“…Most vulnerability methodologies make use of a combination of theory-driven, data-driven, and normative approaches. Theory-driven approaches, also known as deductive approaches, are based on existing scientific knowledge in the form of conceptual frameworks, theories or models about the system considered to identify relevant variables, and determine their relationships, and generate a list of components (Moss et al, 2001, Schröter, 2004a, Adger & Vincent, 2005, Yohe et al, 2006b, Mahendra et al, 2011. Data-driven approaches, or inductive approaches, select vulnerability variables based on their statistical relationship with observed vulnerability outcomes (e.g., mortality due to natural hazards) (Briguglio, 1995, Peduzzi et al, 2002, Brooks et al, 2005, Dilley et al, 2005, Eriksen & Kelly, 2007, Tol & Yohe, 2007.…”