Introducing relational vulnerability