Introduction: Mapping vulnerability