ecological Protection Red Line in China,
an ecosystem to withstand stress (Williams and ecological vulnerability zoning is closely related to the
Kapustka 2000; Cao et al. 2022). As a specific attribute stability of an ecological security pattern (Bai et al. 2016).
of an ecosystem, it reveals the potential of an ecosystem Therefore, in-depth research on ecological vulnerability
to regulate its response to stressors (Weißhuhn, Müller, can better promote regional ecological delineation and
and Wiggering 2018). Because ecosystem is affected by optimize ecological security pattern (Nguyen et al.
internal materials, overall structure, and external inter 2016). For countries with greater environmental pres
ferences, there are differences in regional ecological sure like China, ecological vulnerability research is often
vulnerability characteristics (Turner et al. 2003; Wang, urgent and is the focus of research on environmental
Liu, and Yang 2008). Ecological vulnerability assessment quality assessment.
(EVA) is a necessary means to assess the differences of The research on ecological vulnerability has been
fragile state and spatial distribution pattern of regional focused on developing EVA systems and data proces
habitats, which is of practical significance for maintain sing models (Li et al. 2006, 2009; Wang, Liu, and Yang
ing the sustainable development of ecosystems (Li et al. 2008a; Wang et al. 2008; Ippolito et al. 2010; Zhao et al.
CONTACT Kang Hou houkang0311@stu.xjtu.edu.cn School of Environmental and Chemical Engineering, Xi’an Polytechnic University, Xi’an,
Shaanxi, China
© 2022 The Author(s). Published by Taylor & Francis Group and Science Press on behalf of the Ecological Society of China.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits
unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2 K. HOU ET AL.
2018). Meanwhile, some vulnerability research frame study the impacts of regulating factor variation on
works highlight the beneficial roles of human activities ecological vulnerability is in urgent need.
in the coupling of humans and natural systems by Due to the differences in the type of regulating
introducing adaptive capacity as an evaluation criter factors and the geographical size of their impacts
ion (Smit and Wandel 2006; Lindner et al. 2010; Pandey under certain conditions, the number of EVI levels
and Bardsley 2015; Weißhuhn, Müller, and Wiggering that have changed and the area ratios of the changes
2018; Chen et al. 2019). The establishment of can be significantly different. As illustrated in Figure 1,
a different index system and improvement of a data the dynamic process of EVI-level transformation deter
processing model can better reflect a regional ecolo mines the evolution direction of ecological vulnerabil
gical environment (Yue, Shen, and Yuan 2019b; Li and ity in a region. Therefore, identifying the regulating
Cao 2019). However, most of the EVA studies did not factors and exploring the transformation mechanisms
identify the factors that regulated the spatial and tem are the key means to intervene the evolution of ecolo
poral changes of ecological vulnerability. The regulat gical vulnerability in different regions (Hou et al. 2018).
ing factors and mechanisms of spatiotemporal However, most of the studies so far remain on evaluat
changes in ecological vulnerability need to be ing the state of ecological vulnerability and optimizing
addressed with greater attention in the future. data processing models (Figure 1a) (Wang et al. 2008;
Studying its regulating factors can elucidate the Xue et al. 2019; Zhao et al. 2018), while few studies
evolutionary causes of ecological vulnerability and have dug into the mechanism of ecological vulnerabil
provide a reasonable basis for ecological restoration ity transformation (Figure 1b).
projects (Choudhary, Boori, and Kupriyanov 2018). Past In an effort to promote exploration into the
research has been focused on ecological vulnerability mechanisms of EVI-level transformation, this paper
index (EVI) and status assessment in harsh natural reviewed the application of the EVA systems and
environments or areas with intensive human activities the corresponding data processing models, dis
(Li et al. 2009; Yu, Yang, and Shi 2012; Neshat, Pradhan, cussed the important roles of regulating factors in
and Dadras 2014; Tran, O’Neill, and Smith 2012; Wu the EVI levels, and explored the approaches for
et al. 2017; Xue et al. 2019). There is little quantitative quantitative analysis of regional EVI transformation.
research on the factors that regulate the changes of The new research perspective could be used to
ecological vulnerability in various evaluation units of monitor the complex spatiotemporal evolution of
a study area. Since each evaluation unit can be affected ecological vulnerability. At the same time, necessary
by various regulating factors, how to determine the control measures could be combined to maintain
most important regulating factor and quantitatively regional ecological stability.
Figure 1. Framework of regional ecological vulnerability research from conventional case studies to exploration into mechanism of
vulnerability level transformation.
ECOSYSTEM HEALTH AND SUSTAINABILITY 3
Research design and methodology 2018), etc. Therefore, additional search terms, such as
“ecological vulnerability,” “environmental evaluation,”
This paper reviewed the case studies involving differ
and “vulnerability evaluation” (Ippolito et al. 2019)
ent models and influencing factors, based on the
were added to expand the scope of ecological vulner
results of literature search in the main databases (SCI
ability evaluation.
Expanded, SSCI, CPCI, and BKCI). First, relevant articles
The identified papers were manually assessed to
were searched with the terms related to ecological
exclude irrelevant literature, and papers with signifi
vulnerability in the field of “title, abstract and key
cant differences from the detailed indicators were
words.” Finally, we selected the typical case studies to
excluded. Since 2000, the research on the theme of
classify the adopted models and the influencing
“ecological vulnerability” has entered a substantial
factors.
stage of rise, from the discussion of concept and fra
The literature included in the review was limited to mework to the case study of typical regions, outstand
peer-refereed publications in English and Chinese, ing results have been achieved. Therefore, the
excluding books, reports, and conference proceedings. publication year is limited to 2000–2022, and the lit
Earlier articles (Williams and Kapustka 2000; Villa and erature cited in this paper involves 126 academic
Mcleod 2002) facilitated the discussion of concepts, papers, including 85 case studies. They were confirmed
though most of them are recent conceptual explana in the primary search and subsequent manual screen
tions (Williams et al. 2000; Tran et al. 2002; Villa and ing. The categorization of the relevant articles (Table 1)
Mcleod 2002; Turner et al. 2003; De Lange et al. 2010; focuses on explanation and analysis of “ecological vul
Weißhuhn, Müller, and Wiggering 2018). nerability evaluation” so as to support the construction
The primary search term was “ecological vulnerabil of the article analysis framework (Figure 2) and imple
ity evaluation.” This term has a very broad meaning, mentation of the literature review and discussion pro
and the relevant literature may involve evaluation of cess (Figure 3).
pollutant concentration (Laura et al. 2015), construc These large numbers of ecological vulnerability
tion of evaluation systems (Rao and Yang 2020; Jiang, papers reflect the characteristics of regional ecological
Shi, Li and Guo 2021b), use of evaluation methods (Li, vulnerability and the changes of regional ecological
Shi and Wu 2021; Li and Cao 2019), evolution of eco vulnerability. However, there is a lack of quantitative
logical vulnerability (Liu et al. 2019; Liu, Huang, Su and research on the transformation mechanism and driving
Joung 2021), driving forces (Cai et al. 2017; Hou et al. force of ecological vulnerability evolution within the
Figure 2. Upgrading ecological vulnerability assessment from traditional case studies to emphasizing mechanism of vulnerability
changes.
regions involved. Therefore, this study provides a new hence based on the contributions of different regulat
perspective, involving the study of applying quantita ing factors to the study area. If different EVA systems
tive analysis to identification of regulating factors and are used to study the same area, the results can be
exploring the mechanisms of ecological vulnerability different. Moreover, due to the complex temporal and
transformation, in order to achieve the purpose of spatial changes in an ecological region, the application
evolutionary process monitoring. options of the EVI system are not uniform (Table 2). Li
et al. (2009) characterized the ecological vulnerability
of Danjiangkou from four aspects: land resources,
Ecological vulnerability evaluation systems
hydrothermal climate, topography, and human activ
Ecological vulnerability characterization involves topo ities. Hou, Li, and Zhang (2015) constructed an EVA
graphy, climate change, vegetation degradation, land system for soil erosion in the Loess Plateau based on
suitability, desertification, salination, biodiversity climate, topography, and social economy. Zou and
degradation, and human activities. The evaluation of Yoshino (2017) established an EVA system for the
ecologically vulnerability areas requires comprehen Daxinganling area based on four major factors includ
sive consideration of the actual ecological develop ing terrain, forest inventory, social economy, and cli
ment of a study area. Selection of an EVA system is mate. Although the above studies were similar in
ECOSYSTEM HEALTH AND SUSTAINABILITY 5
Table 2. Major ecological vulnerability evaluation systems. operation and potential underestimation of the envir
Index system Main indicators References onmental and socio-economic uncertainties and the
PSR Nature, anthropogenic Xue et al. (2019) diversity of the causal relationships (Svarstad et al.
DPSIR Social-ecological data, Hasani (2018)
etc. 2008); and 3) in the VSD model, it is unclear whether
/ Meteorological data, etc. Hou et al. (2018) the index reflects natural or human factors that the
/ Landform, meteorology Zhao et al. (2018)
VSD Exposure, sensitivity data, Zou and Yoshino (2017) EVA system fails to clearly identify the vulnerability
etc. causes (Li and Fan 2014). As a result, the selection of
/ Natural, environmental, Hou et al. (2016a, 2016b)
etc.
evaluation criteria plays a key role in regional eco-
/ Geographic, hydrologic, Chang (2013) environmental assessment. The operability and repre
etc. sentativeness of indicators must be considered when
/ Landscape pattern, etc. Qiao et al. (2013)
/ Ecological sensitivity, etc. Quan et al. (2013) introducing natural disaster factors and comprehen
/ Socio-ecological data Abson, Dougill, and sive human factors.
Stringer (2012)
/ Pressure factors Abbasov and Smakhtin
(2012)
Self- or peer- Multiple stressors, Tran, O’Neill, and Smith
appraisal resources, etc. (2012)
Data processing models
/ Multiple indicators Zabeo et al. (2011)
/ Multiple criteria Huang, Tsai, and Lin As summarized in Table 3, there are subjective models,
(2010) objective models, and their modifications for data pro
DPSIR Multiple stressors and Ippolito et al. (2010)
indicators cessing. Since the data used in an EVI system are
/ Multiple indicators Siyuan, Jingshi, and usually derived from field surveys, statistical data, sta
Cunjian (2008)
/ Environmental, human Wang, Liu, and Yang
tion observations, and topographic and geomorphic
impact, etc. (2008a),b data, the EVI data often have spatial and geographical
/ Multiple indicators Li et al. (2006) attributes. Meanwhile, it is difficult for the traditional
/ Land cover, population, Tran et al. (2002)
etc.
data processing models to eliminate the influence of Research on the new perspective of ecological
human factors on weight allocation. It is, hence, neces vulnerability
sary to introduce geospatial technologies to improve
Factors regulating ecological vulnerability
the data processing models.
changes
The wide application of remote sensing (RS) and
geographic information system (GIS) technologies has Identification of factors regulating the changes in
opened new channels and methods for EVA data ana ecological vulnerability
lysis (Li et al. 2006; Zhao et al. 2018; Zhang et al. 2022). In recent years, the ecological and environmental pro
With RS and GIS, an index system can reflect the eco blems caused by global changes have become increas
logical environment with topographical, geomorphic, ingly prominent, and ecological vulnerability has
and natural disaster factors. The GIS spatial analysis received more and more attention (Fekete, Damm,
technology can be used to study the relationships and Birkmann 2010; Hou, Li, and Zhang 2015; Li et al.
between ecological vulnerability and environmental 2006; Zhao et al. 2018). Site-specific studies quantify
factors and simulate spatial distribution of EVI. These the changes of ecological vulnerability state and diag
two technologies have technical advantages to meet nose the regulating factors of the changes, though
many needs of EVA by providing data sources and such studies involve largely one regulating factor or
supporting model building and display platform one type of regulating factors (Khandlhela and
construction. May 2006; Villa and Mcleod 2002) and lack of consid
Li et al. (2006) used GIS and RS technologies to erations in spatial variation of regulating factors. Li
extract topographical factors of the Lancang River et al. (2006) assessed the ecological vulnerability in
Basin and constructed a spatial principal component the upper reach of the Minjiang River based on nine
analysis (PCA) model to quantitatively study the indicators in climate and topography and qualitatively
changes in ecological vulnerability. Rapicetta and discussed the factors affecting the EVI classification.
Zanon (2009) proposed a new way of studying volcanic Ippolito et al. (2010) established EVA systems for water
eruptions in environmental vulnerability by simulating sheds and studied environmental health and vulner
Etna volcanic activity and using GIS to map ecological ability drivers at the basin scale. Abson, Dougill, and
vulnerability. Hassan, Mahmud-Ul-Islam, and Rahman Stringer (2012) mapped the ecological vulnerability of
(2015) used GIS and RS to identify and quantify the South Africa and qualitatively analyzed the main envir
vulnerability of environmental degradation in the onmental factors. Sahoo, Dhar, and Kar (2016) studied
northwestern part of Bangladesh and classify its vulner ecological vulnerability of the Hirakud region in India
ability intensity. Hou et al. (2016a) and Zhang et al. and concluded that elevation factors were the main
(2017b) extracted the environmental topographic fac factors affecting the variation of ecological
tors of Yan’an and Fuzhou, respectively, applying RS vulnerability.
and GIS to the analytic hierarchy process (AHP) model Human activities can also be important factors influ
for weight allocation and comprehensive assessment of encing EVI changes. Unreasonable land use can exacer
the spatial and temporal changes in EVI. With the sup bate the vulnerability of the ecological environment.
port of GIS and RS, an EVA system of the Yellow River A study by Skondras et al. (2011) on EVA in Sweden
Delta was established, and the results of the EVI data pointed out that the increasing influence of human
were analyzed by the fuzzy AHP model (Wu et al. 2018). activities on the background of natural changes had
Table 3 lists the data processing methods com become the dominant vulnerability factor, which
monly used in EVA research, which summarizes the aggravated the development of ecological vulnerabil
subjective and objective models and their modifica ity. Hou et al. (2016a) analyzed the ecological vulner
tions for data processing. When using these methods, ability of the Loess Plateau in northern China and
the source of the data and its objective authenticity are found that the land use change and the policy of
very important. Based on the characteristics of RS and returning farmland to forests were the main causes
GIS technologies, we believe that these two technolo leading to the change of vulnerability. Choudhary,
gies can help us improve our research work when Boori, and Kupriyanov (2018) argued that population
using the methods. Among them, RS technology can growth, industrialization, and government environ
increase the data sources in a study area and help mental protection policies were the main factors con
researchers to analyze the data more comprehensively, tributing to changes in ecological vulnerability in the
thus making the identified regulating factors more Astrakhan region of Russia. Yu et al. (2019b) deter
objective. GIS technology can improve the precision mined regional ecological vulnerability based on the
of data analysis in a research area and better display interaction of the natural environment and human
the temporal and spatial variation characteristics of disturbance and identified the regulating factors to
ecological vulnerability in research areas through gra be tourism interference, traffic interference, alien spe
phic simulation. cies invasion, and land use.
ECOSYSTEM HEALTH AND SUSTAINABILITY 7
The above studies showed that the regulating fac by the standard deviation (σ). Y represents the matrix
tors of vulnerability changes were different in different of yij.
regions, including both natural and human factors. The �x
x
regulating factors were mostly determined qualita y¼ (3)
σ
tively and subjectively with inherent biases, lacking
quantitative approaches and analysis of the spatial n
,
P
differentiation. Moreover, the EVI effects caused by �x ¼ xij (4)
i¼1 n
different regulating factors may overlap in some
cases that the effects of individual factors could not
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
be clearly distinguished. How to compile the indicators n
1 X �2
in order to more effectively distinguish the vulnerabil σx ¼ xij xj (5)
n 1 i¼1
ity changes caused by different factors and evaluate
the differences was a problem that needed to be �
solved in the future (Li and Fan 2014). In general, the Y ¼ ðY1 ; Y2 ; . . . ; Ym Þ ¼ yij n�m
(6)
development of vulnerability theory fell behind the
case-specific evaluations in past studies.
Calculate the eigenvalues, eigenvectors, and contri
bution rates of the correlation matrix. Calculate the
Models to identify regulating factors
sample correlation coefficient matrix R ¼ ðrij Þm , then
Ecological vulnerability state is the result of
find the m-th eigenvalues λ1 ; λ2 ; . . . ; λm ðλi > 0Þ of the
a combination of regulating factors. Since these factors
correlation matrix R and the corresponding eigenvec
are independent of each other, objective, and quanti
tors C1 ; C2 ; . . . ; Cm ,
tative methods are needed to screen numerous factors
Ci ¼ ðci1 ; ci2 ; . . . ; cim Þði ¼ 1; 2; . . . ; mÞ, the contri
and identify the main factors that regulate ecological m
P
vulnerability changes. A multivariate statistical analysis bution rate of which vi ¼ λi = λi .
method such as PCA could convert multiple experi i¼1
p
X p X
X m been restricted to evaluation of the ecological vulner
ϕ¼ ϕk ¼ ðdkj 2 � k Þ2
d (10) ability state (Beroya-Eitner 2016), while ignoring the
k¼1 k¼1 j¼1
m qffiffiffiffiffiffiffiffiffi�ffiffiffiffiffi�ffi EVI classification and transformation of EVI levels over
P
where: dkj ¼ dkj =hj , dk ¼ 1 dkj , hj ¼ max�rij � time. Classification of ecological vulnerability, as the
R is the correlation matrix, j¼1
R ¼ ðrij Þm premise of research on transformation mechanism, can
represent the degrees of regional ecological
Calculate factor score F. Ft is the comprehensive vulnerability.
factor of Xt , t ¼ 1; 2; . . . ; n Ecological vulnerability transformation is affected
by the internal and external linkages and feedback
Ft ¼ ðft1 ; ft2 ; . . . ; ftp Þ ¼ ðQR 1 Qr ÞQR 1 Y (11)
processes of the ecosystems, and changes between
The factor load matrix can be used to study both the EVI levels are also dynamic. The diversity of the human-
main formation factors and evolution process of eco environment coupled system and the complexity of
logically vulnerable areas. As an example, Hou et al. the internal nesting process require a comprehensive
(2018) analyzed the observation variable matrix using analysis of the responses to environmental stresses
the spatial PCA model and identified the main regulat within each geospatial unit and the feedback of the
ing factors that led to the ecological vulnerability. Their environment to human activities (Figure 4). This is the
findings showed that the principal components I, II, main reason why the vulnerability transformation pro
and IV with a total loading of 64.5% revealed its reg cess is difficult to measure and transformation
ulating factors to be the social and economic factors mechanisms are difficult to find. Researchers have
(Hou et al. 2018). combined vulnerability and sustainable development
in qualitative research (Bo and Lianjun 2008; Lee 2014).
The transformation of EVI levels directly leads to
Methods to identify mechanisms of vulnerability
changes in the stability of ecological environment in
transformation
different regions, which is extremely important for
The current research on fragile ecological environment stability and sustainable development of the ecologi
is mainly based on the application of theories in ecol cal environment.
ogy and geography for general evaluation. Research
on the formation mechanism of vulnerable ecological Construction of ecological vulnerability
environment mainly focused on factor discrimination, transformation matrix
less on the evolution mechanisms of spatial distribu As shown in Equation 15, an ecological vulnerability
tion (Hou et al. 2018). From the introduction of the transformation matrix can be constructed to represent
ecological vulnerability concept to the current the EVI-level changes from the initial to final state in
research using different models, the research has a certain period. It not only includes static ecological
ECOSYSTEM HEALTH AND SUSTAINABILITY 9
Figure 5. The spatial change of ecological vulnerability index from 2000 to 2006.
vulnerability area data at a certain time point in vulnerability transformation matrix contains more infor
a certain area, but also contains information about mation on the mutual transformation between the EVI
the transformation of the EVI levels from the initial to levels at the beginning and end of a study period and is
the final state. rich in statistical significance. Based on the results of the
2 3 EVI classification at different time points, the EVI-level
f11 f12 � � � f1x
6 f21 f22 � � � f2x 7 transformation matrix can be constructed in GIS for
6 7 individual evaluation units. The mechanisms of the vul
6 7
Pij ¼ 6 f31 f32 � � � f3x 7 (12)
6 .. .. .. .. 7 nerability transformation can then be identified for the
4 . . . . 5 entire region, which is of great significance for studying
fx1 fx2 � � � fxx the evolution of regional ecological vulnerability.
Where x represents the number of EVI levels at the
beginning and end of a transformation period; i and Case study on transformation of ecological
j represent the EVI levels before and after the transfor vulnerability
mation, respectively; and fij represents the area of Research defects in spatial changes of ecological
a change in ecological vulnerability level from i to j. vulnerability. The Qinling mountain area, one of the
Each row in the matrix represents the resultant infor landmarks dividing the north and south of China, was
mation of each EVI level after the transformation of the taken as an example to demonstrate the matrix opera
i-th ecological vulnerability level. Each column in the tion for ecological vulnerability transformation. Hou
matrix represents the source information of each eco et al. (2018) evaluated ecological vulnerability of this
logical vulnerability level before the transition from the area for years 2000 and 2006 using an EVI system that
j-th level. included 12 sub-influencing factors representing the
For convenience, the same EVI classification system is natural environment and social economy. Spatial PCA
used before and after the transformation so that the was used for data processing, meaning that EVI was
numbers of rows and columns of the matrix are the the sum of the weighted principal components as
same, that is, an N-order square matrix. The ecological given in Equation 15 (Hou et al. 2018). Four principal
components were identified. The EVIs for 2000 and
Table 4. Matrix of ecological vulnerability transformation from 2006 were then expressed in Equation 15 and
2000 to 2006. Equation 15, respectively. EVI was calculated for indi
2006 vidual evaluation units for 2000 and 2006 in ArcGIS
2000 I II III Ⅳ Ⅴ
10.3.
I 2280 689 310 0 0
II 1453 4719 1200 0 0 m
III 1241 6412 10,635 1317 0
X
Ⅳ 1308 1816 7693 9891 1242 EVI ¼ r m Pm (13)
Ⅴ 0 3124 2262 6204 6690 i¼1
10 K. HOU ET AL.
Figure 6. Map of ecological vulnerability transformation in Qinling Mountain from 2000 to 2006.
where EVI is the ecological vulnerability index; r is levels, i.e., I–V. Table 4 demonstrated the area change
the contribution ratio; P is the principal component; of each EVI level from 2000 to 2006. For example, 689
and m is the number of principal components. and 310 square kilometers of Level I in 2000 were
changed to Levels II and III, respectively, in 2006.
EVI2000 ¼ 0:4998X1 þ 0:2120X2 þ 0:1908X3 þ 0:0974X4
Similarly, 3124, 2262, and 6204 square kilometers of
(14)
Level V in 2000 were changed to Levels II, III, and IV,
respectively, in 2006. Since the levels of ecological
EVI2006 ¼ 0:4913Y1 þ 0:2186Y2 þ 0:1945Y3 þ 0:0956Y4
vulnerability from I to V indicated an increase in the
(15)
degree of ecological vulnerability, the greater the level
where X1, X2, X3 and X4 are the principal compo of ecological vulnerability was transferred to, the
nents in 2000; and Y1, Y2, Y3 and Y4 are the principal greater the area of degraded environmental vulner
components in 2006. ability was. On the contrary, the transfer to a lower
By comparing the ecological vulnerability index of level of vulnerability meant an increase in the areas of
the study area between 2006 and 2000, using tradi improved environmental vulnerability. Overall, it could
tional methods through overlay analysis, we can be seen that ecological vulnerability levels trans
clearly see the areas where the ecological vulnerability formed from heavier to lighter vulnerability levels or
index has increased and decreased. During this period, from V toward I, indicating improvement in ecological
the areas where the ecological vulnerability index stability (Hou et al. 2018).
increased significantly were Zhashui, Hantai, Hanyin, The EVI-level transformation map (Figure 6) clearly
and Ziyang, while the areas where the ecological vul shows the spatial variation of the transformation pro
nerability index decreased significantly were Lveyang, cess. With reference to the spatiotemporal variations of
Ningshan, and Xunyang (Figure 5). the EVI levels, appropriate measures can be taken to
Although it can be clearly seen that the ecological reduce ecological vulnerability. The greatest benefit of
vulnerability of that area has increased or decreased, EVI transformation matrix is that it can be presented
the changes in local ecological vulnerability can only graphically by making use of the power of GIS. This
reflect trends and cannot trace the change process of approach, hence, provides a simple, effective way to
micro-units. It cannot be prepared to reflect the chan facilitate environmental management.
ging process of ecological vulnerability levels.
Therefore, it is necessary to explore a reliable method
to effectively monitor the conversion process of differ Conclusion
ent units. As a result of the degree of ecosystem disturbance,
system damage, and the ability of system restoration,
Mechanisms of ecological vulnerability transforma ecological vulnerability can be used as an important
tion. Ecological vulnerability was classified into five means to monitor environmental changes in areas
ECOSYSTEM HEALTH AND SUSTAINABILITY 11
Watershed, Changting, Fujian Province, Southern China.” Gao, J., C. Zou, and S. Chen. 2013. ”On the Concept,
Catena 177: 57–69. doi:10.1016/j.catena.2019.01.036. Connotation and Typology of Ecological Red Lines.”
Choudhary, K., M. S. Boori, and A. Kupriyanov. 2018. “Spatial China Ecological Civilization 1: 3. (In Chinese).
Modelling for Natural and Environmental Vulnerability Guo, B., W. Zang, and W. Luo. 2020. “Spatial-Temporal Shifts
Through Remote Sensing and GIS in Astrakhan, Russia.” of Ecological Vulnerability of Karst Mountain
The Egyptian Journal of Remote Sensing and Space Science Ecosystem-Impacts of Global Change and Anthropogenic
21 (2): 139–147. doi:10.1016/j.ejrs.2017.05.003. Interference.” The Science of the Total Environment 741:
Cortinovis, C., and D. Geneletti. 2018. “Ecosystem Services in 140256. doi:10.1016/j.scitotenv.2020.140256.
Urban Plans: What is There, and What is Still Needed for Hasani, M. 2018. Assessment of Social-Ecological Vulnerability
Better Decisions.” Land Use Policy 70: 298–312. doi:10. to Climate Change for Identifying and Prioritizing
1016/j.landusepol.2017.10.017. Ecosystem-Based Adaptation Strategies: A Case Study of
Daily, G. C., and P. A. Matson. 2008. “Ecosystem Services: Baba Mountain Valleys at the Center of Bamyan Province,
From Theory to Implementation.” Proceedings of the Afghanistan. Asian Institute of Technology, Bangkok.
National Academy of Sciences 105 (28): 9455–9456. Hassan, M. S., S. Mahmud-Ul-Islam, and M. T. Rahman. 2015.
doi:10.1073/pnas.0804960105. “Integration of Remote Sensing and GIS to Assess
Dawson, T. P., M. D. Rounsevell, T. Kluvánková-Oravská, Vulnerability of Environmental Degradation in
V. Chobotová, and A. Stirling. 2010. “Dynamic Properties North-Western Bangladesh.” Journal of Geographic
of Complex Adaptive Ecosystems: Implications for the Information System 7 (05): 494. doi:10.4236/jgis.2015.
Sustainability of Service Provision.” Biodiversity and 75040.
Conservation 19 (10): 2843–2853. doi:10.1007/s10531- He, L., J. Shen, and Y. Zhang. 2018. “Ecological Vulnerability
010-9892-z. Assessment for Ecological Conservation and
De Lange, H. J., S. Sala, M. Vighi, and J. H. Faber. 2010. Environmental Management.” Journal of Environmental
“Ecological Vulnerability in Risk Assessment—A Review Management 206: 1115–1125. doi:10.1016/j.jenvman.
and Perspectives.” The Science of the Total Environment 2017.11.059.
408 (18): 3871–3879. doi:10.1016/j.scitotenv.2009.11.009. Hou, K., X. Li, W. J. Jing, and J. Zhang. 2016a. “An Analysis of
Deng, W., X.Z. Yuan, R. Sun, and Y.W. Zhang. 2016. ”Remote the Impact on Land Use and Ecological Vulnerability of the
Sensing-Based Ecological Vulnerability Assessment of the Policy of Returning Farmland to Forest in Yan’an, China.”
Northern Agro-Pastoral Interlacing Zone.” Environmental Environmental Science and Pollution Research 23 (5):
Science & Technology 39 (11): 8. (In Chinese). 4670–4680. doi:10.1007/s11356-015-5679-9.
Ding, Q., X. Shan, and X. Jin. 2020. “Ecological Footprint and Hou, K., X. Li, J. Wang, and J. Zhang. 2016b. “Evaluating
Vulnerability of Marine Capture Fisheries in China.” Acta Ecological Vulnerability Using the GIS and Analytic
Oceanologica Sinica 39 (4): 100–109. doi:10.1007/s13131- Hierarchy Process (AHP) Method in Yan’an, China.” Polish
019-1468-y. Journal of Environmental Studies 25 (2): 599–605. doi:10.
Dossou, J. F., X. X. Li, M. Sadek, M. A. Sidi Almouctar, and 15244/pjoes/61312.
E. Mostafa. 2021. “Hybrid Model for Ecological Hou, K., X. Li, and J. Zhang. 2015. “Gis Analysis of Changes in
Vulnerability Assessment in Benin.” Scientific Reports Ecological Vulnerability Using a Spca Model in the Loess
11 (1): 1–15. doi:10.1038/s41598-021-81742-2. Plateau of Northern Shaanxi, China.” International Journal
Chen, F., Z. Li, S.-C. Dong, Y. Ren, J.-N. Li, et al. 2018. ”Ecological of Environmental Research and Public Health 12 (4):
Vulnerability Assessment of Counties in the Hilly and Gully 4292–4305. doi:10.3390/ijerph120404292.
Areas of the Loess Plateau Based on Vsd Model - an Hou, K., W. Tao, Y. Chang, Y. Zhang, and X. Li. 2018.
Example from Lintao County, Gansu Province.” Arid Zone “A Feasible Method for the Division of Ecological
Resources and Environment 32 (11): 74–80. (In Chinese). Vulnerability and Its Driving Forces in Southern Shaanxi.”
Fan, Y., C. Fang, and Q. Zhang. 2019. “Coupling Coordinated Journal of Cleaner Production 205: 619–628. doi:10.1016/j.
Development Between Social Economy and Ecological jclepro.2018.09.109.
Environment in Chinese Provincial Capital Hou, K., W. Tao, L. Wang, and X. Li. 2020. “Study on
Cities-Assessment and Policy Implications.” Journal of Hierarchical Transformation Mechanisms of Regional
Cleaner Production 229: 289–298. doi:10.1016/j.jclepro. Ecological Vulnerability and Its Applicability.” Ecological
2019.05.027. Indicators 114: 106343. doi:10.1016/j.ecolind.2020.106343.
Fekete, A., M. Damm, and J. Birkmann. 2010. “Scales as Huang, P. H., J. S. Tsai, and W. T. Lin. 2010. “Using
a Challenge for Vulnerability Assessment.” Natural Multiple-Criteria Decision-Making Techniques for
Hazards 55 (3): 729–747. doi:10.1007/s11069-009-9445-5. Eco-Environmental Vulnerability Assessment: A Case
Fischer, A. P., and T. G. Frazier. 2018. “Social Vulnerability to Study on the Chi-Jia-Wan Stream Watershed, Taiwan.”
Climate Change in Temperate Forest Areas: New Measures Environmental Monitoring and Assessment 168 (1–4):
of Exposure, Sensitivity, and Adaptive Capacity.” Annals of 141–158. doi:10.1007/s10661-009-1098-z.
the American Association of Geographers 108 (3): 658–678. Inostroza, L., M. Palme, F. de la Barrera, and J. Shaman. 2016.
doi:10.1080/24694452.2017.1387046. “A Heat Vulnerability Index: Spatial Patterns of Exposure,
Fisher, B., and R. K. Turner. 2008. “Ecosystem Services: Sensitivity and Adaptive Capacity for Santiago de Chile.”
Classification for Valuation.” Biological Conservation Plos One 11 (9): e0162464. doi:10.1371/journal.pone.
141 (5): 1167–1169. doi:10.1016/j.biocon.2008.02.019. 0162464.
Fu, G., B. Gade, Q. Yue, Y. Bing, H. Jing, X. Nengwen, et al. Ippolito, A., S. Sala, J. H. Faber, and M. Vighi. 2010. “Ecological
2018. ”A Gis-Based Ecological Vulnerability Assessment of Vulnerability Analysis: A River Basin Case Study.” The
Beijing.” Journal of Ecology and Rural Environment 34 (9): Science of the Total Environment 408 (18): 3880–3890.
10. (In Chinese). doi:10.1016/j.scitotenv.2009.10.002.
Gallopín, G. C. 2006. “Linkages Between Vulnerability, Ippolito, A., S. Sala, J. H. Faber, and M. Vighi. 2010. “Ecological
Resilience, and Adaptive Capacity.” Global Environmental Vulnerability Analysis: A River Basin Case Study.” The
Change 16 (3): 293–303. doi:10.1016/j.gloenvcha.2006.02. Science of the Total Environment 408: 3880–3890. doi:10.
004. 1016/j.scitotenv.2009.10.002.
ECOSYSTEM HEALTH AND SUSTAINABILITY 13
Ives, A. R., and S. R. Carpenter. 2007. “Stability and Diversity of Li, B., L. Ding, H. Xu, X. Mu, and H. Wang. 2017. “Multivariate
Ecosystems.” Science 317 (5834): 58–62. doi:10.1126/ Data Analysis Applied in Alkali-Based Pretreatment of Corn
science.1133258. Stover.” Resources, Conservation and Recycling 122:
Jacobides, M. G., C. Cennamo, and A. Gawer. 2018. “Towards 307–318. doi:10.1016/j.resconrec.2016.12.007.
a Theory of Ecosystems.” Strategic Management Journal Li, P. X., and J. Fan. 2014. “Regional Ecological Vulnerability
39 (8): 2255–2276. doi:10.1002/smj.2904. Assessment of the Guangxi Xijiang River Economic Belt in
Jha, S. K., A. K. Negi, J. M. Alatalo, and R. S. Negi. 2021. “Socio- Southwest China with VSD Model.” Journal of Resources and
Ecological Vulnerability and Resilience of Mountain Ecology 5 (2): 163–171. doi:10.5814/j.issn.1674-764X.2014.02.
Communities Residing in Capital-Constrained 009.
Environments.” Mitigation and Adaptation Strategies for Li, Y. H., Q. Fan, X. Wang, J. C. Xi, S. Y. Wang, and J. Yang. 2015.
Global Change 26 (8): 1–23. doi:10.1007/s11027-021-09974-1. ”Spatial and Temporal Variation of Ecological Vulnerability
Jia, J. J., J. Zhao, J. B. Wang, C. Gao, and R. Y. Chang. 2020. in Natural Disaster-Prone Areas Based on the Srp Model:
“Ecological Vulnerability Assessment of Shiyang River A Case Study of Chaoyang County, Liaoning Province.”
Basin Based on SRP Model.” J Arid Land Resour Environ Geoscience 35 (11): 1452–1459). (In Chinese).
34 (1): 34–41. Li, W., J. Fang, Z. Xing, W. Hao, and W. Zhao. 2020. “Ecological
Jiang, Y., R. Li, Y. Shi, and L. Guo. 2021a. “Natural and Political Vulnerability Evaluation of City Based on Landscape
Determinants of Ecological Vulnerability in the Qinghai– Pattern.” Bangladesh Journal of Botany 49 (3): 743–755.
Tibet Plateau: A Case Study of Shannan, China.” ISPRS Li, X., J. Philp, R. Cremades, A. Roberts, L. He, L. Li, and Q. Yu.
International Journal of Geo-Information 10 (5): 327. 2016. “Agricultural Vulnerability Over the Chinese Loess
doi:10.3390/ijgi10050327. Plateau in Response to Climate Change: Exposure,
Jiang, Y., Y. Shi, R. Li, and L. Guo. 2021b. “A Long-Term Sensitivity, and Adaptive Capacity.” Ambio 45 (3):
Ecological Vulnerability Analysis of the Tibetan Region of 350–360. doi:10.1007/s13280-015-0727-8.
Natural Conditions and Ecological Protection Programs.” Li, Q., X. Shi, and Q. Wu. 2021. “Effects of Protection and
Sustainability 13 (19): 10598. doi:10.3390/su131910598. Restoration on Reducing Ecological Vulnerability.” The
Jin-Xi, Z. H. A. N. G., L. I. Hong-Ying, C. A. O. Erjia, and Science of the Total Environment 761: 143180. doi:10.
G. O. N. G. Jie. 2018. “Assessment of Ecological 1016/j.scitotenv.2020.143180.
Vulnerability in Multi-Scale and Its Spatial Correlation: Li, L., Z. H. Shi, W. Yin, D. Zhu, S. L. Ng, C. F. Cai, and
A Case Study of Bailongjiang Watershed in Gansu A. L. Lei. 2009. “A Fuzzy Analytic Hierarchy Process
Province, China.” Yingyong Shengtai Xuebao 29 (9): 2897– (Fahp) Approach to Eco-Environmental Vulnerability
2906). Assessment for the Danjiangkou Reservoir Area,
Jin, L., and Q. Xu. 2021. Research on Ecological Vulnerability China.” Ecological Modelling 220 (23): 3439–3447.
Evaluation of Yunnan Province Based on SRP Model. In doi:10.1016/j.ecolmodel.2009.09.005.
2021 IEEE 4th Advanced Information Management, Li, X., L. Song, Z. Xie, T. Gao, T. Wang, X. Zheng . . ., and L. Liu.
Communicates, Electronic and Automation Control 2021. “Assessment of Ecological Vulnerability on Northern
Conference (IMCEC), Chongqing, China (Vol. 4, pp. Sand Prevention Belt of China Based on the Ecological
1022–1026). IEEE. Pressure–sensibility–resilience Model.” Sustainability
Khandlhela, M., and J. May. 2006. “Poverty, Vulnerability and 13 (11): 6078. doi:10.3390/su13116078.
the Impact of Flooding in the Limpopo Province, South Li, A., A. Wang, S. Liang, and W. Zhou. 2006. “Eco-
Africa.” Natural Hazards 39 (2): 275–287. doi:10.1007/ Environmental Vulnerability Evaluation in Mountainous
s11069-006-0028-4. Region Using Remote Sensing and GIS—A Case Study in
Kubiszewski, I., R. Costanza, S. Anderson, and P. Sutton. 2020. the Upper Reaches of Minjiang River, China.” Ecological
“The Future Value of Ecosystem Services: Global Scenarios Modelling 192 (1–2): 175–187. doi:10.1016/j.ecolmodel.
and National Implications.” In Environmental Assessments. 2005.07.005.
Edward Elgar Publishing. doi:10.4337/9781788976879. Lin, J., G. Hu, X. Qi, C.-Y. Xu, A. Zhang, W.-H. Chen, et al. 2018.
00016. ”Ecological Vulnerability and Its Driving Forces in the Min
La Notte, A., D. D’Amato, H. Mäkinen, M. L. Paracchini, Delta Urban Agglomeration.” The Journal of Ecology
C. Liquete, B. Egoh, D. Geneletti, et al. 2017. “Ecosystem 38 (12): 12. (In Chinese).
Services Classification: A Systems Ecology Perspective of Lindner, M., M. Maroschek, S. Netherer, A. Kremer, A. Barbati,
the Cascade Framework.” Ecological Indicators 74: J. Garcia-Gonzalo, and M. J. Lexer. 2010. “Climate Change
392–402. doi:10.1016/j.ecolind.2016.11.030. Impacts, Adaptive Capacity, and Vulnerability of European
Laura, G., C. Garbisu, E. Ciprián, J. M. Becerril, M. Soto, J. Forest Ecosystems.” Forest Ecology and Management
Etxebarria, and L. Epelde. 2015. “Application of Ecological 259 (4): 698–709. doi:10.1016/j.foreco.2009.09.023.
Risk Assessment Based on a Novel TRIAD-Tiered Approach Liu, K. M., L. H. Huang, K. Y. Su, and S. J. Joung. 2021.
to Contaminated Soil Surrounding a Closed Non-Sealed “Vulnerability Assessment of Pelagic Sharks in the
Landfill.” The Science of the Total Environment 514: 49–59. Western North Pacific by Using an Integrated Ecological
doi:10.1016/j.scitotenv.2015.01.103. Risk Assessment.” Animals 11 (8): 2161. doi:10.3390/
Lee, Y. J. 2014. “Social Vulnerability Indicators as a Sustainable ani11082161.
Planning Tool.” Environmental Impact Assessment Review Liu, X., Y. Wang, J. Peng, A. K. Braimoh, and H. Yin. 2013.
44: 31–42. doi:10.1016/j.eiar.2013.08.002. “Assessing Vulnerability to Drought Based on Exposure,
Li, X. 2020. “Dynamic Simulation of System Flow of Green Sensitivity and Adaptive Capacity: A Case Study in Middle
Building Complex Considering Ecological Environment Inner Mongolia of China.” Chinese Geographical Science
Vulnerability.” Fresenius Environmental Bulletin 29 (9): 23 (1): 13–25. doi:10.1007/s11769-012-0583-4.
7660–7667. Liu, J., C. Zou, J. Gao, S. Ma, W. Wang, K. Wu, et al. 2015.
Li, P., and H. Cao. 2019. “Comprehensive Assessment on the ”Scoping of Ecologically Fragile Areas in China”.
Ecological Stress of Rapid Land Urbanization per Proportion, Biodiversity 23(6): 725–732). (In Chinese)
Intensity, and Location.” Ecosystem Health and Sustainability Ma, X., M. de Jong, B. Sun, and X. Bao. 2020. “Nouveauté or
5 (1): 242–255. doi:10.1080/20964129.2019.1686954. Cliché? Assessment on Island Ecological Vulnerability to
14 K. HOU ET AL.
Tourism: Application to Zhoushan, China.” Ecological Greece.” Ecological Indicators 11 (6): 1699–1706. doi:10.
Indicators 113: 106247. doi:10.1016/j.ecolind.2020.106247. 1016/j.ecolind.2011.04.010.
Murthy, C. S., B. Laxman, and M. S. Sai. 2015. “Geospatial Smit, B., and J. Wandel. 2006. “Adaptation, Adaptive Capacity
Analysis of Agricultural Drought Vulnerability Using and Vulnerability.” Global Environmental Change 16 (3):
a Composite Index Based on Exposure, Sensitivity and 282–292. doi:10.1016/j.gloenvcha.2006.03.008.
Adaptive Capacity.” International Journal of Disaster Risk Sun, B., X. Ma, X. Bao, and M. D. Jong. 2020. “Mapping Island
Reduction 12: 163–171. doi:10.1016/j.ijdrr.2015.01.004. Ecological Vulnerability to Urbanization: A Study of Twelve
Murthy, C. S., B. Laxman, M. S. Sai, and P. G. Diwakar. 2014. Island Counties/districts, China.” Journal of Coastal
“Analyzing Agricultural Drought Vulnerability at Research 95 (SI): 83–87. doi:10.2112/SI95-016.1.
Sub-District Level Through Exposure, Sensitivity and Svarstad, H., L. K. Petersen, D. Rothman, H. Siepel, and
Adaptive Capacity Based Composite Index.” The F. Wätzold. 2008. “Discursive Biases of the Environmental
International Archives of Photogrammetry, Remote Sensing Research Framework DPSIR.” Land Use Policy 25 (1):
and Spatial Information Sciences 40 (8): 65. doi:10.5194/ 116–125. doi:10.1016/j.landusepol.2007.03.005.
isprsarchives-XL-8-65-2014. Swami, D., and D. Parthasarathy. 2021. “Dynamics of
Neshat, A., B. Pradhan, and M. Dadras. 2014. “Groundwater Exposure, Sensitivity, Adaptive Capacity and Agricultural
Vulnerability Assessment Using an Improved DRASTIC Vulnerability at District Scale for Maharashtra, India.”
Method in GIS.” Resources, Conservation and Recycling 86: Ecological Indicators 121: 107206. doi:10.1016/j.ecolind.
74–86. doi:10.1016/j.resconrec.2014.02.008. 2020.107206.
Newton, A., and J. Weichselgartner. 2014. “Hotspots of Tran, L. T., C. G. Knight, R. V. O’Neill, E. R. Smith, K. H. Riitters,
Coastal Vulnerability: A DPSIR Analysis to Find Societal and J. Wickham. 2002. “Fuzzy Decision Analysis for
Pathways and Responses.” Estuarine, Coastal and Shelf Integrated Environmental Vulnerability Assessment of
Science 140: 123–133. doi:10.1016/j.ecss.2013.10.010. the Mid-Atlantic Region.” Environmental Management
Nguyen, A. K., Y. A. Liou, M. H. Li, and T. A. Tran. 2016. “Zoning 29 (6): 845–859. doi:10.1007/s00267-001-2587-1.
Eco-Environmental Vulnerability for Environmental Tran, L. T., R. V. O’Neill, and E. R. Smith. 2012. “A
Management and Protection.” Ecological Indicators 69: Watershed-Based Method for Environmental
100–117. doi:10.1016/j.ecolind.2016.03.026. Vulnerability Assessment with a Case Study of the
Pandey, R., and D. K. Bardsley. 2015. “Social-Ecological Mid-Atlantic Region.” Environmental Impact Assessment
Vulnerability to Climate Change in the Nepali Himalaya.” Review 34: 58–64. doi:10.1016/j.eiar.2011.11.005.
Applied Geography 64: 74–86. doi:10.1016/j.apgeog.2015. Turner, B. L., R. E. Kasperson, P. A. Matson, J. J. McCarthy,
09.008. R. W. Corell, L. Christensen . . ., and C. Polsky. 2003.
Parrott, L. 2010. “Measuring Ecological Complexity.” “A Framework for Vulnerability Analysis in Sustainability
Ecological Indicators 10 (6): 1069–1076. doi:10.1016/j.eco Science.” Proceedings of the National Academy of Sciences
lind.2010.03.014. 100 (14): 8074–8079. doi:10.1073/pnas.1231335100.
Qiao, Z., X. Yang, J. Liu, and X. Xu. 2013. Ecological Vulnerability Vihervaara, P., M. Rönkä, and M. Walls. 2010. “Trends in
Assessment Integrating the Spatial Analysis Technology with Ecosystem Service Research: Early Steps and Current
Algorithms: A Case of the Wood-Grass Ecotone of Northeast Drivers.” Ambio 39 (4): 314–324. doi:10.1007/s13280-010-
China. Abstract and Applied Analysis 207987. 0048-x.
Quan, Z. J., Y. Li, J. S. Li, Y. Han, N. W. Xiao, and M. D. Fu. 2013. Villa, F., and H. Mcleod. 2002. “Environmental Vulnerability
“Ecological Vulnerability of Coal Mining Area: A Case Study Indicators for Environmental Planning and
of Shengli Coalfield in Xilinguole of Inner Mongolia, Decision-Making: Guidelines and Applications.”
China.” The Journal of Applied Ecology 24: 1729–1738. Environmental Management 29 (3): 335–348. doi:10.1007/
Rao, K., and Y. Zisheng. 2020. “Evaluation of Mountain Land s00267-001-0030-2.
Ecological Security Based on DPSIR Model and Entropy Wallace, K. J. 2007. “Classification of Ecosystem Services:
Weight Method.” Asian Agricultural Research 12 (2). Problems and Solutions.” Biological Conservation 139 (3–
Rapicetta, S., and V. Zanon. 2009. “GIS-Based Method for the 4): 235–246. doi:10.1016/j.biocon.2007.07.015.
Environmental Vulnerability Assessment to Volcanic Walther, G. R. 2010. “Community and Ecosystem Responses
Ashfall at Etna Volcano.” GeoInformatica 13 (3): 267–276. to Recent Climate Change.” Philosophical Transactions of
doi:10.1007/s10707-008-0061-4. the Royal Society B: Biological Sciences 365 (1549):
Rau, A.-L., H. von Wehrden, and D. J. Abson. 2018. “Temporal 2019–2024. doi:10.1098/rstb.2010.0021.
Dynamics of Ecosystem Services.” Ecological Economics Wang, S. Y., J. S. Liu, and C. J. Yang. 2008. “Eco-Environmental
151: 122–130. doi:10.1016/j.ecolecon.2018.05.009. Vulnerability Evaluation in the Yellow River Basin, China.”
Sahoo, S., A. Dhar, and A. Kar. 2016. “Environmental Pedosphere 18 (2): 171–182. doi:10.1016/S1002-0160(08)
Vulnerability Assessment Using Grey Analytic Hierarchy 60005-3.
Process Based Model.” Environmental Impact Assessment Wang, X. D., X. H. Zhong, S. Z. Liu, J. G. Liu, Z. Y. Wang, and
Review 56: 145–154. doi:10.1016/j.eiar.2015.10.002. M. H. Li. 2008. “Regional Assessment of Environmental
Shang, H., Q. Han, and Y. Li. 2017. “Ecological Vulnerability Vulnerability in the Tibetan Plateau: Development and
Evaluation in West China: Evaluate Vulnerability and Its Application of a New Method.” Journal of Arid
Synergy Degree with Government Performance.” Eurasia Environments 72 (10): 1929–1939. doi:10.1016/j.jaridenv.
Journal of Mathematics, Science and Technology Education 2008.06.005.
13 (12): 7743–7754. Weis, S. W. M., V. N. Agostini, L. M. Roth, B. Gilmer, S. R. Schill,
Siyuan, W., L. Jingshi, and Y. Cunjian. 2008. “Eco- J. E. Knowles, and R. Blyther. 2016. “Assessing Vulnerability:
Environmental Vulnerability Evaluation in the Yellow An Integrated Approach for Mapping Adaptive Capacity,
River Basin, China.” Pedosphere 18 (2): 171–182. doi:10. Sensitivity, and Exposure.” Climatic Change 136 (3–4):
1016/S1002-0160(08)60005-3. 615–629. doi:10.1007/s10584-016-1642-0.
Skondras, N. A., C. A. Karavitis, I. I. Gkotsis, P. J. B. Scott, Weißhuhn, P., F. Müller, and H. Wiggering. 2018. “Ecosystem
U. L. Kaly, and S. G. Alexandris. 2011. “Application and Vulnerability Review: Proposal of an Interdisciplinary
Assessment of the Environmental Vulnerability Index in Ecosystem Assessment Approach.” Environmental
ECOSYSTEM HEALTH AND SUSTAINABILITY 15