The used datasets (Tables 1 and 2) are based on various sources and have been produced with an array of method. Consequently, we had to rely on the quality control of the publishers of the datasets. An effort was made to select the best publicly available data for each of the indicators. The spatial resolution of the data was somewhat inhomogeneous. Nevertheless, while carrying out the macro – scale vulnerability analysis and using the same datasets for each basin, the authors believe that the analysis has succeeded in capturing the essentials of each of the issues under study and lead to a sound vulnerability analysis.