WorldWideScience

Sample records for assessing infrastructure vulnerability

  1. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  2. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    International Nuclear Information System (INIS)

    Suski, N.; Wuest, C.

    2011-01-01

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment

  3. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    Science.gov (United States)

    Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.

    2015-06-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.

  4. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  5. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Directory of Open Access Journals (Sweden)

    M. Garschagen

    2018-04-01

    Full Text Available Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do – or do not – play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  6. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Science.gov (United States)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  7. Coastal Vulnerability and risk assessment of infrastructures, natural and cultural heritage sites in Greece.

    Science.gov (United States)

    Alexandrakis, George; Kampanis, Nikolaos

    2016-04-01

    The majority of human activities are concentrated around coastal areas, making coastline retreat, a significant threat to coastal infrastructure, thus increasing protection cost and investment revenue losses. In this study the management of coastal areas in terms of protecting coastal infrastructures, cultural and environmental heritage sites, through risk assessment analysis is been made. The scope is to provide data for spatial planning for future developments in the coastal zone and the protection of existing ones. Also to determine the impact of coastal changes related to the loss of natural resources, agricultural land and beaches. The analysis is based on a multidisciplinary approach, combining environmental, spatial and economic data. This can be implemented by integrating the assessment of vulnerability of coasts, the spatial distribution and structural elements of coastal infrastructure (transport, tourism, and energy) and financial data by region, in a spatial database. The approach is based on coastal vulnerability estimations, considering sea level rise, land loss, extreme events, safety, adaptability and resilience of infrastructure and natural sites. It is based on coupling of environmental indicators and econometric models to determine the socio-economic impact in coastal infrastructure, cultural and environmental heritage sites. The indicators include variables like the coastal geomorphology; coastal slope; relative sea-level rise rate; shoreline erosion/accretion rate; mean tidal range and mean wave height. The anthropogenic factors include variables like settlements, sites of cultural heritage, transport networks, land uses, significance of infrastructure (e.g. military, power plans) and economic activities. The analysis in performed by a GIS application. The forcing variables are determined with the use of sub-indices related to coastal geomorphology, climate and wave variables and the socioeconomics of the coastal zone. The Greek coastline in

  8. Vulnerability assessment as a missing part of efficient regulatory emergency preparedness system for nuclear critical infrastructure

    International Nuclear Information System (INIS)

    Kostadinov, V.

    2007-01-01

    One introduces a new model to assess the vulnerability of the nuclear infrastructure critical facilities. The new procedure of the vulnerability assessment (the VA) aims to reevaluate the efficiency of the present-day safeguards. On the basis of deeper insight into the VA new strategy and of the elaborated procedure to analyze the hazards for the nuclear power facilities one recommends the key safeguards affecting the damage magnitude [ru

  9. An approach for modelling interdependent infrastructures in the context of vulnerability analysis

    International Nuclear Information System (INIS)

    Johansson, Jonas; Hassel, Henrik

    2010-01-01

    Technical infrastructures of the society are becoming more and more interconnected and interdependent, i.e. the function of an infrastructure influences the function of other infrastructures. Disturbances in one infrastructure therefore often traverse to other dependent infrastructures and possibly even back to the infrastructure where the failure originated. It is becoming increasingly important to take these interdependencies into account when assessing the vulnerability of technical infrastructures. In the present paper, an approach for modelling interdependent technical infrastructures is proposed. The modelling approach considers structural properties, as employed in graph theory, as well as functional properties to increase its fidelity and usefulness. By modelling a fictional electrified railway network that consists of five systems and interdependencies between the systems, it is shown how the model can be employed in a vulnerability analysis. The model aims to capture both functional and geographic interdependencies. It is concluded that the proposed modelling approach is promising and suitable in the context of vulnerability analyses of interdependent systems.

  10. A Conceptual Framework for Vulnerability Assessment of Climate Change Impact on Critical Oil and Gas Infrastructure in the Niger Delta

    Directory of Open Access Journals (Sweden)

    Justin Udie

    2018-02-01

    Full Text Available The impact of climate change on the Niger Delta is severe, as extreme weather events have inflicted various degrees of stress on critical oil/gas infrastructure. Typically, assets managers and government agencies lack a clear framework for evaluating the vulnerability of these systems. This paper presents a participatory framework for the vulnerability assessment of critical oil/gas infrastructure to climate change impacts in the Niger Delta context. Through a critical review of relevant literature and triangulating observational and exploratory data from the field, this paper has developed a conceptual framework with three elements: (1 a preliminary scoping activity; (2 the vulnerability assessment; and (3 mainstreaming the results into institutional asset management codes. Scoping involves the definition of research aims and objectives, review of prevailing climate burdens and impacts, exploratory investigation, screening for new (planned assets and selection of relevant infrastructure. The emphasis on screening for planned infrastructure is to facilitate the incorporation of sustainable adaptive capacities into the original design of identified systems. A conceptual framework for vulnerability assessment is presented as a robust systematic iterative model for the evaluation of selected assets using an appropriate methodology. In this study, analytic hierarchy process (AHP is applied while mainstreaming as part of the research framework is emphasised to aid commercial implementation from an expert-based perspective. The study recommends the use of other suitable methodologies and systematic approaches to test the flexibility of the framework.

  11. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    Science.gov (United States)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  12. Developing new methodology for nuclear power plants vulnerability assessment

    International Nuclear Information System (INIS)

    Kostadinov, Venceslav

    2011-01-01

    Research highlights: → Paper presents new methodology for vulnerability assessment of nuclear power plants. → First universal quantitative risks assessment model for terrorist attack on a NPPs. → New model enhance security, reliability and safe operation of all energy infrastructure. → Significant research benefits: increased NPPs security, reliability and availability. → Useful new tool for PRA application to evaluation of terrorist threats on NPPs. - Abstract: The fundamental aim of an efficient regulatory emergency preparedness and response system is to provide sustained emergency readiness and to prevent emergency situations and accidents. But when an event occurs, the regulatory mission is to mitigate consequences and to protect people and the environment against nuclear and radiological damage. The regulatory emergency response system, which would be activated in the case of a nuclear and/or radiological emergency and release of radioactivity to the environment, is an important element of a comprehensive national regulatory system of nuclear and radiation safety. In the past, national emergency systems explicitly did not include vulnerability assessments of the critical nuclear infrastructure as an important part of a comprehensive preparedness framework. But after the huge terrorist attack on 11/09/2001, decision-makers became aware that critical nuclear infrastructure could also be an attractive target to terrorism, with the purpose of using the physical and radioactive properties of the nuclear material to cause mass casualties, property damage, and detrimental economic and/or environmental impacts. The necessity to evaluate critical nuclear infrastructure vulnerability to threats like human errors, terrorist attacks and natural disasters, as well as preparation of emergency response plans with estimation of optimized costs, are of vital importance for assurance of safe nuclear facilities operation and national security. In this paper presented

  13. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    Energy Technology Data Exchange (ETDEWEB)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  14. Low carbon technology performance vs infrastructure vulnerability: analysis through the local and global properties space.

    Science.gov (United States)

    Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K

    2014-11-04

    Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.

  15. Integrating socio-economic and infrastructural dimension to reveal hazard vulnerability of coastal districts

    Science.gov (United States)

    Mazumdar, Jublee; Paul, Saikat

    2015-04-01

    Losses of life and property due to natural hazards have intensified in the past decade, motivating an alteration of disaster management away from simple post event resettlement and rehabilitation. The degree of exposure to hazard for a homogeneous population is not entirely reliant upon nearness to the source of hazard event. Socio-economic factors and infrastructural capability play an important role in determining the vulnerability of a place. This study investigates the vulnerability of eastern coastal states of India from tropical cyclones. The record of past hundred years shows that the physical vulnerability of eastern coastal states is four times as compared to the western coastal states in terms of frequency and intensity of tropical cyclones. Nevertheless, these physical factors played an imperative role in determining the vulnerability of eastern coast. However, the socio-economic and infrastructural factors influence the risk of exposure exponentially. Inclusion of these indicators would provide better insight regarding the preparedness and resilience of settlements to hazard events. In this regard, the present study is an effort to develop an Integrated Vulnerability Model (IVM) based on socio-economic and infrastructural factors for the districts of eastern coastal states of India. A method is proposed for quantifying the socio-economic and infrastructural vulnerability to tropical cyclone in these districts. The variables included in the study are extracted from Census of India, 2011 at district level administrative unit. In the analysis, a large number of variables are reduced to a smaller number of factors by using principal component analysis that represents the socio-economic and infrastructure vulnerability to tropical cyclone. Subsequently, the factor scores in socio-economic Vulnerability Index (SeVI) and Infrastructure Vulnerability Index (InVI) are standardized from 0 to 1, indicating the range from low to high vulnerability. The factor

  16. Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

    Directory of Open Access Journals (Sweden)

    Yongliang Deng

    2017-01-01

    Full Text Available Vulnerability analysis of network models has been widely adopted to explore the potential impacts of random disturbances, deliberate attacks, and natural disasters. However, almost all these models are based on a fixed topological structure, in which the physical properties of infrastructure components and their interrelationships are not well captured. In this paper, a new research framework is put forward to quantitatively explore and assess the complexity and vulnerability of critical infrastructure systems. Then, a case study is presented to prove the feasibility and validity of the proposed framework. After constructing metro physical network (MPN, Pajek is employed to analyze its corresponding topological properties, including degree, betweenness, average path length, network diameter, and clustering coefficient. With a comprehensive understanding of the complexity of MPN, it would be beneficial for metro system to restrain original near-miss or accidents and support decision-making in emergency situations. Moreover, through the analysis of two simulation protocols for system component failure, it is found that the MPN turned to be vulnerable under the condition that the high-degree nodes or high-betweenness edges are attacked. These findings will be conductive to offer recommendations and proposals for robust design, risk-based decision-making, and prioritization of risk reduction investment.

  17. Challenges in the vulnerability and risk analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Zio, Enrico

    2016-01-01

    The objective of this paper is to provide a systematic view on the problem of vulnerability and risk analysis of critical infrastructures. Reflections are made on the inherent complexities of these systems, related challenges are identified and possible ways forward for their analysis and management are indicated. Specifically: the framework of vulnerability and risk analysis is examined in relation to its application for the protection and resilience of critical infrastructures; it is argued that the complexity of these systems is a challenging characteristic, which calls for the integration of different modeling perspectives and new approaches of analysis; examples of are given in relation to the Internet and, particularly, the electric power grid, as representative of critical infrastructures and the associated complexity; the integration of different types of analyses and methods of system modeling is put forward for capturing the inherent structural and dynamic complexities of critical infrastructures and eventually evaluating their vulnerability and risk characteristics, so that decisions on protections and resilience actions can be taken with the required confidence. - Highlights: • The problem of the protection and resilience of CIs is the focus of the work. • The vulnerability and risk analysis framework for this is critically examined. • The complexity of CIs is presented as a challenge for system modeling and analysis. • The integration of different modeling perspectives of analysis is put forward as a solution. • The extension of the analysis framework to new methods for dealing with surprises and black swans is advocated.

  18. Assessing the Climate Resilience of Transport Infrastructure Investments in Tanzania

    Science.gov (United States)

    Hall, J. W.; Pant, R.; Koks, E.; Thacker, S.; Russell, T.

    2017-12-01

    Whilst there is an urgent need for infrastructure investment in developing countries, there is a risk that poorly planned and built infrastructure will introduce new vulnerabilities. As climate change increases the magnitudes and frequency of natural hazard events, incidence of disruptive infrastructure failures are likely to become more frequent. Therefore, it is important that infrastructure planning and investment is underpinned by climate risk assessment that can inform adaptation planning. Tanzania's rapid economic growth is placing considerable strain on the country's transportation infrastructure (roads, railways, shipping and aviation); especially at the port of Dar es Salaam and its linking transport corridors. A growing number of natural hazard events, in particular flooding, are impacting the reliability of this already over-used network. Here we report on new methodology to analyse vulnerabilities and risks due to failures of key locations in the intermodal transport network of Tanzania, including strategic connectivity to neighboring countries. To perform the national-scale risk analysis we will utilize a system-of-systems methodology. The main components of this general risk assessment, when applied to transportation systems, include: (1) Assembling data on: spatially coherent extreme hazards and intermodal transportation networks; (2) Intersecting hazards with transport network models to initiate failure conditions that trigger failure propagation across interdependent networks; (3) Quantifying failure outcomes in terms of social impacts (customers/passengers disrupted) and/or macroeconomic consequences (across multiple sectors); and (4) Simulating, testing and collecting multiple failure scenarios to perform an exhaustive risk assessment in terms of probabilities and consequences. The methodology is being used to pinpoint vulnerability and reduce climate risks to transport infrastructure investments.

  19. A Comprehensive Assessment Model for Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Häyhtiö Markus

    2017-12-01

    Full Text Available International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain.

  20. Interdependency control : compensation strategies for the inherent vulnerability of critical infrastructure networks

    International Nuclear Information System (INIS)

    Mao, D.; Sotoodeh, M.; Monu, K.; Marti, J.R.; Srivastava, K.D.

    2009-01-01

    Today's increasingly interacting national critical infrastructures (NCIs) can tolerate most stochastic local disturbances. However, they are extremely fragile under global disturbances, as the latter may either push the whole system into a critical state or reveal many unexpected hidden interdependencies, inducing or triggering cascading failures among all possible layers. This robust yet fragile duality is an inherent vulnerability of modern infrastructures. It is therefore expected that weather-related disasters will be more frequent under a changing climate. This paper proposed an interdependency control strategy (ICS) that would maintain the survival of the most critical services, and compensate for this inherent vulnerability during emergency states. The paper also proposed a generalized adjacency matrix (GAM) to represent the physical interdependencies intra/inter of various infrastructure networks. The vulnerable section in the network can be identified, based on computed results of GAM, number of islands in the network, and influence domain(s) of each component. These features render ICS more effective and convincing. Last, the paper proposed a survivability index for isolated sub-networks and described relevant measures for improving this index during the four phases of emergency management. It was concluded that the proposed strategy is an effective means to reduce the inherent vulnerability and increase the resiliency of these critical infrastructures networks. 20 refs., 5 figs

  1. Real Option Cost Vulnerability Analysis of Electrical Infrastructure

    Science.gov (United States)

    Prime, Thomas; Knight, Phil

    2015-04-01

    Critical infrastructure such as electricity substations are vulnerable to various geo-hazards that arise from climate change. These geo-hazards range from increased vegetation growth to increased temperatures and flood inundation. Of all the identified geo-hazards, coastal flooding has the greatest impact, but to date has had a low probability of occurring. However, in the face of climate change, coastal flooding is likely to occur more often due to extreme water levels being experienced more frequently due to sea-level rise (SLR). Knowing what impact coastal flooding will have now and in the future on critical infrastructure such as electrical substations is important for long-term management. Using a flood inundation model, present day and future flood events have been simulated, from 1 in 1 year events up to 1 in 10,000 year events. The modelling makes an integrated assessment of impact by using sea-level and surge to simulate a storm tide. The geographical area the model covers is part of the Northwest UK coastline with a range of urban and rural areas. The ensemble of flood maps generated allows the identification of critical infrastructure exposed to coastal flooding. Vulnerability has be assessed using an Estimated Annual Damage (EAD) value. Sampling SLR annual probability distributions produces a projected "pathway" for SLR up to 2100. EAD is then calculated using a relationship derived from the flood model. Repeating the sampling process allows a distribution of EAD up to 2100 to be produced. These values are discounted to present day values using an appropriate discount rate. If the cost of building and maintain defences is also removed from this a Net Present Value (NPV) of building the defences can be calculated. This distribution of NPV can be used as part of a cost modelling process involving Real Options, A real option is the right but not obligation to undertake investment decisions. In terms of investment in critical infrastructure resilience this

  2. Assessing the risk posed by natural hazards to infrastructures

    Science.gov (United States)

    Eidsvig, Unni Marie K.; Kristensen, Krister; Vidar Vangelsten, Bjørn

    2017-03-01

    This paper proposes a model for assessing the risk posed by natural hazards to infrastructures, with a focus on the indirect losses and loss of stability for the population relying on the infrastructure. The model prescribes a three-level analysis with increasing level of detail, moving from qualitative to quantitative analysis. The focus is on a methodology for semi-quantitative analyses to be performed at the second level. The purpose of this type of analysis is to perform a screening of the scenarios of natural hazards threatening the infrastructures, identifying the most critical scenarios and investigating the need for further analyses (third level). The proposed semi-quantitative methodology considers the frequency of the natural hazard, different aspects of vulnerability, including the physical vulnerability of the infrastructure itself, and the societal dependency on the infrastructure. An indicator-based approach is applied, ranking the indicators on a relative scale according to pre-defined ranking criteria. The proposed indicators, which characterise conditions that influence the probability of an infrastructure malfunctioning caused by a natural event, are defined as (1) robustness and buffer capacity, (2) level of protection, (3) quality/level of maintenance and renewal, (4) adaptability and quality of operational procedures and (5) transparency/complexity/degree of coupling. Further indicators describe conditions influencing the socio-economic consequences of the infrastructure malfunctioning, such as (1) redundancy and/or substitution, (2) cascading effects and dependencies, (3) preparedness and (4) early warning, emergency response and measures. The aggregated risk estimate is a combination of the semi-quantitative vulnerability indicators, as well as quantitative estimates of the frequency of the natural hazard, the potential duration of the infrastructure malfunctioning (e.g. depending on the required restoration effort) and the number of users of

  3. The regional impacts of climate change: an assessment of vulnerability

    National Research Council Canada - National Science Library

    Zinyowera, Marufu C; Moss, Richard H; Watson, R. T

    1998-01-01

    .... The Regional Impacts of Climate Change: An Assessment of Vulnerability reviews state-of-the-art information on potential impacts of climate change for ecological systems, water supply, food production, coastal infrastructure, human health...

  4. Assessing Storm Vulnerabilities and Resilience Strategies: A Scenario-Method for Engaging Stakeholders of Public/Private Maritime Infrastructure

    Science.gov (United States)

    Becker, A.; Burroughs, R.

    2014-12-01

    This presentation discusses a new method to assess vulnerability and resilience strategies for stakeholders of coastal-dependent transportation infrastructure, such as seaports. Much coastal infrastructure faces increasing risk to extreme events resulting from sea level rise and tropical storms. As seen after Hurricane Sandy, natural disasters result in economic costs, damages to the environment, and negative consequences on resident's quality of life. In the coming decades, tough decisions will need to be made about investment measures to protect critical infrastructure. Coastal communities will need to weigh the costs and benefits of a new storm barrier, for example, against those of retrofitting, elevating or simply doing nothing. These decisions require understanding the priorities and concerns of stakeholders. For ports, these include shippers, insurers, tenants, and ultimate consumers of the port cargo on a local and global scale, all of whom have a stake in addressing port vulnerabilities.Decision-makers in exposed coastal areas need tools to understand stakeholders concerns and perceptions of potential resilience strategies. For ports, they need answers to: 1) How will stakeholders be affected? 2) What strategies could be implemented to build resilience? 3) How effectively would the strategies mitigate stakeholder concerns? 4) What level of time and investment would strategies require? 5) Which stakeholders could/should take responsibility? Our stakeholder-based method provides answers to questions 1-3 and forms the basis for further work to address 4 and 5.Together with an expert group, we developed a pilot study for stakeholders of Rhode Island's critical energy port, the Port of Providence. Our method uses a plausible extreme storm scenario with localized visualizations and a portfolio of potential resilience strategies. We tailor a multi-criteria decision analysis tool and, through a series of workshops, we use the storm scenario, resilience strategies

  5. Vulnerability assessment at a national level in Georgia

    Science.gov (United States)

    Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.

    2012-04-01

    Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation

  6. Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics

    Directory of Open Access Journals (Sweden)

    Frédéric Petit

    2010-02-01

    Full Text Available Critical Infrastructures (CIs are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data. In this context, this paper aims at presenting the fundamentals of a method for analyzing the vulnerabilities of CIs towards the use of cyber data. By characterizing cyber vulnerability of CIs, it will be possible to improve the resilience of these networks and to foster a proactive approach to risk management not only by considering cybernetics from a cyber-attack point of view but also by considering the consequences of the use of corrupted data.

  7. A probabilistic approach for assessing the vulnerability of transportation infrastructure to flooding from sea level rise and storm surge.

    Science.gov (United States)

    Douglas, E. M.; Kirshen, P. H.; Bosma, K.; Watson, C.; Miller, S.; McArthur, K.

    2015-12-01

    There now exists a plethora of information attesting to the reality of our changing climate and its impacts on both human and natural systems. There also exists a growing literature linking climate change impacts and transportation infrastructure (highways, bridges, tunnels, railway, shipping ports, etc.) which largely agrees that the nation's transportation systems are vulnerable. To assess this vulnerability along the coast, flooding due to sea level rise and storm surge has most commonly been evaluated by simply increasing the water surface elevation and then estimating flood depth by comparing the new water surface elevation with the topographic elevations of the land surface. While this rudimentary "bathtub" approach may provide a first order identification of potential areas of vulnerability, accurate assessment requires a high resolution, physically-based hydrodynamic model that can simulate inundation due to the combined effects of sea level rise, storm surge, tides and wave action for site-specific locations. Furthermore, neither the "bathtub" approach nor other scenario-based approaches can quantify the probability of flooding due to these impacts. We developed a high resolution coupled ocean circulation-wave model (ADCIRC/SWAN) that utilizes a Monte Carlo approach for predicting the depths and associated exceedance probabilities of flooding due to both tropical (hurricanes) and extra-tropical storms under current and future climate conditions. This required the development of an entirely new database of meteorological forcing (e.g. pressure, wind speed, etc.) for historical Nor'easters in the North Atlantic basin. Flooding due to hurricanes and Nor'easters was simulated separately and then composite flood probability distributions were developed. Model results were used to assess the vulnerability of the Central Artery/Tunnel system in Boston, Massachusetts to coastal flooding now and in the future. Local and regional adaptation strategies were

  8. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  9. Chemical and radiological vulnerability assessment in urban areas

    Directory of Open Access Journals (Sweden)

    Stojanović Božidar

    2006-01-01

    Full Text Available Cities and towns are faced with various types of threat from the extraordinary events involving chemical and radiological materials as exemplified by major chemical accidents, radiological incidents, fires, explosions, traffic accidents, terrorist attacks, etc. On the other hand, many sensitive or vulnerable assets exist within cities, such as: settlements, infrastructures, hospitals, schools, churches, businesses, government, and others. Besides emergency planning, the land use planning also represents an important tool for prevention or reduction of damages on people and other assets due to unwanted events. This paper considers development of method for inclusion vulnerability assessment in land use planning with objective to assess and limit the consequences in cities of likely accidents involving hazardous materials. We made preliminary assessment of criticality and vulnerability of the assets within Belgrade city area in respect to chemical sites and transportation roads that can be exposed to chemical accidents, or terrorist attacks.

  10. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    Energy Technology Data Exchange (ETDEWEB)

    Moss, R. H. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Blohm, A. J. [Univ. of Maryland, College Park, MD (United States); Delgado, A. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Henriques, J. J. [James Madison Univ., Harrisonburg, VA (United States); Malone, E L. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  11. Assessment of human-natural system characteristics influencing global freshwater supply vulnerability

    Science.gov (United States)

    Padowski, Julie C.; Gorelick, Steven M.; Thompson, Barton H.; Rozelle, Scott; Fendorf, Scott

    2015-10-01

    Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

  12. Vulnerability of wastewater infrastructure of coastal cities to sea level ...

    African Journals Online (AJOL)

    This study investigates the vulnerability of the wastewater collection and disposal infrastructure (i.e. pipelines and manholes, pumping stations and wastewater treatment plants) to sea-level rise in eThekwini Municipality, South Africa. By using geographical information systems (GIS) and a multi-criteria analysis considering ...

  13. Transnational infrastructure vulnerability : the historical shaping of the 2006 European 'blackout'

    NARCIS (Netherlands)

    Vleuten, van der E.B.A.; Lagendijk, V.C.

    2010-01-01

    The "European Blackout" of 4 November 2006 is a key reference in current debates on transnational electricity infrastructure vulnerability and governance. Several commentators have observed that to understand what happened, one must look at history. Our paper answers this call and demonstrates how

  14. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  15. The Assessment of Vulnerability of Industrial Parks to Climate Change in South Korea

    Science.gov (United States)

    Ryu, J. E.; Lee, D. K.; Jung, T. Y.; Choi, K. L.; Lee, S. H.

    2014-12-01

    Many countries are developing policy and measures to adapt to climate changes at the national and local levels, but the assessment of vulnerability to climate change and the establishment of countermeasures in the industries considering industrial factors such as worker, infrastructure are insufficient due to the characteristics of diverse processes and fields. In South Korea, the national government provides infrastructures for industrial parks where various companies in manufacturing and other industries are concentrated . Because of their concentration, damages can aggravate in case of natural disasters such as typhoons. In this study, vulnerability indices for climate change were developed and evaluated using climate scenarios for the climate exposure of localized terrential downpour for eight industrial parks. The vulnerability indices were selected and reviewed through literature review and two in-depth interviews with experts in various industries, and the assessment of vulnerability to climate change was conducted by collecting relevant information including the Directory of Industrial Complexes. The vulnerability of each industrial park to climate change was assessed for four time serious such as the base line, 2020s, 2050s, and 2100s . As a result, even though the possibility of localized heavy rain was the highest in Yeosu(Southeast coast) at present, but it was predicted that Gwangyang(Southwest coast) will be higher in the future. For the influences of climate including sensitivity, Ulsan Mipo(Southeast coast) is currently under the highest influence of climate, but the Gumi(Inland area) was forecasted to be under the highest influence of climate in the future. As a result of the assessment of vulnerability to climate change including adaptive capacity, Gumi and Myongji Noksan(Southeast coast) were most vulnerable to localized heavy rain. The degree of vulnerability of all the industrial parks except Ulsan and Yeosu was forecasted to increase in the

  16. Drought vulnerability assessment: The case of wheat farmers in Western Iran

    Science.gov (United States)

    Zarafshani, Kiumars; Sharafi, Lida; Azadi, Hossein; Hosseininia, Gholamhossein; De Maeyer, Philippe; Witlox, Frank

    2012-12-01

    Drought, as a natural and slow-onset phenomenon, creates numerous damages to agricultural communities. As a drought prone area in the Middle East, Iran has currently launched a crisis management approach to mitigate the harmful impacts of drought. However, thus far studies indicate that effective drought management strategies should be designed based upon vulnerability management which can increase farmers' ability to challenge the impacts. The purpose of this study was to assess drought vulnerability across three drought intensities (very high, extremely high, and critical) areas in Western Iran. Accordingly, a survey study was applied and 370 wheat farmers who all experienced drought during 2007-2009 were selected through a multi-stage stratified random sampling method. Face to face interviews were used to collect data on vulnerability indices from the farmers. Me-Bar and Valdez's vulnerability formula was applied to assess the vulnerability of wheat farmers during drought. Results revealed that the farmers' vulnerability is influenced mainly by economic, socio-cultural, psychological, technical, and infrastructural factors. The results also indicated that the farmers in Sarpole-Zahab township were most vulnerable compared to those in the Kermanshah township as the least vulnerable. Accordingly, some conclusions and recommendations are drawn for both policy-makers and practitioners who often must prioritize limited resources in the design vulnerability-reducing interventions.

  17. Assessing tsunami vulnerability, an example from Herakleio, Crete

    Science.gov (United States)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  18. Vulnerability of roads and associated structures to the effects of climate change

    International Nuclear Information System (INIS)

    Arisz, H.; Therrien, M.; Burrell, B.C.; LeBlanc, M.M.

    2009-01-01

    The vulnerability of roads and associated structures in the City of Greater Sudbury to the effects of climate change was evaluated using the Public Infrastructure Vulnerability Committee (PIEVC) Engineering Protocol for Climate Change Infrastructure Assessment. Study objectives were to evaluate the vulnerability of road-related infrastructure in Greater Sudbury to climate change, and to identify potential impediments to the application of the protocol in other municipalities. Based on the experience gained during this study, recommendations were provided with respect to the vulnerabilities of roads and associated structures to the predicted effects of climate change and the performance of vulnerability assessments. (author)

  19. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  20. A Methodology for Assessing the Seismic Vulnerability of Highway Systems

    International Nuclear Information System (INIS)

    Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco

    2008-01-01

    Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the places of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system

  1. Tsunami vulnerability assessment in the western coastal belt in Sri Lanka

    Science.gov (United States)

    Ranagalage, M. M.

    2017-12-01

    26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

  2. Rapid Assessment of Seismic Vulnerability in Palestinian Refugee Camps

    Science.gov (United States)

    Al-Dabbeek, Jalal N.; El-Kelani, Radwan J.

    Studies of historical and recorded earthquakes in Palestine demonstrate that damaging earthquakes are occurring frequently along the Dead Sea Transform: Earthquake of 11 July 1927 (ML 6.2), Earthquake of 11 February 2004 (ML 5.2). In order to reduce seismic vulnerability of buildings, losses in lives, properties and infrastructures, an attempt was made to estimate the percentage of damage degrees and losses at selected refugee camps: Al Ama`ri, Balata and Dhaishe. Assessing the vulnerability classes of building structures was carried out according to the European Macro-Seismic Scale 1998 (EMS-98) and the Fedral Emergency Management Agency (FEMA). The rapid assessment results showed that very heavy structural and non structural damages will occur in the common buildings of the investigated Refugee Camps (many buildings will suffer from damages grades 4 and 5). Bad quality of buildings in terms of design and construction, lack of uniformity, absence of spaces between the building and the limited width of roads will definitely increase the seismic vulnerability under the influence of moderate-strong (M 6-7) earthquakes in the future.

  3. Roads and associated structures: infrastructure impacts, vulnerabilities and design considerations for future climate change

    International Nuclear Information System (INIS)

    Tighe, S.L.; Lapp, D.

    2009-01-01

    This paper provides a summary of the findings from the literature scan, directed at identifying engineering literature that relates to road and associated infrastructure vulnerabilities in light of climate change. The scan was carried out over the course of several weeks in late 2007/early 2008. Although many Canadian transportation agencies are thinking about the potential vulnerabilities and associated engineering impacts, very few agencies have completed any formal analysis at this time. A few agencies currently have some on-going activities that are expected to be completed in 2008, but the majority have not started to examine the engineering aspects of how the change will need to be addressed in design, construction and maintenance. Although climate change and it's impact on transportation and specifically roads and associated structures is appearing in various reports and documents across Canada, available detailed information on engineering impacts was limited to nonexistent. This paper includes a brief introduction and background on climate change in general and the related predicted impacts on road infrastructure and associated structures, with primary focus on bridges. These sections are followed by project scope and objectives and methodology of assessment. The summary of findings provides some more specific details and has been prepared using available public agency documents that were located during the aforementioned search. Finally a few closing comments are provided. (author)

  4. Territorial Vulnerability Assessment Supporting Risk Managing Coastal Areas Due to Tsunami Impact

    Directory of Open Access Journals (Sweden)

    José Leandro Barros

    2015-09-01

    Full Text Available Portugal’s coastline extends 1187 km. It is characterized by social, economic and physical conditions that differentiate it from the rest of the territory, including population density, location of infrastructure and support of tourism activities. Therefore, it has a significant exposure if a tsunami occurs. Six coastal study sites with varying characteristics were selected for evaluation in this paper, including two core beach-use areas, two residential areas and two industrial areas. These sites are located in the municipalities of Figueira da Foz, Setúbal and Vila do Bispo. The analysis began with the calculation of the potential tsunami inundation area for each site using the 1755 Lisbon tsunami. Next, a methodology distinguished by its multidimensional character was applied to assess local vulnerability to tsunamis. This methodology assesses vulnerabilities associated with morphological, structural, social and tax factors. These four vulnerability components were combined to obtain a Composite Vulnerability Index (CVI, which enabled us to identify the most vulnerable areas and to determine the distinguishing characteristics of each area.

  5. A database of volcanic hazards and their physical impacts to critical infrastructure

    Science.gov (United States)

    Wilson, Grant; Wilson, Thomas; Deligne, Natalia

    2013-04-01

    Approximately 10% of the world's population lives within 100 km of historically active volcanoes. Consequently, considerable critical infrastructure is at risk of being affected by volcanic eruptions, where critical infrastructure includes: electricity and wastewater networks; water supply systems; transport routes; communications; and buildings. Appropriate risk management strategies are required to minimise the risk to infrastructure, which necessitates detailed understanding of both volcanic hazards and infrastructure parameters and vulnerabilities. To address this, we are developing a database of the physical impacts and vulnerability of critical infrastructure observed during/following historic eruptions, placed in the context of event-specific volcanic hazard and infrastructure parameters. Our database considers: volcanic hazard parameters for each case study eruption (tephra thickness, dynamic pressure of PDCs, etc.); inventory of infrastructure elements present within the study area (geographical extent, age, etc.); the type and number of impacts and disruption caused to particular infrastructure sectors; and the quantified assessment of the vulnerability of built environments. Data have been compiled from a wide range of literature, focussing in particular on impact assessment studies which document in detail the damage sustained by critical infrastructure during a given eruption. We are creating a new vulnerability ranking to quantify the vulnerability of built environments affected by volcanic eruptions. The ranking is based upon a range of physical impacts and service disruption criteria, and is assigned to each case study. This ranking will permit comparison of vulnerabilities between case studies as well as indicate expected vulnerability during future eruptions. We are also developing hazard intensity thresholds indicating when specific damage states are expected for different critical infrastructure sectors. Finally, we have developed a data quality

  6. Advanced methods for the risk, vulnerability and resilience assessment of safety-critical engineering components, systems and infrastructures, in the presence of uncertainties

    International Nuclear Information System (INIS)

    Pedroni, Nicolas

    2016-01-01

    Safety-critical industrial installations (e.g., nuclear plants) and infrastructures (e.g., power transmission networks) are complex systems composed by a multitude and variety of heterogeneous 'elements', which are highly interconnected and mutually dependent. In addition, such systems are affected by large uncertainties in the characterization of the failure and recovery behavior of their components, interconnections and interactions. Such characteristics raise concerns with respect to the system risk, vulnerability and resilience properties, which have to be accurately and precisely assessed for decision making purposes. In general, this entails the following main steps: (1) representation of the system to capture its main features; (2) construction of a mathematical model of the system; (3) simulation of the behavior of the system under various uncertain conditions to evaluate the relevant risk, vulnerability and resilience metrics by propagating the uncertainties through the mathematical model; (4) decision making to (optimally) determine the set of protective actions to effectively reduce (resp., increase) the system risk and vulnerability (resp., resilience). New methods to address these issues have been developed in this dissertation. Specifically, the research works have been carried out along two main axes: (1) the study of approaches for uncertainty modeling and quantification; (2) the development of advanced computational methods for the efficient system modeling, simulation and analysis in the presence of uncertainties. (author)

  7. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Kroeger, Wolfgang; Sansavini, Giovanni; Schlaepfer, Markus; Zio, Enrico

    2009-01-01

    A framework for the analysis of the vulnerability of critical infrastructures has been proposed by some of the authors. The framework basically consists of two successive stages: (i) a screening analysis for identifying the parts of the critical infrastructure most relevant with respect to its vulnerability and (ii) a detailed modeling of the operational dynamics of the identified parts for gaining insights on the causes and mechanisms responsible for the vulnerability. In this paper, a critical presentation is offered of the results of a set of investigations aimed at evaluating the potentials of (i) using network analysis based on measures of topological interconnection and reliability efficiency, for the screening task; (ii) using object-oriented modeling as the simulation framework to capture the detailed dynamics of the operational scenarios involving the most vulnerable parts of the critical infrastructure as identified by the preceding network analysis. A case study based on the Swiss high-voltage transmission system is considered. The results are cross-compared and evaluated; the needs of further research are defined

  8. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    Energy Technology Data Exchange (ETDEWEB)

    Burchett, Deon L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chen, Richard Li-Yang [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Richard, Jean-Philippe [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed

  9. Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems

    International Nuclear Information System (INIS)

    Johansson, Jonas; Hassel, Henrik; Zio, Enrico

    2013-01-01

    Society depends on services provided by critical infrastructures, and hence it is important that they are reliable and robust. Two main approaches for gaining knowledge required for designing and improving critical infrastructures are reliability analysis and vulnerability analysis. The former analyses the ability of the system to perform its intended function; the latter analyses its inability to withstand strains and the effects of the consequent failures. The two approaches have similarities but also some differences with respect to what type of information they generate about the system. In this view, the main purpose of this paper is to discuss and contrast these approaches. To strengthen the discussion and exemplify its findings, a Monte Carlo-based reliability analysis and a vulnerability analysis are considered in their application to a relatively simple, but representative, system the IEEE RTS96 electric power test system. The exemplification reveals that reliability analysis provides a good picture of the system likely behaviour, but fails to capture a large portion of the high consequence scenarios, which are instead captured in the vulnerability analysis. Although these scenarios might be estimated to have small probabilities of occurrence, they should be identified, considered and treated cautiously, as probabilistic analyses should not be the only input to decision-making for the design and protection of critical infrastructures. The general conclusion that can be drawn from the findings of the example is that vulnerability analysis should be used to complement reliability studies, as well as other forms of probabilistic risk analysis. Measures should be sought for reducing both the vulnerability, i.e. improving the system ability to withstand strains and stresses, and the reliability, i.e. improving the likely behaviour

  10. A synthesized biophysical and social vulnerability assessment for Taiwan

    Science.gov (United States)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  11. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    Energy Technology Data Exchange (ETDEWEB)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  12. Digital divide, biometeorological data infrastructures and human vulnerability definition

    Science.gov (United States)

    Fdez-Arroyabe, Pablo; Lecha Estela, Luis; Schimt, Falko

    2018-05-01

    The design and implementation of any climate-related health service, nowadays, imply avoiding the digital divide as it means having access and being able to use complex technological devices, massive meteorological data, user's geographic location and biophysical information. This article presents the co-creation, in detail, of a biometeorological data infrastructure, which is a complex platform formed by multiple components: a mainframe, a biometeorological model called Pronbiomet, a relational database management system, data procedures, communication protocols, different software packages, users, datasets and a mobile application. The system produces four daily world maps of the partial density of the atmospheric oxygen and collects user feedback on their health condition. The infrastructure is shown to be a useful tool to delineate individual vulnerability to meteorological changes as one key factor in the definition of any biometeorological risk. This technological approach to study weather-related health impacts is the initial seed for the definition of biometeorological profiles of persons, and for the future development of customized climate services for users in the near future.

  13. Digital divide, biometeorological data infrastructures and human vulnerability definition

    Science.gov (United States)

    Fdez-Arroyabe, Pablo; Lecha Estela, Luis; Schimt, Falko

    2017-06-01

    The design and implementation of any climate-related health service, nowadays, imply avoiding the digital divide as it means having access and being able to use complex technological devices, massive meteorological data, user's geographic location and biophysical information. This article presents the co-creation, in detail, of a biometeorological data infrastructure, which is a complex platform formed by multiple components: a mainframe, a biometeorological model called Pronbiomet, a relational database management system, data procedures, communication protocols, different software packages, users, datasets and a mobile application. The system produces four daily world maps of the partial density of the atmospheric oxygen and collects user feedback on their health condition. The infrastructure is shown to be a useful tool to delineate individual vulnerability to meteorological changes as one key factor in the definition of any biometeorological risk. This technological approach to study weather-related health impacts is the initial seed for the definition of biometeorological profiles of persons, and for the future development of customized climate services for users in the near future.

  14. Digital divide, biometeorological data infrastructures and human vulnerability definition.

    Science.gov (United States)

    Fdez-Arroyabe, Pablo; Lecha Estela, Luis; Schimt, Falko

    2018-05-01

    The design and implementation of any climate-related health service, nowadays, imply avoiding the digital divide as it means having access and being able to use complex technological devices, massive meteorological data, user's geographic location and biophysical information. This article presents the co-creation, in detail, of a biometeorological data infrastructure, which is a complex platform formed by multiple components: a mainframe, a biometeorological model called Pronbiomet, a relational database management system, data procedures, communication protocols, different software packages, users, datasets and a mobile application. The system produces four daily world maps of the partial density of the atmospheric oxygen and collects user feedback on their health condition. The infrastructure is shown to be a useful tool to delineate individual vulnerability to meteorological changes as one key factor in the definition of any biometeorological risk. This technological approach to study weather-related health impacts is the initial seed for the definition of biometeorological profiles of persons, and for the future development of customized climate services for users in the near future.

  15. Development of the efficient emergency preparedness system for the nuclear critical infrastructure

    International Nuclear Information System (INIS)

    Kostadinov, V.; Marn, J.; Petelin, S.

    2007-01-01

    The evaluation of the critical nuclear infrastructure vulnerability to threats like human occurrences, terrorist attacks and natural disasters and the preparation of emergency response plans with the estimation of optimized costs are of the vital importance for the assurance of a safe nuclear facilities operation and the national security. In the past national emergency systems did not include vulnerability assessments of the critical nuclear infrastructure as the important part of the comprehensive preparedness framework. The fundamental aims of the efficient emergency preparedness and response system are to provide a sustained emergency readiness and to prevent an emergency situation and accidents. But when an event happens the mission is to mitigate consequences and to protect the people and environment against the nuclear and radiological damage. The efficient emergency response system, which would be activated in the case of the nuclear and/or radiological emergency and release of the radioactivity to the environment, is an important element of a comprehensive system of the nuclear and radiation safety. In the article the new methodology for the critical nuclear infrastructure vulnerability assessment as a missing part of an efficient emergency preparedness system is presented. It can help the overall national energy sectors to identify and better understand the terrorist threats and vulnerabilities of their critical infrastructure. The presented methodology could also facilitate national agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security, reliability and safe operation of the whole energy infrastructure. The vulnerability assessment methodology will also assist nuclear power plants to develop, validate, and disseminate the assessment and survey of new efficient countermeasures. The significant benefits of the new vulnerability assessment research are to increase nuclear power

  16. Elements at risk as a framework for assessing the vulnerability of communities to landslides

    Directory of Open Access Journals (Sweden)

    M. Papathoma-Köhle

    2007-12-01

    Full Text Available The assessment of the vulnerability of communities prone to landslide related disasters is a topic that is growing in importance. Few studies discuss this issue and limited research has been carried out on the relationship between types of landslide and their potential impact on buildings and infrastructure. We outline a framework to undertake an assessment of the vulnerability of buildings to landslide utilising a similar framework used for assessing the vulnerability of buildings to tsunami damage. The framework is based on the development of an "elements at risk database" that takes into consideration the characteristics and use of the buildings, their importance for the local economy and the characteristics of the inhabitants (population density, age and so forth. The attributes that affect vulnerability are imported and examined within a GIS database which is used to visualise the physical, human and economic vulnerability. The results may have important implications for disaster management and emergency planning, and the database can be used by various end-users and stakeholders such as insurance companies, local authorities and the emergency services. The approach presented here can be integrated in to a wider more detailed "Framework for Landslide Risk and Vulnerability Assessment for Communities". We illustrate the potential of this framework and present preliminary results from Lichtenstein, Baden Württemberg, Germany.

  17. Climate change: assessment of the vulnerability of nuclear power and cost of adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Paillere, H.; Cameron, R. [OECD Nuclear Energy Agency, Issy-les-Moulineaux, Paris (France); Caneill, J.-Y. [EDF Group, Paris, (France); Syri, S. [Aalto Univ., Dept. of Energy Technology, Aalto (Finland)

    2014-07-01

    This paper reports on the preliminary outcome of an OECD study (2013-14) aimed at assessing the vulnerability of nuclear power generation in the event of extreme weather events that could be induced by climate change. Nuclear power plants (NPPs), just as other energy infrastructures, can be affected by phenomena such as floods, storms, heat waves, droughts, etc. This paper reports on examples of extreme weather events that have affected the operation of NPPs, and describes the adaptation strategy that can be implemented to improve the resilience of existing generating assets as well as new infrastructures. (author)

  18. Collision and displacement vulnerability among marine birds of the California Current System associated with offshore wind energy infrastructure

    Science.gov (United States)

    Adams, Josh; Kelsey, Emily C.; Felis, Jonathan J.; Pereksta, David M.

    2016-10-27

    With growing climate change concerns and energy constraints, there is an increasing need for renewable energy sources within the United States and globally. Looking forward, offshore wind-energy infrastructure (OWEI) has the potential to produce a significant proportion of the power needed to reach our Nation’s renewable energy goal. Offshore wind-energy sites can capitalize open areas within Federal waters that have persistent, high winds with large energy production potential. Although there are few locations in the California Current System (CCS) where it would be acceptable to build pile-mounted wind turbines in waters less than 50 m deep, the development of technology able to support deep-water OWEI (>200 m depth) could enable wind-energy production in the CCS. As with all human-use of the marine environment, understanding the potential impacts of wind-energy infrastructure on the marine ecosystem is an integral part of offshore wind-energy research and planning. Herein, we present a comprehensive database to quantify marine bird vulnerability to potential OWEI in the CCS (see https://doi.org/10.5066/F79C6VJ0). These data were used to quantify marine bird vulnerabilities at the population level. For 81 marine bird species present in the CCS, we created three vulnerability indices: Population Vulnerability, Collision Vulnerability, and Displacement Vulnerability. Population Vulnerability was used as a scaling factor to generate two comprehensive indicies: Population Collision Vulnerability (PCV) and Population Displacement Vulnerability (PDV). Within the CCS, pelicans, terns (Forster’s [Sterna forsteri], Caspian [Hydroprogne caspia], Elegant [Thalasseus elegans], and Least Tern [Sternula antillarum]), gulls (Western [Larus occidentalis] and Bonaparte’s Gull [Chroicocephalus philadelphia]), South Polar Skua (Stercorarius maccormicki), and Brandt’s Cormorant (Phalacrocorax penicillatus) had the greatest PCV scores. Brown Pelican (Pelicanus occidentalis

  19. Landslide Vulnerability Assessment (LVAs: A Case Study from Kota Kinabalu, Sabah, Malaysia

    Directory of Open Access Journals (Sweden)

    Rodeano Roslee

    2016-12-01

    Full Text Available DOI: 10.17014/ijog.4.1.49-59The topic on Landslide Vulnerability Assessment (LVAs in Malaysia is relatively new and received little attention from geoscientists and engineers. This research paper tries to formulate the concept of LVAs by taking into account the science and socio-economic aspects. A new approach in vulnerability concept is also introduced herein. To achieve this goal, a framework was designed for assessing the LVAs. The framework was formulated semiquantitatively through the development of database for the risk elements (human and properties based on information from secondary data (technical reports, extensive review of literature, and field observations. The vulnerability parameters included in assessing LVAs are 1 physical implication (building structures, internal materials, property damage, infrastructural facilities, and stabilization actions, 2 social status (injury, fatalities, safety, loss of accommodation, and public awareness, and 3 interference on environment (affected period, daily operation, and diversity. Each considered parameter in the vulnerability assessment is allocated with a certain index value ranges from 0 (0 % damage/victims/period, 0.25 (1 - 25% damage/victims/period, 0.50 (26 - 50% damage/victims/period, 0.75 (51 - 75% damage/victims/period, and 1.00 (75 - 100% damage/victims/period. All of these parameters are compiled and analyzed with “Landslide Distribution Map” (LDM to generate a “Landslide Vulnerability Degree map (LVD”. The LDM was produced based on field studies and satellite image interpretations in order to locate the landslide locations in the studied area. Finally, three types of physical, human, and environment vulnerabilities were then classified into five classes of vulnerabilities, namely: Class 1 (< 0.20: Very Low Vulnerability; Class 2 (0.21 - 0.40: Low Vulnerability; Class 3 (0.41 - 0.60: Medium Vulnerability; Class 4 (0.61 - 0.80: High Vulnerability; and Class 5 (> 0.81: Very

  20. Securing energy assets and infrastructure 2007

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  1. Interactive exploration of the vulnerability of the human infrastructure: an approach using simultaneous display of similar locations

    Science.gov (United States)

    Ceré, Raphaël; Kaiser, Christian

    2015-04-01

    Currently, three quarters of the Swiss population is living in urban areas. The total population is still increasing, and urbanized space is increasing event faster. Consequently, the intensity of use has decreased but the exposure of the urban space to natural events has grown along with the cost related to the impact of hazards. In line with this fact, during the 20th century there has been a noticeable increase of natural disasters accompanied by the rapid increase of the world population, leading to higher costs. Additionally to the fact that more people are exposed to natural hazards, the value of goods globally has increased more than proportionally. Consequently, the vulnerability of urban space is, more than ever before, a major issue for socio-economic development. Here, vulnerability is defined as the potential human loss or loss of infrastructure caused by a hazardous event. It encompasses factors of urban infrastructure, population and the environment, which increase the susceptibility of a location to the impact of hazards. This paper describes a novel method for improving the interactive use of exploratory data analysis in the context of minimizing vulnerability and disaster risk by prevention or mitigation. This method is used to assess the similarity between different locations with respect to several characteristics relevant to vulnerability at different scales, allowing for automatic display of multiple locations similar to the one under investigation by an expert. Visualizing vulnerability simultaneously for several locations allows for analyzing and comparing of metric characteristics between multiple places and at different scales. The interactivity aspect is also useful for understanding vulnerability patterns and it facilitates disaster risk management and decisions on global preventive measures in urban spaces. Metrics for vulnerability assessment can be extracted from extensive geospatial datasets such as high-resolution digital elevation

  2. Vulnerability assessment including tangible and intangible components in the index composition: An Amazon case study of flooding and flash flooding.

    Science.gov (United States)

    Andrade, Milena Marília Nogueira de; Szlafsztein, Claudio Fabian

    2018-07-15

    The vulnerability of cities and communities in the Amazon to flooding and flash flooding is increasing. The effects of extreme events on populations vary across landscapes, causing vulnerability to differ spatially. Traditional vulnerability studies in Brazil and across the world have used the vulnerability index for the country and, more recently, municipality scales. The vulnerability dimensions are exposure, sensitivity, and adaptive capacity. For each of these dimensions, there is a group of indicators that constitutes a vulnerability index using quantitative data. Several vulnerability assessments have used sensitivity and exposure analyses and, recently, adaptive capacity has been considered. The Geographical Information Systems (GIS) analysis allows spatial regional modeling using quantitative vulnerability indicators. This paper presents a local-scale vulnerability assessment in an urban Amazonian area, Santarém City, using interdisciplinary methods. Data for exposure and sensitivity were gathered by remote sensing and census data, respectively. However, adaptive capacity refers to local capacities, whether infrastructural or not, and the latter were gathered by qualitative participatory methods. For the mixed data used to study adaptive capacity, we consider tangible components for countable infrastructure that can cope with hazards, and intangible components that reflect social activities based on risk perceptions and collective action. The results indicate that over 80% of the area is highly or moderately vulnerable to flooding and flash flooding. Exposure and adaptive capacity were determinants of the results. Lower values of adaptive capacity play a significant role in vulnerability enhancement. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Effectively protecting cyber infrastructure and assessing security needs

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, J.; Starman, R. [EWA Canada Ltd., Edmonton, AB (Canada)

    2002-07-01

    This presentation addressed some of the requirements for effectively protecting cyber infrastructure and assessing security needs. The paper discussed the hype regarding cyber attacks, and presented the Canadian reality (as viewed by CanCERT). An assessment of security concerns was also presented. Recent cyber attacks on computer networks have raised fears of unsafe energy networks. Some experts claim the attacks are linked to terrorism, others blame industrial spying and mischief. Others dismiss the notion that somebody could bring down a power grid with a laptop as being far-fetched. It was noted that the cyber security threat is real, and that attacks are becoming more sophisticated as we live in a target rich environment. The issue of assessing vulnerabilities was discussed along with the selection of safeguards such as improving SCADA systems and the latest encryption methods to prevent hackers from bringing down computer networks. 3 tabs., 23 figs.

  4. Critical infrastructures risk and vulnerability assessment in transportation of dangerous goods transportation by road and rail

    CERN Document Server

    Vamanu, Bogdan I; Katina, Polinpapilinho F

    2016-01-01

    This book addresses a key issue in today’s society: the safer transport of dangerous goods, taking into account people, the environment and economics. In particular, it offers a potential approach to identifying the issues, developing the models, providing the methods and recommending the tools to address the risks and vulnerabilities involved. We believe this can only be achieved by assessing those risks in a comprehensive, quantifiable and integrated manner. Examining both rail and road transportation, the book is divided into three sections, covering: the mature and accepted (by both academia and practitioners) methodology of risk assessment; the vulnerability assessment – a novel approach proposed as a vital complement to risk; guidance and support to build the tools that make methods and equations to yield: the Decision Support Systems. Throughout the book, the authors do not endeavor to provide THE solution. Instead, the book offers insightful food for thought for students, researchers, practitioner...

  5. Vulnerability studies and integrated assessments for hazard risk reduction in Pittsburgh, PA (Invited)

    Science.gov (United States)

    Klima, K.

    2013-12-01

    Today's environmental problems stretch beyond the bounds of most academic disciplines, and thus solutions require an interdisciplinary approach. For instance, the scientific consensus is changes in the frequency and severity of many types of extreme weather events are increasing (IPCC 2012). Yet despite our efforts to reduce greenhouse gases, we continue to experience severe weather events such as Superstorm Sandy, record heat and blizzards, and droughts. These natural hazards, combined with increased vulnerability and exposure, result in longer-lasting disruptions to critical infrastructure and business continuity throughout the world. In order to protect both our lives and the economy, we must think beyond the bounds of any one discipline to include an integrated assessment of relevant work. In the wake of recent events, New York City, Washington, DC, Chicago, and a myriad of other cities have turned to their academic powerhouses for assistance in better understanding their vulnerabilities. This talk will share a case study of the state of integrated assessments and vulnerability studies of energy, transportation, water, real estate, and other main sectors in Pittsburgh, PA. Then the talk will use integrated assessment models and other vulnerability studies to create coordinated sets of climate projections for use by the many public agencies and private-sector organizations in the region.

  6. Critical infrastructure systems of systems assessment methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  7. Using field data and HSR imagery to downscale vulnerability assessment of buildings and local infrastructure facing hazards from floods and hyperconcentrated flows

    Science.gov (United States)

    Ettinger, Susanne; Manrique Llerena, Nélida Victoria; Thouret, Jean-Claude

    2014-05-01

    The focus of this study is the analysis of post-flood conditions along the Venezuela channel in the large city of Arequipa, south Peru, in order to identify the parameters determining vulnerability of buildings and infrastructure. Two tributaries draining a c. 11.9 km2 large catchment feed the Venezuela channel. Before joining the main Rio Chili valley to the West, it crosses the city from NE to SW. Over a total length of 5.2 km, channel depth ranges from 1.3 to 6.3 m and c. 40% of the channel sections do not exceed 5 m in width. On 8 February 2013, 123 mm of rainfall within 3 hours (monthly mean: 29.3 mm) triggered a flashflood inundating at least 0.4 km2 of urban settlements along the channel. The flood damaged 14 buildings, 23 among 53 bridges, and led to the partial collapse of main road sections paralyzing central parts of the city for at least one week. This research relies on (1) analyzing post-flood conditions and assessing damage types caused by the 8 February 2013 flood; (2) mapping of the channel characteristics (slope, wetted section, sinuosity, type of river banks, bed roughness, etc.) and buildings, bridges, and contention walls potentially exposed to inundation. Data collection and analysis have been based on high spatial resolution (HSR) images (SPOT5 2007, Google Earth Pro and BINGMAP 2012, PLEIADES 2012-2013). Field measurements (GPS, laser and geomorphologic mapping) were used to ground truth channel width, depth, as well as building outlines, contention walls and bridge characteristics (construction material, opening size, etc.). An inventory of 25 city blocks (1500 to 20000 m2; 6 to 157 houses per block) has been created in a GIS database in order to estimate their physical vulnerability. As many as 717 buildings have been surveyed along the affected drainage and classified according to four building types based on their structural characteristics. Output vulnerability maps show that the varying channel characteristics, i.e. bank type, bed

  8. Transdisciplinary knowledge integration : cases from integrated assessment and vulnerability assessment

    NARCIS (Netherlands)

    Hinkel, J.

    2008-01-01

    Keywords: climate change, integrated assessment, knowledge integration, transdisciplinary research, vulnerability, vulnerability assessment.
    This thesis explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments and vulnerability

  9. Beyond Vulnerability Assessment: Impact of Developments toward Local Adaptive Capacity in Kemijen City Village, Semarang City

    Science.gov (United States)

    Jayanimitta, M. E.; Puspasari, D. A.; Widyahantari, R.; Kristina, D.; Ratnaningtyas, T.; Setionurjaya, A.; Anindita, Y. A.

    2018-02-01

    Vulnerability Assessment is usually used for assessing the ability of an area on facing disaster. In previous studies, the study of Vulnerability Assessment applied only quantitative method to show the vulnerability level. Therefore, this study attempts to add information reviews using qualitative method. Kemijen City Village is one of the administrative areas in the northern part of Semarang City affected by climate change. The residents have to adapt it by renovating and elevating their houses and other infrastructures to avoid floods. There are some development programs held by government, NGOs, and corporations such as Banger Polder Development, PLPBK, etc. It is interesting to know how big the vulnerability level of Kemijen on facing flood disasters, then how the projects can affect local adaptive capacity. To answer it, this research uses mixed-method approach. Vulnerability Assessment uses quantitative method by scoring indicators of Exposure, Sensitivity, and Adaptive Capacity, while the development impact uses qualitative method. The data were collected through interviews and FGD conducted in Joint Studio Course between Diponegoro University and University of Hawaii in October 2016. Non-physical programs such as community empowerment have more positive impacts on local adaptive capacity in Kemijen. Community participation is important for environmental sustainability that can not be done in a short time to educate the people.

  10. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  11. Risk assessment framework on time impact: Infrastructure projects in soft soil during construction stage

    Science.gov (United States)

    Low, W. W.; Wong, K. S.; Lee, J. L.

    2018-04-01

    With the growth of economy and population, there is an increase in infrastructure construction projects. As such, it is unavoidable to have construction projects on soft soil. Without proper risk management plan, construction projects are vulnerable to different types of risks which will have negative impact on project’s time, cost and quality. Literature review showed that little or none of the research is focused on the risk assessment on the infrastructure project in soft soil. Hence, the aim of this research is to propose a risk assessment framework in infrastructure projects in soft soil during the construction stage. This research was focused on the impact of risks on project time and internal risk factors. The research method was Analytical Hierarchy Process and the sample population was experienced industry experts who have experience in infrastructure projects. Analysis was completed and result showed that for internal factors, the five most significant risks on time element are lack of special equipment, potential contractual disputes and claims, shortage of skilled workers, delay/lack of materials supply, and insolvency of contractor/sub-contractor. Results indicated that resources risk factor play a critical role on project time frame in infrastructure projects in soft soil during the construction stage.

  12. The effects of `non-infrastructural' measures to improve the safety of vulnerable road users : a review of international findings, prepared for the OECD Scientific Expert Group "Safety of vulnerable road users".

    OpenAIRE

    Hagenzieker, M.P.

    1997-01-01

    This report reviews the evaluated effects of what can be called `non-infrastructural measures' to improve the safety of vulnerable road users. Three selected areas are discussed: education and training, measures to enhance visibility and conspecuity, and protective devices for bicyclists. Other types of non-infrastructural measures are briefly mentioned.

  13. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  14. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  15. Climate change vulnerability for species-Assessing the assessments.

    Science.gov (United States)

    Wheatley, Christopher J; Beale, Colin M; Bradbury, Richard B; Pearce-Higgins, James W; Critchlow, Rob; Thomas, Chris D

    2017-09-01

    Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to the same risk categories and whether any of the existing methodologies perform well at identifying climate-threatened species. We compare the outputs of 12 climate change vulnerability assessment methodologies, using both real and simulated species, and validate the methods using historic data for British birds and butterflies (i.e. using historical data to assign risks and more recent data for validation). Our results show that the different vulnerability assessment methods are not consistent with one another; different risk categories are assigned for both the real and simulated sets of species. Validation of the different vulnerability assessments suggests that methods incorporating historic trend data into the assessment perform best at predicting distribution trends in subsequent time periods. This study demonstrates that climate change vulnerability assessments should not be used interchangeably due to the poor overall agreement between methods when considering the same species. The results of our validation provide more support for the use of trend-based rather than purely trait-based approaches, although further validation will be required as data become available. © 2017 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  16. Energy infrastructure in India: Profile and risks under climate change

    International Nuclear Information System (INIS)

    Garg, Amit; Naswa, Prakriti; Shukla, P.R.

    2015-01-01

    India has committed large investments to energy infrastructure assets-power plants, refineries, energy ports, pipelines, roads, railways, etc. The coastal infrastructure being developed to meet the rising energy imports is vulnerable to climate extremes. This paper provides an overview of climate risks to energy infrastructures in India and details two case studies – a crude oil importing port and a western coast railway transporting coal. The climate vulnerability of the port has been mapped using an index while that of the railway has been done through a damage function for RCP 4.5.0 and 8.5 scenarios. Our analysis shows that risk management through adaptation is likely to be very expensive. The system risks can be even greater and might adversely affect energy security and access objectives. Aligning sustainable development and climate adaptation measures can deliver substantial co-benefits. The key policy recommendations include: i) mandatory vulnerability assessment to future climate risks for energy infrastructures; ii) project and systemic risks in the vulnerability index; iii) adaptation funds for unmitigated climate risks; iv) continuous monitoring of climatic parameters and implementation of adaptation measures, and iv) sustainability actions along energy infrastructures that enhance climate resilience and simultaneously deliver co-benefits to local agents. -- Highlights: •Climate risks to energy infrastructures adversely impact energy security. •Case studies of a port and a railway show their future climate change vulnerability. •Managing climate-induced risks through preventive adaptation policies

  17. Assessment of Socioeconomic Vulnerability to Floods in the Bâsca Chiojdului Catchment Area

    Directory of Open Access Journals (Sweden)

    REMUS PRĂVĂLIE

    2014-12-01

    Full Text Available Hydrological risk phenomena such as floods are among the most costly natural disasters worldwide, effects consisting of socioeconomic damages and deaths. The Bâsca Chiojdului catchment area, by its morphometric and hydrographic peculiarities, is prone to generate these hydrological risk phenomena, so there is a high vulnerability in the socioeconomic elements. This paper is focused on the identification of the main socioeconomic elements vulnerable to hydrological risk phenomena such as floods, based on the assessment of their manifestation potential. Thus, following the delimitation of areas with the highest flood occurrence potential (susceptibility to floods, major socioeconomic factors existing in the basin, considering human settlements (constructions, transport infrastructure, and agricultural areas (the most important category, were superimposed. Results showed a high vulnerability for all three exposed socioeconomic elements especially in valley sectors, of which household structures were the most vulnerable, given both their importance and the high number of areas highly exposed to floods (approximately 2,500 houses and outbuildings, out of a total of about 10,250, intersect the most susceptible area to floods in the study area.

  18. Assessing Vulnerability to Heat: A Geospatial Analysis for the City of Philadelphia

    Directory of Open Access Journals (Sweden)

    Laura Barron

    2018-04-01

    Full Text Available Urban heat island (UHI effect is an increasingly prominent health and environmental hazard that is linked to urbanization and climate change. Greening reduces the negative impacts of UHI; trees specifically are the most effective in ambient temperature reduction. This paper investigates vulnerability to heat in the Philadelphia, Pennsylvania and identifies where street trees can be planted as a public intervention. We used geospatial information systems (GIS software to map a validated Heat Vulnerability Index to identify vulnerability at the block level. Using a high-low geospatial cluster analysis, we assessed where the City of Philadelphia can most effectively plant street trees to address UHI. This information was then aggregated to the neighborhood level for more effective citizen communication and policymaking. We identified that 26 of 48 (54% neighborhoods that were vulnerable to heat also lacked street trees. Of 158 Philadelphia neighborhoods, 63 (40% contained block groups of high vulnerability to either heat or street tree infrastructure. Neighborhoods that were ranked highest in both classifications were identified in two adjacent West Philadelphia neighborhoods. Planting street trees is a public service a city can potentially reduce the negative health impacts of UHI. GIS can be used to identify and recommend street tree plantings to reduce urban heat.

  19. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    Energy Technology Data Exchange (ETDEWEB)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  20. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    International Nuclear Information System (INIS)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term

  1. Underground Economics for Vulnerability Risk

    NARCIS (Netherlands)

    Allodi, L.

    The estimation of vulnerability risk is at the core of any IT security management strategy. Among technical and infrastructural metrics of risk, attacker economics represent an emerging new aspect that several risk assessment methodologies propose to consider (e.g., based on game theory). Yet the

  2. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  3. Assessing dependability and resilience in critical infrastructures: challenges and opportunities

    NARCIS (Netherlands)

    Avritzer, Alberto; Di Giandomenico, Felicita; Remke, Anne Katharina Ingrid; Riedl, Martin; Wolter, Katinka; Avritzer, Alberto; Vieira, Marco; van Moorsel, Aad

    2012-01-01

    Critical infrastructures (CI) are very complex and highly interdependent systems, networks and assets that provide essential services in our daily life. Most CI are either built upon or monitored and controlled by vulnerable information and communication technology (ICT) systems. Critical

  4. Adaptive pathways and coupled infrastructure: seven centuries of adaptation to water risk and the production of vulnerability in Mexico City

    Directory of Open Access Journals (Sweden)

    Beth Tellman

    2018-03-01

    Full Text Available Infrastructure development is central to the processes that abate and produce vulnerabilities in cities. Urban actors, especially those with power and authority, perceive and interpret vulnerability and decide when and how to adapt. When city managers use infrastructure to reduce urban risk in the complex, interconnected city system, new fragilities are introduced because of inherent system feedbacks. We trace the interactions between system dynamics and decision-making processes over 700 years of Mexico City's adaptations to water risks, focusing on the decision cycles of public infrastructure providers (in this case, government authorities. We bring together two lenses in examining this history: robustness-vulnerability trade-offs to explain the evolution of systemic risk dynamics mediated by feedback control, and adaptation pathways to focus on the evolution of decision cycles that motivate significant infrastructure investments. Drawing from historical accounts, archeological evidence, and original research on water, engineering, and cultural history, we examine adaptation pathways of humans settlement, water supply, and flood risk. Mexico City's history reveals insights that expand the theory of coupled infrastructure and lessons salient to contemporary urban risk management: (1 adapting by spatially externalizing risks can backfire: as cities expand, such risks become endogenous; (2 over time, adaptation pathways initiated to address specific risks may begin to intersect, creating complex trade-offs in risk management; and (3 city authorities are agents of risk production: even in the face of new exogenous risks (climate change, acknowledging and managing risks produced endogenously may prove more adaptive. History demonstrates that the very best solutions today may present critical challenges for tomorrow, and that collectively people have far more agency in and influence over the complex systems we live in than is often acknowledged.

  5. Urban growth patterns in major Southeast Asian cities: Toward exposure mapping and vulnerability assessment

    Science.gov (United States)

    Mandapaka, Pradeep; Kamarajugedda, Shankar A.; Lo, Edmond Y. M.

    2017-04-01

    Southeast Asia (SEA) is undergoing rapid urbanization, with urban population percentage increasing from 32% in 1990 to 48% in 2015. It is projected that by the year 2040, urban regions in SEA account for 60% of its total population. The region is home to 600 million people, with many densely populated cities, including megacities such as Jakarta, Bangkok, and Manila. The region has more than 20,000 islands, and many cities lie on coastal low-lands and floodplains. These geographical characteristics together with the increasing population, infrastructure growth, and changing climate makes the region highly vulnerable to natural hazards. This study assessed urban growth dynamics in major (defined as population exceeding 1 million) SEA cities using remotely sensed night-time lights (NTL) data. A recently proposed brightness gradient approach was applied on 21 years (1992-2012) of NTL annual composites to derive core-urban (CU) and peri-urban (PU) regions within each city. The study also assessed the sensitivity of above extracted urban categories to different NTL thresholds. The temporal trends in CU and PU regions were quantified, and compared with trends in socio-economic indicators. The spatial expansion of CU and PU regions were found to depend on geographical constraints and socio-economic factors. Quantification of urban growth spatial-temporal patterns, as conducted here contributes towards the understanding of exposure and vulnerability of people and infrastructures to natural hazards, as well as the evolving trends for assessment under projected urbanization conditions. This will underpin better risk assessment efforts for present and future planning.

  6. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  7. Risk analysis of underground infrastructures in urban areas

    International Nuclear Information System (INIS)

    Cagno, Enrico; De Ambroggi, Massimiliano; Grande, Ottavio; Trucco, Paolo

    2011-01-01

    The paper presents an integrated approach for vulnerability and resilience analysis for underground infrastructures, i.e. a societal risk analysis of the failures of underground services for an urban area. The approach is based on the detailed study of (1) domino-effects for the components of a single infrastructure and for a given set of infrastructures interoperated and/or belonging to the same area; (2) risk and vulnerability analysis of a given area; (3) identification of a set of intervention guidelines, in order to improve the overall system resilience. The use of an integrated (interoperability and area) approach, breaking down the analysis area extent into sub-areas and assessing the dependencies among sub-areas both in terms of interoperability and damage propagation of critical infrastructures, demonstrates a useful advantage in terms of resilience analysis, more consistent with the 'zoned' nature of failures of the underground infrastructures. An applied case, describing the interoperability and damage propagation analysis with the evaluation of time-dependency for the infrastructures and targets and of different kinds of interventions of the underground infrastructures of a town, is presented for this purpose.

  8. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  9. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  10. Assessing the Vulnerability of Agriculture to Climate Change in Jordan

    Science.gov (United States)

    Khresat, Sa'eb; Shraidaeh, Fadi; Maddat, Amer

    2015-04-01

    Climate change represents one of the greatest environmental, social and economic threats facing Jordan. In particular, the combined effects of climate change and water scarcity threaten to affect food and water resources that are critical for livelihoods in Jordan. This is especially true for those communities who live in the dryland area in the country and who rely wholly on rain-fed agriculture. The exact nature and extent of the impact of climate change on temperature and precipitation distribution pattern remain uncertain and it is the poor and vulnerable who will be the most susceptible to climate change adverse effects. A vulnerability assessment of rain fed agriculture to climate change and variability in semi-arid parts of Jordan was conducted in 2014. The purpose of this study is to assess the vulnerability and resilience of the most vulnerable groups where rainfed and irrigated agriculture is practiced. Also, the study focused on quantifying the impacts on agricultural productivity in response to climate change. This will help policymakers and researchers better understand and anticipate the likely impacts of climate change on agriculture and on vulnerable communities in Jordan. Also, it will provide them with tools to identify and implement appropriate adaptation strategies. The data used includes; Representative Concentration Pathways (RCPs), RCP 4.5 and RCP 8.5 adopted by the IPCC for its fifth Assessment Report (AR5). Those pathways were used for climate modeling. A decision support system (DSSAT) for agricultural production was used to assess the impact of climate changes on agricultural production. This approach was used for the Identification of climate change risk and their impacts on Agriculture. Outputs from models are used to assess the vulnerability of farmers and crops to climate and socio-economic change by estimating their sensitivity and capacity to adapt to external factors as a means of identifying what causes the differences in their

  11. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  12. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  13. Climate change & extreme weather vulnerability assessment framework.

    Science.gov (United States)

    2012-12-01

    The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...

  14. Vulnerability assessment to Drought in Various Provinces, approach towards risk management in the country

    Directory of Open Access Journals (Sweden)

    F. Nasrnia

    2016-05-01

    deal with drought in the community and reflect the effects of drought on people's ability to cope with the event. The physical vulnerability is related to the characteristics and the structure of society, infrastructure and services that are the result of the damage caused by drought. In the present study, the economic dimension of vulnerability, including GDP per capita, value added in agriculture, value added in industry and the impact of drought on the GDP. Under the criteria of social vulnerability, population density, population growth, the rate of literacy, vulnerable populations, the costs of health and safety and the impact of drought on employment were considered. The physical dimensions of vulnerability include the rate of irrigated land and road density since the objective of this study was to assess vulnerability to drought in various provinces of the country, the required data for all provinces except for Alborz province was collected in 1391 from intelligence sources. To determine the importance of different dimensions of vulnerability as well as the sub-phase in each dimension, the questionnaire was used for paired comparisons. As for the tens of experts, specialists and professionals who have expertise using the Delphi method is incorporated. In general, the importance of physical vulnerability is more than economic and social vulnerability. On the other hand, according to the results the economic and social vulnerability is important, too. The results of this study showed that the importance of the physical vulnerability was more than the economic and social vulnerability and economic vulnerability and social importance were the same. In the economic vulnerability sub-criteria of per capita GDP, in the social vulnerability sub-criteria of population density and in the physical vulnerability sub-criteria of road density have the most importance. These findings may reflect the fact that when drought occurs, access to infrastructure, services and markets

  15. How urban system vulnerabilities to flooding could be assessed to improve resilience and adaptation in spatial planning

    Science.gov (United States)

    Pasi, Riccardo; Viavattene, Christophe; La Loggia, Goffredo

    2016-04-01

    Natural hazards damage assets and infrastructure inducing disruptions to urban functions and key daily services. These disruptions may be short or long with a variable spatial scale of impact. From an urban planning perspective, measuring these disruptions and their consequences at an urban scale is fundamental in order to develop more resilient cities. Whereas the assessment of physical vulnerabilities and direct damages is commonly addressed, new methodologies for assessing the systemic vulnerability at the urban scale are required to reveal these disruptions and their consequences. Physical and systemic vulnerability should be measured in order to reflect the multifaceted fragility of cities in the face of external stress, both in terms of the natural/built environment and socio-economic sphere. Additionally, a systemic approach allows the consideration of vulnerability across different spatial scales, as impacts may vary and be transmitted across local, regional or national levels. Urban systems are spatially distributed and the nature of this can have significant effects on flood impacts. The proposed approach identifies the vulnerabilities of flooding within urban contexts, including both in terms of single elementary units (buildings, infrastructures, people, etc.) and systemic functioning (urban functions and daily life networks). Direct losses are appraised initially using conventional methodologies (e.g. depth-damage functions). This aims to both understand the spatial distribution of physical vulnerability and associated losses and, secondly, to identify the most vulnerable building types and ways to improve the physical adaptation of our cities, proposing changes to building codes, design principles and other municipal regulation tools. The subsequent systemic approach recognises the city as a collection of sub-systems or functional units (such as neighbourhoods and suburbs) providing key daily services for inhabitants (e.g. healthcare facilities

  16. Structural vulnerability in transmission systems: Cases of Colombia and Spain

    International Nuclear Information System (INIS)

    Correa, Gabriel J.; Yusta, José M.

    2014-01-01

    Highlights: • Vulnerability analysis of transmission electric systems in Colombia and Spain. • Based on scale-free graph statistic indexes. • Evaluating both current conditions and expansion plans of infrastructures. • Comparison of random error and deliberate attack tolerance evaluation. - Abstract: In this paper the authors apply methodological strategies for the structural vulnerability assessment in high voltage power networks based upon the combination of power flow models and scale-free graph statistic indexes. Thus, it is possible to study risk scenarios based on events that may trigger cascading failures within a power system. The usefulness of graph theory techniques has been validated on previous works of the authors, and may be applied in analysis of the vulnerability of different power electric networks. A case study for vulnerability analysis is carried out through methodologies that allow comparison on random error and deliberate attack tolerance evaluation in transmission electric systems from countries like Colombia and Spain. Such vulnerability assessment methodology takes into account the current conditions of the power networks (base case), as well as the impact of expansion plans into infrastructures as defined by their governments. Consequently, the authors show the advantage on the use of graph theory based techniques for vulnerability analysis of electrical power systems

  17. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    Science.gov (United States)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  18. Vulnerability of Forests in India: A National Scale Assessment.

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  19. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  20. DETERMINANTS OF RISK ASSESSMENT PROCESS IN CRITICAL ENERGY INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Przemysław Borkowski

    2016-06-01

    Full Text Available Article deals with the problem of risk assessment in critical energy infrastructure. Firstly the critical infrastructure in energy sector is discussed than risk identification methodology for application to critical infrastructure is proposed. Specific conditions resulting from features of critical infrastructure are addressed in the context of risk assessment procedure. The limits of such a procedure are outlined and critical factors influencing different stages of risk assessment process are researched in view of specificity of the sector.

  1. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  2. The effects of `non-infrastructural' measures to improve the safety of vulnerable road users : a review of international findings, prepared for the OECD Scientific Expert Group "Safety of vulnerable road users".

    NARCIS (Netherlands)

    Hagenzieker, M.P.

    1997-01-01

    This report reviews the evaluated effects of what can be called `non-infrastructural measures' to improve the safety of vulnerable road users. Three selected areas are discussed: education and training, measures to enhance visibility and conspecuity, and protective devices for bicyclists. Other

  3. CALTRANS CLIMATE CHANGE VULNERABILITY ASSESSMENTS

    Science.gov (United States)

    2018-01-01

    The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

  4. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  5. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  6. HEPA Filter Vulnerability Assessment

    International Nuclear Information System (INIS)

    GUSTAVSON, R.D.

    2000-01-01

    This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection

  7. Assessment of the vulnerability and the resilience of the population at risk of multi-hazard: a support to geo-risk management in Central Africa

    Science.gov (United States)

    Michellier, Caroline; Kervyn, François; Tréfon, Théodore; Wolff, Eléonore

    2013-04-01

    GeoRisCA is a project which aims at studying the geo-risk in the Kivu region (DRC, Rwanda, Burundi), in order to support risk management. The approach developed in GeoRisCA combines methodologies from various disciplines, which will allow the analyses of seismic, volcanic and mass-movement hazards and the vulnerability assessment of the threatened elements. Vulnerability is a complex concept which is commonly defined as the susceptibility of the population, the infrastructures and the natural ecosystems to suffer from damages if a hazard occurs. The densely populated area extended from the North Kivu province in Democratic Republic of the Congo (DRC) to North Burundi and East Rwanda is vulnerable to several geohazards, such as landslides triggered by geodynamical processes (climate, seismicity, volcanism) and possibly worsen by anthropic actions. Located in the East African rift valley, the region is also characterized by a strong seismicity, with increasing people and infrastructure exposed. In addition, east DRC hosts the two most active African volcanoes: Nyiragongo and Nyamulagira. Their activity can have serious impacts, as in 2002 when Nyiragongo directly endangers the ~800.000 inhabitants of Goma city, located ~15 km to the south. Linked to passive volcanic degassing, SO2 and CO2 discharge may also increase the population vulnerability(morbidity, mortality). Focusing specifically on this region, the vulnerability assessment methodology developed in GeoRisCA takes into account "exposure to perturbations" and "adaptive capacity or resilience" of the vulnerable systems. On one hand, the exposure is identified as the potential degree of loss of a given element or set of elements at risk; i.e., the susceptibility of people, infrastructures and buildings with respect to a hazard (social vulnerability). It focuses mainly on land use, and on demographic and socio-economic factors that increase or attenuate the impacts of hazards events on local populations. On the

  8. Cyber Vulnerabilities Within Critical Infrastructure: The Flaws of Industrial Control Systems in the Oil and Gas Industry

    Science.gov (United States)

    Alpi, Danielle Marie

    The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.

  9. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  10. Formal Vulnerability Assessment of a maritime transportation system

    International Nuclear Information System (INIS)

    Berle, Oyvind; Asbjornslett, Bjorn Egil; Rice, James B.

    2011-01-01

    World trade increasingly relies on longer, larger and more complex supply chains, where maritime transportation is a vital backbone of such operations. Long and complex supply chain systems are more prone to being vulnerable, though through reviews, no specific methods have been found to assess vulnerabilities of a maritime transportation system. Most existing supply chain risk assessment frameworks require risks to be foreseen to be mitigated, rather than giving transportation systems the ability to cope with unforeseen threats and hazards. In assessing cost-efficiency, societal vulnerability versus industrial cost of measures should be included. This conceptual paper presents a structured Formal Vulnerability Assessment (FVA) methodology, seeking to transfer the safety-oriented Formal Safety Assessment (FSA) framework into the domain of maritime supply chain vulnerability. To do so, the following two alterations are made: (1) The focus of the assessment is defined to ensure the ability of the transportation to serve as a throughput mechanism of goods, and to survive and recover from disruptive events. (2) To cope with low-frequency high-impact disruptive scenarios that were not necessarily foreseen, two parallel tracks of risk assessments need to be pursued-the cause-focused risk assessment as in the FSA, and a consequence-focused failure mode approach.

  11. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    Science.gov (United States)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the

  12. Reliability assessment of power pole infrastructure incorporating deterioration and network maintenance

    International Nuclear Information System (INIS)

    Ryan, Paraic C.; Stewart, Mark G.; Spencer, Nathan; Li, Yue

    2014-01-01

    There is considerable investment in timber utility poles worldwide, and there is a need to examine the structural reliability and probability based management optimisation of these power distribution infrastructure elements. The work presented in this paper builds on the existing studies in this area through assessment of both treated and untreated timber power poles, with the effects of deterioration and network maintenance incorporated in the analysis. This more realistic assessment approach, with deterioration and maintenance considered, was achieved using event-based Monte Carlo simulation. The output from the probabilistic model is used to illustrate the importance of considering network maintenance in the time-dependent structural reliability assessment of timber power poles. Under wind load, treated and untreated poles designed and maintained in accordance with existing Australian standards were found to have similar failure rates. However, untreated pole networks required approximately twice as many maintenance based pole replacements to sustain the same level of reliability. The effect of four different network maintenance strategies on infrastructure performance was also investigated herein. This assessment highlighted the fact that slight alterations to network maintenance practices can lead to significant changes in performance of timber power pole networks. - Highlights: • A time-dependent structural reliability model was developed for timber power poles. • Deterioration and network maintenance were incorporated into this event based model. • Network maintenance had a significant impact on power pole wind vulnerability. • Treated and untreated poles designed to Australian standards had similar reliability. • Minor alterations to maintenance strategies had large effects on network performance

  13. Water Resources Vulnerability Assessment Accounting for Human Influence

    Science.gov (United States)

    Mehran, A.; AghaKouchak, A.

    2014-12-01

    Reservoirs are one of the main infrastructures that provide resilience against extremes (e.g., floods and droughts) and they play a key role in water resources management. Based on International Commission of Large Dams (ICOLD 2003) records, the total volume of reservoirs is over 6200 km3, which is twice larger than the global annual water use estimated as 3000 km3. Just a simple comparison of the two numbers indicates the importance of reservoirs and their role in providing resilience for water security. On the other hand, man-made reservoirs change the water distribution throughout the year. Most climate change impact studies ignore the role of reservoirs in water availability studies. However, water availability cannot be properly assessed without a thorough assessment of reservoir conditions. By combining classical methods for climate variability assessment (top-down approach) and influence assessment (bottom-up approach), this study offers a hybrid framework that integrates different drivers of water storage vulnerability. Final index is termed as the Multivariate Standardized Reliability and Resilience Index (MSRRI). This index investigates the adaptive capacity of the reservoir and exposure of the system to variable conditions. MSRRI has been investigated over several major reservoirs in Australia and California, United States. This presentation reviews recent findings and discusses reservoir conditions in Australia and California using MSRRI under different climatic change scenarios.

  14. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  15. Homeland Security -- Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2002-01-01

    This report assesses the impact of the September 11, 2001 attacks on public and private information infrastructures in the context of critical infrastructure protection, continuity of operations (COOP...

  16. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  17. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Science.gov (United States)

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA) announces that the TSA Maritime Self-Assessment Risk Module (TMSARM), developed to support the United States...

  18. Energy infrastructure in India: Profile and risks under climate change

    DEFF Research Database (Denmark)

    Garg, Amit; Naswa, Prakriti; Shukla, P.R.

    2015-01-01

    risks to energy infrastructures in India and details two case studies - a crude oil importing port and a western coast railway transporting coal. The climate vulnerability of the port has been mapped using an index while that of the railway has been done through a damage function for RCP 4.5.0 and 8.......5 scenarios. Our analysis shows that risk management through adaptation is likely to be very expensive. The system risks can be even greater and might adversely affect energy security and access objectives. Aligning sustainable development and climate adaptation measures can deliver substantial co......-benefits. The key policy recommendations include: i) mandatory vulnerability assessment to future climate risks for energy infrastructures; ii) project and systemic risks in the vulnerability index; iii) adaptation funds for unmitigated climate risks; iv) continuous monitoring of climatic parameters...

  19. NGNP Infrastructure Readiness Assessment: Consolidation Report

    International Nuclear Information System (INIS)

    Castle, Brian K.

    2011-01-01

    The Next Generation Nuclear Plant (NGNP) project supports the development, demonstration, and deployment of high temperature gas-cooled reactors (HTGRs). The NGNP project is being reviewed by the Nuclear Energy Advisory Council (NEAC) to provide input to the DOE, who will make a recommendation to the Secretary of Energy, whether or not to continue with Phase 2 of the NGNP project. The NEAC review will be based on, in part, the infrastructure readiness assessment, which is an assessment of industry's current ability to provide specified components for the FOAK NGNP, meet quality assurance requirements, transport components, have the necessary workforce in place, and have the necessary construction capabilities. AREVA and Westinghouse were contracted to perform independent assessments of industry's capabilities because of their experience with nuclear supply chains, which is a result of their experiences with the EPR and AP-1000 reactors. Both vendors produced infrastructure readiness assessment reports that identified key components and categorized these components into three groups based on their ability to be deployed in the FOAK plant. The NGNP project has several programs that are developing key components and capabilities. For these components, the NGNP project have provided input to properly assess the infrastructure readiness for these components.

  20. NGNP Infrastructure Readiness Assessment: Consolidation Report

    Energy Technology Data Exchange (ETDEWEB)

    Brian K Castle

    2011-02-01

    The Next Generation Nuclear Plant (NGNP) project supports the development, demonstration, and deployment of high temperature gas-cooled reactors (HTGRs). The NGNP project is being reviewed by the Nuclear Energy Advisory Council (NEAC) to provide input to the DOE, who will make a recommendation to the Secretary of Energy, whether or not to continue with Phase 2 of the NGNP project. The NEAC review will be based on, in part, the infrastructure readiness assessment, which is an assessment of industry's current ability to provide specified components for the FOAK NGNP, meet quality assurance requirements, transport components, have the necessary workforce in place, and have the necessary construction capabilities. AREVA and Westinghouse were contracted to perform independent assessments of industry's capabilities because of their experience with nuclear supply chains, which is a result of their experiences with the EPR and AP-1000 reactors. Both vendors produced infrastructure readiness assessment reports that identified key components and categorized these components into three groups based on their ability to be deployed in the FOAK plant. The NGNP project has several programs that are developing key components and capabilities. For these components, the NGNP project have provided input to properly assess the infrastructure readiness for these components.

  1. Assessing local vulnerability to climate change in Ecuador

    OpenAIRE

    Fernandez, Mario Andres; Bucaram, Santiago J.; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a c...

  2. Seismic and wind vulnerability assessment for the GAR-13 global risk assessment

    OpenAIRE

    Yamín Lacouture, Luis Eduardo; Hurtado Chaparro, Alvaro Ivan; Barbat Barbat, Horia Alejandro; Cardona Arboleda, Omar Dario

    2014-01-01

    A general methodology to evaluate vulnerability functions suitable for a probabilistic global risk assessment is proposed. The methodology is partially based in the methodological approach of the Multi-hazard Loss Estimation Methodology (Hazus) developed by the Federal Emergency Management Agency (FEMA). The vulnerability assessment process considers the resolution, information and limitations established for both the hazard and exposure models adopted. Seismic and wind vulnerability function...

  3. Comparative studies of groundwater vulnerability assessment

    Science.gov (United States)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  4. Flood Risk Assessment on Selected Critical Infrastructure in Kota Marudu Town, Sabah, Malaysia

    Directory of Open Access Journals (Sweden)

    Ayog Janice Lynn

    2017-01-01

    Full Text Available This study investigates the risk of flood on selected critical infrastructure in a flood-prone catchment in Sabah, Malaysia. Kota Marudu, located in the Bandau floodplain, one of the Sabah’s northern water catchments, was selected as the study site due to its frequent flood occurrence and large floodplain coverage. Two of its largest rivers, namely Sungai Bongon and Sungai Bandau, tends to flood during rainy season and cause temporary displacements of thousands of people living in the floodplain. A total of 362 respondents participated in the questionnaire survey in order to gather information on historical flood occurrence. Three flood depth groups were determined, which are 1 less than 0.3 meter, 2 0.3 – 0.6 meter and 3 more than 0.6 meter, while three categories of critical infrastructure were defined, namely transportation system, communication system and buildings. It is found that the transportation system encounters the most severe impact as flood inundation increases, where 92% of the respondents believe that the transportation access should be abandoned when flood depth is more than 0.6m. The findings of this study will be used for detailed risk assessment, specifically on the vulnerability of the critical infrastructures to flood in this floodplain.

  5. Climate change vulnerability assessment in Georgia

    Science.gov (United States)

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  6. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  7. Review Article: A comparison of flood and earthquake vulnerability assessment indicators

    Science.gov (United States)

    de Ruiter, Marleen C.; Ward, Philip J.; Daniell, James E.; Aerts, Jeroen C. J. H.

    2017-07-01

    In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

  8. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf.

    Directory of Open Access Journals (Sweden)

    Jonathan A Hare

    Full Text Available Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region. These

  9. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf

    Science.gov (United States)

    Hare, Jonathan A.; Morrison, Wendy E.; Nelson, Mark W.; Stachura, Megan M.; Teeters, Eric J.; Griffis, Roger B.; Alexander, Michael A.; Scott, James D.; Alade, Larry; Bell, Richard J.; Chute, Antonie S.; Curti, Kiersten L.; Curtis, Tobey H.; Kircheis, Daniel; Kocik, John F.; Lucey, Sean M.; McCandless, Camilla T.; Milke, Lisa M.; Richardson, David E.; Robillard, Eric; Walsh, Harvey J.; McManus, M. Conor; Marancik, Katrin E.; Griswold, Carolyn A.

    2016-01-01

    Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability) and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region). These results will inform

  10. Cyber and physical infrastructure interdependencies.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  11. Assessing local vulnerability to climate change in Ecuador.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.

  12. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  13. Vulnerability assessments as a political creation: tsunami management in Portugal.

    Science.gov (United States)

    Pronk, Maartje; Maat, Harro; Crane, Todd A

    2017-10-01

    Vulnerability assessments are a cornerstone of contemporary disaster research. This paper shows how research procedures and the presentation of results of vulnerability assessments are politically filtered. Using data from a study of tsunami risk assessment in Portugal, the paper demonstrates that approaches, measurement instruments, and research procedures for evaluating vulnerability are influenced by institutional preferences, lines of communication, or lack thereof, between stakeholder groups, and available technical expertise. The institutional setting and the pattern of stakeholder interactions form a filter, resulting in a particular conceptualisation of vulnerability, affecting its operationalisation via existing methods and technologies and its institutional embedding. The Portuguese case reveals a conceptualisation that is aligned with perceptions prevalent in national government bureaucracies and the exclusion of local stakeholders owing to selected methodologies and assessment procedures. The decisions taken by actors involved in these areas affect how vulnerability is assessed, and ultimately which vulnerability reduction policies will be recommended in the appraisal. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  14. Fiscal Feasibility Assessment Applied to Transport Infrastructure Projects

    Energy Technology Data Exchange (ETDEWEB)

    Guilherme de Aragão, J.J.; Santos Fontes Pereira, L. dos; Yamashita, Y.; Brandão, R.

    2016-07-01

    The demand for transport infrastructure investment is a latent issue for several countries, mainly for developing countries. However, investments in major logistics projects should be carefully evaluated, in order that their deployment induces development without endangering fiscal sustainability by excessive public indebtedness. Fiscal accounting practices used currently in the feasibility studies of transport infrastructures in Brazil are very limited, as they do not consider indirect and induced effects of the infrastructure investment in the fiscal evaluation. In addition, the corresponding influence area has not an established delimitation method. The aim of the present paper is to develop a model for calculating economic and fiscal impacts of transport infrastructure investment projects that includes the direct, indirect and induced effects within a reference area do be determined. First, different project assessment guides in Brazil and abroad are examined with a special focus on the assessment of economic and fiscal impacts of the projects. Based on the assessment experience and on the definition of the fiscal balance of an infrastructure project, the next step sets up a framework for the calculation of the impacts, using more simplified data. (Author)

  15. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  16. Improving tag/seal technologies: the vulnerability assessment component

    International Nuclear Information System (INIS)

    Jones, J.L.

    1996-01-01

    The Department of Energy (DOE), specifically the Office of Nonproliferation and National Security, has sponsored the development of numerous tag and seal technologies for high-security/high-valued applications. One important component in this technology development effort has been the continuous integration of vulnerability assessments. The Idaho National Engineering Laboratory (INEL) has been the lead laboratory for vulnerability assessments of fiber-optic-based tag/seal technologies. This paper presents a brief historical overview and the current status of the DOE high-security tag/seal development program and discusses INEL's adversarial role and assessment philosophy. Verification testing criteria used to define ''successful'' tampering attempts/attacks are discussed. Finally, the advantages of integrating a vulnerability assessment into the development of commercial security tag/seals are presented

  17. An Integrated Method of Supply Chains Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Jiaguo Liu

    2016-01-01

    Full Text Available Supply chain vulnerability identification and evaluation are extremely important to mitigate the supply chain risk. We present an integrated method to assess the supply chain vulnerability. The potential failure mode of the supply chain vulnerability is analyzed through the SCOR model. Combining the fuzzy theory and the gray theory, the correlation degree of each vulnerability indicator can be calculated and the target improvements can be carried out. In order to verify the effectiveness of the proposed method, we use Kendall’s tau coefficient to measure the effect of different methods. The result shows that the presented method has the highest consistency in the assessment compared with the other two methods.

  18. Taking the uncertainty in climate-change vulnerability assessment seriously

    International Nuclear Information System (INIS)

    Patt, A.; Patt, A.; Klein, R.J.T.; Vega-Leinert, A. de la

    2005-01-01

    Climate-change vulnerability assessment has become a frequently employed tool, with the purpose of informing policy-makers attempting to adapt to global change conditions. However, we suggest that there are three reasons to suspect that vulnerability assessment often promises more certainty, and more useful results, than it can deliver. First, the complexity of the system it purports to describe is greater than that described by other types of assessment. Second, it is difficult, if not impossible, to obtain data to test proposed interactions between different vulnerability drivers. Third, the time scale of analysis is too long to be able to make robust projections about future adaptive capacity. We analyze the results from a stakeholder workshop in a European vulnerability assessment, and find evidence to support these arguments. (authors)

  19. Assessing the social vulnerability to malaria in Rwanda.

    Science.gov (United States)

    Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan

    2015-01-07

    Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria

  20. Method of Pentest Synthesis and Vulnerability Detection

    OpenAIRE

    Hahanova Irina Vitalyevna

    2012-01-01

    The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

  1. Assessing Hazard Vulnerability, Habitat Conservation, and Restoration for the Enhancement of Mainland China's Coastal Resilience

    Science.gov (United States)

    Sajjad, Muhammad; Li, Yangfan; Tang, Zhenghong; Cao, Ling; Liu, Xiaoping

    2018-03-01

    Worldwide, humans are facing high risks from natural hazards, especially in coastal regions with high population densities. Rising sea levels due to global warming are making coastal communities' infrastructure vulnerable to natural disasters. The present study aims to provide a coupling approach of vulnerability and resilience through restoration and conservation of lost or degraded coastal natural habitats to reclamation under different climate change scenarios. The integrated valuation of ecosystems and tradeoffs model is used to assess the current and future vulnerability of coastal communities. The model employed is based on seven different biogeophysical variables to calculate a natural hazard index and to highlight the criticality of the restoration of natural habitats. The results show that roughly 25% of the coastline and more than 5 million residents are in highly vulnerable coastal areas of mainland China, and these numbers are expected to double by 2100. Our study suggests that restoration and conservation in recently reclaimed areas have the potential to reduce this vulnerability by 45%. Hence, natural habitats have proved to be a great defense against coastal hazards and should be prioritized in coastal planning and development. The findings confirm that natural habitats are critical for coastal resilience and can act as a recovery force of coastal functionality loss. Therefore, we recommend that the Chinese government prioritizes restoration (where possible) and conservation of the remaining habitats for the sake of coastal resilience to prevent natural hazards from escalating into disasters.

  2. Southern African Coastal vulnerability assessment

    CSIR Research Space (South Africa)

    Rautenbach, C

    2015-10-01

    Full Text Available or business. The CSIR coastal systems group uses specialist skills in coastal engineering, geographic engineering systems and numerical modelling to assess and map vulnerable coastal ecosystems to develop specific adaptation measures and coastal protection...

  3. Assessment of Chemical and Radiological Vulnerabilities

    International Nuclear Information System (INIS)

    SETH, S.S.

    2000-01-01

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities

  4. Vulnerability of solar energy infrastructure and output to extreme events: Climate change implications (Conference paper)

    OpenAIRE

    Patt, A.; Pfenninger, S.; Lilliestam, J.

    2010-01-01

    This paper explores the potential vulnerability of solar energy systems to future extreme event risks as a consequence of climate change. We describe the three main technologies likely to be used to harness sunlight -- thermal heating, photovoltaic (PV), and concentrating solar power (CSP) -- and identify critical extreme event vulnerabilities for each one. We then compare these vulnerabilities with assessments of future changes in extreme event risk levels. We do not identify any vulnerabili...

  5. Automating Flood Hazard Mapping Methods for Near Real-time Storm Surge Inundation and Vulnerability Assessment

    Science.gov (United States)

    Weigel, A. M.; Griffin, R.; Gallagher, D.

    2015-12-01

    Storm surge has enough destructive power to damage buildings and infrastructure, erode beaches, and threaten human life across large geographic areas, hence posing the greatest threat of all the hurricane hazards. The United States Gulf of Mexico has proven vulnerable to hurricanes as it has been hit by some of the most destructive hurricanes on record. With projected rises in sea level and increases in hurricane activity, there is a need to better understand the associated risks for disaster mitigation, preparedness, and response. GIS has become a critical tool in enhancing disaster planning, risk assessment, and emergency response by communicating spatial information through a multi-layer approach. However, there is a need for a near real-time method of identifying areas with a high risk of being impacted by storm surge. Research was conducted alongside Baron, a private industry weather enterprise, to facilitate automated modeling and visualization of storm surge inundation and vulnerability on a near real-time basis. This research successfully automated current flood hazard mapping techniques using a GIS framework written in a Python programming environment, and displayed resulting data through an Application Program Interface (API). Data used for this methodology included high resolution topography, NOAA Probabilistic Surge model outputs parsed from Rich Site Summary (RSS) feeds, and the NOAA Census tract level Social Vulnerability Index (SoVI). The development process required extensive data processing and management to provide high resolution visualizations of potential flooding and population vulnerability in a timely manner. The accuracy of the developed methodology was assessed using Hurricane Isaac as a case study, which through a USGS and NOAA partnership, contained ample data for statistical analysis. This research successfully created a fully automated, near real-time method for mapping high resolution storm surge inundation and vulnerability for the

  6. Assessing internal biophysical vulnerability to landslide hazards - a nested catchment approach: Xiangxi Watershed / Three Gorges Reservoir

    Science.gov (United States)

    Wiegand, Matthias; Seeber, Christoph; Hartmann, Heike; Xiang, Wei; King, Lorenz

    2010-05-01

    . Dwellings and road infrastructure, chosen as high priorities, are captured based on various data like: high resolution satellite imagery, topographic information and field investigation. Currently demographic data is available only at administrative county level - therefore buildings will serve as spatial proxy for population density. Elements at risk will be classified into categories and susceptibility factors will be identified for sampled groups. The envisaged model defines the susceptibility of a certain element at risk not only by the element itself - it assumes that the specific susceptibility is also strongly influenced by the particular surroundings. The susceptibility of a certain building, as for instance, will be defined by the structure type and condition, and in addition or as proxy, specific site characteristics like: slope angle and aspect, soil type and erodibility, lithology, proximity to streams, proximity to the Three Gorges reservoir, depth to groundwater, land use change and dissect intensity, if feasible. Each factor with potential influence on susceptibility will go through a GIS based factor weighting procedure as part of the quantitative vulnerability model. Holistic, "cross scale integrated" vulnerability assessment models need to integrate environmental, social/ cultural and economic aspects. Therefore the proposed vulnerability assessment model must be seen as a starting point for a conceptual framework, and might serve as stimulus to local disaster- and resources management systems. Furthermore the GIS based model enables the opportunity to be linked and refined within the local spatial data infrastructure initiatives.

  7. Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems

    DEFF Research Database (Denmark)

    Nidd, Michael; Ivanova, Marieta Georgieva; Probst, Christian W.

    2015-01-01

    Assessing risk in cloud infrastructures is difficult. Typical cloud infrastructures contain potentially thousands of nodes that are highly interconnected and dynamic. Another important component is the set of human actors who get access to data and computing infrastructure. The cloud infrastructure...... exercise for cloud infrastructures using the socio-technical model developed in the TRESPASS project; after showing how to model typical components of a cloud infrastructure, we show how attacks are identified on this model and discuss their connection to risk assessment. The technical part of the model...... is extracted automatically from the configuration of the cloud infrastructure, which is especially important for systems so dynamic and complex....

  8. Coping with subjectivity in vulnerability assessment

    International Nuclear Information System (INIS)

    Renis, T.A.; Cardwell, R.G.

    1988-01-01

    Vulnerability assessment models are widely used to systematically evaluate the performance of complex safeguards systems against a variety of threats. These models require varying levels of detail and input data about the physical design of a facility and its safeguards operations and procedures. However, to evaluate safeguards effectiveness and give a performance rating, these models require additional performance data reflecting probabilities of detection, assessment, interruption, and neutralization, as well as the associated times for various adversary scenarios. These data may be attained from equipment design specifications, laboratory testing, expert judgment, or component testing. Regardless of how these data are obtained, they are inherently subjective. This paper addresses the uses of various vulnerability assessment models and the nature of subjectivity in those models. The paper also describes methods for coping with subjective data

  9. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  10. A Multimethod Approach towards Assessing Urban Flood Patterns and Its Associated Vulnerabilities in Singapore

    Directory of Open Access Journals (Sweden)

    Winston T. L. Chow

    2016-01-01

    Full Text Available We investigated flooding patterns in the urbanised city-state of Singapore through a multimethod approach combining station precipitation data with archival newspaper and governmental records; changes in flash floods frequencies or reported impacts of floods towards Singapore society were documented. We subsequently discussed potential flooding impacts in the context of urban vulnerability, based on future urbanisation and forecasted precipitation projections for Singapore. We find that, despite effective flood management, (i significant increases in reported flash flood frequency occurred in contemporary (post-2000 relative to preceding (1984–1999 periods, (ii these flash floods coincide with more localised, “patchy” storm events, (iii storms in recent years are also more intense and frequent, and (iv floods result in low human casualties but have high economic costs via insurance damage claims. We assess that Singapore presently has low vulnerability to floods vis-à-vis other regional cities largely due to holistic flood management via consistent and successful infrastructural development, widespread flood monitoring, and effective advisory platforms. We conclude, however, that future vulnerabilities may increase from stresses arising from physical exposure to climate change and from demographic sensitivity via rapid population growth. Anticipating these changes is potentially useful in maintaining the high resilience of Singapore towards this hydrometeorological hazard.

  11. Impacts of Flooding on Road Transport Infrastructure In Enugu Metropolitan City, Nigeria.

    OpenAIRE

    Iloeje, A. F; Aniagolu, C. O

    2015-01-01

    An assessment of the impact of flooding on the road transport infrastructure in Enugu Metropolis was carried out using survey research method. Thirty impact indicators were rated by the respondents against six impact dimensions of population, vulnerability of activities, frequency, intensity, extent and risk. Three null hypotheses were postulated and tested. One sample t-test was used for testing hypothesis one which stated that damages to the road transport infrastructure resulti...

  12. Hazard risk and vulnerability assessment : Regional District of Nanaimo : final report

    International Nuclear Information System (INIS)

    2006-06-01

    A Hazard Risk and Vulnerability Assessment (HRVA) is a mandated regulatory requirement in British Columbia that requires local authorities to prepare emergency plans that reflect the local authority's assessment of the relative risk of occurrence and the potential impact on people and property of the hazards, emergencies or disasters that could affect the jurisdictional area for which the local authority has responsibility. This report constituted an HRVA for the Regional District of Nanaimo, British Columbia. It presented the study scope and methodology and provided an overview of the Regional District of Nanaimo. This included information on the setting, demographics, and economy. Next, it discussed social vulnerability; critical response and recovery facilities; and critical infrastructure such as water, energy, telecommunications and transportation. A summary of the Regional District of Nanaimo's response capabilities that were considered when assessing the Regional District's overall risk to the hazards was also presented. Response capabilities were discussed with reference to fire and rescue; police; ambulance; and search and rescue. Emergency support and preparedness organizations were also identified. These included the Emergency Coordination Centre, environmental services, emergency social services, amateur radio and health authorities. Last, 33 hazards that could affect the Regional District of Nanaimo were identified and discussed. The study identified the following hazards as high risk: flooding; forest fires and wildland urban interface fires; and human diseases and pandemic. It was recommended that the advancement of business continuity planning in the Regional District of Nanaimo would help to reduce the impact of a possible human disease and pandemic risk outbreak affecting the population. 75 refs., 25 figs., 14 tabs., 2 appendices

  13. Evaluation of Social Vulnerability to Natural Disasters on a County Scale in Henan Province

    Institute of Scientific and Technical Information of China (English)

    Shanfeng HE; Liping DU; Xiuhua GAO

    2016-01-01

    Social vulnerability evaluation is of important significance to analyzing risks of natural disasters to human society and economy. By using expert investigation and AHP method,12 indicators from four aspects( population,economy,infrastructure and disaster prevention and mitigation capacity) are selected to assess social vulnerability to natural disasters on a county scale in Henan Province. The results show that the population vulnerability and economic vulnerability to natural disasters in the eastern region is generally higher than in the western region,while the areas with high infrastructure vulnerability are mainly located in the northwest; the disaster prevention and mitigation capacity in northwest is higher than in east and south,and this capacity of various districts is obviously higher than that of counties; in terms of the spatial pattern,social vulnerability to natural disasters is roughly higher in a belt from northeast to southwest,and lower on both sides of the belt. The results can provide scientific basis for disaster risk management and disaster prevention and mitigation planning in Henan Province.

  14. Modelling self-assessed vulnerability to HIV and its associated ...

    African Journals Online (AJOL)

    Background: Globally, individuals' self-assessment of vulnerability to HIV infection is important to maintain safer sexual behaviour and reduce risky behaviours. However, determinants of self-perceived risk of HIV infection are not well documented and differ. We assessed the level of self-perceived vulnerability to HIV ...

  15. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27 Section 1730.27 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...

  16. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  17. The Gerici project: management of risks related to climate change for infrastructures. First lessons of three years of vulnerability study experience

    International Nuclear Information System (INIS)

    Guerard, H.; Ray, M.

    2007-01-01

    Climate change considerably modifies the vulnerability of infrastructures, and such concepts as the 'hundred-year flood' can even become dangerous in this new context. Interesting conclusions were reached for contracting authorities and a specific tool developed for infrastructure operators resulting from three years of research carried out after labelling by the RGCU (civil engineering and urban network) and with co-financing by the public works ministry. This project, managed by Egis (Scetauroute and Bceom) groups Sanef, ASF, Meteo-France, LCPC and Esri France. The article describes the stages in the procedure and the geographical information system (SIG), a user-friendly and transposable support tool for technical and strategic investigations. (authors)

  18. Infrastructure Damage/Fragility Models and Data Quality Issues Associated with Department of Defense Climate Vulnerability and Impact Assessment

    Science.gov (United States)

    2015-01-26

    Jeffrey Donnelly, Richard Moss,  Joseph Donoghue, Steve Kish, Jim Elsner, Robert Evans, David LaBranche, Justin LaRose, Adam  Parris,  Chris  Weaver...Garrow, L.,  Higgins , M., and Meyer, M. (2013). ”Impacts of Climate Change on Scour‐ Vulnerable Bridges: Assessment Based on HYRISK.” J. Infrastruct...Adam Parris  NOAA Regional Integrated Sciences and  Assessments Program  Y  Chris  Weaver  U.S. Global Change Research Program  Y    83    Name

  19. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  20. A systems framework for national assessment of climate risks to infrastructure

    Science.gov (United States)

    Dawson, Richard J.; Thompson, David; Johns, Daniel; Wood, Ruth; Darch, Geoff; Chapman, Lee; Hughes, Paul N.; Watson, Geoff V. R.; Paulson, Kevin; Bell, Sarah; Gosling, Simon N.; Powrie, William; Hall, Jim W.

    2018-06-01

    Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue `Advances in risk assessment for climate change adaptation policy'.

  1. A systems framework for national assessment of climate risks to infrastructure

    Science.gov (United States)

    Thompson, David; Johns, Daniel; Darch, Geoff; Paulson, Kevin

    2018-01-01

    Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue ‘Advances in risk assessment for climate change adaptation policy’. PMID:29712793

  2. The Vulnerability Assessment Code for Physical Protection System

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2007-01-01

    To neutralize the increasing terror threats, nuclear facilities have strong physical protection system (PPS). PPS includes detectors, door locks, fences, regular guard patrols, and a hot line to a nearest military force. To design an efficient PPS and to fully operate it, vulnerability assessment process is required. Evaluating PPS of a nuclear facility is complicate process and, hence, several assessment codes have been developed. The estimation of adversary sequence interruption (EASI) code analyzes vulnerability along a single intrusion path. To evaluate many paths to a valuable asset in an actual facility, the systematic analysis of vulnerability to intrusion (SAVI) code was developed. KAERI improved SAVI and made the Korean analysis of vulnerability to intrusion (KAVI) code. Existing codes (SAVI and KAVI) have limitations in representing the distance of a facility because they use the simplified model of a PPS called adversary sequence diagram. In adversary sequence diagram the position of doors, sensors and fences is described just as the locating area. Thus, the distance between elements is inaccurate and we cannot reflect the range effect of sensors. In this abstract, we suggest accurate and intuitive vulnerability assessment based on raster map modeling of PPS. The raster map of PPS accurately represents the relative position of elements and, thus, the range effect of sensor can be easily incorporable. Most importantly, the raster map is easy to understand

  3. People at risk - nexus critical infrastructure and society

    Science.gov (United States)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross

  4. Assessment of groundwater vulnerability and sensitivity to pollution ...

    African Journals Online (AJOL)

    Groundwater pollution caused by human activity is a serious environmental problem in cities. Pollution vulnerability assessment of groundwater resources provides information on how to protect areas vulnerable to pollution. The present study is a detailed investigation of the potential for groundwater contamination through ...

  5. Assessing the likely impacts of climate change on infrastructure

    International Nuclear Information System (INIS)

    Holper, Paul; Nolan, Michael

    2007-01-01

    Full text: In 2005, the Victorian Government contracted CSIRO, Maunsell Australia and Phillips Fox to undertake an overview assessment of the likely impacts of climate change on the State's infrastructure, establish the categories of infrastructure most at risk and outline opportunities for adaptation responses. The Government released the assessment in May 2007. Climate change poses a significant risk to infrastructure and its owners, managers and long-term operators. The work was undertaken on the basis that it should not be assumed that future climate and its impacts will simply be an extension of what has been experienced in the past. Major infrastructure items have long useful life spans (20-100 years). A bridge built today is expected to still be in use in tens, if not hundreds, of years. This means that recognition of likely climate change impacts and appropriate adaptation measures should occur now. Recognition of the risks associated with climate change is a valuable first step towards better planning of new infrastructure investments and reducing potential damage to existing infrastructure.lnfrastructure types examined were water, power, telecommunications, transport and buildings. The climate change projections used in this report are based on CSIRO climate modelling, supported by findings from the Intergovernmental Panel on Climate Change. Climatic and other variables considered were temperature, rainfall, available moisture, humidity, winds, fire-weather frequency and intensity, solar radiation levels and sea-level rise. For each climate change variable identified, we described a worst-case impact for low and high climate change projections for the years 2030 and 2070. The assessment was made on the basis of 'business as usual' with no adaptation responses to climate change. The report also details the current governance structures associated with each infrastructure type. Overall, the report assessed the likely impact of climate change on

  6. California Statewide Plug-In Electric Vehicle Infrastructure Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Melaina, Marc; Helwig, Michael

    2014-05-01

    The California Statewide Plug-In Electric Vehicle Infrastructure Assessment conveys to interested parties the Energy Commission’s conclusions, recommendations, and intentions with respect to plug-in electric vehicle (PEV) infrastructure development. There are several relatively low-risk and high-priority electric vehicle supply equipment (EVSE) deployment options that will encourage PEV sales and

  7. Climate Vulnerability of Hydro-power infrastructure in the Eastern African Power Pool

    Science.gov (United States)

    Sridharan, Vignesh

    2017-04-01

    At present there is around 6000 MW of installed hydropower capacity in the Eastern African power pool (EAPP)[1]. With countries aggressively planning to achieve the Sustainable development goal (SDG) of ensuring access to affordable electricity for all, a three-fold increase in hydropower capacity is expected by 2040 [1]. Most of the existing and planned infrastructure lie inside the Nile River Basin. The latest assessment report (AR 5) from the Intergovernmental Panel on Climate Change (IPCC) indicates a high level of climatic uncertainty in the Nile Basin. The Climate Moisture index (CMI) for the Eastern Nile region and the Nile Equatorial lakes varies significantly across the different General Circulation Models (GCM)[2]. Such high uncertainty casts a shadow on the plans to expand hydropower capacity, doubting whether hydropower expansion can contribute to the goal of improving access to electricity or end up as sunk investments. In this assessment, we analyze adaptation strategies for national energy systems in the Eastern African Power Pool (EAPP), which minimize the regret that could potentially arise from impacts of a changed climate. An energy systems model of the EAPP is developed representing national electricity supply infrastructure. Cross border transmission and hydropower infrastructure is defined at individual project level. The energy systems model is coupled with a water systems management model of the Nile River Basin that calculates the water availability at different hydropower infrastructures under a range of climate scenarios. The results suggest that a robust adaptation strategy consisting of investments in cross border electricity transmission infrastructure and diversifying sources of electricity supply will require additional investments of USD 4.2 billion by 2050. However, this leads to fuel and operational cost savings of up to USD 22.6 billion, depending on the climate scenario. [1] "Platts, 2016. World Electric Power Plants Database

  8. Assessment of Road Infrastructures Pertaining to Malaysian Experience

    Directory of Open Access Journals (Sweden)

    Samsuddin Norshakina

    2016-01-01

    Full Text Available Road Infrastructures contribute towards many severe accidents and it needs supervision as to improve road safety levels. The numbers of fatalities have increased annually and road authority should seriously consider conducting programs or activities to periodically monitor, restore of improve road infrastructure. Implementation of road safety audits may reduce fatalities among road users and maintain road safety at acceptable standards. This paper is aimed to discuss the aspects of road infrastructure in Malaysia. The research signifies the impact of road hazards during the observations and the impact of road infrastructure types on road accidents. The F050 (Jalan Kluang-Batu Pahat road case study showed that infrastructure risk is closely related with number of accident. As the infrastructure risk increase, the number of road accidents also increase. It was also found that different road zones along Jalan Kluang-Batu Pahat showed different level of intersection volume due to number of road intersection. Thus, it is hoped that by implementing continuous assessment on road infrastructures, it might be able to reduce road accidents and fatalities among drives and the community.

  9. Vulnerability assessment and mitigation for the Chinese railway system under floods

    International Nuclear Information System (INIS)

    Hong, Liu; Ouyang, Min; Peeta, Srinivas; He, Xiaozheng; Yan, Yongze

    2015-01-01

    The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies are essential to the reliable functioning of the railway system. This article proposes a comprehensive methodology to quantitatively assess the railway system vulnerability under floods using historical data and GIS technology. The proposed methodology includes a network representation of the railway system, the generation of flood event scenarios, a method to estimate railway link vulnerability, and a quantitative vulnerability value computation approach. The railway system vulnerability is evaluated in terms of its service disruption related to the number of interrupted trains and the durations of interruption. A maintenance strategy to mitigate vulnerability is proposed that simultaneously considers link vulnerability and number of trains using it. Numerical experiments show that the flood-induced vulnerability of the proposed representation of the Chinese railway system reaches its maximum monthly value in July, and the proposed vulnerability mitigation strategy is more effective compared to other strategies. - Highlights: • We propose a methodology to assess flood-induced railway system vulnerability. • Railway system vulnerability is evaluated in terms of its service disruption. • Chinese railway system reaches its maximum monthly vulnerability in July. • We propose an effective maintenance strategy considering link vulnerability and burden

  10. A Systems-Based Risk Assessment Framework for Intentional Electromagnetic Interference (IEMI) on Critical Infrastructures.

    Science.gov (United States)

    Oakes, Benjamin Donald; Mattsson, Lars-Göran; Näsman, Per; Glazunov, Andrés Alayón

    2018-01-03

    Modern infrastructures are becoming increasingly dependent on electronic systems, leaving them more vulnerable to electrical surges or electromagnetic interference. Electromagnetic disturbances appear in nature, e.g., lightning and solar wind; however, they may also be generated by man-made technology to maliciously damage or disturb electronic equipment. This article presents a systematic risk assessment framework for identifying possible, consequential, and plausible intentional electromagnetic interference (IEMI) attacks on an arbitrary distribution network infrastructure. In the absence of available data on IEMI occurrences, we find that a systems-based risk assessment is more useful than a probabilistic approach. We therefore modify the often applied definition of risk, i.e., a set of triplets containing scenario, probability, and consequence, to a set of quadruplets: scenario, resource requirements, plausibility, and consequence. Probability is "replaced" by resource requirements and plausibility, where the former is the minimum amount and type of equipment necessary to successfully carry out an attack scenario and the latter is a subjective assessment of the extent of the existence of attackers who possess the motivation, knowledge, and resources necessary to carry out the scenario. We apply the concept of intrusion areas and classify electromagnetic source technology according to key attributes. Worst-case scenarios are identified for different quantities of attacker resources. The most plausible and consequential of these are deemed the most important scenarios and should provide useful decision support in a countermeasures effort. Finally, an example of the proposed risk assessment framework, based on notional data, is provided on a hypothetical water distribution network. © 2017 Society for Risk Analysis.

  11. A Comprehensive Assessment and Spatial Analysis of Vulnerability of China’s Provincial Economies

    Directory of Open Access Journals (Sweden)

    Chongqiang Ren

    2018-04-01

    Full Text Available Vulnerability theory is a fundamental scientific knowledge system in sustainable development, and vulnerability assessment is important in vulnerability studies. Economic vulnerability affects economic growth sustainability. Comprehensive assessment of economic vulnerability in the process of economic growth under the theoretical framework of vulnerability will provide a new perspective for vulnerability studies. Based on a vulnerability scoping diagram assessment model, this study selected 22 economic sensitivity indexes and 25 economic adaptability indexes from the economic, social, and nature–resource–environmental subsystems to comprehensively assess and spatially analyse the vulnerability of China’s provincial economies since the year 2000, while applying the entropy method, multilevel extension assessment, spatial measurement method, and geographic information system technology. The results showed the following: (1 There are great differences in the vulnerability of China’s provincial economies. Western China’s vulnerability is higher and the fluctuation range of economic vulnerability is larger. The vulnerability increased significantly based on spatial differential features; (2 Regional differences in economic vulnerability, mainly caused by differences within a region, increased gradually. Eastern and Western China showed the spatial pattern characteristics of prominent and reinforcing regional imbalance, while Central and Northeast China showed declining regional imbalance. The spatial structure evolution of economic vulnerability is characterized by a volatility curve, and regional separation and divergence are strengthened; (3 Growth of China’s provincial economies and economic vulnerability are related negatively. In Eastern, Central, and Northeast China, vulnerability of the provincial economies has a negative spillover effect on neighbouring provinces’ economic growth, while in Western China it has a slight positive

  12. Vulnerability assessment of atmospheric environment driven by human impacts.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  14. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  15. Cyberwarfare on the Electricity Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Murarka, N.; Ramesh, V.C.

    2000-03-20

    The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

  16. Climate Change Vulnerability Assessment for Idaho National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  17. Tsunami Hazard, Vulnerability and Risk assessment for the coast of Oman

    Science.gov (United States)

    Gonzalez, Mauricio; Aniel-Quiroga, Íñigo; Aguirre-Ayerbe, Ignacio; Álvarez-Gómez, José Antonio; MArtínez, Jara; Gonzalez-Riancho, Pino; Fernandez, Felipe; Medina, Raúl; Al-Yahyai, Sultan

    2016-04-01

    Tsunamis are relatively infrequent phenomena representing a greater threat than earthquakes, hurricanes and tornadoes, and causing the loss of thousands of human lives and extensive damage to coastal infrastructures around the world. Advances in the understanding and prediction of tsunami impacts allow the development of new methodologies in this field. This work presents the methodology that has been followed for developing the tsunami hazard, vulnerability and risk assessment for the coast of Oman, including maps containing the results of the process. Oman is located in the south eastern corner of the Arabian Peninsula and of the Arabian plate, in front of the Makran Subduction Zone (MSZ), which is the major source of earthquakes in the eastern border of the Arabian plate and Oman (Al-Shaqsi, 2012). There are at least three historical tsunamis assigned to seismic origin in the MSZ (Heidarzadeh et al., 2008; Jordan, 2008). These events show the high potential for tsunami generation of the MSZ, being one of the most tsunamigenic zones in the Indian Ocean. For the tsunami hazard assessment, worst potential cases have been selected, as well as the historical case of 1945, when an 8.1 earthquake generated a tsunami affecting the coast of Oman, and prompting 4000 casualties in the countries of the area. These scenarios have been computationally simulated in order to get tsunami hazard maps, including flooding maps. These calculations have been carried out at national and local scale, in 9 municipalities all along the coast of Oman, including the cities of Sohar, Wudam, Sawadi, Muscat, Quriyat, Sur, Masirah, Al Duqm, and Salalah. Using the hazard assessment as input, this work presents as well an integrated framework for the tsunami vulnerability and risk assessment carried out in the Sultanate of Oman. This framework considers different dimensions (human, structural) and it is developed at two different spatial resolutions, national and local scale. The national

  18. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    Science.gov (United States)

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  19. Development of a security vulnerability assessment process for the RAMCAP chemical sector

    International Nuclear Information System (INIS)

    Moore, David A.; Fuller, Brad; Hazzan, Michael; Jones, J. William

    2007-01-01

    The Department of Homeland Security (DHS), Directorate of Information Analysis and Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors:*Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. *Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  20. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  1. The role of assessment infrastructures in crafting project-based science classrooms

    Science.gov (United States)

    D'Amico, Laura Marie

    In project-based science teaching, teachers engage students in the practice of conducting meaningful investigations and explanations of natural phenomena, often in collaboration with fellow students or adults. Reformers suggest that this approach can provide students with more profitable learning experiences; but for many teachers, a shift to such instruction can be difficult to manage. As some reform-minded teachers have discovered, classroom assessment can serve as a vital tool for meeting the challenges associated with project science activity. In this research, classroom assessment was viewed as an infrastructure that both students and teachers rely upon as a mediational tool for classroom activity and communications. The study explored the classroom assessment infrastructures created by three teachers involved in the Learning through Collaborative Visualization (CoVis) Project from 1993--94 to 1995--96. Each of the three teachers under study either created a new course or radically reformulated an old one in an effort to incorporate project-based science pedagogy and supporting technologies. Data in the form of interviews, classroom observations, surveys, student work, and teacher records was collected. From these data, an interpretive case study was developed for each course and its accompanying assessment infrastructure. A set of cross-case analyses was also constructed, based upon common themes that emerged from all three cases. These themes included: the assessment challenges based on the nature of project activity, the role of technology in the teachers' assessment infrastructure designs, and the influence of the wider assessment infrastructure on their course and assessment designs. In combination, the case studies and cross-case analyses describe the synergistic relationship between the design of pedagogical reforms and classroom assessment infrastructures, as well as the effectiveness of all three assessment designs. This work contributes to research

  2. Defining Population Health Vulnerability Following an Extreme Weather Event in an Urban Pacific Island Environment: Honiara, Solomon Islands

    Science.gov (United States)

    Natuzzi, Eileen S.; Joshua, Cynthia; Shortus, Matthew; Reubin, Reginald; Dalipanda, Tenneth; Ferran, Karen; Aumua, Audrey; Brodine, Stephanie

    2016-01-01

    Extreme weather events are common and increasing in intensity in the southwestern Pacific region. Health impacts from cyclones and tropical storms cause acute injuries and infectious disease outbreaks. Defining population vulnerability to extreme weather events by examining a recent flood in Honiara, Solomon Islands, can help stakeholders and policymakers adapt development to reduce future threats. The acute and subacute health impacts following the April 2014 floods were defined using data obtained from hospitals and clinics, the Ministry of Health and in-country World Health Organization office in Honiara. Geographical information system (GIS) was used to assess morbidity and mortality, and vulnerability of the health system infrastructure and households in Honiara. The April flash floods were responsible for 21 acute deaths, 33 injuries, and a diarrhea outbreak that affected 8,584 people with 10 pediatric deaths. A GIS vulnerability assessment of the location of the health system infrastructure and households relative to rivers and the coastline identified 75% of the health infrastructure and over 29% of Honiara's population as vulnerable to future hydrological events. Honiara, Solomon Islands, is a rapidly growing, highly vulnerable urban Pacific Island environment. Evaluation of the mortality and morbidity from the April 2014 floods as well as the infectious disease outbreaks that followed allows public health specialists and policy makers to understand the health system and populations vulnerability to future shocks. Understanding the negative impacts natural disaster have on people living in urban Pacific environments will help the government as well as development partners in crafting resilient adaptation development. PMID:27091867

  3. A support system for assessing local vulnerability to weather and climate

    Science.gov (United States)

    Coletti, Alex; Howe, Peter D.; Yarnal, Brent; Wood, Nathan J.

    2013-01-01

    The changing number and nature of weather- and climate-related natural hazards is causing more communities to need to assess their vulnerabilities. Vulnerability assessments, however, often require considerable expertise and resources that are not available or too expensive for many communities. To meet the need for an easy-to-use, cost-effective vulnerability assessment tool for communities, a prototype online vulnerability assessment support system was built and tested. This prototype tool guides users through a stakeholder-based vulnerability assessment that breaks the process into four easy-to-implement steps. Data sources are integrated in the online environment so that perceived risks—defined and prioritized qualitatively by users—can be compared and discussed against the impacts that past events have had on the community. The support system is limited in scope, and the locations of the case studies do not provide a sufficiently broad range of sample cases. The addition of more publically available hazard databases combined with future improvements in the support system architecture and software will expand opportunities for testing and fully implementing the support system.

  4. Participatory flood vulnerability assessment: a multi-criteria approach

    Science.gov (United States)

    Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian

    2018-01-01

    This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  5. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    Science.gov (United States)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.

  6. Mitigations for Security Vulnerabilities Found in Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  7. Preliminary regulatory assessment of nuclear power plants vulnerabilities

    International Nuclear Information System (INIS)

    Kostadinov, V.; Petelin, S.

    2004-01-01

    Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)

  8. Assessment of Urban Infrastructure Quality and User Satisfaction in ...

    African Journals Online (AJOL)

    This study assessed urban infrastructure quality and the level of user satisfaction with urban infrastructure in low income residential neighbourhoods in Minna, Nigeria. Five (5) neighbourhoods were selected for the study, and a total of 250 housing units were sampled. Questionnaire was administered on households that fell ...

  9. Assessment of food fraud vulnerability in the spices chain

    NARCIS (Netherlands)

    Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.

    2017-01-01

    Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently

  10. Integrated flash flood vulnerability assessment: Insights from East Attica, Greece

    Science.gov (United States)

    Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven

    2016-10-01

    In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.

  11. Is your dam vulnerable to climate change? Using the PIEVC engineering protocol

    International Nuclear Information System (INIS)

    Bourgeois, Gilles; Dickson, Stewart; Ness, Ryan; Lapp, David

    2010-01-01

    The potential impacts of climate change on public infrastructure are currently studied to advance planning and prioritization of adaption strategies. This paper investigated the potential vulnerability of the Claireville and G. Ross Lord dams and reservoirs by considering the projected character, its magnitude and its rate of change in future local climatic conditions, the sensitivity of infrastructure to the changes, and the built-in capacity of the infrastructure to absorb any net negative consequence from the predicted changes in climatic conditions. This study used the public infrastructure engineering vulnerability (PIEV) engineering protocol to study the vulnerabilities of both facilities to current climate, as well as future climate change at the 2050 time horizon. Recommendations were provided for actions to be taken to address the potential vulnerabilities that were identified. The project determined that the two dams have the capacity to withstand the existing and projected future climate.

  12. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  13. Europe’s infrastructure vulnerabilities : comparisons and connections

    NARCIS (Netherlands)

    Hommels, A.; Högselius, P.; Kaijser, A.; Vleuten, van der E.B.A.; Högselius, P.; Hommels, A.; Kaijser, A.; Vleuten, van der E.B.A.

    2013-01-01

    This book has investigated the historical shaping of critical transnational infras tructure in Europe, its associated vulnerabilities, and its intertwinement with broader processes of European integration and fragmentation. The chapters in the three parts have scrutinized these issues from different

  14. Integrating Urban Infrastructure and Health System Impact Modeling for Disasters and Mass-Casualty Events

    Science.gov (United States)

    Balbus, J. M.; Kirsch, T.; Mitrani-Reiser, J.

    2017-12-01

    Over recent decades, natural disasters and mass-casualty events in United States have repeatedly revealed the serious consequences of health care facility vulnerability and the subsequent ability to deliver care for the affected people. Advances in predictive modeling and vulnerability assessment for health care facility failure, integrated infrastructure, and extreme weather events have now enabled a more rigorous scientific approach to evaluating health care system vulnerability and assessing impacts of natural and human disasters as well as the value of specific interventions. Concurrent advances in computing capacity also allow, for the first time, full integration of these multiple individual models, along with the modeling of population behaviors and mass casualty responses during a disaster. A team of federal and academic investigators led by the National Center for Disaster Medicine and Public Health (NCDMPH) is develoing a platform for integrating extreme event forecasts, health risk/impact assessment and population simulations, critical infrastructure (electrical, water, transportation, communication) impact and response models, health care facility-specific vulnerability and failure assessments, and health system/patient flow responses. The integration of these models is intended to develop much greater understanding of critical tipping points in the vulnerability of health systems during natural and human disasters and build an evidence base for specific interventions. Development of such a modeling platform will greatly facilitate the assessment of potential concurrent or sequential catastrophic events, such as a terrorism act following a severe heat wave or hurricane. This presentation will highlight the development of this modeling platform as well as applications not just for the US health system, but also for international science-based disaster risk reduction efforts, such as the Sendai Framework and the WHO SMART hospital project.

  15. SENSITIVITY ANALYSIS OF ORDERED WEIGHTED AVERAGING OPERATOR IN EARTHQUAKE VULNERABILITY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    M. Moradi

    2013-09-01

    Full Text Available The main objective of this research is to find the extent to which the minimal variability Ordered Weighted Averaging (OWA model of seismic vulnerability assessment is sensitive to variation of optimism degree. There are a variety of models proposed for seismic vulnerability assessment. In order to examine the efficiency of seismic vulnerability assessment models, the stability of results could be analysed. Seismic vulnerability assessment is done to estimate the probable losses in the future earthquake. Multi-Criteria Decision Making (MCDM methods have been applied by a number of researchers to estimate the human, physical and financial losses in urban areas. The study area of this research is Tehran Metropolitan Area (TMA which has more than eight million inhabitants. In addition, this paper assumes that North Tehran Fault (NTF is activated and caused an earthquake in TMA. 1996 census data is used to extract the attribute values for six effective criteria in seismic vulnerability assessment. The results demonstrate that minimal variability OWA model of Seismic Loss Estimation (SLE is more stable where the aggregated seismic vulnerability degree has a lower value. Moreover, minimal variability OWA is very sensitive to optimism degree in northern areas of Tehran. A number of statistical units in southern areas of the city also indicate considerable sensitivity to optimism degree due to numerous non-standard buildings. In addition, the change of seismic vulnerability degree caused by variation of optimism degree does not exceed 25 % of the original value which means that the overall accuracy of the model is acceptable.

  16. Support Process Development for Assessing Green Infrastructure in Omaha, NE

    Science.gov (United States)

    Evaluates Omaha’s current process for assessing green infrastructure projects and recommends improvements for comparing green and gray infrastructure. Compares Omaha’s design criteria to other cities. Reviews other US programs with rights-of-way criteria.

  17. An assessment of coastal vulnerability for the South African coast ...

    African Journals Online (AJOL)

    Coastal vulnerability is the degree to which a coastal system is susceptible to, or unable to cope with, adverse effects of climate change. One of the most widely used methods in assessing risk and vulnerability of coastlines on a regional scale includes the calculation of vulnerability indices and presenting these results on a ...

  18. Developing a Comprehensive and Integrated Vulnerability Assessment Methodology for the Defense Department's Critical Infrastructure Protection (CIP) Program. A Report Supporting CIP Program Outread and Education

    National Research Council Canada - National Science Library

    2003-01-01

    ...) strategy for Outreach, Education, and Training. It seeks to help those interested in understanding the Defense Department's current concepts and plans for developing CIP-specific vulnerability assessments...

  19. Urban vulnerability and climate change in Africa a multidisciplinary approach

    CERN Document Server

    Coly, Adrien; Fohlmeister, Sandra; Gasparini, Paolo; Jørgensen, Gertrud; Kabisch, Sigrun; Kombe, Wilbard; Lindley, Sarah; Simonis, Ingo; Yeshitela, Kumelachew

    2015-01-01

    The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

  20. Department of Energy, highly enriched uranium ES ampersand H vulnerability assessment, Idaho National Engineering Laboratory site assessment team report

    International Nuclear Information System (INIS)

    1996-01-01

    In accordance with the February 22, 1996 directive issued by Secretary of Energy O'Leary on the Vulnerability Assessment of Highly Enriched Uranium (HEU) Storage, the Idaho National Engineering Laboratory conducted an assessment of the site's HEU holdings and any associated vulnerabilities. The assessment was conducted between April 25 and May 24, 1996. The scope of this assessment, as defined in the Assessment Plan, included all HEU, and any spent fuel not evaluated in the Spent Fuel Vulnerability Assessment. Addressed in this assessment were all of the holdings at the Idaho National Engineering Laboratory (INEL) except any located at Argonne National Laboratory-West (ANL-W) and the Naval Reactors Facility. Excluded from the assessment were those HEU holdings previously assessed in the Idaho National Engineering Laboratory Spent Nuclear Fuel Inventory and Vulnerability Site Assessment Report and any HEU holdings evaluated in the Plutonium Vulnerability Assessment Report

  1. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    Science.gov (United States)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step

  2. Vulnerability assessment for reinforced concrete buildings exposed to landslides

    International Nuclear Information System (INIS)

    Mavrouli, O.; Corominas, J.; Fotopoulou, S.; Pitilakis, K.; Zuccaro, G.; Cacace, F.; De Gregorio, D.; Santo, A.; Di Crescenzo, G.; Foerster, E.; Ulrich, T.

    2014-01-01

    The methodologies available for the analytical quantification of the vulnerability of buildings which are subject to actions resulting from slope instabilities and landslides are relatively limited in comparison with other components of quantitative landslide risk assessment. This paper provides a general methodology for calculating the vulnerabilities of reinforced concrete frame structures that are subject to three types of slope instability: slow-moving landslides, rapid flow-type slides and rock falls. The vulnerability is expressed using sets of fragility curves. A description of the general framework and of the specialised procedures employed is presented here, separately for each landslide mechanism, through the example of a single-bay one-storey reinforced concrete frame. The properties of the frame are taken into account as variables with associated uncertainties. The derived vulnerability curves presented here can be used directly by risk assessment practitioners without having to repeat the procedure, given the expected range of landslide intensities and for similar building typologies and ranges of structural characteristics. This permits the applicability of the calculated vulnerability to a wide variety of similar frames for a range of landslide intensity parameters. (authors)

  3. Vulnerability Assessment of Rural Households to Urmia Lake Drying (the Case of Shabestar Region

    Directory of Open Access Journals (Sweden)

    Rasoul Maleki

    2018-06-01

    Full Text Available One of the most important environmental problems in Iran is the destruction and drying of Urmia Lake (UL. UL is one of the main causes of suitable weather for agricultural boom and tourist attraction and it should be considered that the villagers exposed to UL drying have a strong dependence on vulnerable resources such as water, air, soil and plants for their livelihoods and have low adaptive capacity with this crisis for reasons such as poverty, lack of awareness and lack of infrastructure. This study was designed to evaluate the vulnerability of rural households to UL drying in the Shabestar region. The vulnerability was calculated based on Intergovernmental Panel on Climate Change (IPCC definition and using vulnerability index (VI. Research population included rural households of Shabestar region (N = 19,249 and about 347 households were selected as the research sample using multistage cluster sampling technique. Results showed that the average score of respondents was 0.455 (moderate in exposure, 0.359 (moderate to low in sensitivity, 0.404 (moderate to low in adaptive capacity and finally, the vulnerability index (VI was 0.470 (range of 0 to 1. 12.8% of households had low, 70.5% had medium and 16.7% had high vulnerability towards UL drying.

  4. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach

    Science.gov (United States)

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  5. evaluation of models for assessing groundwater vulnerability

    African Journals Online (AJOL)

    DR. AMINU

    applied models for groundwater vulnerability assessment mapping. The appraoches .... The overall 'pollution potential' or DRASTIC index is established by applying the formula: DRASTIC Index: ... affected by the structure of the soil surface.

  6. A quantitative method for assessing resilience of interdependent infrastructures

    International Nuclear Information System (INIS)

    Nan, Cen; Sansavini, Giovanni

    2017-01-01

    The importance of understanding system resilience and identifying ways to enhance it, especially for interdependent infrastructures our daily life depends on, has been recognized not only by academics, but also by the corporate and public sectors. During recent years, several methods and frameworks have been proposed and developed to explore applicable techniques to assess and analyze system resilience in a comprehensive way. However, they are often tailored to specific disruptive hazards/events, or fail to properly include all the phases such as absorption, adaptation, and recovery. In this paper, a quantitative method for the assessment of the system resilience is proposed. The method consists of two components: an integrated metric for system resilience quantification and a hybrid modeling approach for representing the failure behavior of infrastructure systems. The feasibility and applicability of the proposed method are tested using an electric power supply system as the exemplary infrastructure. Simulation results highlight that the method proves effective in designing, engineering and improving the resilience of infrastructures. Finally, system resilience is proposed as a proxy to quantify the coupling strength between interdependent infrastructures. - Highlights: • A method for quantifying resilience of interdependent infrastructures is proposed. • It combines multi-layer hybrid modeling and a time-dependent resilience metric. • The feasibility of the proposed method is tested on the electric power supply system. • The method provides insights to decision-makers for strengthening system resilience. • Resilience capabilities can be used to engineer interdependencies between subsystems.

  7. Vulnerability Assessments and Resilience Planning at Federal Sites

    Energy Technology Data Exchange (ETDEWEB)

    Moss, Richard H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Blohm, Andrew [Univ. of Maryland, College Park, MD (United States); Delgado, Alison [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Henriques, Justin J. [James Madison Univ., Harrisonburg, VA (United States); Malone, Elizabeth L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-02-01

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Departments of Energy and Defense. The paper provides a framework of steps for climate vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change.

  8. Advanced methodology for risk and vulnerability assessment of interdependency of critical infrastructure in respect to urban floods

    Directory of Open Access Journals (Sweden)

    Serre Damien

    2016-01-01

    Full Text Available The behaviour of the urban network infrastructures, and their interactions during flood events, will have direct and indirect consequences on the flood risk level in the built environment. By urban network infrastructures we include all the urban technical networks like transportation, energy, water supply, waste water, telecommunication…able to spread the flood risk in cities, qualified as critical infrastructures due to their major roles for modern living standards. From history, most of cities in the world have been built close to coast lines or to river to beneficiate this means of communication and trade. Step by step, to avoid being flooded, defences like levees have been built. The capacity of the levees to retain the floods depends on their conditions, their performance level and the capacity of the authorities to well maintain these infrastructures. But recent history shows the limits of a flood risk management strategy focused on protection, leading to levee breaks these last decades. Then, in case of levee break, cities will be flooded. The urban technical networks, due to the way they have been designed, their conditions and their locations in the city, will play a major role in the diffusion of the flood extent. Also, the flood risk will have consequences in some not flooded neighbourhoods due to networks collapses and complex interdependencies. This article describes some methods to design spatial decision support systems in that context.

  9. Enhancement of global flood damage assessments using building material based vulnerability curves

    Science.gov (United States)

    Englhardt, Johanna; de Ruiter, Marleen; de Moel, Hans; Aerts, Jeroen

    2017-04-01

    This study discusses the development of an enhanced approach for flood damage and risk assessments using vulnerability curves that are based on building material information. The approach draws upon common practices in earthquake vulnerability assessments, and is an alternative for land-use or building occupancy approach in flood risk assessment models. The approach is of particular importance for studies where there is a large variation in building material, such as large scale studies or studies in developing countries. A case study of Ethiopia is used to demonstrate the impact of the different methodological approaches on direct damage assessments due to flooding. Generally, flood damage assessments use damage curves for different land-use or occupancy types (i.e. urban or residential and commercial classes). However, these categories do not necessarily relate directly to vulnerability of damage by flood waters. For this, the construction type and building material may be more important, as is used in earthquake risk assessments. For this study, we use building material classification data of the PAGER1 project to define new building material based vulnerability classes for flood damage. This approach will be compared to the widely applied land-use based vulnerability curves such as used by De Moel et al. (2011). The case of Ethiopia demonstrates and compares the feasibility of this novel flood vulnerability method on a country level which holds the potential to be scaled up to a global level. The study shows that flood vulnerability based on building material also allows for better differentiation between flood damage in urban and rural settings, opening doors to better link to poverty studies when such exposure data is available. Furthermore, this new approach paves the road to the enhancement of multi-risk assessments as the method enables the comparison of vulnerability across different natural hazard types that also use material-based vulnerability curves

  10. Assessment of farm households' vulnerability to climate change in ...

    African Journals Online (AJOL)

    Climate change is currently an emerging problem in Nigeria. The Niger Delta region presents some vulnerability due to activities of some oil companies. This study provides an assessment of farm households' perception of climate change and vulnerability in the Niger Delta region of Nigeria. The data were obtained form ...

  11. Development on Vulnerability Assessment Methods of PPS

    Institute of Scientific and Technical Information of China (English)

    MIAO; Qiang; ZHANG; Wen-liang; BU; Li-xin; YIN; Hong-he; LI; Xin-jun; FANG; Xin

    2013-01-01

    Through investigating information from domestic and abroad,joint the domestic assessment experience,we present a set of physical protection system(PPS)vulnerability assessment methods for on-operating nuclear power plants and for on-designing nuclear facilities.The methods will help to strengthen and upgrade the security measures of the nuclear facilities,improve the effectiveness and

  12. Combining landscape variables and species traits can improve the utility of climate change vulnerability assessments

    Science.gov (United States)

    Nadeau, Christopher P.; Fuller, Angela K.

    2016-01-01

    Conservation organizations worldwide are investing in climate change vulnerability assessments. Most vulnerability assessment methods focus on either landscape features or species traits that can affect a species vulnerability to climate change. However, landscape features and species traits likely interact to affect vulnerability. We compare a landscape-based assessment, a trait-based assessment, and an assessment that combines landscape variables and species traits for 113 species of birds, herpetofauna, and mammals in the northeastern United States. Our aim is to better understand which species traits and landscape variables have the largest influence on assessment results and which types of vulnerability assessments are most useful for different objectives. Species traits were most important for determining which species will be most vulnerable to climate change. The sensitivity of species to dispersal barriers and the species average natal dispersal distance were the most important traits. Landscape features were most important for determining where species will be most vulnerable because species were most vulnerable in areas where multiple landscape features combined to increase vulnerability, regardless of species traits. The interaction between landscape variables and species traits was important when determining how to reduce climate change vulnerability. For example, an assessment that combines information on landscape connectivity, climate change velocity, and natal dispersal distance suggests that increasing landscape connectivity may not reduce the vulnerability of many species. Assessments that include landscape features and species traits will likely be most useful in guiding conservation under climate change.

  13. Environmental Groundwater Vulnerability Assessment in Urban Water Mines (Porto, NW Portugal

    Directory of Open Access Journals (Sweden)

    Maria José Afonso

    2016-11-01

    Full Text Available A multidisciplinary approach was developed to estimate urban groundwater vulnerability to contamination combining hydrogeology, hydrogeochemistry, subterranean hydrogeotechnics, groundwater ecotoxicology and isotope tracers. Paranhos and Salgueiros spring waters in Porto City were used as a case study. Historical and current vulnerability scenarios were compared using hydrogeological GIS-based modelling. Potential contamination sources were mapped around the spring galleries. Most of these were point sources and their potential contamination load was moderate. The ecotoxicological assessment indicated a low acute toxicity potential. Groundwater radionuclides appeared to be mainly controlled by geological factors and biomineralisation. Vulnerability maps suggest that most of the area has a moderate to low vulnerability to contamination. However, some surface sources such as sewage systems cause contamination and contribute to increased vulnerability. This integrated approach was demonstrated to be adequate for a better knowledge of urban hydrogeological processes and their dynamics, and highlighted the importance of a vulnerability assessment in urban areas.

  14. Intrinsic vulnerability assessment of Sette Comuni Plateau aquifer (Veneto Region, Italy).

    Science.gov (United States)

    Cucchi, Franco; Franceschini, Giuliana; Zini, Luca; Aurighi, Marina

    2008-09-01

    Maps illustrating the different degrees of vulnerability within a given area are integral to environmental protection and management policies. The assessment of the intrinsic vulnerability of karst areas is difficult since the type and stage of karst development and the related underground discharge behavior are difficult to determine and quantify. Geographic Information Systems techniques are applied to the evaluation of the vulnerability of an aquifer in the alpine karst area of the Sette Comuni Plateau, in the Veneto Region of northern Italy. The water resources of the studied aquifer are of particular importance to the local communities. This aquifer must therefore be protected from both inappropriate use as well as possible pollution. The SINTACS and SINTACS P(RO) K(ARST) vulnerability assessment methods have been utilized here to create the vulnerability map. SINTACS P(RO) K(ARST) is an adaptation of the parametric managerial model (SINTACS) to karst hydrostructures. The vulnerability map reveals vast zones (81% of the analyzed areas) with a high degree of vulnerability. The presence of well-developed karst structures in these highly vulnerable areas facilitate water percolation, thereby enhancing the groundwater vulnerability risk. Only 1.5 of the studied aquifer have extremely high-vulnerability levels, however these areas include all of the major springs utilized for human consumption. This vulnerability map of the Sette Comuni Plateau aquifer is an indispensable tool for both the effective management of water resources and as support to environmental planning in the Sette Comuni Plateau area.

  15. Assessing vulnerability to drought: identifying underlying factors across Europe

    Science.gov (United States)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  16. Participatory flood vulnerability assessment: a multi-criteria approach

    Directory of Open Access Journals (Sweden)

    M. M. de Brito

    2018-01-01

    Full Text Available This paper presents a participatory multi-criteria decision-making (MCDM approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP and analytical network process (ANP multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  17. Probabilistic seismic vulnerability and risk assessment of stone masonry structures

    Science.gov (United States)

    Abo El Ezz, Ahmad

    Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for

  18. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  19. Intelligent Techniques for Power Systems Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Mohamed A. El-Sharkawi

    2002-06-01

    Full Text Available With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults.  These contingencies could lead to a disruption of service to part or all of the system.  The service disruption is known as outage or blackout.  The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.

  20. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  1. Assessing and managing freshwater ecosystems vulnerable to global change

    Science.gov (United States)

    Angeler, David G.; Allen, Craig R.; Birge, Hannah E.; Drakare, Stina; McKie, Brendan G.; Johnson, Richard K.

    2014-01-01

    Freshwater ecosystems are important for global biodiversity and provide essential ecosystem services. There is consensus in the scientific literature that freshwater ecosystems are vulnerable to the impacts of environmental change, which may trigger irreversible regime shifts upon which biodiversity and ecosystem services may be lost. There are profound uncertainties regarding the management and assessment of the vulnerability of freshwater ecosystems to environmental change. Quantitative approaches are needed to reduce this uncertainty. We describe available statistical and modeling approaches along with case studies that demonstrate how resilience theory can be applied to aid decision-making in natural resources management. We highlight especially how long-term monitoring efforts combined with ecological theory can provide a novel nexus between ecological impact assessment and management, and the quantification of systemic vulnerability and thus the resilience of ecosystems to environmental change.

  2. Livelihood Vulnerability Assessment Of Farmers and Nomads in Eastern Ecotone of Tibetan Plateau

    Science.gov (United States)

    Yan, J.; Zhang, Y.

    2011-12-01

    Livelihood vulnerability assessment provides a scientific basis for anti-poverty of people and regional sustainable development in vulnerable area. Although there are massive discussions on concept of vulnerability, it is still difficult to make it quantitative and to carry out comprehensive appraise. Vulnerability assessments based on sustainable livelihood frame are widely accepted in case studies for attentions to vulnerable groups. However, these case studies are always on regional scale and never reflect how climate change affects people's livelihood and adaptive capability of people. It is necessary to seek vulnerable assessment index system and means based on livelihood process of local people. This paper develops a livelihood vulnerability assessment index system on the basis of sustainable livelihood framework and appraises livelihood vulnerability values of 11 townships, using data of 879 sample households. Livelihood vulnerability assessment index system reflects main risks, livelihood assets and adaptation strategies of local people and government. The results show that livelihood vulnerability level of plateau region is higher than that of mountain to plateau region and mountain gorge region. Manzhang Township in plateau region is the most vulnerable township and nomads there cannot cope with risks of climate change, meadow degeneration and herbs degradation. Upper part of mountain to plateau region and the whole plateau region have high livelihood vulnerability values and local nomads would not cope with risks if no measures are taken by government. The driving forces of livelihood vulnerability include strikes of risks and deficiency of livelihood assets and adaptive capability. Farmers and nomads in high mountain gorge region and lower part of mountain to plateau region can cope with these risks, meanwhile, there are more employment opportunities in second and tertiary industries are needed to help them realize livelihood diversification. Therefore

  3. Assessing Climate Vulnerabilities of Food Distribution Center Sites in Greater Boston and Their Regional Implications: Climate Adaptation Planning in Practice

    Science.gov (United States)

    Teferra, A.; Watson, C.; Douglas, E. M.

    2016-12-01

    The Metro Boston region, an area whose civic leaders have been at the forefront of climate resilience initiatives in recent years, is finalizing a flood vulnerability assessment of food distribution center sites located north of Boston, with the support of the University of Massachusetts Boston and the American Geophysical Union's Thriving Earth Exchange program. The community-scientist collaboration emerged because of the need for more local analyses of the area to inform climate resiliency policy and planning actions for the region. A significant amount of the metro region's food supply passes through two major distribution centers in the cities of Everett and Chelsea, just north of the Mystic River. The Metropolitan Area Planning Council (MAPC), on behalf of the Metro Boston Climate Preparedness Taskforce, is working with Chris Watson and Ellen Douglas of UMass Boston to build on existing analyses of the region's food system and climate vulnerabilities and to develop a report identifying flood risk exposure to the sites. The analysis brings in dynamic modeling techniques that incorporate storm surge and sea level rise projections under different climate scenarios, and aims to align methodologies with those of other regional analyses, such as Climate Ready Boston and the City of Cambridge's Vulnerability Assessment. The study is helping to inform MAPC's and the Metro Boston Climate Preparedness Taskforce's understanding of this critical food distribution infrastructure, illustrate the larger regional implications of climate impacts on food distribution in the Greater Boston area, and guide the development of site-specific strategies for addressing identified vulnerabilities.

  4. Development of a methodology for the assessment of sea level rise impacts on Florida's transportation modes and infrastructure : [summary].

    Science.gov (United States)

    2012-01-01

    In Florida, low elevations can make transportation infrastructure in coastal and low-lying areas potentially vulnerable to sea level rise (SLR). Becuase global SLR forecasts lack precision at local or regional scales, SLR forecasts or scenarios for p...

  5. Infrastructure: A technology battlefield in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Drucker, H.

    1997-12-31

    A major part of technological advancement has involved the development of complex infrastructure systems, including electric power generation, transmission, and distribution networks; oil and gas pipeline systems; highway and rail networks; and telecommunication networks. Dependence on these infrastructure systems renders them attractive targets for conflict in the twenty-first century. Hostile governments, domestic and international terrorists, criminals, and mentally distressed individuals will inevitably find some part of the infrastructure an easy target for theft, for making political statements, for disruption of strategic activities, or for making a nuisance. The current situation regarding the vulnerability of the infrastructure can be summarized in three major points: (1) our dependence on technology has made our infrastructure more important and vital to our everyday lives, this in turn, makes us much more vulnerable to disruption in any infrastructure system; (2) technologies available for attacking infrastructure systems have changed substantially and have become much easier to obtain and use, easy accessibility to information on how to disrupt or destroy various infrastructure components means that almost anyone can be involved in this destructive process; (3) technologies for defending infrastructure systems and preventing damage have not kept pace with the capability for destroying such systems. A brief review of these points will illustrate the significance of infrastructure and the growing dangers to its various elements.

  6. Applying spatial clustering analysis to a township-level social vulnerability assessment in Taiwan

    Directory of Open Access Journals (Sweden)

    Wen-Yen Lin

    2016-09-01

    Full Text Available The degree of social vulnerability may vary according to the conditions and backgrounds of different locations, yet spatial clustering phenomena may exist when nearby spatial units exhibit similar characteristics. This study applied spatial autocorrelation statistics to analyze the spatial association of vulnerability among townships in Taiwan. The vulnerability was first assessed on the basis of a social vulnerability index that was constructed using Fuzzy Delphi and analytic hierarchy process methods. Subsequently, the corresponding indicator variables were applied to calculate standardized vulnerability assessment scores by using government data. According to the results of the vulnerability assessment in which T scores were normalized, the distribution of social vulnerabilities varied among the townships. The scores were further analyzed using spatial autocorrelation statistics for spatial clustering of vulnerability distribution. The Local G statistic identified 42 significant spatial association pockets, whereas the Global G statistic indicated no spatial phenomenon of clustering. This phenomenon was verified and explained by applying Moran's I statistics to examine the homogeneity and heterogeneity of spatial associations. Although both statistics were originally designed to identify the existence of spatial clustering, they serve diverse purposes, and the results can be compared to obtain additional insights into the distribution patterns of social vulnerability.

  7. The quest for the oil and gas infrastructure protection in central Asia : time bombs and policy options

    Energy Technology Data Exchange (ETDEWEB)

    Bi, J. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs

    2006-03-15

    The growing economies of China and India have increased global anxieties over dwindling fossil fuel resources. Regional countries in central Asia have advocated for more extensive strategic partnerships within the oil and gas industry as insurance against the pressures of more powerful nations. However, non-traditional threats such as terrorism raise serious questions about critical oil and gas infrastructure protection in central Asia. This paper assessed the vulnerability and threats inherent in protecting the critical oil and gas infrastructure of Central Asia, with a specific focus on Kazakhstan, Turkmenistan, Uzbekistan, and the region of Xinjiang in China. An-depth analysis of the development strategies, terrorist threats, and water issues confronted by Central Asian powers was conducted to demonstrate their vulnerability. The analysis was then used to consider options available for managing oil and gas infrastructure in the regions. It was observed that different perceptions and technological difficulties have made cooperation on critical oil and gas infrastructure protection less important than national sovereignty and domestic stability. It was concluded that a low-key approach to homeland security and oil and gas infrastructure may be the best strategy for Central Asia and China. 44 refs.

  8. An assessment of fire vulnerability for aged electrical relays

    International Nuclear Information System (INIS)

    Vigil, R.A.; Nowlen, S.P.

    1995-03-01

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized

  9. Urban underground infrastructure mapping and assessment

    Science.gov (United States)

    Huston, Dryver; Xia, Tian; Zhang, Yu; Fan, Taian; Orfeo, Dan; Razinger, Jonathan

    2017-04-01

    This paper outlines and discusses a few associated details of a smart cities approach to the mapping and condition assessment of urban underground infrastructure. Underground utilities are critical infrastructure for all modern cities. They carry drinking water, storm water, sewage, natural gas, electric power, telecommunications, steam, etc. In most cities, the underground infrastructure reflects the growth and history of the city. Many components are aging, in unknown locations with congested configurations, and in unknown condition. The technique uses sensing and information technology to determine the state of infrastructure and provide it in an appropriate, timely and secure format for managers, planners and users. The sensors include ground penetrating radar and buried sensors for persistent sensing of localized conditions. Signal processing and pattern recognition techniques convert the data in information-laden databases for use in analytics, graphical presentations, metering and planning. The presented data are from construction of the St. Paul St. CCTA Bus Station Project in Burlington, VT; utility replacement sites in Winooski, VT; and laboratory tests of smart phone position registration and magnetic signaling. The soil conditions encountered are favorable for GPR sensing and make it possible to locate buried pipes and soil layers. The present state of the art is that the data collection and processing procedures are manual and somewhat tedious, but that solutions for automating these procedures appear to be viable. Magnetic signaling with moving permanent magnets has the potential for sending lowfrequency telemetry signals through soils that are largely impenetrable by other electromagnetic waves.

  10. Community vulnerability to climate change in the context of other exposure-sensitivities in Kugluktuk, Nunavut

    Directory of Open Access Journals (Sweden)

    Laura Tozer

    2011-07-01

    Full Text Available Climate change in the Canadian north is, and will be, managed by communities that are already experiencing social, political, economic and other environmental changes. Hence, there is a need to understand vulnerability to climate change in the context of multiple exposure-sensitivities at the community level. This article responds to this perceived knowledge need based on a case study of the community of Kugluktuk in Nunavut, Canada. An established approach for vulnerability assessment is used to identify current climatic and non-climatic exposure-sensitivities along with their associated contemporary adaptation strategies. This assessment of current vulnerability is used as a basis to consider Kugluktuk's possible vulnerability to climatic change in the future. Current climate-related exposure-sensitivities in Kugluktuk relate primarily to subsistence harvesting and community infrastructure. Thinner and less stable ice conditions and unpredictable weather patterns are making travel and harvesting more dangerous and some community infrastructure is sensitive to permafrost melt and extreme weather events (e.g., flash floods. The ability of individuals and households to adapt to these and other climatic exposure-sensitivities is influenced by non-climatic factors that condition adaptive capacity including substance abuse, the erosion of traditional knowledge and youth suicide. These and other non-climatic factors often underpin adaptive capacity to deal with and adapt to changing conditions and must be considered in an assessment of vulnerability. This research argues that Northern communities are challenged by multiple exposure-sensitivities—beyond just those posed by climate—and effective adaptation to climate change requires consideration if not resolution of socio-economic and other issues in communities.

  11. An Assessment of Vulnerability and Trade-offs of Dairy Farmers of India to Climate Variability and Change

    Science.gov (United States)

    Radhakrishnan, Aparna; Gupta, Jancy; Ravindran, Dileepkumar

    2017-04-01

    The study aims at assessing the vulnerability and tradeoffs of dairy based livelihoods to Climate Variability and Change (CVC) in the Western Ghats ecosystem, India. For this purpose; data were aggregated to an overall Livelihood Vulnerability Index (LVI) to CVC underlying the principles of IPCC, using 40 indicators under 7 LVI components. Fussel framework was used for the nomenclature of vulnerable situation and trade-off between vulnerability components and milk production was calculated. Data were collected through participatory rural appraisal and personal interviews from 360 randomly selected dairy farmers of nine blocks from three states of Western Ghat region, complemented by thirty years of gridded weather data and livestock data. The LVI score of dairy based livelihoods of six taluks were negative. The data were normalized and then combined into three indices of sensitivity, exposure and adaptive capacity, which were then averaged with weights given using principal component analysis, to obtain the overall vulnerability index. Mann Whitney U test was used to find the significant difference between the taluks in terms of LVI and cumulative square root frequency method was used to categorise the farmers. Even though the taluks are geographically closer, there is significant difference in the LVI values of the regions. Results indicated that the Lanja taluks of Maharashtra is the most vulnerable having an overall LVI value -4.17 with 48% farmers falling in highly vulnerable category. Panel regression analysis reveals that there is significant synergy between average milk production and livestock, social network component and trade-off between natural disasters climate variability component of LVI. Policies for incentivizing the 'climate risk adaptation' costs for small and marginal farmers and livelihood infrastructure for mitigating risks and promoting grass root level innovations are necessary to sustain dairy farming of the region. Thus the research will

  12. All rights reserved Assessment of groundwater vulnerability and ...

    African Journals Online (AJOL)

    ADOWIE PERE

    2017-12-12

    Dec 12, 2017 ... Pollution vulnerability assessment of groundwater resources provides information on how to protect areas ... the application of DRASTIC model, the relationship ..... mathematical structure of consistent matrices and the.

  13. Global assessment of water policy vulnerability under uncertainty in water scarcity projections

    Science.gov (United States)

    Greve, Peter; Kahil, Taher; Satoh, Yusuke; Burek, Peter; Fischer, Günther; Tramberend, Sylvia; Byers, Edward; Flörke, Martina; Eisner, Stephanie; Hanasaki, Naota; Langan, Simon; Wada, Yoshihide

    2017-04-01

    Water scarcity is a critical environmental issue worldwide, which has been driven by the significant increase in water extractions during the last century. In the coming decades, climate change is projected to further exacerbate water scarcity conditions in many regions around the world. At present, one important question for policy debate is the identification of water policy interventions that could address the mounting water scarcity problems. Main interventions include investing in water storage infrastructures, water transfer canals, efficient irrigation systems, and desalination plants, among many others. This type of interventions involve long-term planning, long-lived investments and some irreversibility in choices which can shape development of countries for decades. Making decisions on these water infrastructures requires anticipating the long term environmental conditions, needs and constraints under which they will function. This brings large uncertainty in the decision-making process, for instance from demographic or economic projections. But today, climate change is bringing another layer of uncertainty that make decisions even more complex. In this study, we assess in a probabilistic approach the uncertainty in global water scarcity projections following different socioeconomic pathways (SSPs) and climate scenarios (RCPs) within the first half of the 21st century. By utilizing an ensemble of 45 future water scarcity projections based on (i) three state-of-the-art global hydrological models (PCR-GLOBWB, H08, and WaterGAP), (ii) five climate models, and (iii) three water scenarios, we have assessed changes in water scarcity and the associated uncertainty distribution worldwide. The water scenarios used here are developed by IIASA's Water Futures and Solutions (WFaS) Initiative. The main objective of this study is to improve the contribution of hydro-climatic information to effective policymaking by identifying spatial and temporal policy

  14. Regulatory Guide on Conducting a Security Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  15. Designing a graph-based approach to landscape ecological assessment of linear infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Girardet, Xavier, E-mail: xavier.girardet@univ-fcomte.fr; Foltête, Jean-Christophe, E-mail: jean-christophe.foltete@univ-fcomte.fr; Clauzel, Céline, E-mail: celine.clauzel@univ-fcomte.fr

    2013-09-15

    The development of major linear infrastructures contributes to landscape fragmentation and impacts natural habitats and biodiversity in various ways. To anticipate and minimize such impacts, landscape planning needs to be capable of effective strategic environmental assessment (SEA) and of supporting environmental impact assessment (EIA) decisions. To this end, species distribution models (SDMs) are an effective way of making predictive maps of the presence of a given species. In this paper, we propose to combine SDMs and graph-based representation of landscape networks to integrate the potential long-distance effect of infrastructures on species distribution. A diachronic approach, comparing distribution before and after the linear infrastructure is constructed, leads to the design of a species distribution assessment (SDA), taking into account population isolation. The SDA makes it possible (1) to estimate the local variation in probability of presence and (2) to characterize the impact of the infrastructure in terms of global variation in presence and of distance of disturbance. The method is illustrated by assessing the impact of the construction of a high-speed railway line on the distribution of several virtual species in Franche-Comté (France). The study shows the capacity of the SDA to characterize the impact of a linear infrastructure either as a research concern or as a spatial planning challenge. SDAs could be helpful in deciding among several scenarios for linear infrastructure routes or for the location of mitigation measures. -- Highlights: • Graph connectivity metrics were integrated into a species distribution model. • SDM was performed before and after the implementation of linear infrastructure. • The local variation of presence provides spatial indicators of the impact.

  16. Designing a graph-based approach to landscape ecological assessment of linear infrastructures

    International Nuclear Information System (INIS)

    Girardet, Xavier; Foltête, Jean-Christophe; Clauzel, Céline

    2013-01-01

    The development of major linear infrastructures contributes to landscape fragmentation and impacts natural habitats and biodiversity in various ways. To anticipate and minimize such impacts, landscape planning needs to be capable of effective strategic environmental assessment (SEA) and of supporting environmental impact assessment (EIA) decisions. To this end, species distribution models (SDMs) are an effective way of making predictive maps of the presence of a given species. In this paper, we propose to combine SDMs and graph-based representation of landscape networks to integrate the potential long-distance effect of infrastructures on species distribution. A diachronic approach, comparing distribution before and after the linear infrastructure is constructed, leads to the design of a species distribution assessment (SDA), taking into account population isolation. The SDA makes it possible (1) to estimate the local variation in probability of presence and (2) to characterize the impact of the infrastructure in terms of global variation in presence and of distance of disturbance. The method is illustrated by assessing the impact of the construction of a high-speed railway line on the distribution of several virtual species in Franche-Comté (France). The study shows the capacity of the SDA to characterize the impact of a linear infrastructure either as a research concern or as a spatial planning challenge. SDAs could be helpful in deciding among several scenarios for linear infrastructure routes or for the location of mitigation measures. -- Highlights: • Graph connectivity metrics were integrated into a species distribution model. • SDM was performed before and after the implementation of linear infrastructure. • The local variation of presence provides spatial indicators of the impact

  17. Multiple flood vulnerability assessment approach based on fuzzy comprehensive evaluation method and coordinated development degree model.

    Science.gov (United States)

    Yang, Weichao; Xu, Kui; Lian, Jijian; Bin, Lingling; Ma, Chao

    2018-05-01

    Flood is a serious challenge that increasingly affects the residents as well as policymakers. Flood vulnerability assessment is becoming gradually relevant in the world. The purpose of this study is to develop an approach to reveal the relationship between exposure, sensitivity and adaptive capacity for better flood vulnerability assessment, based on the fuzzy comprehensive evaluation method (FCEM) and coordinated development degree model (CDDM). The approach is organized into three parts: establishment of index system, assessment of exposure, sensitivity and adaptive capacity, and multiple flood vulnerability assessment. Hydrodynamic model and statistical data are employed for the establishment of index system; FCEM is used to evaluate exposure, sensitivity and adaptive capacity; and CDDM is applied to express the relationship of the three components of vulnerability. Six multiple flood vulnerability types and four levels are proposed to assess flood vulnerability from multiple perspectives. Then the approach is applied to assess the spatiality of flood vulnerability in Hainan's eastern area, China. Based on the results of multiple flood vulnerability, a decision-making process for rational allocation of limited resources is proposed and applied to the study area. The study shows that multiple flood vulnerability assessment can evaluate vulnerability more completely, and help decision makers learn more information about making decisions in a more comprehensive way. In summary, this study provides a new way for flood vulnerability assessment and disaster prevention decision. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Climate change risks to United States infrastructure: impacts on coastal development, roads, bridges, and urban drainage

    Science.gov (United States)

    Changes in temperature, precipitation, sea level, and coastal storms will likely increase the vulnerability of infrastructure across the United States. Using four models of vulnerability, impacts, and adaptation of infrastructure, its deployment, and its role in protecting econom...

  19. Assessing large-scale wildlife responses to human infrastructure development.

    Science.gov (United States)

    Torres, Aurora; Jaeger, Jochen A G; Alonso, Juan Carlos

    2016-07-26

    Habitat loss and deterioration represent the main threats to wildlife species, and are closely linked to the expansion of roads and human settlements. Unfortunately, large-scale effects of these structures remain generally overlooked. Here, we analyzed the European transportation infrastructure network and found that 50% of the continent is within 1.5 km of transportation infrastructure. We present a method for assessing the impacts from infrastructure on wildlife, based on functional response curves describing density reductions in birds and mammals (e.g., road-effect zones), and apply it to Spain as a case study. The imprint of infrastructure extends over most of the country (55.5% in the case of birds and 97.9% for mammals), with moderate declines predicted for birds (22.6% of individuals) and severe declines predicted for mammals (46.6%). Despite certain limitations, we suggest the approach proposed is widely applicable to the evaluation of effects of planned infrastructure developments under multiple scenarios, and propose an internationally coordinated strategy to update and improve it in the future.

  20. Rapid assessment of infrastructure of primary health care facilities - a relevant instrument for health care systems management.

    Science.gov (United States)

    Scholz, Stefan; Ngoli, Baltazar; Flessa, Steffen

    2015-05-01

    Health care infrastructure constitutes a major component of the structural quality of a health system. Infrastructural deficiencies of health services are reported in literature and research. A number of instruments exist for the assessment of infrastructure. However, no easy-to-use instruments to assess health facility infrastructure in developing countries are available. Present tools are not applicable for a rapid assessment by health facility staff. Therefore, health information systems lack data on facility infrastructure. A rapid assessment tool for the infrastructure of primary health care facilities was developed by the authors and pilot-tested in Tanzania. The tool measures the quality of all infrastructural components comprehensively and with high standardization. Ratings use a 2-1-0 scheme which is frequently used in Tanzanian health care services. Infrastructural indicators and indices are obtained from the assessment and serve for reporting and tracing of interventions. The tool was pilot-tested in Tanga Region (Tanzania). The pilot test covered seven primary care facilities in the range between dispensary and district hospital. The assessment encompassed the facilities as entities as well as 42 facility buildings and 80 pieces of technical medical equipment. A full assessment of facility infrastructure was undertaken by health care professionals while the rapid assessment was performed by facility staff. Serious infrastructural deficiencies were revealed. The rapid assessment tool proved a reliable instrument of routine data collection by health facility staff. The authors recommend integrating the rapid assessment tool in the health information systems of developing countries. Health authorities in a decentralized health system are thus enabled to detect infrastructural deficiencies and trace the effects of interventions. The tool can lay the data foundation for district facility infrastructure management.

  1. Assessing intrinsic and specific vulnerability models ability to indicate groundwater vulnerability to groups of similar pesticides: A comparative study

    Science.gov (United States)

    Douglas, Steven; Dixon, Barnali; Griffin, Dale W.

    2018-01-01

    With continued population growth and increasing use of fresh groundwater resources, protection of this valuable resource is critical. A cost effective means to assess risk of groundwater contamination potential will provide a useful tool to protect these resources. Integrating geospatial methods offers a means to quantify the risk of contaminant potential in cost effective and spatially explicit ways. This research was designed to compare the ability of intrinsic (DRASTIC) and specific (Attenuation Factor; AF) vulnerability models to indicate groundwater vulnerability areas by comparing model results to the presence of pesticides from groundwater sample datasets. A logistic regression was used to assess the relationship between the environmental variables and the presence or absence of pesticides within regions of varying vulnerability. According to the DRASTIC model, more than 20% of the study area is very highly vulnerable. Approximately 30% is very highly vulnerable according to the AF model. When groundwater concentrations of individual pesticides were compared to model predictions, the results were mixed. Model predictability improved when concentrations of the group of similar pesticides were compared to model results. Compared to the DRASTIC model, the AF model more accurately predicts the distribution of the number of contaminated wells within each vulnerability class.

  2. Development of safety related technology and infrastructure for safety assessment

    International Nuclear Information System (INIS)

    Venkat Raj, V.

    1997-01-01

    Development and optimum utilisation of any technology calls for the building up of the necessary infrastructure and backup facilities. This is particularly true for a developing country like India and more so for an advanced technology like nuclear technology. Right from the inception of its nuclear power programme, the Indian approach has been to develop adequate infrastructure in various areas such as design, construction, manufacture, installation, commissioning and safety assessment of nuclear plants. This paper deals with the development of safety related technology and the relevant infrastructure for safety assessment. A number of computer codes for safety assessment have been developed or adapted in the areas of thermal hydraulics, structural dynamics etc. These codes have undergone extensive validation through data generated in the experimental facilities set up in India as well as participation in international standard problem exercises. Side by side with the development of the tools for safety assessment, the development of safety related technology was also given equal importance. Many of the technologies required for the inspection, ageing assessment and estimation of the residual life of various components and equipment, particularly those having a bearing on safety, were developed. This paper highlights, briefly, the work carried out in some of the areas mentioned above. (author)

  3. Development and implementation of a Bayesian-based aquifer vulnerability assessment in Florida

    Science.gov (United States)

    Arthur, J.D.; Wood, H.A.R.; Baker, A.E.; Cichon, J.R.; Raines, G.L.

    2007-01-01

    The Florida Aquifer Vulnerability Assessment (FAVA) was designed to provide a tool for environmental, regulatory, resource management, and planning professionals to facilitate protection of groundwater resources from surface sources of contamination. The FAVA project implements weights-of-evidence (WofE), a data-driven, Bayesian-probabilistic model to generate a series of maps reflecting relative aquifer vulnerability of Florida's principal aquifer systems. The vulnerability assessment process, from project design to map implementation is described herein in reference to the Floridan aquifer system (FAS). The WofE model calculates weighted relationships between hydrogeologic data layers that influence aquifer vulnerability and ambient groundwater parameters in wells that reflect relative degrees of vulnerability. Statewide model input data layers (evidential themes) include soil hydraulic conductivity, density of karst features, thickness of aquifer confinement, and hydraulic head difference between the FAS and the watertable. Wells with median dissolved nitrogen concentrations exceeding statistically established thresholds serve as training points in the WofE model. The resulting vulnerability map (response theme) reflects classified posterior probabilities based on spatial relationships between the evidential themes and training points. The response theme is subjected to extensive sensitivity and validation testing. Among the model validation techniques is calculation of a response theme based on a different water-quality indicator of relative recharge or vulnerability: dissolved oxygen. Successful implementation of the FAVA maps was facilitated by the overall project design, which included a needs assessment and iterative technical advisory committee input and review. Ongoing programs to protect Florida's springsheds have led to development of larger-scale WofE-based vulnerability assessments. Additional applications of the maps include land-use planning

  4. Multi-hazards coastal vulnerability assessment of Goa, India, using geospatial techniques.

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.; Jauhari, N.; Mehrotra, U.; Kotha, M.; Hursthouse, A.S.; Gagnon, A.S.

    that are the most and least vulnerable to erosion, flooding and inundation of coastal lands, and that the inclusion of socio-economic parameters influences the overall assessment of vulnerability. This study provides information aimed at increasing awareness amongst...

  5. Integrating Science and Management to Assess Forest Ecosystem Vulnerability to Climate Change

    Science.gov (United States)

    Leslie A. Brandt; Patricia R. Butler; Stephen D. Handler; Maria K. Janowiak; P. Danielle Shannon; Christopher W. Swanston

    2017-01-01

    We developed the ecosystem vulnerability assessment approach (EVAA) to help inform potential adaptation actions in response to a changing climate. EVAA combines multiple quantitative models and expert elicitation from scientists and land managers. In each of eight assessment areas, a panel of local experts determined potential vulnerability of forest ecosystems to...

  6. Assessing social vulnerability in African urban context. The challenge to cope with climate change induced hazards by communities and households

    Science.gov (United States)

    Kabisch, Sigrun; Jean-Baptiste, Nathalie

    2013-04-01

    Social vulnerability assessment remains central in discourses on global climatic change and takes a more pertinent meaning considering that natural disasters in African countries continue to deeply affect human settlements and destroys human livelihoods. In recent years, in particular large territories and growing cities have experienced severe weather events. Among them are river and flash floods, affecting the social and economic assets of local populations. The impact of the damage related to floods is not only perceptible during seasonal events but also during unexpected larger disasters which place a particular burden on local population and institutions to adapt effectively to increasing climatic pressures. Important features for social vulnerability assessment are the increasing severity of the physical damages, the shortcoming of social and technical infrastructure, the complexity of land management/market, the limited capacity of local institutions and last but not least the restricted capacities of local population to resist these events. Understanding vulnerability implies highlighting and interlinking relevant indicators and/or perceptions encompassed in four main dimensions: social, institutional, physical and attitudinal vulnerability. Case studies in Dar es Salaam, Ouagadougou and Addis Ababa were carried out to obtain insights into the context-related conditions, behavior routines and survival networks in urban areas in west and east Africa. Using a combination of tools (e.g. focus group discussions, transect walks, interviews) we investigated in close cooperation with African partners how households and communities are being prepared to cope with, as well as to recover from floods. A comprehensive process of dealing with floods can be described based on sequential attributes concerning i) Anticipation before a flood occurs, ii) Resistance and coping activities during a flood event and, iii) Recovery and reconstruction afterwards. A participatory

  7. Data Integration for Climate Vulnerability Mapping in West Africa

    Directory of Open Access Journals (Sweden)

    Alex de Sherbinin

    2015-11-01

    Full Text Available Vulnerability mapping reveals areas that are likely to be at greater risk of climate-related disasters in the future. Through integration of climate, biophysical, and socioeconomic data in an overall vulnerability framework, so-called “hotspots” of vulnerability can be identified. These maps can be used as an aid to targeting adaptation and disaster risk management interventions. This paper reviews vulnerability mapping efforts in West Africa conducted under the USAID-funded African and Latin American Resilience to Climate Change (ARCC project. The focus is on the integration of remotely sensed and socioeconomic data. Data inputs included a range of sensor data (e.g., MODIS NDVI, Landsat, SRTM elevation, DMSP-OLS night-time lights as well as high-resolution poverty, conflict, and infrastructure data. Two basic methods were used, one in which each layer was transformed into standardized indicators in an additive approach, and another in which remote sensing data were used to contextualize the results of composite indicators. We assess the benefits and challenges of data integration, and the lessons learned from these mapping exercises.

  8. Vulnerability Assessment of Water Supply Systems: Status, Gaps and Opportunities

    Science.gov (United States)

    Wheater, H. S.

    2015-12-01

    Conventional frameworks for assessing the impacts of climate change on water resource systems use cascades of climate and hydrological models to provide 'top-down' projections of future water availability, but these are subject to high uncertainty and are model and scenario-specific. Hence there has been recent interest in 'bottom-up' frameworks, which aim to evaluate system vulnerability to change in the context of possible future climate and/or hydrological conditions. Such vulnerability assessments are generic, and can be combined with updated information from top-down assessments as they become available. While some vulnerability methods use hydrological models to estimate water availability, fully bottom-up schemes have recently been proposed that directly map system vulnerability as a function of feasible changes in water supply characteristics. These use stochastic algorithms, based on reconstruction or reshuffling methods, by which multiple water supply realizations can be generated under feasible ranges of change in water supply conditions. The paper reports recent successes, and points to areas of future improvement. Advances in stochastic modeling and optimization can address some technical limitations in flow reconstruction, while various data mining and system identification techniques can provide possibilities to better condition realizations for consistency with top-down scenarios. Finally, we show that probabilistic and Bayesian frameworks together can provide a potential basis to combine information obtained from fully bottom-up analyses with projections available from climate and/or hydrological models in a fully integrated risk assessment framework for deep uncertainty.

  9. Impact Assessment of Its Applications for Vulnerable Road Users

    NARCIS (Netherlands)

    Scholliers, J.; Noort, M. van; Johansson, C.; Mans, D.; Silla, A.; Bell, D.; Hancox, G.; Leden, L.; Giannelos, I.; Bax, B.; Malone, K.

    2016-01-01

    The EU-sponsored VRUITS project has prioritized ITS applications which have a potential to improve the safety, mobility and comfort of vulnerable road users (VRUs) and performed a quantitative safety, mobility and comfort assessment for the 10 most promising systems. The assessment methodology

  10. Impact assessment of ITS applications for vulnerable road users.

    NARCIS (Netherlands)

    Scholliers, J. Noort, M. van Johansson, C. Mans, D. Silla, A. Bell, D. Hancox, G. Leden, L. Giannelos, I. Bax, B. & Malone, K.

    2017-01-01

    The EU-sponsored VRUITS project has prioritized ITS applications which have a potential to improve the safety, mobility and comfort of vulnerable road users (VRUs) and performed a quantitative safety, mobility and comfort assessment for the 10 most promising systems. The assessment methodology

  11. (Non-) robustness of vulnerability assessments to climate change: An application to New Zealand.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago; Renteria, Willington

    2017-12-01

    Assessments of vulnerability to climate change are a key element to inform climate policy and research. Assessments based on the aggregation of indicators have a strong appeal for their simplicity but are at risk of over-simplification and uncertainty. This paper explores the non-robustness of indicators-based assessments to changes in assumptions on the degree of substitution or compensation between indicators. Our case study is a nationwide assessment for New Zealand. We found that the ranking of geographic areas is sensitive to different parameterisations of the aggregation function, that is, areas that are categorised as highly vulnerable may switch to the least vulnerable category even with respect to the same climate hazards and population groups. Policy implications from the assessments are then compromised. Though indicators-based approaches may help on identifying drivers of vulnerability, there are weak grounds to use them to recommend mitigation or adaptation decisions given the high level of uncertainty because of non-robustness. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. A novel method of sensitivity analysis testing by applying the DRASTIC and fuzzy optimization methods to assess groundwater vulnerability to pollution: the case of the Senegal River basin in Mali

    Science.gov (United States)

    Souleymane, Keita; Zhonghua, Tang

    2017-08-01

    Vulnerability to groundwater pollution in the Senegal River basin was studied by two different but complementary methods: the DRASTIC method (which evaluates the intrinsic vulnerability) and the fuzzy method (which assesses the specific vulnerability by taking into account the continuity of the parameters). The validation of this application has been tested by comparing the connection in groundwater and distribution of different established classes of vulnerabilities as well as the nitrate distribution in the study area. Three vulnerability classes (low, medium and high) have been identified by both the DRASTIC method and the fuzzy method (between which the normalized model was used). An integrated analysis reveals that high classes with 14.64 % (for the DRASTIC method), 21.68 % (for the normalized DRASTIC method) and 18.92 % (for the fuzzy method) are not the most dominant. In addition, a new method for sensitivity analysis was used to identify (and confirm) the main parameters which impact the vulnerability to pollution with fuzzy membership. The results showed that the vadose zone is the main parameter which impacts groundwater vulnerability to pollution while net recharge contributes least to pollution in the study area. It was also found that the fuzzy method better assesses the vulnerability to pollution with a coincidence rate of 81.13 % versus that of 77.35 % for the DRASTIC method. These results serve as a guide for policymakers to identify areas sensitive to pollution before such sites are used for socioeconomic infrastructures.

  13. Vulnerability assessment of storm surges in the coastal area of Guangdong Province

    Directory of Open Access Journals (Sweden)

    K. Li

    2011-07-01

    Full Text Available Being bordered by the South China Sea and with long coastline, the coastal zone of Guangdong Province is often under severe risk of storm surges, as one of a few regions in China which is seriously threatened by storm surges. This article systematically analyzes the vulnerability factors of storm surges in the coastal area of Guangdong (from Yangjing to Shanwei. Five vulnerability assessment indicators of hazard-bearing bodies are proposed, which are social economic index, land use index, eco-environmental index, coastal construction index, and disaster-bearing capability index. Then storm surge vulnerability assessment index system in the coastal area of Guangdong is established. Additionally, the international general mode about coastal vulnerability assessment is improved, and the vulnerability evolution model of storm surges in the coastal area of Guangdong is constructed. Using ArcGIS, the vulnerability zoning map of storm surges in the study region is drawn. Results show that there is the highest degree of storm surge vulnerability in Zhuhai, Panyu, and Taishan; second in Zhongshan, Dongguan, Huiyang, and Haifeng; third in Jiangmen, Shanwei, Yangjiang, and Yangdong; fourth in Baoan, Kaiping, and Enping; and lowest in Guangzhou, Shunde, Shenzhen, and Longgang. This study on the risk of storm surges in these coastal cities can guide the land use of coastal cities in the future, and provide scientific advice for the government to prevent and mitigate the storm surge disasters. It has important theoretical and practical significance.

  14. Performance-based methodology for assessing seismic vulnerability and capacity of buildings

    Science.gov (United States)

    Shibin, Lin; Lili, Xie; Maosheng, Gong; Ming, Li

    2010-06-01

    This paper presents a performance-based methodology for the assessment of seismic vulnerability and capacity of buildings. The vulnerability assessment methodology is based on the HAZUS methodology and the improved capacitydemand-diagram method. The spectral displacement ( S d ) of performance points on a capacity curve is used to estimate the damage level of a building. The relationship between S d and peak ground acceleration (PGA) is established, and then a new vulnerability function is expressed in terms of PGA. Furthermore, the expected value of the seismic capacity index (SCev) is provided to estimate the seismic capacity of buildings based on the probability distribution of damage levels and the corresponding seismic capacity index. The results indicate that the proposed vulnerability methodology is able to assess seismic damage of a large number of building stock directly and quickly following an earthquake. The SCev provides an effective index to measure the seismic capacity of buildings and illustrate the relationship between the seismic capacity of buildings and seismic action. The estimated result is compared with damage surveys of the cities of Dujiangyan and Jiangyou in the M8.0 Wenchuan earthquake, revealing that the methodology is acceptable for seismic risk assessment and decision making. The primary reasons for discrepancies between the estimated results and the damage surveys are discussed.

  15. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  16. Development and Application of Urban Landslide Vulnerability Assessment Methodology Reflecting Social and Economic Variables

    Directory of Open Access Journals (Sweden)

    Yoonkyung Park

    2016-01-01

    Full Text Available An urban landslide vulnerability assessment methodology is proposed with major focus on considering urban social and economic aspects. The proposed methodology was developed based on the landslide susceptibility maps that Korean Forest Service utilizes to identify landslide source areas. Frist, debris flows are propagated to urban areas from such source areas by Flow-R (flow path assessment of gravitational hazards at a regional scale, and then urban vulnerability is assessed by two categories: physical and socioeconomic aspect. The physical vulnerability is related to buildings that can be impacted by a landslide event. This study considered two popular building structure types, reinforced-concrete frame and nonreinforced-concrete frame, to assess the physical vulnerability. The socioeconomic vulnerability is considered a function of the resistant levels of the vulnerable people, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. To illustrate the validity of the proposed methodology, physical and socioeconomic vulnerability levels are analyzed for Seoul, Korea, using the suggested approach. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.

  17. Environmental impact assessment: Classification of ecosystems with respect to vulnerability for radioactive contamination

    International Nuclear Information System (INIS)

    Blytt, Line Diana

    1999-01-01

    This presentation recommends that an environmental impact assessment should be made ahead of any major action plan in the environment. The final document should point out to the authorities and public that expertise has been systematised in order to predict the effects of an action plan on the environment. This should be done for different scenarios and time scales. A useful tool for an environmental impact assessment is GIS, Geographic Information Systems. It can be used to identify areas and ecosystems that are vulnerable to radioactive contamination. To predict the radiation dose to humans and biota, a vulnerability assessment considers population density, land use, economic resources and the chemical and biological pathways of radionuclides in different ecosystems. Supplemented with knowledge of consumption and dietary habits a vulnerability assessment can be used to identify critical groups and to calculate doses to these groups. For ecosystems, vulnerability can be quantified by using critical loads for radioactive contamination or flux of radionuclides from an area. One criterion for critical load can be that intervention limits for food products should not be exceeded. If the critical load is low, this indicates a high vulnerability. The flux from an area can also identify vulnerability and it can be used to calculate collective dose. The vulnerability approach is a methodology that can be used to select areas that are suitable for treatment, transport and disposal of radioactive waste

  18. A flood vulnerability index for coastal cities and its use in assessing climate change impacts

    NARCIS (Netherlands)

    Balica, S.F.; Wright, N.G.; Van der Meulen, F.

    2012-01-01

    Worldwide, there is a need to enhance our understanding of vulnerability and to develop methodologies and tools to assess vulnerability. One of the most important goals of assessing coastal flood vulnerability, in particular, is to create a readily understandable link between the theoretical

  19. Comparison of Flood Vulnerability Assessments to Climate Change by Construction Frameworks for a Composite Indicator

    Directory of Open Access Journals (Sweden)

    Jong Seok Lee

    2018-03-01

    Full Text Available As extreme weather conditions due to climate change can cause deadly flood damages all around the world, a role of the flood vulnerability assessment has become recognized as one of the preemptive measures in nonstructural flood mitigation strategies. Although the flood vulnerability is most commonly assessed by a composite indicator compiled from multidimensional phenomena and multiple conflicting criteria associated with floods, directly or indirectly, it has been often overlooked that the construction frameworks and processes can have a significant influence on the flood vulnerability indicator outcomes. This study has, therefore, compared the flood vulnerability ranking orders for the 54 administrative districts in the Nakdong River Watershed of the Korean Peninsula, ranked from composite indicators by different frameworks and multi-attribute utility functions for combining the three assessment components, such as exposure, sensitivity, and coping, presented in the IPCC Third Assessment Report. The results show that the different aggregation components and utility functions under the same proxy variable system can lead to larger volatility of flood vulnerability rankings than expected. It is concluded that the vulnerability indicator needs to be derived from all three assessment components by a multiplicative utility function for a desirable flood vulnerability assessment to climate change.

  20. Vulnerability Assessments in Support of the Climate Ready ...

    Science.gov (United States)

    As part of the Climate Ready Estuaries (CRE) program, the Global Change Research Program (GCRP) in the National Center for Environmental Assessment, Office of Research and Development at the U.S. Environmental Protection Agency has prepared this draft report exploring a new methodology for climate change vulnerability assessments using San Francisco Bay’s salt marsh and mudflat ecosystems as a demonstration. N/A

  1. The use of climate information in vulnerability assessments.

    Science.gov (United States)

    2011-01-01

    This memorandum focuses on the use of climate information when performing a vulnerability : assessment, a topic that was discussed at the Newark Pilot Peer Exchange Workshop on May 4-5, : 2011. The memorandum describes several sources of climate info...

  2. Development of a Malicious Insider Composite Vulnerability Assessment Methodology

    National Research Council Canada - National Science Library

    King, William H

    2006-01-01

    .... There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization's malicious insider mitigation strategies...

  3. A geographical and multi-criteria vulnerability assessment of transportation networks against extreme earthquakes

    International Nuclear Information System (INIS)

    Kermanshah, A.; Derrible, S.

    2016-01-01

    The purpose of this study is to provide a geographical and multi-criteria vulnerability assessment method to quantify the impacts of extreme earthquakes on road networks. The method is applied to two US cities, Los Angeles and San Francisco, both of which are susceptible to severe seismic activities. Aided by the recent proliferation of data and the wide adoption of Geography Information Systems (GIS), we use a data-driven approach using USGS ShakeMaps to determine vulnerable locations in road networks. To simulate the extreme earthquake, we remove road sections within “very strong” intensities provided by USGS. Subsequently, we measure vulnerability as a percentage drop in four families of metrics: overall properties (length of remaining system); topological indicators (betweenness centrality); accessibility; and travel demand using Longitudinal Employment Household Dynamics (LEHD) data. The various metrics are then plotted on a Vulnerability Surface (VS), from which the area can be assimilated to an overall vulnerability indicator. This VS approach offers a simple and pertinent method to capture the impacts of extreme earthquake. It can also be useful to planners to assess the robustness of various alternative scenarios in their plans to ensure that cities located in seismic areas are better prepared to face severe earthquakes. - Highlights: • Developed geographical and multi-criteria vulnerability assessment method. • Quantify the impacts of extreme earthquakes on transportation networks. • Data-driven approach using USGS ShakeMaps to determine vulnerable locations. • Measure vulnerability as a percentage drop in four families of metrics: ○Overall properties. ○Topological indicators. ○Accessibility. ○Travel demand using Longitudinal Employment Household Dynamics (LEHD) data. • Developed Vulnerability Surface (VS), a new pragmatic vulnerability indicator.

  4. Assessment of Logistics effects from Transport Infrastructure Investments

    DEFF Research Database (Denmark)

    Holvad, Torben; Salling, Kim Bang

    2004-01-01

    on the basis of the importance of this research area from a societal and economic viewpoint. This paper aims to identify a framework for assessment of logistic effects from transport infrastructure investment such that these effects can be integrated into the appraisal methodologies. Particular attention...

  5. Assessment of groundwater vulnerability by applying the modified DRASTIC model in Beihai City, China.

    Science.gov (United States)

    Wu, Xiaoyu; Li, Bin; Ma, Chuanming

    2018-05-01

    This study assesses vulnerability of groundwater to pollution in Beihai City, China, as a support of groundwater resource protection. The assessment result not only objectively reflects potential possibility of groundwater to contamination but also provides scientific basis for the planning and utilization of groundwater resources. This study optimizes the parameters consisting of natural factors and human factors upon the DRASTIC model and modifies the ratings of these parameters, based on the local environmental conditions for the study area. And a weight of each parameter is assigned by the analytic hierarchy process (AHP) to reduce the subjectivity of humans to vulnerability assessment. The resulting scientific ratings and weights of modified DRASTIC model (AHP-DRASTLE model) contribute to obtain the more realistic assessment of vulnerability of groundwater to contaminant. The comparison analysis validates the accuracy and rationality of the AHP-DRASTLE model and shows it suits the particularity of the study area. The new assessment method (AHP-DRASTLE model) can provide a guide for other scholars to assess the vulnerability of groundwater to contamination. The final vulnerability map for the AHP-DRASTLE model shows four classes: highest (2%), high (29%), low (55%), and lowest (14%). The vulnerability map serves as a guide for decision makers on groundwater resource protection and land use planning at the regional scale and that it is adapted to a specific area.

  6. Environmental vulnerability assessment using Grey Analytic Hierarchy Process based model

    International Nuclear Information System (INIS)

    Sahoo, Satiprasad; Dhar, Anirban; Kar, Amlanjyoti

    2016-01-01

    Environmental management of an area describes a policy for its systematic and sustainable environmental protection. In the present study, regional environmental vulnerability assessment in Hirakud command area of Odisha, India is envisaged based on Grey Analytic Hierarchy Process method (Grey–AHP) using integrated remote sensing (RS) and geographic information system (GIS) techniques. Grey–AHP combines the advantages of classical analytic hierarchy process (AHP) and grey clustering method for accurate estimation of weight coefficients. It is a new method for environmental vulnerability assessment. Environmental vulnerability index (EVI) uses natural, environmental and human impact related factors, e.g., soil, geology, elevation, slope, rainfall, temperature, wind speed, normalized difference vegetation index, drainage density, crop intensity, agricultural DRASTIC value, population density and road density. EVI map has been classified into four environmental vulnerability zones (EVZs) namely: ‘low’, ‘moderate’ ‘high’, and ‘extreme’ encompassing 17.87%, 44.44%, 27.81% and 9.88% of the study area, respectively. EVI map indicates that the northern part of the study area is more vulnerable from an environmental point of view. EVI map shows close correlation with elevation. Effectiveness of the zone classification is evaluated by using grey clustering method. General effectiveness is in between “better” and “common classes”. This analysis demonstrates the potential applicability of the methodology. - Highlights: • Environmental vulnerability zone identification based on Grey Analytic Hierarchy Process (AHP) • The effectiveness evaluation by means of a grey clustering method with support from AHP • Use of grey approach eliminates the excessive dependency on the experience of experts.

  7. Environmental vulnerability assessment using Grey Analytic Hierarchy Process based model

    Energy Technology Data Exchange (ETDEWEB)

    Sahoo, Satiprasad [School of Water Resources, Indian Institute of Technology Kharagpur (India); Dhar, Anirban, E-mail: anirban.dhar@gmail.com [Department of Civil Engineering, Indian Institute of Technology Kharagpur (India); Kar, Amlanjyoti [Central Ground Water Board, Bhujal Bhawan, Faridabad, Haryana (India)

    2016-01-15

    Environmental management of an area describes a policy for its systematic and sustainable environmental protection. In the present study, regional environmental vulnerability assessment in Hirakud command area of Odisha, India is envisaged based on Grey Analytic Hierarchy Process method (Grey–AHP) using integrated remote sensing (RS) and geographic information system (GIS) techniques. Grey–AHP combines the advantages of classical analytic hierarchy process (AHP) and grey clustering method for accurate estimation of weight coefficients. It is a new method for environmental vulnerability assessment. Environmental vulnerability index (EVI) uses natural, environmental and human impact related factors, e.g., soil, geology, elevation, slope, rainfall, temperature, wind speed, normalized difference vegetation index, drainage density, crop intensity, agricultural DRASTIC value, population density and road density. EVI map has been classified into four environmental vulnerability zones (EVZs) namely: ‘low’, ‘moderate’ ‘high’, and ‘extreme’ encompassing 17.87%, 44.44%, 27.81% and 9.88% of the study area, respectively. EVI map indicates that the northern part of the study area is more vulnerable from an environmental point of view. EVI map shows close correlation with elevation. Effectiveness of the zone classification is evaluated by using grey clustering method. General effectiveness is in between “better” and “common classes”. This analysis demonstrates the potential applicability of the methodology. - Highlights: • Environmental vulnerability zone identification based on Grey Analytic Hierarchy Process (AHP) • The effectiveness evaluation by means of a grey clustering method with support from AHP • Use of grey approach eliminates the excessive dependency on the experience of experts.

  8. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  9. Critical Infrastructures: Background, Policy, and Implementation

    National Research Council Canada - National Science Library

    Moteff, John D

    2005-01-01

    .... electricity, the power plants that generate it, and the electric grid upon which it is distributed). The national security community has been concerned for sometime about the vulnerability of critical infrastructure to both physical and cyber attack...

  10. [Vulnerability assessment on the coastal wetlands in the Yangtze Estuary under sea-level rise].

    Science.gov (United States)

    Cui, Li-Fang; Wang, Ning; Ge, Zhen-Ming; Zhang, Li-Quan

    2014-02-01

    To study the response of coastal wetlands to climate change, assess the impacts of climate change on the coastal wetlands and formulate feasible and practical mitigation strategies are the important prerequisite for securing coastal ecosystems. In this paper, the possible impacts of sea level rise caused by climate change on the coastal wetlands in the Yangtze Estuary were analyzed by the Source-Pathway-Receptor-Consequence (SPRC) model and IPCC definition on the vulnerability. An indicator system for vulnerability assessment was established, in which sea-level rise rate, subsidence rate, habitat elevation, inundation threshold of habitat and sedimentation rate were selected as the key indicators. A quantitatively spatial assessment method based on the GIS platform was established by quantifying each indicator, calculating the vulnerability index and grading the vulnerability index for the assessment of coastal wetlands in the Yangtze Estuary under the scenarios of sea-level rise. The vulnerability assessments on the coastal wetlands in the Yangtze Estuary in 2030 and 2050 were performed under two sea-level rise scenarios (the present sea-level rise trend over recent 30 years and IPCC A1F1 scenario). The results showed that with the projection in 2030 under the present trend of sea-level rise (0.26 cm x a(-1)), 6.6% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.8% and 0.2% of the coastal wetlands were in low and moderate vulnerabilities, respectively. With the projection in 2030 under the A1F1 scenario (0.59 cm x a(-1)), 9.0% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.5%, 1.0% and 0.3% of the coastal wetlands were in the low, moderate and high vulnerabilities, respectively.

  11. An atmospheric vulnerability assessment framework for environment management and protection based on CAMx.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-02-01

    This paper presents an atmospheric vulnerability assessment framework based on CAMx that should be helpful to assess potential impacts of changes in human, atmospheric environment, and social economic elements of atmospheric vulnerability. It is also a useful and effective tool that can provide policy-guidance for environmental protection and management to reduce the atmospheric vulnerability. The developed framework was applied to evaluate the atmospheric environment vulnerability of 13 cities in the Beijing-Tianjin-Hebei (BTH) region for verification. The results indicated that regional disparity of the atmospheric vulnerability existed in the study site. More specifically, the central and southern regions show more atmospheric environment vulnerability than the northern regions. The impact factors of atmospheric environment vulnerability in the BTH region mainly derived from increasing population press, frequently unfavorable meteorological conditions, extensive economic growth of secondary industry, increased environmental pollution, and accelerating population aging. The framework shown in this paper is an interpretative and heuristic tool for a better understanding of atmospheric vulnerability. This framework can also be replicated at different spatial and temporal scales using context-specific datasets to straightly support environmental managers with decision-making. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Applying and validating the PTVA-3 Model at the Aeolian Islands, Italy: assessment of the vulnerability of buildings to tsunamis

    Directory of Open Access Journals (Sweden)

    F. Dall'Osso

    2010-07-01

    Full Text Available The volcanic archipelago of the Aeolian Islands (Sicily, Italy is included on the UNESCO World Heritage list and is visited by more than 200 000 tourists per year. Due to its geological characteristics, the risk related to volcanic and seismic activity is particularly high. Since 1916 the archipelago has been hit by eight local tsunamis. The most recent and intense of these events happened on 30 December 2002. It was triggered by two successive landslides along the north-western side of the Stromboli volcano (Sciara del Fuoco, which poured approximately 2–3×107 m3 of rocks and debris into the Tyrrhenian Sea. The waves impacted across the whole archipelago, but most of the damage to buildings and infrastructures occurred on the islands of Stromboli (maximum run-up 11 m and Panarea.

    The aim of this study is to assess the vulnerability of buildings to damage from tsunamis located within the same area inundated by the 2002 event. The assessment is carried out by using the PTVA-3 Model (Papathoma Tsunami Vulnerability Assessment, version 3. The PTVA-3 Model calculates a Relative Vulnerability Index (RVI for every building, based on a set of selected physical and structural attributes. Run-up values within the area inundated by the 2002 tsunami were measured and mapped by the Istituto Italiano di Geofisica e Vulcanologia (INGV and the University of Bologna during field surveys in January 2003. Results of the assessment show that if the same tsunami were to occur today, 54 buildings would be affected in Stromboli, and 5 in Panarea. The overall vulnerability level obtained in this analysis for Stromboli and Panarea are "average"/"low" and "very low", respectively. Nonetheless, 14 buildings in Stromboli are classified as having a "high" or "average" vulnerability. For some buildings, we were able to validate the RVI scores calculated by the PTVA-3 Model through a qualitative comparison with photographs taken by INGV and

  13. Intrinsic vulnerability assessment of shallow aquifers of the sedimentary basin of southwestern Nigeria

    Directory of Open Access Journals (Sweden)

    Saheed A. Oke

    2018-03-01

    Full Text Available The shallow groundwater of the multi-layered sedimentary basin aquifer of southwestern Nigeria was assessed based on its intrinsic vulnerability property. The vulnerability evaluation involves determining the protective cover and infiltration condition of the unsaturated zone in the basin. This was achieved using the PI (P stands for protective cover effectiveness of the overlying lithology and I indicates the degree of infiltration bypass vulnerability method of the European vulnerability approach. The PI method specifically measures the protection cover and the degree to which the protective cover is bypassed. Intrinsic parameters assessed were the subsoil, lithology, topsoil, recharge and fracturing for the protective cover. The saturated hydraulic conductivity of topsoil, infiltration processes and the lateral surface and subsurface flow were evaluated for the infiltration bypassed. The results show moderate to very low vulnerability areas. Low vulnerability areas were characterised by lithology with massive sandstone and limestone, subsoils of sandy loam texture, high slopes and high depth to water table. The moderate vulnerability areas were characterised by high rainfall and high recharge, low water table, unconsolidated sandstones and alluvium lithology. The intrinsic vulnerability properties shown in vulnerability maps will be a useful tool in planning and monitoring land use activities that can be of impact in groundwater pollution.

  14. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  15. Bridging the Gap Between Policy and Research Infrastructure: Risk and Vulnerability Case Study

    Science.gov (United States)

    Hugo, Wim; Rogers, Annabelle

    2017-04-01

    Linking sound scientific data and conclusions to decision and policy support is not a trivial task, and the difficulty in achieving this has been highlighted more than a decade ago (Reid, 2004). There are several reasons why this is the case, inter alia: 1. The language, (vocabularies, framework, and heuristics) adopted by the research community in a specific discipline may not translate into meaningful implementation language (Preston et al., 2015); 2. The researchers may not be in a position of influence (which includes aspects such as writing policy briefs, undertaking personal initiatives, and building up public or industry concern and interest) (Fox and Sitkin, 2015); 3. The frequency, timing, and/or certainty associated with research output is at odds with decision and policy-making cycles. Research typically progresses until there is a defensible level of certainty in statistical assessment of a result, while policy decisions are often made within a regular cycle; 4. Scientists are not trained for, or measured by, the typical work required for decision and policy support: synthesis of scenarios and cost-benefits of such scenarios given sometimes significant uncertainty in the input data, and cross-disciplinary concerns that need to be balanced. There is a significant expectation that research output, being increasingly open, standardised, and managed in formal research data infrastructure, will be useful to policy and decision makers without much additional intervention and modification. We believe that this is unlikely to be feasible in the majority of cases. For most instances, it will be necessary to provide a framework for the translation of scientific output into decision and policy support metrics or indicators at a frequency, with spatial and temporal resolution, and thematic coverage that suits the decision to be made. Such frameworks exist, since the need has been identified - sometimes formally - such as the very detailed framework developed by

  16. Reconsidering the risk assessment concept: Standardizing the impact description as a building block for vulnerability assessment

    Directory of Open Access Journals (Sweden)

    K. Hollenstein

    2005-01-01

    Full Text Available Risk assessments for natural hazards are becoming more widely used and accepted. Using an extended definition of risk, it becomes obvious that performant procedures for vulnerability assessments are vital for the success of the risk concept. However, there are large gaps in knowledge about vulnerability. To alleviate the situation, a conceptual extension of the scope of existing and new models is suggested. The basis of the suggested concept is a stadardization of the output of hazard assessments. This is achieved by defining states of the target objects that depend on the impact and at the same time affect the object's performance characteristics. The possible state variables can be related to a limited set of impact descriptors termed generic impact description interface. The concept suggests that both hazard and vulnerability assessment models are developed according to the specification of this interface, thus facilitating modularized risk assessments. Potential problems related to the application of the concept include acceptance issues and the lacking accuracy of transformation of outputs of existing models. Potential applications and simple examples for adapting existing models are briefly discussed.

  17. Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches

    Science.gov (United States)

    Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea

    2017-04-01

    Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial

  18. Modelling the changing cumulative vulnerability to climate-related hazards for river basin management using a GIS-based multicriteria decision approach

    Science.gov (United States)

    Hung, Hung-Chih; Wu, Ju-Yu; Hung, Chih-Hsuan

    2017-04-01

    , production values of industries, and infrastructures. We then conduct a regression analysis to test the VCM. To illustrate the proposed methodology, the data are collected from the National Science and Technology Center for Disaster Reduction, Taiwan as well as the National Land Use Investigation and official census statistics. 3. Results and policy implications Results of CVAF analysis demonstrate heterogeneous patterns of vulnerability in the region, and highlight trends of long-term changes. The vulnerable areas unfold as clustered patterns and spatial analogues across regions, rather than randomly distributed. Highest cumulative vulnerability is concentrated in densely populated and downstream reaches (such as Taipei City) of the Danshui River in both time periods. When examining the VCM, it indicates that upper stream and more remote areas generally show low vulnerability, increases are observed in some areas between 1996 and 2006 due to land use intensification, industrial and infrastructure expansion. These findings suggest that land use planning should consider the socioeconomic progression and infrastructure investment factors that contribute to urban sprawl and address current as well as future urban developments vulnerable to hazard risk transmission. The cumulative vulnerability assessment, mapping methods and modelling presented here can be applied to other climate change and hazard risks to highlight priority areas for further investigation and contribute towards improving river basin management.

  19. How to Assess Vulnerabilities of Water Policies to Global Change?

    Science.gov (United States)

    Kumar, A.; Haasnoot, M.; Weijs, S.

    2017-12-01

    Water managers are confronted with uncertainties arising from hydrological, societal, economical and political drivers. To manage these uncertainties two paradigms have been identified: top-down and bottom-up approaches. Top-down or prediction-based approaches use socio-economic scenarios together with a discrete set of GCM projections (often downscaled) to assess the expected impact of drivers and policies on water resource system through various hydrological and social systems models. Adaptation strategies to alleviate these impacts are then identified and tested against the scenarios. To address GCM and downscaling uncertainties, these approaches put more focus on climate predictions, rather than the decision problem itself. Triggered by the wish to have a more scenario-neutral approach and address downscaling uncertainties, recent analyses have been shifted towards vulnerability-based (bottom-up or decision-centric) approaches. They begin at the local scale by addressing socio-economic responses to climate, often involving stakeholder's input; identify vulnerabilities under a larger sample of plausible futures and evaluate sensitivity and robustness of possible adaptation options. Several bottom-up approaches have emerged so far and are increasingly recommended. Fundamentally they share several core ideas, however, subtle differences exist in vulnerability assessment, visualization tools for exploring vulnerabilities and computational methods used for identifying robust water policies. Through this study, we try to identify how these approaches are progressing, how the climate and non-climate uncertainties are being confronted and how to integrate existing and new tools. We find that choice of a method may depend on the number of vulnerability drivers identified and type of threshold levels (environmental conditions or policy objectives) defined. Certain approaches are suited well for assessing adaptive capacities, tipping points and sequencing of decisions

  20. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  1. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  2. Capturing subregional variability in regional-scale climate change vulnerability assessments of natural resources

    Science.gov (United States)

    Polly C. Buotte; David L. Peterson; Kevin S. McKelvey; Jeffrey A. Hicke

    2016-01-01

    Natural resource vulnerability to climate change can depend on the climatology and ecological conditions at a particular site. Here we present a conceptual framework for incorporating spatial variability in natural resource vulnerability to climate change in a regional-scale assessment. The framework was implemented in the first regional-scale vulnerability...

  3. A Framework and Metric for resilience concept in water infrastructure

    Science.gov (United States)

    Karamouz, M.; Olyaei, M.

    2017-12-01

    The collaborators of water industries are looking for ways and means to bring resilience into our water infrastructure systems. The key to this conviction is to develop a shared vision among the engineers, builders and decision makers of our water executive branch and policy makers, utilities, community leaders, players, end users and other stakeholders of our urban environment. Among water infrastructures, wastewater treatment plants (WWTP) have a significant role on urban systems' serviceability. These facilities, especially when located in coastal regions, are vulnerable to heavy rain, surface runoff, storm surges and coastal flooding. Flooding can cause overflows from treatment facilities into the natural water bodies and result in environmental predicament of significant proportions. In order to minimize vulnerability to flood, a better understanding of flood risk must be realized. Vulnerability to floods frequency and intensity is increasing by external forcing such as climate change, as well as increased interdependencies in urban systems. Therefore, to quantify the extent of efforts for flood risk management, a unified index is needed for evaluating resiliency of infrastructure. Resiliency is a key concept in understanding vulnerability in dealing with flood. New York City based on its geographic location, its urbanized nature, densely populated area, interconnected water bodies and history of the past flooding events is extremely vulnerable to flood and was selected as the case study. In this study, a framework is developed to evaluate resiliency of WWTPs. An analysis of the current understanding of vulnerability is performed and a new perspective utilizing different components of resiliency including resourcefulness, robustness, rapidity and redundancy is presented. To quantify resiliency and rank the wastewater treatment plants in terms of how resilient they are, an index is developed using Multi Criteria Decision Making (MCDM) technique. Moreover

  4. Pakistan’s Earthquake and Tsunami Hazards Potential Impact on Infrastructure

    Directory of Open Access Journals (Sweden)

    GEORGE PARARAS-CARAYANNIS

    2011-06-01

    Full Text Available Interaction of the Indian, Arabian and Eurasian tectonic plates has resulted in the formation of major active fault systems in South Asia. Compression along the tectonic boundaries results in thrust or reverse type of faulting and zones of crustal deformation characterized by high seismic activity and continuing Orogenesis. The more intense seismic activity occurs near regions of thrust faulting which is developing at the Himalayan foothills. In northern Pakistan, the Hindu Kush Mountains converge with the Karakoram Range to form a part of the Himalayan mountain system. Northern, western as well as southern Pakistan, Kashmir and northern India and Afghanistan are along such zones of high seismic activity. In Pakistan, most of the earthquakes occur in the north and western regions along the boundary of the Indian tectonic plate with the Iranian and Afghan micro-plates. The active zone extends from the Makran region in the southwest to the Hazara-Kashmir syntaxial bend in the north. Southwest Pakistan is vulnerable to both earthquake and tsunami hazards. In 2005, earthquakes devastated northern Pakistan and Kashmir and severely affected the cities of Muzaffarabad, Islamadad and Rawalpindi, causing severe destruction to the infrastructure of the northern region. A major earthquake along an extensive transform fault system in 1935 destroyed the city Quetta and the adjoining region. A major earthquake along the northern Arabian sea in 1945 generated a very destructive tsunami along the coasts of Baluchistan and Sindh Provinces. The region near Karachi is vulnerable as it is located near four major faults where destructive earthquakes and tsunamis have occurred in the past. Given Pakistan’s vulnerability and extensive infrastructure development in recent years, the present study reviews briefly the earthquake and tsunami risk factors and assesses the impact that such disasters can have on the country’s critical infrastructure - which includes

  5. Vulnerability assessments, identity and spatial scale challenges in disaster-risk reduction

    Directory of Open Access Journals (Sweden)

    Edward R. Carr

    2015-11-01

    Full Text Available Current approaches to vulnerability assessment for disaster-risk reduction (DRR commonly apply generalised, a priori determinants of vulnerability to particular hazards in particular places. Although they may allow for policy-level legibility at high levels of spatial scale, these approaches suffer from attribution problems that become more acute as the level of analysis is localised and the population under investigation experiences greater vulnerability. In this article, we locate the source of this problem in a spatial scale mismatch between the essentialist framings of identity behind these generalised determinants of vulnerability and the intersectional, situational character of identity in the places where DRR interventions are designed and implemented. Using the Livelihoods as Intimate Government (LIG approach to identify and understand different vulnerabilities to flooding in a community in southern Zambia, we empirically demonstrate how essentialist framings of identity produce this mismatch. Further, we illustrate a means of operationalising intersectional, situational framings of identity to achieve greater and more productive understandings of hazard vulnerability than available through the application of general determinants of vulnerability to specific places and cases.

  6. Seismic Vulnerability Assessment of Site-Vicinity Infrastructure for Supporting the Accident Management of a Nuclear Power Plant

    Directory of Open Access Journals (Sweden)

    T. J. Katona

    2017-01-01

    Full Text Available Nuclear power plants shall be designed to resist the effects of large earthquakes. The design basis earthquake affects large area around the plant site and can cause serious consequences that will affect the logistical support of the emergency actions at the plant, influence the psychological condition of the plant personnel, and determine the workload of the country’s disaster management personnel. In this paper the main qualitative findings of a study are presented that have been performed for the case of a hypothetical 10−4/a probability design basis earthquake for the Paks Nuclear Power Plant, Hungary. The study covers the qualitative assessment of the postearthquake conditions at the settlements around the plant site including quantitative evaluation of the condition of dwellings. The main goal of the recent phase of the study was to identify public utility vulnerabilities that define the outside support conditions of the nuclear power plant accident management. The results of the study can be used for the planning of logistical support of the plant accident management staff. The study also contributes to better understanding of the working conditions of the disaster management services in the region around the nuclear power plant.

  7. Critical Infrastructure: Control Systems and the Terrorist Threat

    National Research Council Canada - National Science Library

    Shea, Dana A

    2003-01-01

    .... Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber-security for these systems has not been previously perceived as a high priority...

  8. Critical Infrastructure: Control Systems and the Terrorist Threat

    National Research Council Canada - National Science Library

    Shea, Dana A

    2004-01-01

    .... Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber-security for these systems has not been previously perceived as a high priority...

  9. A situational analysis of priority disaster hazards in Uganda: findings from a hazard and vulnerability analysis.

    Science.gov (United States)

    Mayega, R W; Wafula, M R; Musenero, M; Omale, A; Kiguli, J; Orach, G C; Kabagambe, G; Bazeyo, W

    2013-06-01

    Most countries in sub-Saharan Africa have not conducted a disaster risk analysis. Hazards and vulnerability analyses provide vital information that can be used for development of risk reduction and disaster response plans. The purpose of this study was to rank disaster hazards for Uganda, as a basis for identifying the priority hazards to guide disaster management planning. The study as conducted in Uganda, as part of a multi-country assessment. A hazard, vulnerability and capacity analysis was conducted in a focus group discussion of 7 experts representing key stakeholder agencies in disaster management in Uganda. A simple ranking method was used to rank the probability of occurance of 11 top hazards, their potential impact and the level vulnerability of people and infrastructure. In-terms of likelihood of occurance and potential impact, the top ranked disaster hazards in Uganda are: 1) Epidemics of infectious diseases, 2) Drought/famine, 3) Conflict and environmental degradation in that order. In terms of vulnerability, the top priority hazards to which people and infrastructure were vulnerable were: 1) Conflicts, 2) Epidemics, 3) Drought/famine and, 4) Environmental degradation in that order. Poverty, gender, lack of information, and lack of resilience measures were some of the factors promoting vulnerability to disasters. As Uganda develops a disaster risk reduction and response plan, it ought to prioritize epidemics of infectious diseases, drought/famine, conflics and environmental degradation as the priority disaster hazards.

  10. 76 FR 55673 - Vulnerability Assessments in Support of the Climate Ready Estuaries Program: A Novel Approach...

    Science.gov (United States)

    2011-09-08

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9460-8; Docket ID No. EPA-HQ-ORD-2011-0485] Vulnerability... titled, Vulnerability Assessments in Support of the Climate Ready Estuaries Program: A Novel Approach...) and Vulnerability Assessments in Support of the Climate Ready Estuaries Program: A Novel Approach...

  11. Assessment of Vulnerability of Farming Households to Climate ...

    African Journals Online (AJOL)

    Assessment of Vulnerability of Farming Households to Climate Change in Ekiti State, Nigeria. ... Ethiopian Journal of Environmental Studies and Management ... Results of the study indicated that the farming households in Ekiti State witnessed change in weather conditions as reflected in unusual downpour of rain thus ...

  12. Earthquake and Physical and Social Vulnerability Assessment for Settlements: Case Study Avcılar District

    Directory of Open Access Journals (Sweden)

    Görün ARUN

    2010-01-01

    Full Text Available Many settled areas in Turkey and across the globe suffer economical and social losses resulting from natural disasters such as earthquakes, floods, hurricanes and landslides. In this study, a vulnerability assessment model has been developed for earthquake prone areas in Turkey. The vulnerability assessment model includes ground factors, a building’s physical conditions, building evacuation and social (demographic and socioeconomic aspects of the settlement. The ground vulnerability factor is calculated using factors such as the earthquake zone, soil classification, land sliding and liquefaction threats. The physical vulnerability factor depends on the structural and non-structural threats of the building; the building evacuation vulnerability factor includes the position and structural system of the staircase, the width and natural illumination of the evacuation route, the size and opening of the building exit doors to the street and the distance of the building to the closest open area. The social vulnerability factor considers the age group, gender, family type, education, ownership, income etc of the building users. This vulnerability assessment model is applied to a case study - that of the Avcılar district of Istanbul. Forty different reinforced concrete residential buildings (349 apartments of 1225 people are assessed using the develop checklist. In order to evaluate the checklist and to assess the importance (relevance of vulnerability factors, a questionnaire is forwarded to various related professional groups (architecture, urban planning and civil engineering. The results of the questionnaire are examined using SPSS software with factor analysis. According to the results, most of the samples in the case study area can be classified as high vulnerable.

  13. Holistic uncertainty analysis in river basin modeling for climate vulnerability assessment

    Science.gov (United States)

    Taner, M. U.; Wi, S.; Brown, C.

    2017-12-01

    The challenges posed by uncertain future climate are a prominent concern for water resources managers. A number of frameworks exist for assessing the impacts of climate-related uncertainty, including internal climate variability and anthropogenic climate change, such as scenario-based approaches and vulnerability-based approaches. While in many cases climate uncertainty may be dominant, other factors such as future evolution of the river basin, hydrologic response and reservoir operations are potentially significant sources of uncertainty. While uncertainty associated with modeling hydrologic response has received attention, very little attention has focused on the range of uncertainty and possible effects of the water resources infrastructure and management. This work presents a holistic framework that allows analysis of climate, hydrologic and water management uncertainty in water resources systems analysis with the aid of a water system model designed to integrate component models for hydrology processes and water management activities. The uncertainties explored include those associated with climate variability and change, hydrologic model parameters, and water system operation rules. A Bayesian framework is used to quantify and model the uncertainties at each modeling steps in integrated fashion, including prior and the likelihood information about model parameters. The framework is demonstrated in a case study for the St. Croix Basin located at border of United States and Canada.

  14. Assessment on Vulnerable Youths Integration to Dar es Salaam ...

    African Journals Online (AJOL)

    Assessment on Vulnerable Youths Integration to Dar es Salaam Solid Waste ... existing municipal solid waste management crisis facing Dar es Salaam City using ... enabling environment of turning rampant solid waste collection a commercial ...

  15. An assessment of flood vulnerability on physical development along ...

    African Journals Online (AJOL)

    Mohammad

    Key words: Drainage channel, flood, risk assessment, vulnerability. INTRODUCTION ... hydraulic and other control structures.” The effects of floods are always ..... An application of Geographic Information System in mapping flood risk zones in ...

  16. Financail Disaster Risk Mangement Solutions for Life Systems Infrastructure in Low and Middle Income Countries

    Science.gov (United States)

    Skees, J. R.

    2016-12-01

    Growing populations and increased frequency of extreme climate events as a result of anthropogenic climate change will make poor populations more vulnerable in the future. Seismic events (earthquakes and tsunamis) also create extreme hazards for the poor and vulnerable living in cities in low and middle income countries. Vulnerability of life-systems infrastructure (e.g., water treatment facilities, hospitals, protective sea walls, etc.) to extreme climate and seismic events compound problems for the poor and vulnerable. By using risk hazard modelling with engineering design, it is possible to blend improved engineering in concert with financial disaster risk management (including insurance) solutions to improve the resiliency of life-systems infrastructure.

  17. An Assessment of the radiological vulnerability for Spanish soils

    International Nuclear Information System (INIS)

    Trueba, C.; Millan, R.; Schimid, T.; Lago, C.; Gutierrez, J.

    2000-01-01

    A methodology is presented to assess the radiological vulnerability of soils, based exclusively on their pedagogical properties. The radiological vulnerability defined as the potential capacity of soils to fix or transfer deposited radiocaesium and radiostrontium to plants, is represented in terms of vulnerability indexes. Two pathways are considered, the external irradiation and their transfer through the food chain, where the top horizon and a critical depth of 60 cm is taken into account, respectively, Partial vulnerability indexes are considered for each pathway, which allows a qualitative prediction of the behaviour of the contaminants in soils Global indexes have been obtained as the sum of the partial indexes. The methodology has been applied and validated using a data base consisting of more than 2000 soil profiles selected from all over Spain. This included a pedagogical characterisation and normalisation of the different soil profiles. Results have been obtained for individual soil profiles and with the aid of a GIS, the distribution of the partial and global indexes have been presented for the most representative soil types. (Author)

  18. Dynamic vulnerability assessment and intelligent control for sustainable power systems

    CERN Document Server

    Gonzalez-Longatt, Francisco

    2018-01-01

    Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...

  19. A multi-dimensional assessment of urban vulnerability to climate change in Sub-Saharan Africa

    DEFF Research Database (Denmark)

    Herslund, Lise Byskov; Jalyer, Fatameh; Jean-Baptiste, Nathalie

    2016-01-01

    In this paper, we develop and apply a multi-dimensional vulnerability assessment framework for understanding the impacts of climate change-induced hazards in Sub- Saharan African cities. The research was carried out within the European/African FP7 project CLimate change and Urban Vulnerability...... in Africa, which investigated climate change-induced risks, assessed vulnerability and proposed policy initiatives in five African cities. Dar es Salaam (Tanzania) was used as a main case with a particular focus on urban flooding. The multi-dimensional assessment covered the physical, institutional...... encroachment on green and flood-prone land). Scenario modeling suggests that vulnerability will continue to increase strongly due to the expected loss of agricultural land at the urban fringes and loss of green space within the city. However, weak institutional commitment and capacity limit the potential...

  20. The vulnerability of the global container shipping network to targeted link disruption

    CSIR Research Space (South Africa)

    Viljoen, NM

    2016-11-01

    Full Text Available transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure...

  1. Europe's electrical vulnerability geography : historical interpretations of the 2006 'European blackout'

    NARCIS (Netherlands)

    Vleuten, van der E.B.A.; Lagendijk, V.C.

    2009-01-01

    The so-called "European Blackout" of 4 November 2006 counts as a key example of present day transnational infrastructure vulnerability and an important reference in current debates on transnational electricity infrastructure governance. This is best examplified by the debate itself, where proponents

  2. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments.

    Directory of Open Access Journals (Sweden)

    Robert S Rempel

    Full Text Available Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna, wood thrush (Hylocichla mustelina, and hooded warbler (Setophaga citrina. We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species.

  3. Assessment of the intrinsic vulnerability to groundwater contamination in lahore, pakistan

    International Nuclear Information System (INIS)

    Mahmood, K.; Khan, R.M.; Ashfaq, M.; Ahsan, A.

    2015-01-01

    This study was intended to map intrinsic vulnerability of groundwater contamination in Lahore using GIS based DRASTIC model. The final output of DRASTIC model was reclassified into three equal interval classes, corresponding to low, moderate and high vulnerability regions. Most of the study area was found to have low to moderate vulnerability, with 27.48% area of low, 66.48% of moderate and only 6.04% area of high vulnerability. Most of the drinking water wells are installed in the residential area of the city, which shows low chances of contamination due to deep water table and almost no recharge. However, an industrial drain is located in the high vulnerable area in the southeastern part of the study area. The previous studies are in agreement with vulnerability zones. Further to remove any doubt in the suitability of assigned weight, map removal sensitivity analysis had been carried out. The assessment of the sensitivity analysis had been made through visual as well as quantitative methods. Priority order for contribution of the parameters in the vulnerability for the study area is D>I>C>R>A>T>S. (author)

  4. Groundwater vulnerability assessment in karstic aquifers using COP method.

    Science.gov (United States)

    Bagherzadeh, Somayeh; Kalantari, Nasrollah; Nobandegani, Amir Fadaei; Derakhshan, Zahra; Conti, Gea Oliveri; Ferrante, Margherita; Malekahmadi, Roya

    2018-05-02

    Access to safe and reliable drinking water is amongst the important indicators of development in each society, and water scarcity is one of the challenges and limitations affecting development at national and regional levels and social life and economic activity areas. Generally, there are two types of drinking water sources: the first type is surface waters, including lakes, rivers, and streams and the second type is groundwaters existing in aquifers. Amongst aquifers, karst aquifers play an important role in supplying water sources of the world. Therefore, protecting these aquifers from pollution sources is of paramount importance. COP method is amongst the methods to investigate the intrinsic vulnerability of this type of aquifers, so that areas susceptible to contamination can be determined before being contaminated and these sources can be protected. In the present study, COP method was employed in order to spot the regions that are prone to contamination in the region. This method uses the properties of overlying geological layers above the water table (O factor), the concentration of flow (C factor), and precipitation (P factor) over the aquifer, as the parameters to assess the intrinsic vulnerability of groundwater resources. In this regard, geographical information system (GIS) and remote sensing (RS) were utilized to prepare the mentioned factors and the intrinsic vulnerability map was obtained. The results of COP method indicated that the northwest and the west of the region are highly and very vulnerable. This study indicated that regions with low vulnerability were observed in eastern areas, which accounted for 15.6% of the area. Moderate vulnerability was 40% and related to the northeast and southeast of the area. High vulnerability was 38.2% and related to western and southwestern regions. Very high vulnerability was 6.2% and related to the northwest of the area. By means of the analysis of sensitivity of the model, it was determined that the focus

  5. Water availability and vulnerability of 225 large cities in the United States

    Science.gov (United States)

    Padowski, Julie C.; Jawitz, James W.

    2012-12-01

    This study presents a quantitative national assessment of urban water availability and vulnerability for 225 U.S. cities with population greater than 100,000. Here, the urban assessments account for not only renewable water flows, but also the extracted, imported, and stored water that urban systems access through constructed infrastructure. These sources represent important hydraulic components of the urban water supply, yet are typically excluded from water scarcity assessments. Results from this hydraulic-based assessment were compared to those obtained using a more conventional method that estimates scarcity solely based on local renewable flows. The inclusion of hydraulic components increased the mean availability to cities, leading to a significantly lower portion of the total U.S. population considered "at risk" for water scarcity (17%) than that obtained from the runoff method (47%). Water vulnerability was determined based on low-flow conditions, and smaller differences were found for this metric between at-risk populations using the runoff (66%) and hydraulic-based (54%) methods. The large increase in the susceptible population between the scarcity measures evaluated using the hydraulic method may better reconcile the seeming contradiction in the United States between perceptions of natural water abundance and widespread water scarcity. Additionally, urban vulnerability measures developed here were validated using a media text analysis. Vulnerability assessments that included hydraulic components were found to correlate with the frequency of urban water scarcity reports in the popular press while runoff-based measures showed no significant correlation, suggesting that hydraulic-based assessments provide better context for understanding the nature and severity of urban water scarcity issues.

  6. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    Energy Technology Data Exchange (ETDEWEB)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  7. Sensitivity Analysis of DRASTIC Model in Vulnerability Assessment of Shahrood Alluvial Aquifer

    Directory of Open Access Journals (Sweden)

    Shadi Abolhasan Almasi

    2017-07-01

    Full Text Available Groundwater vulnerability assessment is typically accomplished as a management tool to protect groundwater resources. In this research, the DRASTIC model which is an empirical one used for evaluating the potential of an aquifer for pollution was employed to evaluate the vulnerability of Shahrood alluvial aquifer. Moreover, the sensitivity of the model paramneters was assessed to identify the ones with greatest effect on vulnerability. The model layers including depth to groundwater table level, recharge, aquifer media, topography, impact of unsaturated zone, and hydraulic conductivity were prepared and classified in the ArcGIS software based on analyses of both the available data and the layer of surface soil texture using Aster satellite images. Once the vulnerability index was calculated, the sensitivity map of Shahroud aquifer vulnerability was analyzed using the two parameter removal and single parameter sensitivity methods. These were further verified by textural analysis of soil samples from different parts of the region. The layers with appropriate weights were overlaid and the DRASTIC index of the aquifer was estimated at 28 to 148. The highest vulnerability was detected in the northern margins and southwestern parts of the aquifer while other parts were characterized by medium to low vulnerability. The low nitrogen concentration observed in the farm areas and its rise to 45 mg/l in the northern stretches of the aquifer bear witness to the accuracy of the zoning rendered by the DRASTIC model. Based on the vulnerability map of Sharoud aquifer, it was found that 1.6% of the aquifer’s area has a very high vulnerability or potential for pollution followed by 10%, 28.8%, and 18.9% of the area were identified as having high, medium and low potentials for pollution, respecytively. The remaining (i.e., 40.5% was found to have no risk of pollution.

  8. Decision analysis and risk models for land development affecting infrastructure systems.

    Science.gov (United States)

    Thekdi, Shital A; Lambert, James H

    2012-07-01

    Coordination and layering of models to identify risks in complex systems such as large-scale infrastructure of energy, water, and transportation is of current interest across application domains. Such infrastructures are increasingly vulnerable to adjacent commercial and residential land development. Land development can compromise the performance of essential infrastructure systems and increase the costs of maintaining or increasing performance. A risk-informed approach to this topic would be useful to avoid surprise, regret, and the need for costly remedies. This article develops a layering and coordination of models for risk management of land development affecting infrastructure systems. The layers are: system identification, expert elicitation, predictive modeling, comparison of investment alternatives, and implications of current decisions for future options. The modeling layers share a focus on observable factors that most contribute to volatility of land development and land use. The relevant data and expert evidence include current and forecasted growth in population and employment, conservation and preservation rules, land topography and geometries, real estate assessments, market and economic conditions, and other factors. The approach integrates to a decision framework of strategic considerations based on assessing risk, cost, and opportunity in order to prioritize needs and potential remedies that mitigate impacts of land development to the infrastructure systems. The approach is demonstrated for a 5,700-mile multimodal transportation system adjacent to 60,000 tracts of potential land development. © 2011 Society for Risk Analysis.

  9. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1

    International Nuclear Information System (INIS)

    Kahal, E.J.; Murphy, S.L.; Salaymeh, S.R.

    1994-09-01

    As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilities identified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

  10. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    Science.gov (United States)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  11. Assessing the social sustainability contribution of an infrastructure project under conditions of uncertainty

    International Nuclear Information System (INIS)

    Sierra, Leonardo A.; Yepes, Víctor; Pellicer, Eugenio

    2017-01-01

    Assessing the viability of a public infrastructure includes economic, technical and environmental aspects; however, on many occasions, the social aspects are not always adequately considered. This article proposes a procedure to estimate the social sustainability of infrastructure projects under conditions of uncertainty, based on a multicriteria deterministic method. The variability of the method inputs is contributed by the decision-makers. Uncertain inputs are treated through uniform and beta PERT distributions. The Monte Carlo method is used to propagate uncertainty in the method. A case study of a road infrastructure improvement in El Salvador is used to illustrate this treatment. The main results determine the variability of the short and long-term social improvement indices by infrastructure and the probability of the position in the prioritization of the alternatives. The proposed mechanism improves the reliability of the decision making early in infrastructure projects, taking their social contribution into account. The results can complement environmental and economic sustainability assessments. - Highlights: •Estimate the social sustainability of infrastructure projects under conditions of uncertainty •The method uses multicriteria and Monte Carlo techniques and beta PERT distributions •Determines variability of the short and long term social improvement •Determines probability in the prioritization of alternatives •Improves reliability of decision making considering the social contribution

  12. A Preliminary Assessment of Social Vulnerability in Ganga-Brahmaputra-Meghna Delta

    Science.gov (United States)

    Hazra, Sugata; Islam, Nabiul

    2017-04-01

    The Ganga-Brahmaputra-Meghna (GBM) Delta has a high population density and is exposed to rapid environmental changes making it one of the most stressed deltas in the world. The low-lying coastal areas of the Ganga-Brahmaputra-Meghna (GBM) Delta comprise 19 coastal districts of Bangladesh and two districts in India with significant land areas within 5 meters of sea level has a population of more than 50 million people at an average population density of 1100 people/km2. This population is exposed to a range of hazards such as severe cyclones, coastal erosion, and salinization, exacerbated by climate change and subsidence which imply severe stress on the resource dependent community of this region. This situation is further complicated by poverty and limited social well-being such as poor access to education/ health/ drinking water/ sanitation facilities, and lack of food and energy security. Thus assessing social vulnerability can help to understand which communities are susceptible to environmental change and guide adaptation actions to address these threats. This preliminary study aims to construct a socio-economic index by assessing the social vulnerability of coastal communities of GBM Delta taking consistent and common secondary data from the Census of India and the Bangladesh Bureau of Statisticsand applyinga Principle Component Analysis(PCA) methodology. Several statistical tests like Kaiser-Meyer-Olkin (KMO) have also been used to assess the appropriateness of using PCA. Among the selected common indicators, five major components are found to explain majority of the total variation of social vulnerability across the delta: (1) poverty, (2) dependency ratio, (3) agriculture dependency, (4) lack of sanitation and (5) existence of mud houses. The most important observation is the existence of a social vulnerability gradient across the coast. In other words, socially marginalised and vulnerable communities are found on the Delta margin in both India and

  13. Assessment of the biodiesel distribution infrastructure in Canada

    International Nuclear Information System (INIS)

    Lagace, C.

    2007-08-01

    Canada's biodiesel industry is in its infancy, and must work to achieve the demand needed to ensure its development. This assessment of Canada's biodiesel distribution infrastructure was conducted to recommend the most efficient infrastructure pathway for effective biodiesel distribution. The study focused on the establishment of a link between biodiesel supplies and end-users. The current Canadian biodiesel industry was discussed, and future market potentials were outlined. The Canadian distillate product distribution infrastructure was discussed. Technical considerations and compliance issues were reviewed. The following 2 scenarios were used to estimate adaptations and costs for the Canadian market: (1) the use of primary terminals to ensure quality control of biodiesel, and (2) storage in secondary terminals where biodiesel blends are prepared before being transported to retail outlets. The study showed that relevant laboratory training programs are needed as well as proficiency testing programs in order to ensure adequate quality control of biodiesel. Standards for biodiesel distribution are needed, as well as specifications for the heating oil market. It was concluded that this document may prove useful in developing government policy objectives and identifying further research needs. 21 refs., 12 tabs., 13 figs

  14. Assessing the Vulnerability of Wheat Farmers to Drought in North of Fars Province

    Directory of Open Access Journals (Sweden)

    H. Iraji

    2016-03-01

    Full Text Available Introduction: Iran is constantly exposed to natural disasters such as floods, earthquakes and drought. In the meantime, drought is the major natural disaster which leads to numerous losses in agriculture and water resources, and this phenomenon is slow and creeping.Available evidence suggests that drought management is based on crisis management. As the present management in our country is based on crisis management, and drought-proneareasin thecountryhave become a society vulnerable to drought. So, the authorities require a new set of data for drought preparedness to deal with these challenges, in order to obtain the resources to be properly and effectively prioritized and reduce the effects of drought and its consequences. Undoubtedly, the starting point of vulnerability assessment and risk management is a prerequisite that has been sadly neglected in our country. In this context, the aim of this study is to determine the vulnerability of technical, economic and social vulnerability assessment determined before and after the drought and vulnerability patterns for wheat farmers in the North of Fars province. Materials and Methods: The vulnerability of wheat farmers in the North of Fars province is determined using three methods. The first method measured ex ante vulnerability based on estimated income distributions, and the other identified ex post vulnerability according to farmers asset positions and drought coping strategy in the 1390 drought. The final section determined the patterns of vulnerability using cluster analysis and data mining. A sample of 203 farmers in three plains was selected for interview and collection of necessary farm level data for two years (1390 and 1391 was carried out. In this study, to assess the vulnerability of households in the North of Fars province against drought, the formula Me-bar and Valdez has been used. In North of Fars province, as many other fields, agriculture is the main source of income and income

  15. Critical infrastructure protection research results of the first critical infrastructure protection research project in Hungary

    CERN Document Server

    Padányi, József

    2016-01-01

    This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TÁMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatrinics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Óbuda University and the National University of Public Service.

  16. Vulnerability assessment of urban ecosystems driven by water resources, human health and atmospheric environment

    Science.gov (United States)

    Shen, Jing; Lu, Hongwei; Zhang, Yang; Song, Xinshuang; He, Li

    2016-05-01

    As ecosystem management is a hotspot and urgent topic with increasing population growth and resource depletion. This paper develops an urban ecosystem vulnerability assessment method representing a new vulnerability paradigm for decision makers and environmental managers, as it's an early warning system to identify and prioritize the undesirable environmental changes in terms of natural, human, economic and social elements. The whole idea is to decompose a complex problem into sub-problem, and analyze each sub-problem, and then aggregate all sub-problems to solve this problem. This method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators, and socio-economic elements. Decision makers can find out relevant urban ecosystem vulnerability assessment results with different vulnerable attitude. To test the potential of the vulnerability methodology, it has been applied to a case study area in Beijing, China, where it proved to be reliable and consistent with the Beijing City Master Plan. The results of urban ecosystem vulnerability assessment can support decision makers in evaluating the necessary of taking specific measures to preserve the quality of human health and environmental stressors for a city or multiple cities, with identifying the implications and consequences of their decisions.

  17. Projecting Drivers of Human Vulnerability under the Shared Socioeconomic Pathways.

    Science.gov (United States)

    Rohat, Guillaume

    2018-03-19

    The Shared Socioeconomic Pathways (SSPs) are the new set of alternative futures of societal development that inform global and regional climate change research. They have the potential to foster the integration of socioeconomic scenarios within assessments of future climate-related health impacts. To date, such assessments have primarily superimposed climate scenarios on current socioeconomic conditions only. Until now, the few assessments of future health risks that employed the SSPs have focused on future human exposure-i.e., mainly future population patterns-, neglecting future human vulnerability. This paper first explores the research gaps-mainly linked to the paucity of available projections-that explain such a lack of consideration of human vulnerability under the SSPs. It then highlights the need for projections of socioeconomic variables covering the wide range of determinants of human vulnerability, available at relevant spatial and temporal scales, and accounting for local specificities through sectoral and regional extended versions of the global SSPs. Finally, this paper presents two innovative methods of obtaining and computing such socioeconomic projections under the SSPs-namely the scenario matching approach and an approach based on experts' elicitation and correlation analyses-and applies them to the case of Europe. They offer a variety of possibilities for practical application, producing projections at sub-national level of various drivers of human vulnerability such as demographic and social characteristics, urbanization, state of the environment, infrastructure, health status, and living arrangements. Both the innovative approaches presented in this paper and existing methods-such as the spatial disaggregation of existing projections and the use of sectoral models-show great potential to enhance the availability of relevant projections of determinants of human vulnerability. Assessments of future climate-related health impacts should thus rely

  18. Focus on CSIR research in water resources: improved methods for aquifer vulnerability assessments and protocols (AVAP) for producing vulnerability maps, taking into account information on soils

    CSIR Research Space (South Africa)

    Colvin, C

    2007-08-01

    Full Text Available for Aquifer Vulnerability Assessments and Protocols (AVAP) for producing vulnerability maps, taking into account information on soils Groundwater resources are increas- ingly threatened by pollution. The AVAP project was initiated to develop improved... characteristics. Both intrinsic and specific vulnerability are taken into account. The approach used to determine the vulnerability of the in- termediate zone involved the descrip- tion and quantification of the factors that influence vulnerability (unsatu...

  19. A method proposal for cumulative environmental impact assessment based on the landscape vulnerability evaluation

    International Nuclear Information System (INIS)

    Pavlickova, Katarina; Vyskupova, Monika

    2015-01-01

    Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impact significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process

  20. Exposure and vulnerability assessment of buildings extracted from lidar derived datasets in Bucao River floodplains, Zambales, Philippines

    Science.gov (United States)

    Paz-Alberto, Annie Melinda; Ramos, Gloria N.; Espiritu, Jo Adrianne; Mapanao, Kathrina M.; Lao, Ranilo B.

    2017-09-01

    The Philippines has a geographic and geological setting that make it prone to various hazards including weather and climate-related. It is usually strongly affected by monsoon and typhoon occurrences that cause floods due to torrential rains that causes great risks in man's life and properties, resulting in a significant national loss. Strategies for disaster prevention to protect human lives, properties and social infrastructure is therefore necessary. Different important parameters in disaster risk management such as earth observations, Light Detection and Ranging and Geographic Information System were integrated and utilized in this study. This study dealt with mapping and assessment of buildings that might possibly be exposed and vulnerable to flooding based on the simulated flood maps at different rainfall scenarios in Bucao River Basin. The assessment was done through GIS overlay analysis of the CLSU PHIL-LiDAR 1 Project outputs, the 3D building GIS database and flood hazard maps. Results of this study were series of maps with statistics at different rainfall scenarios. From 23,097 building features extracted, 10,118 buildings, 4,258 buildings and 7,433 buildings were the identified highest number of buildings exposed to flooding and a total of 2,427 buildings, 3,914 buildings and 7,204 buildings from the exposed were identified that had high vulnerabilities in terms of height at low, medium and high hazards of 100 year return period, respectively. Through these maps, it is easier to disseminate information that is more realistic to the residents about the hazardous areas and to help them act on warning and evacuating measures.

  1. Department of Energy HEU ES and H vulnerability assessment, Savannah River Site, Site Assessment Team report. Revision 2

    International Nuclear Information System (INIS)

    Geddes, R.L.; Barone, A.; Shook, H.E. Varner, C.E.; Rollins, R.

    1996-01-01

    This report fulfills the directive issued by the Secretary of Energy on February 22, 1996 to complete a comprehensive assessment of potential vulnerabilities associated with the management of highly enriched uranium (HEU) throughout the DOE complex. In a subsequent letter instruction, the DOE-SR Field Office formally directed WSRC to conduct an assessment of the HEU materials at SRS. The term ''ES and H vulnerabilities'' is defined for the purpose of this assessment to mean conditions or weaknesses that could lead to unnecessary or increased exposure of workers or the public to radiation or to HEU-associated chemical hazards, or to the release of radioactive materials to the environment. The assessment will identify and prioritize ES and H vulnerabilities, and will serve as an information base for identifying corrective actions for the safe management of HEU. Primary facilities that hold HEU at SRS are H-Canyon, K-Reactor assembly area, K, L, and P-Reactor disassembly basins, and the Receiving Basin for Offsite Fuels (RBOF)

  2. Intelligent Techniques for Power Systems Vulnerability Assessment

    OpenAIRE

    Mohamed A. El-Sharkawi

    2002-01-01

    With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA) deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks ...

  3. On the use of IT investment assessment methods in the area of spatial data infrastructure

    Directory of Open Access Journals (Sweden)

    Zwirowicz-Rutkowska Agnieszka

    2016-06-01

    Full Text Available One of the important issues concerning development of spatial data infrastructures (SDIs is the carrying out of economic and financial analysis. It is essential to determine expenses and also assess effects resulting from the development and use of infrastructures. Costs and benefits assessment could be associated with assessment of the infrastructure effectiveness and efficiency as well as the infrastructure value, understood as the infrastructure impact on economic aspects of an organisational performance, both of an organisation which realises an SDI project and all users of the infrastructure. The aim of this paper is an overview of various assessment methods of investment as well as an analysis of different types of costs and benefits used for information technology (IT projects. Based on the literature, the analysis of the examples of the use of these methods in the area of spatial data infrastructures is also presented. Furthermore, the issues of SDI projects and investments are outlined. The results of the analysis indicate usefulness of the financial methods from different fields of management in the area of SDI building, development and use. The author proposes, in addition to the financial methods, the adaptation of the various techniques used for IT investments and their development, taking into consideration the SDI specificity for the purpose of assessment of different types of costs and benefits and integration of financial aspects with non-financial ones. Among the challenges are identification and quantification of costs and benefits, as well as establishing measures which would fit the characteristics of the SDI project and artefacts resulting from the project realisation. Moreover, aspects of subjectivity and variability in time should be taken into account as the consequences of definite goals and policies as well as business context of organisation undertaking the project or using its artefacts and also investors.

  4. On the use of IT investment assessment methods in the area of spatial data infrastructure

    Science.gov (United States)

    Zwirowicz-Rutkowska, Agnieszka

    2016-06-01

    One of the important issues concerning development of spatial data infrastructures (SDIs) is the carrying out of economic and financial analysis. It is essential to determine expenses and also assess effects resulting from the development and use of infrastructures. Costs and benefits assessment could be associated with assessment of the infrastructure effectiveness and efficiency as well as the infrastructure value, understood as the infrastructure impact on economic aspects of an organisational performance, both of an organisation which realises an SDI project and all users of the infrastructure. The aim of this paper is an overview of various assessment methods of investment as well as an analysis of different types of costs and benefits used for information technology (IT) projects. Based on the literature, the analysis of the examples of the use of these methods in the area of spatial data infrastructures is also presented. Furthermore, the issues of SDI projects and investments are outlined. The results of the analysis indicate usefulness of the financial methods from different fields of management in the area of SDI building, development and use. The author proposes, in addition to the financial methods, the adaptation of the various techniques used for IT investments and their development, taking into consideration the SDI specificity for the purpose of assessment of different types of costs and benefits and integration of financial aspects with non-financial ones. Among the challenges are identification and quantification of costs and benefits, as well as establishing measures which would fit the characteristics of the SDI project and artefacts resulting from the project realisation. Moreover, aspects of subjectivity and variability in time should be taken into account as the consequences of definite goals and policies as well as business context of organisation undertaking the project or using its artefacts and also investors.

  5. Summarizing components of U.S. Department of the Interior vulnerability assessments to focus climate adaptation planning

    Science.gov (United States)

    Thompson, Laura M.; Staudinger, Michelle D.; Carter, Shawn L.

    2015-09-29

    A secretarial order identified climate adaptation as a critical performance objective for future management of U.S. Department of the Interior (DOI) lands and resources in response to global change. Vulnerability assessments can inform climate adaptation planning by providing insight into what natural resources are most at risk and why. Three components of vulnerability—exposure, sensitivity, and adaptive capacity—were defined by the Intergovernmental Panel on Climate Change (IPCC) as necessary for identifying climate adaptation strategies and actions. In 2011, the DOI requested all internal bureaus report ongoing or completed vulnerability assessments about a defined range of assessment targets or climate-related threats. Assessment targets were defined as freshwater resources, landscapes and wildlife habitat, native and cultural resources, and ocean health. Climate-related threats were defined as invasive species, wildfire risk, sea-level rise, and melting ice and permafrost. Four hundred and three projects were reported, but the original DOI survey did not specify that information be provided on exposure, sensitivity, and adaptive capacity collectively as part of the request, and it was unclear which projects adhered to the framework recommended by the IPCC. Therefore, the U.S. Geological Survey National Climate Change and Wildlife Science Center conducted a supplemental survey to determine how frequently each of the three vulnerability components was assessed. Information was categorized for 124 of the 403 reported projects (30.8 percent) based on the three vulnerability components, and it was discovered that exposure was the most common component assessed (87.9 percent), followed by sensitivity (68.5 percent) and adaptive capacity (33.1 percent). The majority of projects did not fully assess vulnerability; projects focused on landscapes/wildlife habitats and sea-level rise were among the minority that simultaneously addressed all three vulnerability

  6. An assessment of flood vulnerability in Khyber Pukhtunkhwa province of Pakistan

    Directory of Open Access Journals (Sweden)

    Said Qasim

    2017-02-01

    Full Text Available In this research we have attempted to measure vulnerability of the communities living in the flood prone area of Khyber Pukhtunkhwa province of Pakistan. Extensive literature review was conducted to identify the flood vulnerability indicators. Primary data were used to achieve the objective of this study. Questionnaires were used to collect the primary data from the selected households and from the director of Centre for Disaster Preparedness and Management. Subjective assessment technique was used to allocate weights to the selected indicators of vulnerability. A sample size of 280 respondents was taken from three selected locations of Charsadda, Nowshera and Peshawar. Simple random sampling was employed for the selection of respondents. Results revealed that overall vulnerability as well as component vulnerability for the selected locations was very high. The study therefore recommends preparedness, provision of funds for building houses with flood resistant materials and building houses in safer places. There is also a need for enhancing the adaptive capacities of the concerned communities through their socio-economic uplift. Implementation of these policies would lower the vulnerability of the communities to flood disasters.

  7. Vulnerability of networks of interacting Markov chains.

    Science.gov (United States)

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  8. Increasing impacts of climate extremes on critical infrastructures in Europe

    Science.gov (United States)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  9. A New Approach to Feasibility Risk Assessment within Transport Infrastructure Appraisal

    DEFF Research Database (Denmark)

    Salling, Kim Bang

    2013-01-01

    This paper introduces a new approach of applying feasibility risk assessment within transport project infrastructure appraisal. The procedure is based upon quantitative risk analysis and Monte Carlo simulation in combination with conventional cost-benefit analysis converting deterministic benefit...... are, hereby, often basing their decisions on wrongful material. The presented approach to transport infrastructure appraisal is to include uncertainties and risks in the evaluation. Correspondingly, the handling of uncertainties and risk within transport project assessment are often made up...... by sensitivity tests producing deterministically based output values. Research has proven that traditional sensitivity analysis seldomnly captures the total variability especially as concerns the costs and demands estimated in the pre-stage of the evaluation. Therefore, this paper introduces an approach...

  10. A novel critical infrastructure resilience assessment approach using dynamic Bayesian networks

    Science.gov (United States)

    Cai, Baoping; Xie, Min; Liu, Yonghong; Liu, Yiliu; Ji, Renjie; Feng, Qiang

    2017-10-01

    The word resilience originally originates from the Latin word "resiliere", which means to "bounce back". The concept has been used in various fields, such as ecology, economics, psychology, and society, with different definitions. In the field of critical infrastructure, although some resilience metrics are proposed, they are totally different from each other, which are determined by the performances of the objects of evaluation. Here we bridge the gap by developing a universal critical infrastructure resilience metric from the perspective of reliability engineering. A dynamic Bayesian networks-based assessment approach is proposed to calculate the resilience value. A series, parallel and voting system is used to demonstrate the application of the developed resilience metric and assessment approach.

  11. Groundwater vulnerability assessment to assist the measurement planning of the water framework directive - a practical approach with stakeholders

    Science.gov (United States)

    Berkhoff, K.

    2007-05-01

    An evaluation scheme is presented in this paper which can be used to assess groundwater vulnerability according to the requirements of the European Water Framework Directive (WFD). The evaluation scheme results in a groundwater vulnerability map identifying areas of high, medium and low vulnerability, as necessary for the measurement planning of the WFD. The evaluation scheme is based on the definition of the vulnerability of the Intergovernmental Panel on Climate Change (IPCC). It considers exposure, sensitivity and the adaptive capacity of the region. The adaptive capacity is evaluated in an actors' platform, which was constituted for the region in the PartizipA ("Participative modelling, Actor and Ecosystem Analysis in Regions with Intensive Agriculture") project. As a result of the vulnerability assessment, 21% of the catchment area was classified as being highly vulnerable, whereas 73% has medium vulnerability and 6% has low vulnerability. Thus, a groundwater vulnerability assessment approach is presented, which can be used in practice on a catchment scale for the WFD measurement planning.

  12. The arctic water resource vulnerability index: An integrated assessment tool for community resilience and vulnerability with respect to freshwater

    Science.gov (United States)

    Alessa, L.; Kliskey, A.; Lammers, R.; Arp, C.; White, D.; Hinzman, L.; Busey, R.

    2008-01-01

    People in the Arctic face uncertainty in their daily lives as they contend with environmental changes at a range of scales from local to global. Freshwater is a critical resource to people, and although water resource indicators have been developed that operate from regional to global scales and for midlatitude to equatorial environments, no appropriate index exists for assessing the vulnerability of Arctic communities to changing water resources at the local scale. The Arctic Water Resource Vulnerability Index (AWRVI) is proposed as a tool that Arctic communities can use to assess their relative vulnerability-resilience to changes in their water resources from a variety of biophysical and socioeconomic processes. The AWRVI is based on a social-ecological systems perspective that includes physical and social indicators of change and is demonstrated in three case study communities/watersheds in Alaska. These results highlight the value of communities engaging in the process of using the AWRVI and the diagnostic capability of examining the suite of constituent physical and social scores rather than the total AWRVI score alone. ?? 2008 Springer Science+Business Media, LLC.

  13. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  14. Impact, adaptation and vulnerability of natural and human systems in Europe

    International Nuclear Information System (INIS)

    Martin, Eric; Salas y Melia, David; Delire, Christine; Lemonsu, Aude; Masson, Valery; Badeau, Vincent; Gattuso, Jean-Pierre; Pigeon, Gregoire; Regimbeau, Mathieu; Viguie, Vincent

    2015-01-01

    This article analyses the observed and projected impacts of climate change on human and natural systems, their vulnerability and adaptation options. It provides insight into the main results related to hydrology, agriculture, natural ecosystems, transport, energy, tourism, infrastructures, health and social aspects. This article presents the main results concerning Europe that were compiled in the contribution of Working Group II to the IPCC fifth assessment report published in 2014. Several studies focused on mainland France are also presented, without claiming to be exhaustive. (authors)

  15. Socio-economic vulnerability to natural hazards - proposal for an indicator-based model

    Science.gov (United States)

    Eidsvig, U.; McLean, A.; Vangelsten, B. V.; Kalsnes, B.; Ciurean, R. L.; Argyroudis, S.; Winter, M.; Corominas, J.; Mavrouli, O. C.; Fotopoulou, S.; Pitilakis, K.; Baills, A.; Malet, J. P.

    2012-04-01

    Vulnerability assessment, with respect to natural hazards, is a complex process that must consider multiple dimensions of vulnerability, including both physical and social factors. Physical vulnerability refers to conditions of physical assets, and may be modeled by the intensity and magnitude of the hazard, the degree of physical protection provided by the natural and built environment, and the physical robustness of the exposed elements. Social vulnerability refers to the underlying factors leading to the inability of people, organizations, and societies to withstand impacts from the natural hazards. Social vulnerability models can be used in combination with physical vulnerability models to estimate both direct losses, i.e. losses that occur during and immediately after the impact, as well as indirect losses, i.e. long-term effects of the event. Direct impact of a landslide typically includes casualties and damages to buildings and infrastructure while indirect losses may e.g. include business closures or limitations in public services. The direct losses are often assessed using physical vulnerability indicators (e.g. construction material, height of buildings), while indirect losses are mainly assessed using social indicators (e.g. economical resources, demographic conditions). Within the EC-FP7 SafeLand research project, an indicator-based method was proposed to assess relative socio-economic vulnerability to landslides. The indicators represent the underlying factors which influence a community's ability to prepare for, deal with, and recover from the damage associated with landslides. The proposed model includes indicators representing demographic, economic and social characteristics as well as indicators representing the degree of preparedness and recovery capacity. Although the model focuses primarily on the indirect losses, it could easily be extended to include more physical indicators which account for the direct losses. Each indicator is individually

  16. Vulnerability of wastewater infrastructure of coastal cities to sea level ...

    African Journals Online (AJOL)

    to sea level rise: A South African case study ... developing countries such as South Africa, and for their coastal cities. ... of the wastewater pipeline network is around 8 790 km and .... propensity for regional infrastructure to malfunction under.

  17. Emerging Livelihood Vulnerabilities in an Urbanizing and Climate Uncertain Environment for the Case of a Secondary City in Thailand

    Directory of Open Access Journals (Sweden)

    Astrud Lea Beringer

    2018-05-01

    Full Text Available Increasing flood risks in Thailand are leading to new challenges for flood management and subsequently for livelihoods, which are still significantly agricultural. Policy makers prefer building flood protection infrastructure over utilizing non-structural measures like urban planning regulations to mitigate risks. We argue that unplanned urbanization intensifies flood risks and livelihood vulnerability and may even create new poverty patterns in peri-urban areas. However, urbanization can also strengthen the adaptive capacity of people in flood risk areas by providing more secure employment opportunities. We assess the livelihood vulnerability of Pra Lab, a peri-urban area of Khon Kaen City in Northeast Thailand, using a qualitative and quantitative analysis. The study relies on a vulnerability index developed from a household survey and rainfall statistics, complemented by household in-depth interviews. We further identified factors of unplanned urbanization in Khon Kaen City and Pra Lab through interviews with relevant local government offices. Our findings show that Pra Lab’s household livelihoods are moderately vulnerable to flood due to high financial (i.e., income, debts and physical vulnerability (i.e., housing, urban systems, infrastructure. Major factors of unplanned urbanization that contribute to flood risks are lack of land use regulations, inefficient monitoring of land and house elevations, reduced pervious surfaces, ineffective water governance and insufficient wastewater treatment.

  18. Hybrid data mining-regression for infrastructure risk assessment based on zero-inflated data

    International Nuclear Information System (INIS)

    Guikema, S.D.; Quiring, S.M.

    2012-01-01

    Infrastructure disaster risk assessment seeks to estimate the probability of a given customer or area losing service during a disaster, sometimes in conjunction with estimating the duration of each outage. This is often done on the basis of past data about the effects of similar events impacting the same or similar systems. In many situations this past performance data from infrastructure systems is zero-inflated; it has more zeros than can be appropriately modeled with standard probability distributions. The data are also often non-linear and exhibit threshold effects due to the complexities of infrastructure system performance. Standard zero-inflated statistical models such as zero-inflated Poisson and zero-inflated negative binomial regression models do not adequately capture these complexities. In this paper we develop a novel method that is a hybrid classification tree/regression method for complex, zero-inflated data sets. We investigate its predictive accuracy based on a large number of simulated data sets and then demonstrate its practical usefulness with an application to hurricane power outage risk assessment for a large utility based on actual data from the utility. While formulated for infrastructure disaster risk assessment, this method is promising for data-driven analysis for other situations with zero-inflated, complex data exhibiting response thresholds.

  19. Vulnerability assessment of archaeological sites to earthquake hazard: An indicator based method integrating spatial and temporal aspects

    Directory of Open Access Journals (Sweden)

    Despina Minos-Minopoulos

    2017-07-01

    Full Text Available Across the world, numerous sites of cultural heritage value are at risk from a variety of human-induced and natural hazards such as war and earthquakes. Here we present and test a novel indicator-based method for assessing the vulnerability of archaeological sites to earthquakes. Vulnerability is approached as a dynamic element assessed through a combination of spatial and temporal parameters. The spatial parameters examine the susceptibility of the sites to the secondary Earthquake Environmental Effects of ground liquefaction, landslides and tsunami and are expressed through the Spatial Susceptibility Index (SSi. Parameters of physical vulnerability, economic importance and visitors density examine the temporal vulnerability of the sites expressed through the Temporal Vulnerability Index (TVi. The equally weighted sum of the spatial and temporal indexes represents the total Archaeological Site Vulnerability Index (A.S.V.I.. The A.S.V.I method is applied at 16 archaeological sites across Greece, allowing an assessment of their vulnerability. This then allows the establishment of a regional and national priority list for considering future risk mitigation. Results indicate that i the majority of the sites have low to moderate vulnerability to earthquake hazard, ii Neratzia Fortress on Kos and Heraion on Samos are characterised as highly vulnerable and should be prioritised for further studies and mitigation measures, and iii the majority of the sites are susceptible to at least one Earthquake Environmental Effect and present relatively high physical vulnerability attributed to the existing limited conservation works. This approach highlights the necessity for an effective vulnerability assessment methodology within the existing framework of disaster risk management for cultural heritage.

  20. Climate Change and Coastal Zones. An Overview of the State-of-the-Art on Regional and Local Vulnerability Assessment

    International Nuclear Information System (INIS)

    Sterr, H.; Klein, R.J.T.; Reese, S.

    2000-06-01

    This paper provides an overview of the latest developments in methodologies for assessing the vulnerability of coastal zones to climate change at regional and local scales. The focus of vulnerability assessment in coastal zones used to be on erosion and land loss due to sea-level rise. Methodologies now increasingly consider the wide range of climate and impact variables that play a part in determining coastal vulnerability, as well as non-climatic developments. The paper presents a conceptual framework for vulnerability assessment that identifies a number of system components that can be considered determinants of vulnerability. It then goes on to outline a number of steps that are required for the actual assessment of coastal vulnerability, such as scenario development, data collection and impact assessment. The approach is illustrated using a regional and local case study in Germany

  1. Vulnerability analysis of the wireless infrastructures to intentional electromagnetic interference

    NARCIS (Netherlands)

    van de Beek, G.S.

    2016-01-01

    Contemporary society is greatly dependent upon a set of critical infrastructures (CIs) providing security and quality of life. Electronic systems control the safety-critical functioning of most CIs, and these electronic systems are susceptible to electromagnetic interference (EMI). A threat to the

  2. Rainfall-induced landslide vulnerability Assessment in urban area reflecting Urban structure and building characteristics

    Science.gov (United States)

    Park, C.; Cho, M.; Lee, D.

    2017-12-01

    Landslide vulnerability assessment methodology of urban area is proposed with urban structure and building charateristics which can consider total damage cost of climate impacts. We used probabilistic analysis method for modeling rainfall-induced shallow landslide susceptibility by slope stability analysis and Monte Carlo simulations. And We combined debris flows with considering spatial movements under topographical condition and built environmental condition. Urban vulnerability of landslide is assessed by two categories: physical demages and urban structure aspect. Physical vulnerability is related to buildings, road, other ubran infra. Urban structure vulnerability is considered a function of the socio-economic factors, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. The analysis was performed in a geographic information system (GIS) environment because GIS can deal efficiently with a large volume of spatial data. The results of the landslide susceptibility assessment were compared with the landslide inventory, and the proposed approach demonstrated good predictive performance. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.

  3. Mapping eco-environmental vulnerability patterns: An assessment framework based on remote sensing, GIS, and AHP

    Science.gov (United States)

    Anh, N. K.; Liou, Y. A.; Li, M. H.

    2016-12-01

    The motivation for this study is assessment of the eco-environment vulnerability based on four independent determinants: hydro-meteorology, topography, land resources, and human activities. An assessment framework is proposed to assess the vulnerable eco-environment by using 16 variables with 6 of them constructed from Landsat 8 satellite images. The remaining variables were extracted from digital maps. Each variable was evaluated and spatially mapped with the aid of an analytical hierarchy process (AHP) and geographical information system (GIS). The Thua Thien - Hue Province that has been experiencing natural disasters and urbanization in the recent decades is selected as our study area. An eco-environmental vulnerability map is assorted into six vulnerable levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities, representing 14%, 27%, 17%, 26%, 13%, 3% of the study area, respectively. It is found that heavy and very heavy vulnerable areas appear mainly in the low and medium lands with high intensification of social-economic activities and often suffer from flooding. Tiny percentages of medium and heavy vulnerable levels occur in high land areas probably caused by agricultural practices in highlands, slash and burn cultivation and removal of natural forests with new plantation forests and these regions are usually influenced by landslides, flash flooding. Based on our results, three ecological zones requiring different development and protection solutions are proposed to restore local eco-environment toward sustainable development. Our findings support the idea that eco-environmental vulnerability is driven by anthropogenic processes and enhanced by natural disaster in the Thua Thien-Hue Province.

  4. Damage assessment of bridge infrastructure subjected to flood-related hazards

    Science.gov (United States)

    Michalis, Panagiotis; Cahill, Paul; Bekić, Damir; Kerin, Igor; Pakrashi, Vikram; Lapthorne, John; Morais, João Gonçalo Martins Paulo; McKeogh, Eamon

    2017-04-01

    Transportation assets represent a critical component of society's infrastructure systems. Flood-related hazards are considered one of the main climate change impacts on highway and railway infrastructure, threatening the security and functionality of transportation systems. Of such hazards, flood-induced scour is a primarily cause of bridge collapses worldwide and one of the most complex and challenging water flow and erosion phenomena, leading to structural instability and ultimately catastrophic failures. Evaluation of scour risk under severe flood events is a particularly challenging issue considering that depth of foundations is very difficult to evaluate in water environment. The continual inspection, assessment and maintenance of bridges and other hydraulic structures under extreme flood events requires a multidisciplinary approach, including knowledge and expertise of hydraulics, hydrology, structural engineering, geotechnics and infrastructure management. The large number of bridges under a single management unit also highlights the need for efficient management, information sharing and self-informing systems to provide reliable, cost-effective flood and scour risk management. The "Intelligent Bridge Assessment Maintenance and Management System" (BRIDGE SMS) is an EU/FP7 funded project which aims to couple state-of-the art scientific expertise in multidisciplinary engineering sectors with industrial knowledge in infrastructure management. This involves the application of integrated low-cost structural health monitoring systems to provide real-time information towards the development of an intelligent decision support tool and a web-based platform to assess and efficiently manage bridge assets. This study documents the technological experience and presents results obtained from the application of sensing systems focusing on the damage assessment of water-hazards at bridges over watercourses in Ireland. The applied instrumentation is interfaced with an open

  5. Assess and Adapt: Coordinated Ecoregional Forest Vulnerability Assessments Covering the Upper Midwest and Northeast in Support of Climate-informed Decision-making

    Science.gov (United States)

    Swanston, C.; Janowiak, M.; Handler, S.; Butler, P.; Brandt, L.; Iverson, L.; Thompson, F.; Ontl, T.; Shannon, D.

    2016-12-01

    Forest ecosystem vulnerability assessments are rapidly becoming an integral component of forest management planning, in which there is increasing public expectation that even near-term activities explicitly incorporate information about anticipated climate impacts and risks. There is a clear desire among forest managers for targeted assessments that address critical questions about species and ecosystem vulnerabilities while delivering this information in an accessible format. We developed the Ecosystem Vulnerability Assessment Approach (EVAA), which combines multiple quantitative models, expert elicitation from scientists and land managers, and a templated report structure oriented to natural resource managers. The report structure includes relevant information on the contemporary landscape, past climate, future climate projections, impact model results, and a transparent vulnerability assessment of species and ecosystems. We have used EVAA in seven ecoregional assessments covering 246 million acres of forestland across the upper Midwest and Northeast (www.forestadaptation.org; five published, two in review). We convened a panel of local forest ecology and management experts in each assessment area to examine projected climate effects on system drivers, stressors, and dominant species, as well as the current adaptive capacity of the major ecoregional forest ecosystems. The panels provided a qualitative assessment of the vulnerability of forest ecosystems to climate change over the next century. Over 130 authors from dozens of organizations collaborated on these peer-reviewed assessment publications, which are delivered to thousands of stakeholders through live and recorded webinars, online briefs, and in-person trainings and seminars. The assessments are designed to be used with the Adaptation Workbook (www.adaptationworkbook.org), a planning tool that works at multiple scales and has generated more than 200 real-world forest adaptation demonstration projects.

  6. Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool

    International Nuclear Information System (INIS)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis

  7. Assessment of Coastal Vulnerability Through the Use of GIS Tools in South Sicily (Italy)

    Science.gov (United States)

    Anfuso, Giorgio; Martínez Del Pozo, José Ángel

    2009-03-01

    This study assessed coastal erosion vulnerability along a 90-km sector, which included both erosional and accretionary beaches, and different levels of human occupation. Two aerial photogrammetric flights were used to reconstruct coastal evolution between 1977 and 1999. During this period, extensive accretion was recorded updrift of human structures at harbors and ports, e.g., Scoglitti (105.6 m), Donnalucata (52.8 m), and Pozzallo (94.6 m). Conversely, erosion was recorded in downdrift areas, with maximum values at Modica Stream mouth (63.8 m) and Point Castellazzo (35.2 m). Assessments were subsequently divided into four categories ranging from “high erosion” to “accretion.” Several sources were examined to assess human activities and land use. The latter was mapped and divided into four categories, ranging from “very high” to “no capital” land use. Subsequently, coastal erosion vulnerability was assessed by combining land use categories with recorded coastline behavior. Results showed “very high” to “high” vulnerability along 5.8% and 16.6%, respectively, of the littoral, while 20.9% and 56.7%, respectively, was found to exhibit “medium” and “low/very low” vulnerability. A very good agreement between predicted coastal vulnerability and coastal trend had been observed over recent years. Furthermore, several human structures and activities are located within the “imminent collapse zone (ICZ)” which reached maximum values of 17.5 m at Modica Stream and 13.5 m at Point Braccetto.

  8. Vulnerability assessment of medieval civic towers as a tool for retrofitting design

    International Nuclear Information System (INIS)

    Casciati, Sara; Faravelli, Lucia

    2008-01-01

    The seismic vulnerability of an ancient civic bell-tower is studied. Rather than seeing it as an intermediate stage toward a risk analysis, the assessment of vulnerability is here pursued for the purpose of optimizing the retrofit design. The vulnerability curves are drawn by carrying out a single time history analysis of a model calibrated on the basis of experimental data. From the results of this analysis, the medians of three selected performance parameters are estimated, and they are used to compute, for each of them, the probability of exceeding or attaining the three corresponding levels of light, moderate and severe damage. The same numerical model is then used to incorporate the effects of several retrofitting solutions and to re-estimate the associated vulnerability curves. The ultimate goal is to provide a numerical tool able to drive the optimization process of a retrofit design by the comparison of the vulnerability estimates associated with the different retrofitting solutions

  9. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  10. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  11. Combining demographic and genetic factors to assess population vulnerability in stream species

    Science.gov (United States)

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss

  12. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model) and the Social Vulnerability Index (SoVI model) - a case study for Bucharest, Romania

    Science.gov (United States)

    Armaş, I.; Gavriş, A.

    2013-06-01

    In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model) and the spatial multi-criteria social vulnerability index (SEVI model). Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA). This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  13. Remote Sensing and GIS Assessment of Flood Vulnerability of ...

    African Journals Online (AJOL)

    Lokoja, the Kogi state capital, is located at the Niger-Benue confluence. Hazards erupt when human activities in the confluence area are not properly managed. This article uses the Remote Sensing and GIS technique to assess the flood vulnerability zones of the town using the bench mark minimum and maximum water ...

  14. Assessing the physical vulnerability of check dams through an empirical damage index

    Directory of Open Access Journals (Sweden)

    Andrea Dell'Agnese

    2013-06-01

    Full Text Available A comprehensive analysis of flood risk in mountain streams has to include an assessment of the vulnerability of the protection systems, in addition to an assessment of the vulnerability of the constructed environment on alluvial fans and floodplains. Structures forming the protection systems are of a dual nature, i.e. they are designed to mitigate natural process-related hazards and, on the other hand, are prone to be damaged during their lifecycle by the same processes they should mitigate. Therefore, their effectiveness declines over time. Hence, the knowledge of how effectively control structures perform is essential for risk management. A procedure was developed to assess the physical vulnerability of check dams based on empirical evidence collected in South Tyrol, Northern Italy. A damage index defined on pre- and postevent comparisons of check dam conditions was evaluated for 362 structures in 18 mountain streams along with the relevant processes and the structural characteristics affecting it. Although the available dataset did not allow conclusive functional relationships between damage index and impact variables to be established, it was possible to assess the average expected residual functionality of check dams according to structure characteristics, and event type and intensity. These results may help plan appropriate check dam maintenance.

  15. Comparative analysis of climate change vulnerability assessments. Lessons from Tunisia and Indonesia

    Energy Technology Data Exchange (ETDEWEB)

    Hammill, Anne; Bizikova, Livia; Dekens, Julie; McCandless, Matthew

    2013-03-15

    Vulnerability assessments (VAs) are central to shaping climate change adaptation decisions. They help to define the nature and extent of the threat that may harm a given human or ecological system, providing a basis for devising measures that will minimize or avoid this harm. Yet the wide variety of VA approaches can be confusing for practitioners, creating uncertainty about the ''right'' way to assess vulnerability. In an effort to provide some guidance on designing and conducting VAs, this paper reviews and compares VAs undertaken in Indonesia and Tunisia to distill key approaches, components and lessons. It begins with a general overview of definitions, approaches and challenges with conducting VAs, and then proposes a framework for analyzing and comparing them. The framework looks at four components of VAs: (1) Framing: where do we come from? (2) Process of conducting the VAs: how does it work? (3) Inputs: what is needed? (4) Outputs: what does it tell us? The framework is then applied to analyze the assessments carried out in Tunisia and Indonesia, from their respective framings of vulnerability to the outputs of the process. The report then concludes with observations on differences and similarities between the VAs, as well as lessons learned that can inform the design and execution of future assessments.

  16. Comparative analysis of climate change vulnerability assessments. Lessons from Tunisia and Indonesia

    International Nuclear Information System (INIS)

    Hammill, Anne; Bizikova, Livia; Dekens, Julie; McCandless, Matthew

    2013-03-01

    Vulnerability assessments (VAs) are central to shaping climate change adaptation decisions. They help to define the nature and extent of the threat that may harm a given human or ecological system, providing a basis for devising measures that will minimize or avoid this harm. Yet the wide variety of VA approaches can be confusing for practitioners, creating uncertainty about the ''right'' way to assess vulnerability. In an effort to provide some guidance on designing and conducting VAs, this paper reviews and compares VAs undertaken in Indonesia and Tunisia to distill key approaches, components and lessons. It begins with a general overview of definitions, approaches and challenges with conducting VAs, and then proposes a framework for analyzing and comparing them. The framework looks at four components of VAs: (1) Framing: where do we come from? (2) Process of conducting the VAs: how does it work? (3) Inputs: what is needed? (4) Outputs: what does it tell us? The framework is then applied to analyze the assessments carried out in Tunisia and Indonesia, from their respective framings of vulnerability to the outputs of the process. The report then concludes with observations on differences and similarities between the VAs, as well as lessons learned that can inform the design and execution of future assessments.

  17. Exploring spatial patterns of vulnerability for diverse biodiversity descriptors in regional conservation planning.

    Science.gov (United States)

    Vimal, Ruppert; Pluvinet, Pascal; Sacca, Céline; Mazagol, Pierre-Olivier; Etlicher, Bernard; Thompson, John D

    2012-03-01

    In this study, we developed a multi-criteria assessment of spatial variability of the vulnerability of three different biodiversity descriptors: sites of high conservation interest by virtue of the presence of rare or remarkable species, extensive areas of high ecological integrity, and landscape diversity in grid cells across an entire region. We assessed vulnerability in relation to (a) direct threats in and around sites to a distance of 2 km associated with intensive agriculture, building and road infrastructure and (b) indirect effects of human population density on a wider scale (50 km). The different combinations of biodiversity and threat indicators allowed us to set differential priorities for biodiversity conservation and assess their spatial variation. For example, with this method we identified sites and grid cells which combined high biodiversity with either high threat values or low threat values for the three different biodiversity indicators. In these two classes the priorities for conservation planning will be different, reduce threat values in the former and restrain any increase in the latter. We also identified low priority sites (low biodiversity with either high or low threats). This procedure thus allows for the integration of a spatial ranking of vulnerability into priority setting for regional conservation planning. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  19. An integrated risk and vulnerability assessment framework for climate change and malaria transmission in East Africa.

    Science.gov (United States)

    Onyango, Esther Achieng; Sahin, Oz; Awiti, Alex; Chu, Cordia; Mackey, Brendan

    2016-11-11

    Malaria is one of the key research concerns in climate change-health relationships. Numerous risk assessments and modelling studies provide evidence that the transmission range of malaria will expand with rising temperatures, adversely impacting on vulnerable communities in the East African highlands. While there exist multiple lines of evidence for the influence of climate change on malaria transmission, there is insufficient understanding of the complex and interdependent factors that determine the risk and vulnerability of human populations at the community level. Moreover, existing studies have had limited focus on the nature of the impacts on vulnerable communities or how well they are prepared to cope. In order to address these gaps, a systems approach was used to present an integrated risk and vulnerability assessment framework for studies of community level risk and vulnerability to malaria due to climate change. Drawing upon published literature on existing frameworks, a systems approach was applied to characterize the factors influencing the interactions between climate change and malaria transmission. This involved structural analysis to determine influential, relay, dependent and autonomous variables in order to construct a detailed causal loop conceptual model that illustrates the relationships among key variables. An integrated assessment framework that considers indicators of both biophysical and social vulnerability was proposed based on the conceptual model. A major conclusion was that this integrated assessment framework can be implemented using Bayesian Belief Networks, and applied at a community level using both quantitative and qualitative methods with stakeholder engagement. The approach enables a robust assessment of community level risk and vulnerability to malaria, along with contextually relevant and targeted adaptation strategies for dealing with malaria transmission that incorporate both scientific and community perspectives.

  20. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    International Nuclear Information System (INIS)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-01-01

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water

  1. A model for assessing the systemic vulnerability in landslide prone areas

    Directory of Open Access Journals (Sweden)

    S. Pascale

    2010-07-01

    Full Text Available The objectives of spatial planning should include the definition and assessment of possible mitigation strategies regarding the effects of natural hazards on the surrounding territory. Unfortunately, however, there is often a lack of adequate tools to provide necessary support to the local bodies responsible for land management. This paper deals with the conception, the development and the validation of an integrated numerical model for assessing systemic vulnerability in complex and urbanized landslide-prone areas. The proposed model considers this vulnerability not as a characteristic of a particular element at risk, but as a peculiarity of a complex territorial system, in which the elements are reciprocally linked in a functional way. It is an index of the tendency of a given territorial element to suffer damage (usually of a functional kind due to its interconnections with other elements of the same territorial system. The innovative nature of this work also lies in the formalization of a procedure based on a network of influences for an adequate assessment of such "systemic" vulnerability.

    This approach can be used to obtain information which is useful, in any given situation of a territory hit by a landslide event, for the identification of the element which has suffered the most functional damage, ie the most "critical" element and the element which has the greatest repercussions on other elements of the system and thus a "decisive" role in the management of the emergency.

    This model was developed within a GIS system through the following phases:

    1. the topological characterization of the territorial system studied and the assessment of the scenarios in terms of spatial landslide hazard. A statistical method, based on neural networks was proposed for the assessment of landslide hazard;

    2. the analysis of the direct consequences of a scenario event on the system;

    3. the definition of the

  2. Quality of service provision assessment in the healthcare information and telecommunications infrastructures.

    Science.gov (United States)

    Babulak, Eduard

    2006-01-01

    The continuous increase in the complexity and the heterogeneity of corporate and healthcare telecommunications infrastructures will require new assessment methods of quality of service (QoS) provision that are capable of addressing all engineering and social issues with much faster speeds. Speed and accessibility to any information at any time from anywhere will create global communications infrastructures with great performance bottlenecks that may put in danger human lives, power supplies, national economy and security. Regardless of the technology supporting the information flows, the final verdict on the QoS is made by the end user. The users' perception of telecommunications' network infrastructure QoS provision is critical to the successful business management operation of any organization. As a result, it is essential to assess the QoS Provision in the light of user's perception. This article presents a cost effective methodology to assess the user's perception of quality of service provision utilizing the existing Staffordshire University Network (SUN) by adding a component of measurement to the existing model presented by Walker. This paper presents the real examples of CISCO Networking Solutions for Health Care givers and offers a cost effective approach to assess the QoS provision within the campus network, which could be easily adapted to any health care organization or campus network in the world.

  3. Dynamic Analytics-Driven Assessment of Vulnerabilities and Exploitation

    Science.gov (United States)

    2016-07-15

    scans and other observations such as network traffic capture, to assess the severity of a vulnerability in terms of its specific impact to a 3...straightforward proposition. There are literally hundreds, if not thousands, of security tools and information technology systems that generate data useful for...during the data modeling process, a common taxonomy or data dictionary for the data elements of interest should be established. The data

  4. Vulnerability assessment: A comparison of three different city sizes in the coastal area of Central Java, Indonesia

    Directory of Open Access Journals (Sweden)

    Wiwandari Handayani

    2017-12-01

    Full Text Available Considering the importance of connecting urbanization phenomena and vulnerability assessments, this paper aims to explore vulnerability assessment in three different city sizes in the northern coast of Central Java province of Indonesia. It compares the vulnerability levels of the three cities based on their sizes (that is, levels of urbanization. It uses the most current secondary data from the lowest administrative levels, called as kelurahan (urban village, for its assessment. There are two indexes used to indicate their vulnerability levels, namely exposure and sensitivity index (ESI and adaptive capacity index (ACI. By combining the ESI and ACI, the study found that the kelurahans in Tegal (the medium sized city have similar vulnerability levels. The kelurahans in Semarang (as the big city have more combination of vulnerability levels—indicating that the city has various sensitivity, exposure, as well as adaptive capacity among its kelurahans. In Lasem (the small sized city, due to limitations imposed by adaptation—mostly because of lack of public services and high dependency on primary economic sectors—all of its kelurahans were found to be vulnerable. The study therefore concluded that the bigger a city is, the more the different areas of that city will have varying levels of vulnerability, leading to a high propensity of vulnerability among its inhabitants. On the other hand, the smaller a city is, the less capacity it will have in reducing its emerging vulnerability challenges.

  5. Assessing global exposure and vulnerability towards natural hazards: the Disaster Risk Index

    Directory of Open Access Journals (Sweden)

    P. Peduzzi

    2009-07-01

    Full Text Available This paper presents a model of factors influencing levels of human losses from natural hazards at the global scale, for the period 1980–2000. This model was designed for the United Nations Development Programme as a building stone of the Disaster Risk Index (DRI, which aims at monitoring the evolution of risk. Assessing what countries are most at risk requires considering various types of hazards, such as droughts, floods, cyclones and earthquakes. Before assessing risk, these four hazards were modelled using GIS and overlaid with a model of population distribution in order to extract human exposure. Human vulnerability was measured by crossing exposure with selected socio-economic parameters. The model evaluates to what extent observed past losses are related to population exposure and vulnerability. Results reveal that human vulnerability is mostly linked with country development level and environmental quality. A classification of countries is provided, as well as recommendations on data improvement for future use of the model.

  6. Quantitative assessment of Vulnerability of Forest ecosystem to Climate Change in Korea

    Science.gov (United States)

    Byun, J.; Lee, W.; Choi, S.; Oh, S.; Climate Change Model Team

    2011-12-01

    The purpose of this study was to assess the vulnerability of forest ecosystem to climate change in Korea using outputs of vegetation models(HyTAG and MC1) and socio-ecological indicators. Also it suggested adaptation strategies in forest management through analysis of three vulnerability components: exposure, sensitivity and adaptive capacity. For the model simulation of past years(1971-2000), the climatic data was prepared by the Korea Meteorological Administration(KMA). In addition, for the future simulation, the Fifth-Generation NCAR/Penn State Mesoscale Model(MM5) coupling with atmosphere-ocean circulation model(ECHO-G) provide the future climatic data under the A1B scenarios. HyTAG (Hydrological and Thermal Analogy Groups), korean model of forest distribution on a regional-scale, could show extent of sensitivity and adaptive capacity in connection with changing frequency and changing direction of vegetation. MC1 model could provide variation and direction of NPP(Net Primary Production) and SCS(Soil Carbon Storage). In addition, the sensitivity and adaptation capacity were evaluated for each. Besides indicators from models, many other indicators such as financial affairs and number of officers were included in the vulnerability components. As a result of the vulnerability assessment, south western part and Je-ju island of Korea had relatively high vulnerability. This finding is considered to come from a distinctively adaptative capacity. Using these results, we could propose actions against climate change and develop decision making systems on forest management.

  7. Transactional approach in assessment of operational performance of companies in transport infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Dubrovsky, V.; Yaroshevich, N.; Kuzmin, E.

    2016-07-01

    Offer an alternative method to assess operational performance of companies in transport infrastructure of a region by making a comparison between transaction costs. The method is supposed to be a cross-functional and possibly applied to an analysis of economic entities of a different order (country, region, sector, companies) while evaluating “viscosity” / complexity of the outside and the inside. The paper includes an analysis of various methodological approaches to assess a development level of the transport infrastructure in a region. Within the author's approach and for purposed of the research, an index of transaction capacity or the transactionalness index is proposed, which determines a level of transaction costs calculated against the cost of production and revenue. The approach is piloted using the region-wise consolidated financial data of companies involved in the Russian transport infrastructure for 2005/2013. The proposed alternative way to measure corporate operating efficiency has proved its academic consistency. A specific comparison between the transaction costs using the transactionalness index allows first to identify companies or regions/sectors, where there is excess complexity of economical communication in bargaining. Secondly, the index does not only point out indirectly to a degree of development in the institutional environment, but also the infrastructure (the transport one in the example given). Third, the transactionalness level may say of uncertainty and risks. As an addition to theoretical and methodological aspects of transaction costs, the authors justify an approach to their size estimation, as well as their differentiation dividing them into two groups: those of a natural type and a background type. In a course of their discussion, the authors have concluded that there are such transaction costs in place, which are standard in a manner of speaking. There is a discussion whether it is scientifically reasonable to use an

  8. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    Science.gov (United States)

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  9. Risk and Interdependencies in Critical Infrastructures A Guideline for Analysis

    CERN Document Server

    Utne, Ingrid; Vatn, Jørn

    2012-01-01

    Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure systems. Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides methods for analyzing risks and interdependencies of critical infrastructures.  A number of analysis approaches are described and are adapted to each of these infrastructures. Various approaches are also revised, and all are supported by several examples and illustrations. Particular emphasis is given to the analysis of various interdependencies that often exist between the infrastructures.  Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides a good tool to identify the hazards that are threatening your infrastructures, and will enhance the un...

  10. Vulnerability to shocks in the global seafood trade network

    Science.gov (United States)

    Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke

    2016-03-01

    Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

  11. Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options

    Science.gov (United States)

    2007-01-26

    absenteeism among workers during the peak weeks of a regional outbreak.26 Concentrations of livestock may be similarly vulnerable to infectious disease...Turning Capital to Wealth: A Ranking of U.S. Utilities.” Public Utilities Fortnightly. Dec. 1999. 43 M. Singer, and K. Turnipseed, “ Curing Capital...careful and complex CRS-18 64 R.C. Mireles, “A Cure for West Coast Congestion.” Logistics Today. Jan. 2005. 65 Congressional Budget Office (CBO

  12. Towards a more sustainable transport infrastructure: how spatial geological data can be utilized to improve early stage Life cycle assessment of road infrastructure

    Science.gov (United States)

    Karlsson, Caroline; Miliutenko, Sofiia; Björklund, Anna; Mörtberg, Ulla; Olofsson, Bo; Toller, Susanna

    2017-04-01

    Environmental impacts during the life cycle stages of transport infrastructure are substantial, including among other greenhouse gas (GHG) emissions, as well as resource and energy use. For transport infrastructure to be sustainable, such issues need to be integrated in the planning process. Environmental Impact Assessment (EIA) is required by the European Union (EU) in order to ensure that all environmental aspects are considered during planning of road infrastructure projects. As a part of this process, the European Commission has suggested the use of the tool life cycle assessment (LCA) for assessing life cycle energy use and GHG emissions. When analyzing life cycle impacts of the road infrastructure itself, it was shown that earthworks and materials used for the road construction have a big share in the total energy use and GHG emissions. Those aspects are largely determined by the geological conditions at the site of construction: parameters such as soil thickness, slope, bedrock quality and soil type. The geological parameters determine the amounts of earthworks (i.e. volumes of soil and rock that will be excavated and blasted), transportation need for excavated materials as well as the availability of building materials. The study presents a new geographic information system (GIS)-based approach for utilizing spatial geological data in three dimensions (i.e. length, width and depth) in order to improve estimates on earthworks during the early stages of road infrastructure planning. Three main methodological steps were undertaken: mass balance calculation, life cycle inventory analysis and spatial mapping of greenhouse gas (GHG) emissions and energy use. The proposed GIS-based approach was later evaluated by comparing with the actual values of extracted material of a real road construction project. The results showed that the estimate of filling material was the most accurate, while the estimate for excavated soil and blasted rock had a wide variation from

  13. 75 FR 51806 - Climate Change Vulnerability Assessment: Four Case Studies of Water Utility Practices

    Science.gov (United States)

    2010-08-23

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9192-2; Docket ID No. EPA-HQ-ORD-2010-0701] Climate Change... period for the draft document titled, ``Climate Change Vulnerability Assessment: Four Case Studies of... vulnerability to future climate change. The report is intended to illustrate the types of analyses, models, and...

  14. Explorations Around "Graceful Failure" in Transportation Infrastructure: Lessons Learned By the Infrastructure and Climate Network (ICNet)

    Science.gov (United States)

    Jacobs, J. M.; Thomas, N.; Mo, W.; Kirshen, P. H.; Douglas, E. M.; Daniel, J.; Bell, E.; Friess, L.; Mallick, R.; Kartez, J.; Hayhoe, K.; Croope, S.

    2014-12-01

    Recent events have demonstrated that the United States' transportation infrastructure is highly vulnerable to extreme weather events which will likely increase in the future. In light of the 60% shortfall of the $900 billion investment needed over the next five years to maintain this aging infrastructure, hardening of all infrastructures is unlikely. Alternative strategies are needed to ensure that critical aspects of the transportation network are maintained during climate extremes. Preliminary concepts around multi-tier service expectations of bridges and roads with reference to network capacity will be presented. Drawing from recent flooding events across the U.S., specific examples for roads/pavement will be used to illustrate impacts, disruptions, and trade-offs between performance during events and subsequent damage. This talk will also address policy and cultural norms within the civil engineering practice that will likely challenge the application of graceful failure pathways during extreme events.

  15. Volcanic ash impacts on critical infrastructure

    Science.gov (United States)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water

  16. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  17. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model and the Social Vulnerability Index (SoVI model – a case study for Bucharest, Romania

    Directory of Open Access Journals (Sweden)

    I. Armaș

    2013-06-01

    Full Text Available In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model and the spatial multi-criteria social vulnerability index (SEVI model. Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA. This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  18. Climate change impact and vulnerability assessment of forests in the Indian Western Himalayan region: A case study of Himachal Pradesh, India

    Directory of Open Access Journals (Sweden)

    Sujata Upgupta

    2015-01-01

    Full Text Available Climate change impact and vulnerability assessment at state and regional levels is necessary to develop adaptation strategies for forests in the biogeographically vital Himalayan region. The present study assesses forest ecosystem vulnerability to climate change across Himachal Pradesh and presents the priority districts for vulnerability reduction under ‘current climate’ and ‘future climate’ scenarios. Vulnerability of forests under ‘current climate’ scenario is assessed by adopting indicator-based approach, while the vulnerability under ‘future climate’ scenario is assessed using climate and vegetation impact models. Based on the vulnerability index estimated to present the vulnerability of forests under current and projected climate change impacts representing climate driven vulnerability, five districts – Chamba, Kangra, Kullu, Mandi and Shimla are identified as priority forest districts for adaptation planning. Identifying vulnerable forest districts and forests will help policy makers and forest managers to prioritize resource allocation and forest management interventions, to restore health and productivity of forests and to build long-term resilience to climate change.

  19. The Combined Use of Airborne Remote Sensing Techniques within a GIS Environment for the Seismic Vulnerability Assessment of Urban Areas: An Operational Application

    Directory of Open Access Journals (Sweden)

    Antonio Costanzo

    2016-02-01

    Full Text Available The knowledge of the topographic features, the building properties, and the road infrastructure settings are relevant operational tasks for managing post-crisis events, restoration activities, and for supporting search and rescue operations. Within such a framework, airborne remote sensing tools have demonstrated to be powerful instruments, whose joint use can provide meaningful analyses to support the risk assessment of urban environments. Based on this rationale, in this study, the operational benefits obtained by combining airborne LiDAR and hyperspectral measurements are shown. Terrain and surface digital models are gathered by using LiDAR data. Information about roads and roof materials are provided through the supervised classification of hyperspectral images. The objective is to combine such products within a geographic information system (GIS providing value-added maps to be used for the seismic vulnerability assessment of urban environments. Experimental results are gathered for the city of Cosenza, Italy.

  20. Groundwater Vulnerability Assessment to Pesticides and Their Ranking and Clustering

    Directory of Open Access Journals (Sweden)

    Ahmad Abrishamchi

    2012-10-01

    Full Text Available In this study, the different methods for groundwater vulnerability assessment to pesticides contamination and their uncertainties were introduced. Then, the groundwater vulnerability of agricultural regions of Pasha-Kolaa dam (Mazandaran province to 7 pesticides has been assessed by the mobility potential indices in the typical conditions of pesticide properties (t1/2 and KOC and the zonation maps of groundwater vulnerability in this region have been generated in the GIS environment.  According to the uncertainty of the pesticide properties and the lack of necessary data for uncertainty analysis in the region of study, the mobility potential indices in different scenarios of pesticide properties (worst and best conditions of pesticide properties (t1/2 and KOC have been calculated, mapped and zoned. The zonation maps in three scenarios (best, typical and worst conditions of pesticide properties were compared. Next, according to the regional values of mobility potential indices, generated for different scenarios, the pesticides are ranked using the composite programming method. Finally, the pesticides are clustered to three groups (suitable, transitional and unsuitable by the combination of the results of previous sections. The clustering results showed that among of studied pesticides, 2,4 D Acid, Dimethoate and Fenvalerate are suitable ,and Metsulfuron and Triclopyr are unsuitable pesticides for region of study. The other pesticides showed transitional condition.

  1. A rating tool to assess the condition of South African infrastructure

    CSIR Research Space (South Africa)

    Wall, K

    2015-12-01

    Full Text Available In 2006 the South African Institution of Civil Engineering (SAICE), in partnership with the Council for Scientific and Industrial Research (CSIR), released the first ever “report card” assessment rating of the condition of engineering infrastructure...

  2. Physically-Based Assessment of Intrinsic Groundwater Resource Vulnerability in AN Urban Catchment

    Science.gov (United States)

    Graf, T.; Therrien, R.; Lemieux, J.; Molson, J. W.

    2013-12-01

    Several methods exist to assess intrinsic groundwater (re)source vulnerability for the purpose of sustainable groundwater management and protection. However, several methods are empirical and limited in their application to specific types of hydrogeological systems. Recent studies suggest that a physically-based approach could be better suited to provide a general, conceptual and operational basis for groundwater vulnerability assessment. A novel method for physically-based assessment of intrinsic aquifer vulnerability is currently under development and tested to explore the potential of an integrated modelling approach, combining groundwater travel time probability and future scenario modelling in conjunction with the fully integrated HydroGeoSphere model. To determine the intrinsic groundwater resource vulnerability, a fully coupled 2D surface water and 3D variably-saturated groundwater flow model in conjunction with a 3D geological model (GoCAD) has been developed for a case study of the Rivière Saint-Charles (Québec/Canada) regional scale, urban watershed. The model has been calibrated under transient flow conditions for the hydrogeological, variably-saturated subsurface system, coupled with the overland flow zone by taking into account monthly recharge variation and evapotranspiration. To better determine the intrinsic groundwater vulnerability, two independent approaches are considered and subsequently combined in a simple, holistic multi-criteria-decision analyse. Most data for the model comes from an extensive hydrogeological database for the watershed, whereas data gaps have been complemented via field tests and literature review. The subsurface is composed of nine hydrofacies, ranging from unconsolidated fluvioglacial sediments to low permeability bedrock. The overland flow zone is divided into five major zones (Urban, Rural, Forest, River and Lake) to simulate the differences in landuse, whereas the unsaturated zone is represented via the model

  3. Climate change vulnerability of native and alien freshwater fishes of California: a systematic assessment approach.

    Science.gov (United States)

    Moyle, Peter B; Kiernan, Joseph D; Crain, Patrick K; Quiñones, Rebecca M

    2013-01-01

    Freshwater fishes are highly vulnerable to human-caused climate change. Because quantitative data on status and trends are unavailable for most fish species, a systematic assessment approach that incorporates expert knowledge was developed to determine status and future vulnerability to climate change of freshwater fishes in California, USA. The method uses expert knowledge, supported by literature reviews of status and biology of the fishes, to score ten metrics for both (1) current status of each species (baseline vulnerability to extinction) and (2) likely future impacts of climate change (vulnerability to extinction). Baseline and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores were highly correlated and were concordant among different scorers. Native species had both greater baseline and greater climate change vulnerability than did alien species. Fifty percent of California's native fish fauna was assessed as having critical or high baseline vulnerability to extinction whereas all alien species were classified as being less or least vulnerable. For vulnerability to climate change, 82% of native species were classified as highly vulnerable, compared with only 19% for aliens. Predicted climate change effects on freshwater environments will dramatically change the fish fauna of California. Most native fishes will suffer population declines and become more restricted in their distributions; some will likely be driven to extinction. Fishes requiring cold water (extinct. In contrast, most alien fishes will thrive, with some species increasing in abundance and range. However, a few alien species will likewise be negatively affected through loss of aquatic habitats during severe droughts and physiologically stressful conditions present in most waterways during summer. Our method has high utility for predicting vulnerability to climate change of diverse fish species. It should be useful for setting conservation

  4. Climate change vulnerability of native and alien freshwater fishes of California: a systematic assessment approach.

    Directory of Open Access Journals (Sweden)

    Peter B Moyle

    Full Text Available Freshwater fishes are highly vulnerable to human-caused climate change. Because quantitative data on status and trends are unavailable for most fish species, a systematic assessment approach that incorporates expert knowledge was developed to determine status and future vulnerability to climate change of freshwater fishes in California, USA. The method uses expert knowledge, supported by literature reviews of status and biology of the fishes, to score ten metrics for both (1 current status of each species (baseline vulnerability to extinction and (2 likely future impacts of climate change (vulnerability to extinction. Baseline and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores were highly correlated and were concordant among different scorers. Native species had both greater baseline and greater climate change vulnerability than did alien species. Fifty percent of California's native fish fauna was assessed as having critical or high baseline vulnerability to extinction whereas all alien species were classified as being less or least vulnerable. For vulnerability to climate change, 82% of native species were classified as highly vulnerable, compared with only 19% for aliens. Predicted climate change effects on freshwater environments will dramatically change the fish fauna of California. Most native fishes will suffer population declines and become more restricted in their distributions; some will likely be driven to extinction. Fishes requiring cold water (<22°C are particularly likely to go extinct. In contrast, most alien fishes will thrive, with some species increasing in abundance and range. However, a few alien species will likewise be negatively affected through loss of aquatic habitats during severe droughts and physiologically stressful conditions present in most waterways during summer. Our method has high utility for predicting vulnerability to climate change of diverse fish

  5. Groundwater vulnerability assessment: from overlay methods to statistical methods in the Lombardy Plain area

    Directory of Open Access Journals (Sweden)

    Stefania Stevenazzi

    2017-06-01

    Full Text Available Groundwater is among the most important freshwater resources. Worldwide, aquifers are experiencing an increasing threat of pollution from urbanization, industrial development, agricultural activities and mining enterprise. Thus, practical actions, strategies and solutions to protect groundwater from these anthropogenic sources are widely required. The most efficient tool, which helps supporting land use planning, while protecting groundwater from contamination, is represented by groundwater vulnerability assessment. Over the years, several methods assessing groundwater vulnerability have been developed: overlay and index methods, statistical and process-based methods. All methods are means to synthesize complex hydrogeological information into a unique document, which is a groundwater vulnerability map, useable by planners, decision and policy makers, geoscientists and the public. Although it is not possible to identify an approach which could be the best one for all situations, the final product should always be scientific defensible, meaningful and reliable. Nevertheless, various methods may produce very different results at any given site. Thus, reasons for similarities and differences need to be deeply investigated. This study demonstrates the reliability and flexibility of a spatial statistical method to assess groundwater vulnerability to contamination at a regional scale. The Lombardy Plain case study is particularly interesting for its long history of groundwater monitoring (quality and quantity, availability of hydrogeological data, and combined presence of various anthropogenic sources of contamination. Recent updates of the regional water protection plan have raised the necessity of realizing more flexible, reliable and accurate groundwater vulnerability maps. A comparison of groundwater vulnerability maps obtained through different approaches and developed in a time span of several years has demonstrated the relevance of the

  6. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    International Nuclear Information System (INIS)

    Najihah, R; Effendi, D M; Hairunnisa, M A; Masiri, K

    2014-01-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters

  7. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    Science.gov (United States)

    Najihah, R.; Effendi, D. M.; Hairunnisa, M. A.; Masiri, K.

    2014-02-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters.

  8. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  9. Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks

    Science.gov (United States)

    Bhatia, U.; Ganguly, A. R.

    2015-12-01

    Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.

  10. Free and Open Source Software for land degradation vulnerability assessment

    Science.gov (United States)

    Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana

    2013-04-01

    Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess

  11. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  12. Applying the Msharpp Method in Risk Assessment for the Water Supply Critical Infrastructure Sector

    Directory of Open Access Journals (Sweden)

    Badea Dorel

    2015-06-01

    Full Text Available The paper highlights a manner to assess risks for an important sector of critical infrastructure, that of water supply, frequently regulated in international legal systems. We took into consideration the fact that risk is a problem related to the processes of decision making under conditions of uncertainty in most cases, so that by this approach we bring to the attention of critical infrastructure managers, drawing on their experience, a simple method that can be considered in a preliminary stage of risk assessment specific to water supply.

  13. Coastal erosion vulnerability and risk assessment focusing in tourism beach use.

    Science.gov (United States)

    Alexandrakis, George

    2016-04-01

    It is well established that the global market for tourism services is a key source of economic growth. Especially among Mediterranean countries, the tourism sector is one of the principal sectors driving national economies. With the majority of the mass tourism activities concentrated around coastal areas, coastal erosion, inter alia, poses a significant threat to coastal economies that depend heavily on revenues from tourism. The economic implications of beach erosion were mainly focused in the cost of coastal protection measures, instead of the revenue losses from tourism. For this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and economic activity need to be identified. To achieve this, a joint environmental and economic evaluation approach of the problem can provide a managerial tool to mitigate the impact of beach erosion in tourism, through realistic cost-benefit scenarios for planning alternative protection measures. Such a multipurpose tool needs to consider social, economic and environmental factors, which relationships can be better understood when distributed and analyzed along the geographical space. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index (BVI) method. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental

  14. Post-Adaptation Vulnerability of Cereals to Rainfall and ...

    African Journals Online (AJOL)

    USER

    2014-09-04

    Sep 4, 2014 ... Ethiopian Journal of Environmental Studies & Management 7(5): 532 – 547, 2014. ISSN:1998-0507 ... and infrastructure as well as reliable agricultural extension service. .... FCT is made up six area councils (AMAC, ..... Nepal, Sri Lanka and Madagascar. ..... means that vulnerability in this research was.

  15. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2003-01-01

    Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security...

  16. Energy Vulnerability and EU-Russia Energy Relations

    Directory of Open Access Journals (Sweden)

    Edward Hunter Christie

    2009-08-01

    Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.

  17. Health Effects of Coastal Storms and Flooding in Urban Areas: A Review and Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Kathryn Lane

    2013-01-01

    Full Text Available Coastal storms can take a devastating toll on the public's health. Urban areas like New York City (NYC may be particularly at risk, given their dense population, reliance on transportation, energy infrastructure that is vulnerable to flood damage, and high-rise residential housing, which may be hard-hit by power and utility outages. Climate change will exacerbate these risks in the coming decades. Sea levels are rising due to global warming, which will intensify storm surge. These projections make preparing for the health impacts of storms even more important. We conducted a broad review of the health impacts of US coastal storms to inform climate adaptation planning efforts, with a focus on outcomes relevant to NYC and urban coastal areas, and incorporated some lessons learned from recent experience with Superstorm Sandy. Based on the literature, indicators of health vulnerability were selected and mapped within NYC neighborhoods. Preparing for the broad range of anticipated effects of coastal storms and floods may help reduce the public health burden from these events.

  18. Health effects of coastal storms and flooding in urban areas: a review and vulnerability assessment.

    Science.gov (United States)

    Lane, Kathryn; Charles-Guzman, Kizzy; Wheeler, Katherine; Abid, Zaynah; Graber, Nathan; Matte, Thomas

    2013-01-01

    Coastal storms can take a devastating toll on the public's health. Urban areas like New York City (NYC) may be particularly at risk, given their dense population, reliance on transportation, energy infrastructure that is vulnerable to flood damage, and high-rise residential housing, which may be hard-hit by power and utility outages. Climate change will exacerbate these risks in the coming decades. Sea levels are rising due to global warming, which will intensify storm surge. These projections make preparing for the health impacts of storms even more important. We conducted a broad review of the health impacts of US coastal storms to inform climate adaptation planning efforts, with a focus on outcomes relevant to NYC and urban coastal areas, and incorporated some lessons learned from recent experience with Superstorm Sandy. Based on the literature, indicators of health vulnerability were selected and mapped within NYC neighborhoods. Preparing for the broad range of anticipated effects of coastal storms and floods may help reduce the public health burden from these events.

  19. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    Directory of Open Access Journals (Sweden)

    Tanja Wolf

    2015-10-01

    Full Text Available Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  20. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    Science.gov (United States)

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-10-23

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  1. Groundwater vulnerability to climate change: A review of the assessment methodology.

    Science.gov (United States)

    Aslam, Rana Ammar; Shrestha, Sangam; Pandey, Vishnu Prasad

    2018-01-15

    Impacts of climate change on water resources, especially groundwater, can no longer be hidden. These impacts are further exacerbated under the integrated influence of climate variability, climate change and anthropogenic activities. The degree of impact varies according to geographical location and other factors leading systems and regions towards different levels of vulnerability. In the recent past, several attempts have been made in various regions across the globe to quantify the impacts and consequences of climate and non-climate factors in terms of vulnerability to groundwater resources. Firstly, this paper provides a structured review of the available literature, aiming to critically analyse and highlight the limitations and knowledge gaps involved in vulnerability (of groundwater to climate change) assessment methodologies. The effects of indicator choice and the importance of including composite indicators are then emphasised. A new integrated approach for the assessment of groundwater vulnerability to climate change is proposed to successfully address those limitations. This review concludes that the choice of indicator has a significant role in defining the reliability of computed results. The effect of an individual indicator is also apparent but the consideration of a combination (variety) of indicators may give more realistic results. Therefore, in future, depending upon the local conditions and scale of the study, indicators from various groups should be chosen. Furthermore, there are various assumptions involved in previous methodologies, which limit their scope by introducing uncertainty in the calculated results. These limitations can be overcome by implementing the proposed approach. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Department of Energy Plutonium ES ampersand H Vulnerability Assessment Savannah River Site interim compensatory measures

    International Nuclear Information System (INIS)

    Bickford, W.E.

    1994-01-01

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES ampersand H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES ampersand H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public

  3. 'System-of-systems' approach for interdependent critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Nan, Cen; Dietz, Sven

    2011-01-01

    The study of the interdependencies within critical infrastructures (CI) is a growing field of research as the importance of potential failure propagation among infrastructures may lead to cascades affecting all supply networks. New powerful methods are required to model and describe such 'systems-of-systems' (SoS) as a whole. An overall model is required to provide security and reliability assessment taking into account various kinds of threats and failures. A significant challenge associated with this model may be to create 'what-if' scenarios for the analysis of interdependencies. In this paper the interdependencies between industrial control systems (ICS), in particular SCADA (Supervisory Control and Data Acquisition), and the underlying critical infrastructures to address the vulnerabilities related to the coupling of these systems are analyzed. The modeling alternatives for system-of-systems, integrated versus coupled models, are discussed. An integrated model contains detailed low level models of (sub)systems as well as a high level model, covering all hierarchical levels. On the other hand, a coupled model aggregates different simulated outputs of the low level models as inputs at a higher level. Strengths and weaknesses of both approaches are analyzed and a model architecture for SCADA and the 'system under control' are proposed. Furthermore, the HLA simulation standard is introduced and discussed in this paper as a promising approach to represent interdependencies between infrastructures. To demonstrate the capabilities of the HLA standard for the interdependencies study, an exemplary application and some first results are also briefly presented in this paper.

  4. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2014-01-01

    Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  5. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  6. How useful are Swiss flood insurance data for flood vulnerability assessments?

    Science.gov (United States)

    Röthlisberger, Veronika; Bernet, Daniel; Zischg, Andreas; Keiler, Margreth

    2015-04-01

    vulnerability and resilience assessments. For instance, the collation of insurance loss data with event documentations containing information on flood intensity allows to develop damage curves. Flood damage curves are fundamental for many risk analysis methodologies but to date only few are published and the spatial and temporal scope of their applicability is subject of discussion. Another possibility of using insurance data lies in the field of assessment exposure, where the analysis of comprehensive insurance portfolio data can improve the understanding of the physical but also the socio-economical vulnerability of a society. The poster spotlights key opportunities and challenges scientists are facing when using insurance data for flood vulnerability assessments.

  7. Combining analytical frameworks to assess livelihood vulnerability to climate change and analyse adaptation options.

    Science.gov (United States)

    Reed, M S; Podesta, G; Fazey, I; Geeson, N; Hessel, R; Hubacek, K; Letson, D; Nainggolan, D; Prell, C; Rickenbach, M G; Ritsema, C; Schwilch, G; Stringer, L C; Thomas, A D

    2013-10-01

    Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change.

  8. Using Bayesian networks to assess the vulnerability of Hawaiian terrestrial biota to climate change

    Science.gov (United States)

    Fortini, L.; Jacobi, J.; Price, J.; Vorsino, A.; Paxton, E.; Amidon, F.; 'Ohukani'ohi'a Gon, S., III; Koob, G.; Brink, K.; Burgett, J.; Miller, S.

    2012-12-01

    As the effects of climate change on individual species become increasingly apparent, there is a clear need for effective adaptation planning to prevent an increase in species extinctions worldwide. Given the limited understanding of species responses to climate change, vulnerability assessments and species distribution models (SDMs) have been two common tools used to jump-start climate change adaptation efforts. However, although these two approaches generally serve the same purpose of understanding species future responses to climate change, they have rarely mixed. In collaboration with research and management partners from federal, state and non-profit organizations, we are conducting a climate change vulnerability assessment for hundreds of plant and forest bird species of the Main Hawaiian Islands. This assessment is the first to comprehensively consider the potential threats of climate change to a significant portion of Hawaii's fauna and flora (over one thousand species considered) and thus fills a critical gap defined by natural resource scientists and managers in the region. We have devised a flexible approach that effectively integrates species distribution models into a vulnerability assessment framework that can be easily updated with improved models and data. This tailors our assessment approach to the Pacific Island reality of often limited and fragmented information on species and large future climate uncertainties, This vulnerability assessment is based on a Bayesian network-based approach that integrates multiple landscape (e.g., topographic diversity, dispersal barriers), species trait (e.g., generation length, fecundity) and expert-knowledge based information (e.g., capacity to colonize restored habitat) relevant to long-term persistence of species under climate change. Our presentation will highlight some of the results from our assessment but will mainly focus on the utility of the flexible approach we have developed and its potential

  9. Coastal Hazard Vulnerability Assessment: A Case Study of Erosion and Flooding on Herschel Island, Yukon Territory, Canada

    Science.gov (United States)

    Radosavljevic, B.; Lantuit, H.; Overduin, P. P.; Fritz, M.

    2015-12-01

    Coastal infrastructure, cultural, and archeological sites are increasingly vulnerable to erosion and flooding along permafrost coasts. Amplified warming of the Arctic, sea level rise, lengthening of the open water period, and a predicted increase in frequency of major storms compound these threats. Mitigation necessitates decision-making tools at an appropriate scale. We present a study of coastal erosion combining it with a flooding risk assessment for the culturally important historic settlement on Herschel Island, a UNESCO World Heritage candidate site. The resulting map may help local stakeholders devise management strategies to cope with rapidly changing environmental conditions. We analyzed shoreline movement using the Digital Shoreline Analysis System (DSAS) after digitizing shorelines from 1952, 1970, and 2011. Using these data, forecasts of shoreline positions were made for 20 and 50 years into the future. Flooding risk was assessed using a cost-distance map based on a high-resolution Light Detection and Ranging (LiDAR) dataset and current Intergovernmental Panel on Climate Change sea level estimates. Widespread erosion characterizes the study area. The rate of shoreline movement for different periods of the study ranges from -5.5 to 2.7 m·a-1 (mean -0.6 m·a-1). Mean coastal retreat decreased from -0.6 m·a-1 to -0.5 m·a-1, for 1952-1970 and 1970-2000, respectively, and increased to -1.3 m·a-1 in the period 2000-2011. Ice-rich coastal sections, and coastal sections most exposed to wave attack exhibited the highest rates of coastal retreat. The geohazard map resulting from shoreline projections and flood risk analysis indicates that most of the area occupied by the historic settlement is at extreme or very high risk of flooding, and some buildings are vulnerable to coastal erosion. The results of this study indicate a greater threat by coastal flooding than erosion. Our assessment may be applied in other locations where limited data are available.

  10. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    Directory of Open Access Journals (Sweden)

    Aaron Zimba

    2018-03-01

    Full Text Available The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes in different SCADA and production subnets, and for the subsequent network propagation. Based on the uncovered artifacts, we recommend a cascaded network segmentation approach, which prioritizes the security of production network devices. Keywords: Critical infrastructure, Cyber-attack, Industrial control system, Crypto ransomware, Vulnerability

  11. Vulnerability Assessment for a Complex Structure Using Vibration Response Induced by Impact Load

    International Nuclear Information System (INIS)

    Park, Jeongwon; Park, Junhong; Koo, Man Hoi

    2014-01-01

    This work presents a vulnerability assessment procedure for a complex structure using vibration characteristics. The structural behavior of a three-dimensional framed structure subjected to impact forces was predicted using the spectral element method. The Timoshenko beam function was applied to simulate the impact wave propagations induced by a high-velocity projectile at relatively high frequencies. The interactions at the joints were analyzed for both flexural and longitudinal wave propagations. Simulations of the impact energy transfer through the entire structure were performed using the transient displacement and acceleration responses obtained from the frequency analysis. The kill probabilities of the crucial components for an operating system were calculated as a function of the predicted acceleration amplitudes according to the acceptable vibration levels. Following the proposed vulnerability assessment procedure, the vulnerable positions of a three-dimensional combat vehicle with high possibilities of damage generation of components by impact loading were identified from the estimated vibration responses

  12. A hybrid framework for assessing maize drought vulnerability in Sub-Saharan Africa

    Science.gov (United States)

    Kamali, B.; Abbaspour, K. C.; Wehrli, B.; Yang, H.

    2017-12-01

    Drought has devastating impacts on crop yields. Quantifying drought vulnerability is the first step to better design of mitigation policies. The vulnerability of crop yield to drought has been assessed with different methods, however they lack a standardized base to measure its components and a procedure that facilitates spatial and temporal comparisons. This study attempts to quantify maize drought vulnerability through linking the Drought Exposure Index (DEI) to the Crop Failure Index (CFI). DEI and CFI were defined by fitting probability distribution functions to precipitation and maize yield respectively. To acquire crop drought vulnerability index (CDVI), DEI and CFI were combined in a hybrid framework which classifies CDVI with the same base as DEI and CFI. The analysis were implemented on Sub-Saharan African countries using maize yield simulated with the Environmental Policy Integrated Climate (EPIC) model at 0.5° resolution. The model was coupled with the Sequential Uncertainty Fitting algorithm for calibration at country level. Our results show that Central Africa and those Western African countries located below the Sahelian strip receive higher amount of precipitation, but experience high crop failure. Therefore, they are identified as more vulnerable regions compared to countries such as South Africa, Tanzania, and Kenya. We concluded that our hybrid approach complements information on crop drought vulnerability quantification and can be applied to different regions and scales.

  13. Developing a concept of social-ecological-technological systems to characterize resilience of urban areas and infrastructure to extreme events

    Science.gov (United States)

    Chester, M.; Grimm, N. B.; Redman, C.; Miller, T.; McPherson, T.; Munoz-Erickson, T.; Chandler, D. G.

    2015-12-01

    Climate change is widely considered one of the greatest challenges to global sustainability, with extreme events being the most immediate way that people experience this phenomenon. Urban areas are particularly vulnerable to these events given their location, concentration of people, and increasingly complex and interdependent infrastructure. We are developing a conceptual framework for urban social-ecological-technological systems (SETS) that will allow researchers and practitioners to assess how infrastructure can be resilient, provide ecosystem services, improve social well being, and exploit new technologies in ways that benefit urban populations. The framework integrates the three domains of social and equity issues, environmental quality and protection, and technical/engineering aspects, to form a concept of infrastructure that occurs at the intersection of the domains. Examples show how the more common socioecological systems and socially sensitive engineering approaches that fail to incorporate the third dimension may elevate vulnerability to climate-related disaster. The SETS conceptual framework bridges currently siloed social science, environmental science, and engineering approaches to significantly advance research into the structure, function, and emergent properties of SETS. Extreme events like heat waves in Phoenix; coastal and urban flooding in the wake of superstorm Sandy and following hurricanes in Miami, FL; drought in Mexico; and urban flooding in Baltimore, Portland, San Juan PR, Syracuse, and Valdivia, Chile provide examples of the impacts of and vulnerability to extreme events that demand a new approach. The infrastructure of the future must be resilient, leverage ecosystem services, improve social well being, and exploit new technologies in ways that benefit all segments of urban populations and are appropriate to the particular urban contexts. These contexts are defined not only by the biophysical environment but also by culture and

  14. Extreme seismicity and disaster risks: Hazard versus vulnerability (Invited)

    Science.gov (United States)

    Ismail-Zadeh, A.

    2013-12-01

    Although the extreme nature of earthquakes has been known for millennia due to the resultant devastation from many of them, the vulnerability of our civilization to extreme seismic events is still growing. It is partly because of the increase in the number of high-risk objects and clustering of populations and infrastructure in the areas prone to seismic hazards. Today an earthquake may affect several hundreds thousand lives and cause significant damage up to hundred billion dollars; it can trigger an ecological catastrophe if occurs in close vicinity to a nuclear power plant. Two types of extreme natural events can be distinguished: (i) large magnitude low probability events, and (ii) the events leading to disasters. Although the first-type events may affect earthquake-prone countries directly or indirectly (as tsunamis, landslides etc.), the second-type events occur mainly in economically less-developed countries where the vulnerability is high and the resilience is low. Although earthquake hazards cannot be reduced, vulnerability to extreme events can be diminished by monitoring human systems and by relevant laws preventing an increase in vulnerability. Significant new knowledge should be gained on extreme seismicity through observations, monitoring, analysis, modeling, comprehensive hazard assessment, prediction, and interpretations to assist in disaster risk analysis. The advanced disaster risk communication skill should be developed to link scientists, emergency management authorities, and the public. Natural, social, economic, and political reasons leading to disasters due to earthquakes will be discussed.

  15. Climate Change Vulnerability Assessments: Four Case Studies of Water Utility Practices (2011 Final)

    Science.gov (United States)

    EPA has released the final report titled, Climate Change Vulnerability Assessments: Four Case Studies of Water Utility Practices. This report was prepared by the National Center for Environmental Assessment's Global Climate Research Staff in the Office of Research and D...

  16. Consideration of vertical uncertainty in elevation-based sea-level rise assessments: Mobile Bay, Alabama case study

    Science.gov (United States)

    Gesch, Dean B.

    2013-01-01

    The accuracy with which coastal topography has been mapped directly affects the reliability and usefulness of elevationbased sea-level rise vulnerability assessments. Recent research has shown that the qualities of the elevation data must be well understood to properly model potential impacts. The cumulative vertical uncertainty has contributions from elevation data error, water level data uncertainties, and vertical datum and transformation uncertainties. The concepts of minimum sealevel rise increment and minimum planning timeline, important parameters for an elevation-based sea-level rise assessment, are used in recognition of the inherent vertical uncertainty of the underlying data. These concepts were applied to conduct a sea-level rise vulnerability assessment of the Mobile Bay, Alabama, region based on high-quality lidar-derived elevation data. The results that detail the area and associated resources (land cover, population, and infrastructure) vulnerable to a 1.18-m sea-level rise by the year 2100 are reported as a range of values (at the 95% confidence level) to account for the vertical uncertainty in the base data. Examination of the tabulated statistics about land cover, population, and infrastructure in the minimum and maximum vulnerable areas shows that these resources are not uniformly distributed throughout the overall vulnerable zone. The methods demonstrated in the Mobile Bay analysis provide an example of how to consider and properly account for vertical uncertainty in elevation-based sea-level rise vulnerability assessments, and the advantages of doing so.

  17. Assessment of the Green Infrastructure of Bucharest using CORINE and Urban Atlas data

    Directory of Open Access Journals (Sweden)

    Alexandru-Ionuţ Petrişor

    2015-06-01

    Full Text Available Urban ecology provides the theoretical foundation for assessing the interaction between man and nature in cities. Nature seems to be reduced and malfunctioning, resulting into a decrease in the ecosystem services provided to humans. The new method, based on assessing the green infrastructure, is designed to replace monetary and carbon footprint assessments and be particularly relevant for the urban areas, which grow and change fast and are the main drivers of environmental changes. This study uses 2005-2007 CORINE and Urban Atlas data to look at Bucharest. The results show that, despite of the method, the area occupied by the green infrastructure represents about 1/3 of the total area, corresponding to 50 m2/person, although the green spaces only account for 6.5 m2/person, which is far below the European average (26 m2/person.

  18. The Future of Risk Analysis: Operationalizing Living Vulnerability Assessments from the Cloud to the Street (and Back)

    Science.gov (United States)

    Tellman, B.; Schwarz, B.; Kuhn, C.; Pandey, B.; Schank, C.; Sullivan, J.; Mahtta, R.; Hammet, L.

    2016-12-01

    21 million people are exposed to flooding every year, and that number is expected to more than double by 2030 due to climate, land use, and demographic change. Cloud to Street, a mission driven science organization, is working to make big and real time data more meaningful to understand both biophysical and social vulnerability to flooding in this changing world. This talk will showcase the science and practice we have built of integrated social and biophysical flood vulnerability assessments based on our work in Uttarakhand, India and Senegal, in conjunction with nonprofits and development banks. We will show developments of our global historical flood database, detected from MODIS and Landsat satellites, used to power machine learning flood exposure models in Google Earth Engine's API. Demonstrating the approach, we will also showcase new approaches in social vulnerability science, from developing data-driven social vulnerability indices in India, to deriving predictive models that explain the social conditions that lead to disproportionate flood damage and fatality in the US. While this talk will draw on examples of completed vulnerability assessments, we will also discuss the possible future for place-based "living" flood vulnerability assessments that are updated each time satellites circle the earth or people add crowd-sourced observations about flood events and social conditions.

  19. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  20. Assessing social vulnerability to climate change in human communities near public forests and grasslands: a framework for resource managers and planners

    Science.gov (United States)

    A. Paige Fischer; Travis Paveglio; Matthew Carroll; Daniel Murphy; Hannah Brenkert-Smith

    2013-01-01

    Public land management agencies have incorporated the concept of vulnerability into protocols for assessing and planning for climate change impacts on public forests and grasslands. However, resource managers and planners have little guidance for how to address the social aspects of vulnerability in these assessments and plans. Failure to assess social vulnerability to...

  1. A method to the impact assessment of the returning grazing land to grassland project on regional eco-environmental vulnerability

    International Nuclear Information System (INIS)

    Shao, Huaiyong; Sun, Xiaofei; Wang, Haoxue; Zhang, Xiaoxue; Xiang, Zhiying; Tan, Rui; Chen, Xuanyi; Xian, Wei; Qi, Jiaguo

    2016-01-01

    The Chinese government has conducted the Returning Grazing Land to Grassland Project (RGLGP) across large portions of grasslands from western China since 2003. In order to explore and understand the impact in the grassland's eco-environment during the RGLGP, we utilized Projection Pursuit Model (PPM) and Geographic Information System (GIS) to develop a spatial assessment model to examine the ecological vulnerability of the grassland. Our results include five indications: (1) it is practical to apply the spatial PPM on ecological vulnerability assessment for the grassland. This methodology avoids creating an artificial hypothesis, thereby providing objective results that successfully execute a multi-index assessment process and analysis under non-linear systems in eco-environments; (2) the spatial PPM is not only capable of evaluating regional eco-environmental vulnerability in a quantitative way, but also can quantitatively demonstrate the degree of effect in each evaluation index for regional eco-environmental vulnerability; (3) the eco-environment of the Xianshui River Basin falls into the medium range level. The normalized difference vegetation index (NDVI) and land use cover and change (LUCC) crucially influence the Xianshui River Basin's eco-environmental vulnerability. Generally, in the Xianshui River Basin, regional eco-environmental conditions improved during 2000 and 2010. The RGLGP positively affected NDVI and LUCC structure, thereby promoting the enhancement of the regional eco-environment; (4) the Xianshui River Basin divides its ecological vulnerability across different levels; therefore our study investigates three ecological regions and proposes specific suggestions for each in order to assist in eco-environmental protection and rehabilitation; and lastly that (5) the spatial PPM established by this study has the potential to be applied on all types of grassland eco-environmental vulnerability assessments under the RGLGP and under the similar

  2. A method to the impact assessment of the returning grazing land to grassland project on regional eco-environmental vulnerability

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Huaiyong, E-mail: huaiyongshao@163.com [Key Laboratory of Geoscience Spatial Information Technology, Ministry of Land and Resources of China, Chengdu University of Technology, Chengdu 610059, Sichuan (China); Center for Global Change and Earth Observations, Michigan State University, East Lansing 48823, MI (United States); Sun, Xiaofei; Wang, Haoxue; Zhang, Xiaoxue [Key Laboratory of Geoscience Spatial Information Technology, Ministry of Land and Resources of China, Chengdu University of Technology, Chengdu 610059, Sichuan (China); Xiang, Zhiying [School of Earth Sciences, Zhejiang University, Hangzhou 310027, Zhejiang (China); Tan, Rui; Chen, Xuanyi [Key Laboratory of Geoscience Spatial Information Technology, Ministry of Land and Resources of China, Chengdu University of Technology, Chengdu 610059, Sichuan (China); Xian, Wei [College of Resources and Environment, Chengdu University of Information Technology, Chengdu 610225, Sichuan (China); Qi, Jiaguo [Center for Global Change and Earth Observations, Michigan State University, East Lansing 48823, MI (United States)

    2016-01-15

    The Chinese government has conducted the Returning Grazing Land to Grassland Project (RGLGP) across large portions of grasslands from western China since 2003. In order to explore and understand the impact in the grassland's eco-environment during the RGLGP, we utilized Projection Pursuit Model (PPM) and Geographic Information System (GIS) to develop a spatial assessment model to examine the ecological vulnerability of the grassland. Our results include five indications: (1) it is practical to apply the spatial PPM on ecological vulnerability assessment for the grassland. This methodology avoids creating an artificial hypothesis, thereby providing objective results that successfully execute a multi-index assessment process and analysis under non-linear systems in eco-environments; (2) the spatial PPM is not only capable of evaluating regional eco-environmental vulnerability in a quantitative way, but also can quantitatively demonstrate the degree of effect in each evaluation index for regional eco-environmental vulnerability; (3) the eco-environment of the Xianshui River Basin falls into the medium range level. The normalized difference vegetation index (NDVI) and land use cover and change (LUCC) crucially influence the Xianshui River Basin's eco-environmental vulnerability. Generally, in the Xianshui River Basin, regional eco-environmental conditions improved during 2000 and 2010. The RGLGP positively affected NDVI and LUCC structure, thereby promoting the enhancement of the regional eco-environment; (4) the Xianshui River Basin divides its ecological vulnerability across different levels; therefore our study investigates three ecological regions and proposes specific suggestions for each in order to assist in eco-environmental protection and rehabilitation; and lastly that (5) the spatial PPM established by this study has the potential to be applied on all types of grassland eco-environmental vulnerability assessments under the RGLGP and under the

  3. Assessing water resources vulnerability and resilience of southern Taiwan to climate change

    Directory of Open Access Journals (Sweden)

    Ming-Hsu Li

    2017-01-01

    Full Text Available Water resources management has become more challenging in Taiwan due to rapid socio-economic development and the complications of climate change. This study developed a systematic procedure for assessing water resources vulnerability and resilience with an integrated tool, TaiWAP, including climate change scenarios, a weather generator, a hydrological model, and system dynamic models. Five assessment indicators, including two for vulnerability, two for resilience, and one for availability were used to quantify changes in water resources and improvements after implementing adaption measures. Each indicator was presented with 3 grades, namely low, medium, and high. Water resources vulnerability and resilience for Tainan City in southern Taiwan were evaluated. Insufficient water supply facilities capacity is the major weakness causing low resilience. Water resources allocation flexibility is limited by substantial agricultural water demands. A total of 9 adaption measures and combinations of measures were assessed. Desalination plant implementation can steadily supply public water to lessen system failure duration. Although agricultural water conservation and fallow land can greatly reduce water demand, fallow compensation is a potential cost. When food security is considered, reducing irrigation leakage will be a better adaption measure to both water and agriculture stakeholders. Both agriculture water conservation and cropping systems adjustment have cross-spatial flexibilities. The combination of desalination, reservoirs and public water conservation provide the most beneficial effects in reducing climate change impact.

  4. Assessment of vulnerability to storm induced flood hazard along diverse coastline settings

    Directory of Open Access Journals (Sweden)

    Valchev Nikolay

    2016-01-01

    Full Text Available European coasts suffer notably from hazards caused by low-probability and high-impact hydrometeorological events. The aim of the study is to assess in probabilistic terms the magnitude of storm‐induced flooding hazard along Varna regional coast (Bulgaria, western Black Sea and to identify susceptible coastal sectors (hotspots. The study is performed employing the Coastal Risk Assessment Framework (CRAF developed within EU FP7 RISC-KIT project. It constitutes a screening process that allows estimation of relevant hazard intensities, extents and potential receptors’ exposure vulnerability within predefined sectors. Total water level was the chief property considered for calculation of coastal flooding hazard. It was estimated using Holman model (for sandy beaches and EurOtop formulation (for artificial or rocky slopes. Resulting values were subjected to Extreme Value Analysis to establish that the best fitting distribution corresponds to Generalized Extreme Value distribution. Furthermore, hazard extents were modelled by means of bathtubbing or overwash estimation in order to form the flooding hazard indicator. Land use, social vulnerability, transport systems, utilities and business settings were considered as exposure indicators. Finally, potential risk was assessed by coastal indices following an index-based methodology, which combines hazard and exposure indicators into a single index, thereby providing base for comparison of coastal sectors’ vulnerability. The study found that the concentration of hotspots is highest in Varna Bay.

  5. Rockfall vulnerability assessment for reinforced concrete buildings

    Science.gov (United States)

    Mavrouli, O.; Corominas, J.

    2010-10-01

    The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  6. Assessment of vulnerability zones for ground water pollution using GIS-DRASTIC-EC model: A field-based approach

    Science.gov (United States)

    Anantha Rao, D.; Naik, Pradeep K.; Jain, Sunil K.; Vinod Kumar, K.; Dhanamjaya Rao, E. N.

    2018-06-01

    Assessment of groundwater vulnerability to pollution is an essential pre-requisite for better planning of an area. We present the groundwater vulnerability assessment in parts of the Yamuna Nagar District, Haryana State, India in an area of about 800 km2, considered to be a freshwater zone in the foothills of the Siwalik Hill Ranges. Such areas in the Lower Himalayas form good groundwater recharge zones, and should always be free from contamination. But, the administration has been trying to promote industrialization along these foothill zones without actually assessing the environmental consequences such activities may invite in the future. GIS-DRASTIC model has been used with field based data inputs for studying the vulnerability assessment. But, we find that inclusion electrical conductivity (EC) as a model parameter makes it more robust. Therefore, we rename it as GIS-DRASTIC-EC model. The model identifies three vulnerability zones such as low, moderate and high with an areal extent of 5%, 80% and 15%, respectively. On the basis of major chemical parameters alone, the groundwater in the foothill zones apparently looks safe, but analysis with the help of GIS-DRASTIC-EC model gives a better perspective of the groundwater quality in terms of identifying the vulnerable areas.

  7. Command Decision-Making and Information Superiority Vulnerability: Addressing the Emerging Threat

    National Research Council Canada - National Science Library

    Thieme, Aaron M

    2007-01-01

    .... Finally, the paper draws conclusions concerning ways to minimize exposure to vulnerabilities in information technology infrastructure and recommends implementation of measures to optimize decision-making and minimize risk in a disruptive C2 environment.

  8. Assessment of online public opinions on large infrastructure projects: A case study of the Three Gorges Project in China

    International Nuclear Information System (INIS)

    Jiang, Hanchen; Qiang, Maoshan; Lin, Peng

    2016-01-01

    Public opinion becomes increasingly salient in the ex post evaluation stage of large infrastructure projects which have significant impacts to the environment and the society. However, traditional survey methods are inefficient in collection and assessment of the public opinion due to its large quantity and diversity. Recently, Social media platforms provide a rich data source for monitoring and assessing the public opinion on controversial infrastructure projects. This paper proposes an assessment framework to transform unstructured online public opinions on large infrastructure projects into sentimental and topical indicators for enhancing practices of ex post evaluation and public participation. The framework uses web crawlers to collect online comments related to a large infrastructure project and employs two natural language processing technologies, including sentiment analysis and topic modeling, with spatio-temporal analysis, to transform these comments into indicators for assessing online public opinion on the project. Based on the framework, we investigate the online public opinion of the Three Gorges Project on China's largest microblogging site, namely, Weibo. Assessment results present spatial-temporal distributions of post intensity and sentiment polarity, reveals major topics with different sentiments and summarizes managerial implications, for ex post evaluation of the world's largest hydropower project. The proposed assessment framework is expected to be widely applied as a methodological strategy to assess public opinion in the ex post evaluation stage of large infrastructure projects. - Highlights: • We developed a framework to assess online public opinion on large infrastructure projects with environmental impacts. • Indicators were built to assess post intensity, sentiment polarity and major topics of the public opinion. • We took the Three Gorges Project (TGP) as an example to demonstrate the effectiveness proposed framework.

  9. Assessment of online public opinions on large infrastructure projects: A case study of the Three Gorges Project in China

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Hanchen, E-mail: jhc13@mails.tsinghua.edu.cn; Qiang, Maoshan, E-mail: qiangms@tsinghua.edu.cn; Lin, Peng, E-mail: celinpe@mail.tsinghua.edu.cn

    2016-11-15

    Public opinion becomes increasingly salient in the ex post evaluation stage of large infrastructure projects which have significant impacts to the environment and the society. However, traditional survey methods are inefficient in collection and assessment of the public opinion due to its large quantity and diversity. Recently, Social media platforms provide a rich data source for monitoring and assessing the public opinion on controversial infrastructure projects. This paper proposes an assessment framework to transform unstructured online public opinions on large infrastructure projects into sentimental and topical indicators for enhancing practices of ex post evaluation and public participation. The framework uses web crawlers to collect online comments related to a large infrastructure project and employs two natural language processing technologies, including sentiment analysis and topic modeling, with spatio-temporal analysis, to transform these comments into indicators for assessing online public opinion on the project. Based on the framework, we investigate the online public opinion of the Three Gorges Project on China's largest microblogging site, namely, Weibo. Assessment results present spatial-temporal distributions of post intensity and sentiment polarity, reveals major topics with different sentiments and summarizes managerial implications, for ex post evaluation of the world's largest hydropower project. The proposed assessment framework is expected to be widely applied as a methodological strategy to assess public opinion in the ex post evaluation stage of large infrastructure projects. - Highlights: • We developed a framework to assess online public opinion on large infrastructure projects with environmental impacts. • Indicators were built to assess post intensity, sentiment polarity and major topics of the public opinion. • We took the Three Gorges Project (TGP) as an example to demonstrate the effectiveness proposed framework.

  10. Integrated assessment on the vulnerability of animal husbandry to snow disasters under climate change in the Qinghai-Tibetan Plateau

    Science.gov (United States)

    Wei, Yanqiang; Wang, Shijin; Fang, Yiping; Nawaz, Zain

    2017-10-01

    Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifying vulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience

  11. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  12. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  13. Increasing Biofuel Deployment and Utilization through Development of Renewable Super Premium: Infrastructure Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Moriarty, K.; Kass, M.; Theiss, T.

    2014-11-01

    A high octane fuel and specialized vehicle are under consideration as a market opportunity to meet federal requirements for renewable fuel use and fuel economy. Infrastructure is often cited as a barrier for the introduction of a new fuel. This report assesses infrastructure readiness for E25 (25% ethanol; 75% gasoline) and E25+ (more than 25% ethanol). Both above-ground and below-ground equipment are considered as are the current state of stations, codes and regulations, and materials compatibility.

  14. Intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by method SINTACS

    Directory of Open Access Journals (Sweden)

    2002-12-01

    Full Text Available In this paper is presented intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by the method SINTACS. It is parametric method that takes into consideration seven parameters (depth to ground water, effective infiltration action, unsaturatedzone attenuation capacity, soil/overburden attenuation capacity, hydrogeological characteristics of the aquifer, hydraulic conductivity range of aquifer, hydrologic role of the topographic slope. Parameters are presented in grid information layers that wereelaborated on the basis of interpretation and GIS processing of geological, hydrogeological,speleological, topographical, meteorological and pedological data. According to the parametersimportance for vulnerability assessment, a multiplier (importance weight was assigned to each parameter. Final map of vulnerability is a result of overlaying (summing of weighted information layers (parameters and shows the catchment area of the Rižanaspring subdivided into six vulnerability classes.

  15. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    Directory of Open Access Journals (Sweden)

    Joshua Steven Reece

    Full Text Available Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri, Key tree cactus (Pilosocereus robinii, Florida duskywing butterfly (Ephyriades brunnea floridensis, and Key deer (Odocoileus virginianus clavium. We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  16. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    .... The break out group discussed vulnerability presentation needs common across various application domains, particularly in support of network discovery and network analysis tasks in those domains...

  17. Assessing vulnerability of giant pandas to climate change in the Qinling Mountains of China.

    Science.gov (United States)

    Li, Jia; Liu, Fang; Xue, Yadong; Zhang, Yu; Li, Diqiang

    2017-06-01

    Climate change might pose an additional threat to the already vulnerable giant panda ( Ailuropoda melanoleuca ). Effective conservation efforts require projections of vulnerability of the giant panda in facing climate change and proactive strategies to reduce emerging climate-related threats. We used the maximum entropy model to assess the vulnerability of giant panda to climate change in the Qinling Mountains of China. The results of modeling included the following findings: (1) the area of suitable habitat for giant pandas was projected to decrease by 281 km 2 from climate change by the 2050s; (2) the mean elevation of suitable habitat of giant panda was predicted to shift 30 m higher due to climate change over this period; (3) the network of nature reserves protect 61.73% of current suitable habitat for the species, and 59.23% of future suitable habitat; (4) current suitable habitat mainly located in Chenggu, Taibai, and Yangxian counties (with a total area of 987 km 2 ) was predicted to be vulnerable. Assessing the vulnerability of giant panda provided adaptive strategies for conservation programs and national park construction. We proposed adaptation strategies to ameliorate the predicted impacts of climate change on giant panda, including establishing and adjusting reserves, establishing habitat corridors, improving adaptive capacity to climate change, and strengthening monitoring of giant panda.

  18. Comprehensive vulnerability assessment method for nodes considering anti-interference ability and influence

    Science.gov (United States)

    LUO, Jianchun; WANG, Yunyu; YANG, Jun; RAN, hong; PENG, Xiaodong; HUANG, Ming; FENG, Hao; LIU, Meijun

    2018-03-01

    The vulnerability assessment of power grid is of great significance in the current research. Power system faces many kinds of uncertainty factors, and the disturbance caused by them has become one of the main factors which restrict the safe operation of power grid. To solve this problem, considering the anti-interference ability of the system when the system is disturbed and the effect of the system when the node is out of operation, a set of index to reflect the anti-interference ability and the influence of nodes are set up. On this basis, a new comprehensive vulnerability assessment method of nodes is put forward by using super efficiency data envelopment analysis to scientific integration. Finally, the simulative results of IEEE30-bus system indicated that the proposed model is rational and valid.

  19. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  20. Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

    Directory of Open Access Journals (Sweden)

    Miguel Seijo Simó

    2017-01-01

    Full Text Available Security in critical infrastructures such as the power grid is of vital importance. The Smart Grid puts power grid classical security approach on the ropes, since it introduces cyberphysical systems where devices, communications, and information systems must be protected. PoweRline Intelligent Metering Evolution (PRIME is a Narrowband Power-Line Communications (NB-PLC protocol widely used in the last mile of Advanced Metering Infrastructure (AMI deployments, playing a key role in the Smart Grid. Therefore, this work aims to unveil the cybersecurity vulnerabilities present in PRIME standard, proposing solutions and validating and discussing the results obtained.

  1. Urban Vulnerability Assessment Using AHP

    Directory of Open Access Journals (Sweden)

    Alireza Rezaei

    2018-01-01

    Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.

  2. Assessing and adapting to climate change in the Blue Mountains, Oregon (USA: Overview, biogeography, and climate

    Directory of Open Access Journals (Sweden)

    Jessica E. Halofsky

    2018-04-01

    Full Text Available The Blue Mountains Adaptation Partnership (BMAP was established to increase climate change awareness, assess vulnerability to climate change, and develop science-based adaptation strategies for national forest lands in the Blue Mountains region of northeast Oregon and southeast Washington (USA. The BMAP process included (1 development of a science-management partnership, (2 a vulnerability assessment of the effects of climate change on natural resources and infrastructure, (3 development of adaptation options that will help reduce negative effects of climate change and assist the transition of biological systems and management to a changing climate, and (4 ongoing dialogue and activities related to climate change in the Blue Mountains region. This special issue of Climate Services describes social context and climate change vulnerability assessments for water use and infrastructure, vegetation, and riparian ecosystems of the Blue Mountains region, as well as adaptation options for natural resource management. This manuscript introduces the special issue, describing the management, biogeographic, and climatic context for the Blue Mountains region; the climate change vulnerability assessment and adaptation process used in BMAP; and the potential applications of the information described in the special issue. Although the institutional focus of information in the special issue is U.S. Forest Service lands (Malheur, Umatilla, and Wallowa-Whitman National Forests, the broader social context and adaptation options should be applicable to other lands throughout this region and the Pacific Northwest. Keywords: Climate change adaptation, Pacific Northwest, Resource management, Vulnerability assessment, Blue Mountains

  3. The drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment

    Science.gov (United States)

    Wang, Zhiqiang; Jiang, Jingyi; Ma, Qing

    2016-12-01

    Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of agricultural drought was conducted from the drought hazard intensity index and physical vulnerability curve. The probability distribution of drought hazard intensity index decreased from south-west to north-east and increased from south-east to north-west along the rainfall isoline. The physical vulnerability curve had a reduction effect in three parts of the farming-pastoral ecotone in Northern China, which helped to reduce drought hazard vulnerability on spring maize. The risk of yield loss ratio calculated based on physical vulnerability curve was lower compared with the drought hazard intensity index, which suggested that the capacity of spring maize to resist and adapt to drought is increasing. In conclusion, the farming-pastoral ecotone in Northern China is greatly sensitive to climate change and has a high probability of severe drought hazard. Risk assessment of physical vulnerability can help better understand the physical vulnerability to agricultural drought and can also promote measurements to adapt to climate change.

  4. Algorithms for Bayesian network modeling and reliability assessment of infrastructure systems

    International Nuclear Information System (INIS)

    Tien, Iris; Der Kiureghian, Armen

    2016-01-01

    Novel algorithms are developed to enable the modeling of large, complex infrastructure systems as Bayesian networks (BNs). These include a compression algorithm that significantly reduces the memory storage required to construct the BN model, and an updating algorithm that performs inference on compressed matrices. These algorithms address one of the major obstacles to widespread use of BNs for system reliability assessment, namely the exponentially increasing amount of information that needs to be stored as the number of components in the system increases. The proposed compression and inference algorithms are described and applied to example systems to investigate their performance compared to that of existing algorithms. Orders of magnitude savings in memory storage requirement are demonstrated using the new algorithms, enabling BN modeling and reliability analysis of larger infrastructure systems. - Highlights: • Novel algorithms developed for Bayesian network modeling of infrastructure systems. • Algorithm presented to compress information in conditional probability tables. • Updating algorithm presented to perform inference on compressed matrices. • Algorithms applied to example systems to investigate their performance. • Orders of magnitude savings in memory storage requirement demonstrated.

  5. A systemic method for evaluating the potential impacts of floods on network infrastructures

    Directory of Open Access Journals (Sweden)

    J. Eleutério

    2013-04-01

    Full Text Available Understanding network infrastructures and their operation under exceptional circumstances is fundamental for dealing with flood risks and improving the resilience of a territory. This work presents a method for evaluating potential network infrastructure dysfunctions and damage in cases of flooding. In contrast to existing approaches, this method analyses network infrastructures on an elementary scale, by considering networks as a group of elements with specific functions and individual vulnerabilities. Our analysis places assets at the centre of the evaluation process, resulting in the construction of damage-dysfunction matrices based on expert interviews. These matrices permit summarising the different vulnerabilities of network infrastructures, describing how the different components are linked to each other and how they can disrupt the operation of the network. They also identify the actions and resources needed to restore the system to operational status following damage and dysfunctions, an essential point when dealing with the question of resilience. The method promotes multi-network analyses and is illustrated by a French case study. Sixty network experts were interviewed during the analysis of the following networks: drinking water supply, waste water, public lighting, gas distribution and electricity supply.

  6. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  7. Assessing social vulnerability to drought in South Africa: Policy implication for drought risk reduction

    Directory of Open Access Journals (Sweden)

    Fumiso Muyambo

    2017-01-01

    Full Text Available The aim of this article was to assess and identify social vulnerability of communal farmers to drought in the O.R. Tambo district in the Eastern Cape province of South Africa using a survey data and social vulnerability index (SoVI. Eleven social vulnerability indicators were identified using Bogardi, Birkman and Cardona conceptual framework. The result found that an SoVI estimated for O.R. Tambo district was very high with a Likert scale of 5 for cultural values and practices, security or safety, social networks, social dependence, preparedness strategies and psychological stress attributed for the high value of social vulnerability to drought. Indigenous knowledge and education had an SoVI value of 2, which was of low vulnerability, contributing positively to resilience to drought. The study also found that government involvement in drought risk reduction is limited; as a result, the study recommends that a national, provincial and district municipalities policy on drought risk reduction and mitigation should be developed.

  8. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  9. [The assessment of vulnerability to floods in Guangdong province at district level].

    Science.gov (United States)

    Zhu, Qi; Liu, Tao; Zhang, Yong-hui; Luo, Yuan; Wei, Yao; Xiao, Jian-peng; Zeng, Si-qing; Ma, Wen-jun

    2012-11-01

    To evaluate the vulnerability to floods in Guangdong province at district level. Data were collected from the sixth census, the 2010 Statistical Yearbook of Guangdong, the 2010 Health Statistics Yearbook of Guangdong and China Disease Prevention and Control information systems, etc. The weight of each indicator was determined based on subjective method and objective method respectively; and finally the results of the two methods were compared. 13 indicators were selected for the assessment of vulnerability to floods, including 6 sensitivity indicators, 5 adaptability indicators and 2 exposure indicators. Indicators with large weight (subjective weight/objective weight) were the proportion of population older than 65 years old (0.31/0.30), the proportion of population older than 65 years old (0.16/0.23), infant mortality rate (0.18/0.20), the total Gross Domestic Product (GDP) per capita (0.33/0.21), the proportion of illiterate in the population older than 15 years old (0.19/0.28), history frequency of floods (0.75/0.75). The mean vulnerability index (VI) calculated by subjective method was 0.35 with the standard deviation of 0.10; the mean vulnerability index calculated by objective method was 0.31 with the standard deviation of 0.08. The two weighting methods showed consistent results of vulnerability index (ICC = 0.975, P 0.50 or objective VI > 0.40 should pay more attention to floods, including parts of the coastal areas, Beijiang River Basin, the eastern tributary area of Dongjiang River and the northern part of Pearl River Delta. Dapu district of Meizhou (0.55/0.45), Dianbai district and Maogang district of Maoming (0.54/0.48) were most vulnerable. Districts of Heyuan, Dongguan, Zhaoqing and Huizhou were less vulnerable, Yuancheng district of Heyuan showed least vulnerable to floods (0.15/0.12) followed by Dongguan (0.18/0.16), Duanzhou district (0.18/0.16) and Guangning (0.17/0.15) district of Zhaoqing. The score of indicators differed among different level

  10. Research on seal control systems for international nuclear safeguard and the vulnerability assessment on the seals

    International Nuclear Information System (INIS)

    Zhang Hongjian; Liu Tianshu; Cao Fangfang; Xu Chunyan

    2014-01-01

    Safeguard seals, also called Tamper-indicating devices (TIDs), are widely used to detect tampering or unauthorized entry in the international safeguard and security systems, Seal control systems consist of seal implementing plan, seal development and the vulnerability assessment on tbe seals, effective implementing procedures and methods of the seals. The vulnerability assessment contents of safeguard seals, thermo-shrinked film seals being as an example, and seals control systems in the implementation program are researched. The seal control systems discuss task assignment, seals management flow and seals program data flow to promote applying effectively seals. The vulnerability assessment program of seals studies assurance level to some different tampering techniques and measures. The researches must promote utilizing seals effectively for nuclear security, non-proliferation of nuclear weapons, radioactive waste management, and the nuclear material accounting and control. (authors)

  11. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  12. Groundwater vulnerability assessment using hydrogeologic and geoelectric layer susceptibility indexing at Igbara Oke, Southwestern Nigeria

    Directory of Open Access Journals (Sweden)

    T.E. Oni

    2017-12-01

    Full Text Available Groundwater vulnerability assessment was carried out at Igbara Oke Southwestern Nigeria, with a view to classify the area into vulnerability zones, by applying the electrical resistivity method, using Schlumberger electrode arrays with maximum electrode separation (AB/2 of 65 m in (41 different locations for data acquisition. Geoelectric parameters (layer resistivity and thickness were determined from the interpreted data. The study area comprises four geoelectric layers (topsoil, lateritic layer, weathered/fractured layer and fresh basement. The geoelectric parameters of the overlying layers across the area were used to assess the vulnerability of the underlying aquifers to near-surface contaminants with the aid of vulnerability maps generated. Three models were compared by maps using geo-electrically derived models; longitudinal conductance, GOD (groundwater occurrence, overlying lithology and depth to the aquifer and GLSI (geoelectric layer susceptibility indexing. The total longitudinal conductance map shows the north central part of the study area as a weakly protected (0.1–0.19 area, while the northern and southern parts have poor protective capacity (<0.1; this is in agreement with the GOD method which shows the northern part of the study area as less vulnerable (0–0.1 while the southern part has low/moderate (0.1–0.3 vulnerability to contamination. The longitudinal conductance exaggerates the degree of susceptibility to contamination than the GOD and GLSI models. From the models, vulnerability to contamination can be considered higher at the southern part than the northern part and therefore, sources of contamination like septic tank, refuse dump should be cited far from groundwater development area. Keywords: Aquifer vulnerability, Longitudinal conductance, GOD and GLSI

  13. Vulnerability Assessment, Climate Change Impacts and Adaptation Measures in Slovenia

    Science.gov (United States)

    Cegnar, T.

    2010-09-01

    In relation to the priority tasks of the climate change measures, the Republic of Slovenia estimates that special attention needs to be devoted to the following sectors in general: - sectors that currently indicate a strong vulnerability for the current climate variability (for instance, agriculture), - sectors where the vulnerability for climate change is increased by current trends (for instance, urban development, use of space), - sectors where the adaptation time is the longest and the subsequent development changes are connected with the highest costs (for instance, use of space, infrastructural objects, forestry, urban development, building stock). Considering the views of Slovenia to the climate change problem in Europe and Slovenia, priority measures and emphasis on future adaptation to climate change, the Republic of Slovenia has especially exposed the following action areas: - sustainable and integrated management of water sources for water power production, prevention of floods, provision of water for the enrichment of low flow rates, and preservation of environmental function as well as provision of water for other needs; - sustainable management of forest ecosystems, adjusted to changes, for the provision of their environmental function as well as being a source of biomass, wood for products for the conservation of carbon, and carbon sinks; - spatial planning as one of the important preventive instruments for the adaptation to climate change through the processes of integral planning of spatial and urban development; - sustainable use and preservation of natural wealth and the preservation of biodiversity as well as ecosystem services with measures and policies that enable an enhanced resistance of ecosystems to climate change, and the role of biological diversity in integral adaptation measures; - informing and awareness on the consequences of climate change and adaptation possibilities. For years, the most endangered sectors have been agriculture and

  14. Cyber security assessment of a power plant

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor; Masera, Marcelo; Stefanini, Alberto [Joint Research Centre, Institute for the Protection and Security of the Citizen, Ispra (Italy); Guidi, Luca [Enel Ingegneria e Innovazione, Pisa (Italy)

    2011-02-15

    Critical infrastructures and systems are today exposed not only to traditional safety and availability problems, but also to new kinds of security threats. These are mainly due to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies (ICT) into such complex systems. In this paper we present the outcomes of an exhaustive ICT security assessment, targeting an operational power plant, which consisted also of the simulation of potential cyber attacks. The assessment shows that the plant is considerably vulnerable to malicious attacks. This situation cannot be ignored, because the potential outcomes of an induced plant malfunction can be severe. (author)

  15. Groundwater vulnerability assessment using hydrogeologic and geoelectric layer susceptibility indexing at Igbara Oke, Southwestern Nigeria

    Science.gov (United States)

    Oni, T. E.; Omosuyi, G. O.; Akinlalu, A. A.

    2017-12-01

    Groundwater vulnerability assessment was carried out at Igbara Oke Southwestern Nigeria, with a view to classify the area into vulnerability zones, by applying the electrical resistivity method, using Schlumberger electrode arrays with maximum electrode separation (AB/2) of 65 m in (41) different locations for data acquisition. Geoelectric parameters (layer resistivity and thickness) were determined from the interpreted data. The study area comprises four geoelectric layers (topsoil, lateritic layer, weathered/fractured layer and fresh basement). The geoelectric parameters of the overlying layers across the area were used to assess the vulnerability of the underlying aquifers to near-surface contaminants with the aid of vulnerability maps generated. Three models were compared by maps using geo-electrically derived models; longitudinal conductance, GOD (groundwater occurrence, overlying lithology and depth to the aquifer) and GLSI (geoelectric layer susceptibility indexing). The total longitudinal conductance map shows the north central part of the study area as a weakly protected (0.1-0.19) area, while the northern and southern parts have poor protective capacity (septic tank, refuse dump should be cited far from groundwater development area.

  16. Building vulnerability to hydro-geomorphic hazards: Estimating damage probability from qualitative vulnerability assessment using logistic regression

    Science.gov (United States)

    Ettinger, Susanne; Mounaud, Loïc; Magill, Christina; Yao-Lafourcade, Anne-Françoise; Thouret, Jean-Claude; Manville, Vern; Negulescu, Caterina; Zuccaro, Giulio; De Gregorio, Daniela; Nardone, Stefano; Uchuchoque, Juan Alexis Luque; Arguedas, Anita; Macedo, Luisa; Manrique Llerena, Nélida

    2016-10-01

    The focus of this study is an analysis of building vulnerability through investigating impacts from the 8 February 2013 flash flood event along the Avenida Venezuela channel in the city of Arequipa, Peru. On this day, 124.5 mm of rain fell within 3 h (monthly mean: 29.3 mm) triggering a flash flood that inundated at least 0.4 km2 of urban settlements along the channel, affecting more than 280 buildings, 23 of a total of 53 bridges (pedestrian, vehicle and railway), and leading to the partial collapse of sections of the main road, paralyzing central parts of the city for more than one week. This study assesses the aspects of building design and site specific environmental characteristics that render a building vulnerable by considering the example of a flash flood event in February 2013. A statistical methodology is developed that enables estimation of damage probability for buildings. The applied method uses observed inundation height as a hazard proxy in areas where more detailed hydrodynamic modeling data is not available. Building design and site-specific environmental conditions determine the physical vulnerability. The mathematical approach considers both physical vulnerability and hazard related parameters and helps to reduce uncertainty in the determination of descriptive parameters, parameter interdependency and respective contributions to damage. This study aims to (1) enable the estimation of damage probability for a certain hazard intensity, and (2) obtain data to visualize variations in damage susceptibility for buildings in flood prone areas. Data collection is based on a post-flood event field survey and the analysis of high (sub-metric) spatial resolution images (Pléiades 2012, 2013). An inventory of 30 city blocks was collated in a GIS database in order to estimate the physical vulnerability of buildings. As many as 1103 buildings were surveyed along the affected drainage and 898 buildings were included in the statistical analysis. Univariate and

  17. The assessment of radio vulnerability in agroecosystems

    International Nuclear Information System (INIS)

    Wasserman, Maria Angelica; Viana, Aline G.; Conti, Claudio C.; Rochedo, Elaine R.; Vivone, Ronaldo J.; Bartoly, Flavia; Perez, Daniel V.

    2005-01-01

    A soil specific sequential extraction protocol, associated to soil to plant transfer factors (TF) data is proposed in this work as a methodology able to detect vulnerability of agro-ecosystems to the contamination with 137 Cs and 90 Sr. The objective is to provide parameters for environmental assessment models and to optimize emergency response planning for the main Brazilian agro-ecosystems and to other Countries with similar soil conditions. Transfer factor values were determined for reference plants, cultivated in Ferralsol, Nitisol and Acrisol that constitute great part in the national agricultural soil. The preliminary results of geochemical partition for these radionuclides were coherent with soil to plant transfer factors (TF) data. And with some soil properties recognized by the specialized literature as related with mechanisms of sorption to Cs (e.g. exchangeable K, organic matter and iron oxides content) and Sr (e.g. exchangeable Ca). Nitisol, showed lower TF for 90 Sr and 137 Cs compared with the other studied soil. In the Nitisol, it is possible that reduction in 137 Cs transfer be also associated with fixation in the internal faces of 2:1 clay mineral type. The integration of experimental methods results obtained in the laboratory with results obtained in field experiments seems to confirm the vulnerability of some Brazilian soil to the radioactivity contamination. (author)

  18. Data Quality Objectives Workbook for Assessing Chemical Vulnerability Potential in REDOX and U Plants

    International Nuclear Information System (INIS)

    Bauer, R. G.

    1999-01-01

    The purpose of this data quality objective workbook is to present the rationale for selecting the sampling and characterization strategy that supports the assessment of the chemical vulnerabilities of the five tanks. Since characterization of the tanks' contents is likely to be expensive, a secondary goal was established to characterize the tank contents for proper waste designation and disposal at the same time the tanks are characterized for chemical vulnerability

  19. Infrastructure assessment for disaster management using multi-sensor and multi-temporal remote sensing imagery

    DEFF Research Database (Denmark)

    Butenuth, Matthias; Frey, Daniel; Nielsen, Allan Aasbjerg

    2011-01-01

    In this paper, a new assessment system is presented to evaluate infrastructure objects such as roads after natural disasters in near-realtime. A particular aim is the exploitation of multi-sensorial and multi-temporal imagery together with further {GIS-}data in a comprehensive assessment framewor...

  20. Assessment of aquifer intrinsic vulnerability using GIS based Drastic model in Sialkot area, Pakistan

    Directory of Open Access Journals (Sweden)

    Muhammad Saqib Khan

    2016-06-01

    Full Text Available The intrinsic vulnerability of a shallow aquifer of Sialkot is assessed using DRASTIC index method. The information required as input for all seven parameters, i.e. depth to water table, net recharge, aquifer media, soil media, topography, the impact of vadose zone and hydraulic conductivity data were collected from literature surveys and on field surveys. A cumulative vulnerability map was developed using the indices obtained as a result of DRASTIC methodology. The values obtained from DRASTIC model for the study area were between 112 and 151. The area was dominated by medium and moderate vulnerable zones covering an area of 446 km2 and 442 km2 respectively. An area of 79 km2 was covered by the low vulnerable zone while the high vulnerable zone encompassed a total area of 38 km2. Least covered area i-e., 09 km2 was found in the vicinity of the very high vulnerable zone. The validation of the DRASTIC model using the nitrate distribution revealed that very high and high indices have the lower percentage of reliability than of the low to moderate zones as compared with the nitrate distribution in the groundwater.

  1. [Life cycle assessment of the infrastructure for hydrogen sources of fuel cell vehicles].

    Science.gov (United States)

    Feng, Wen; Wang, Shujuan; Ni, Weidou; Chen, Changhe

    2003-05-01

    In order to promote the application of life cycle assessment and provide references for China to make the project of infrastructure for hydrogen sources of fuel cell vehicles in the near future, 10 feasible plans of infrastructure for hydrogen sources of fuel cell vehicles were designed according to the current technologies of producing, storing and transporting hydrogen. Then life cycle assessment was used as a tool to evaluate the environmental performances of the 10 plans. The standard indexes of classified environmental impacts of every plan were gotten and sensitivity analysis for several parameters were carried out. The results showed that the best plan was that hydrogen will be produced by natural gas steam reforming in central factory, then transported to refuelling stations through pipelines, and filled to fuel cell vehicles using hydrogen gas at last.

  2. Using graph theory to analyze the vulnerability of process plants in the context of cascading effects

    International Nuclear Information System (INIS)

    Khakzad, Nima; Reniers, Genserik

    2015-01-01

    Dealing with large quantities of flammable and explosive materials, usually at high-pressure high-temperature conditions, makes process plants very vulnerable to cascading effects compared with other infrastructures. The combination of the extremely low frequency of cascading effects and the high complexity and interdependencies of process plants makes risk assessment and vulnerability analysis of process plants very challenging in the context of such events. In the present study, cascading effects were represented as a directed graph; accordingly, the efficacy of a set of graph metrics and measurements was examined in both unit and plant-wide vulnerability analysis of process plants. We demonstrated that vertex-level closeness and betweenness can be used in the unit vulnerability analysis of process plants for the identification of critical units within a process plant. Furthermore, the graph-level closeness metric can be used in the plant-wide vulnerability analysis for the identification of the most vulnerable plant layout with respect to the escalation of cascading effects. Furthermore, the results from the application of the graph metrics have been verified using a Bayesian network methodology. - Highlights: • Graph metrics can effectively be employed to identify vulnerable units and layouts in process plants. • Units with larger vertex-level closeness result in more probable and severe cascading effects. • Units with larger vertex-level betweenness contribute more to the escalation of cascading effects. • Layouts with larger graph-level closeness are more vulnerable to the escalation of cascading effects

  3. Using a Coupled Human-Natural System to Assess the Vulnerability of the Karst Landform Region in China

    Directory of Open Access Journals (Sweden)

    Xiang He

    2015-09-01

    Full Text Available Guizhou Plateau is a region in China that typically shows the contradictory human-earth system. A vulnerability assessment indicator system was constructed to explore the coupled human-natural system characteristic of the karst landform based on the grey correlation analysis mathematic model. The quantitative assessment results show that Qiandongnan and Tongren Districts belong to the slight degree of the sensitivity evaluation index. Bijie district belongs to the middle degree and the other districts of Guizhou Plateau belong to the light degree. In terms of the exposure and resilience evaluation index, only Guiyang City belongs to the slight degree and other districts are in the middle degree. Thus, Guizhou Plateau could be divided into three level zones based on the comprehensive vulnerability degree of the coupled human-natural system. The strong degree vulnerability zone includes Liupanshui City, Bijie City, Anshun City, and Qiannan District. The middle degree vulnerability zone includes the districts of Qiandongnan, Qianxinan, and Tongren and the city of Zunyi. The slight degree vulnerability zone only includes Guiyang City. The research results suggest that the coupled human-natural system in Guizhou Plateau has a high vulnerability.

  4. Identifying the World's Most Climate Change Vulnerable Species: A Systematic Trait-Based Assessment of all Birds, Amphibians and Corals

    Science.gov (United States)

    Foden, Wendy B.; Butchart, Stuart H. M.; Stuart, Simon N.; Vié, Jean-Christophe; Akçakaya, H. Resit; Angulo, Ariadne; DeVantier, Lyndon M.; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D.; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A.; Hughes, Adrian F.; O’Hanlon, Susannah E.; Garnett, Stephen T.; Şekercioğlu, Çagan H.; Mace, Georgina M.

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species’ biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world’s birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608–851 bird (6–9%), 670–933 amphibian (11–15%), and 47–73 coral species (6–9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

  5. A new approach to flood vulnerability assessment for historic buildings in England

    Science.gov (United States)

    Stephenson, V.; D'Ayala, D.

    2014-05-01

    The recent increase in frequency and severity of flooding in the UK has led to a shift in the perception of risk associated with flood hazards. This has extended to the conservation community, and the risks posed to historic structures that suffer from flooding are particularly concerning for those charged with preserving and maintaining such buildings. In order to fully appraise the risks in a manner appropriate to the complex issue of preservation, a new methodology is presented here that studies the nature of the vulnerability of such structures, and places it in the context of risk assessment, accounting for the vulnerable object and the subsequent exposure of that object to flood hazards. The testing of the methodology is carried out using three urban case studies and the results of the survey analysis provide guidance on the development of fragility curves for historic structures exposed to flooding. This occurs through appraisal of vulnerability indicators related to building form, structural and fabric integrity, and preservation of architectural and archaeological values. Key findings of the work include determining the applicability of these indicators to fragility analysis, and the determination of the relative vulnerability of the three case study sites.

  6. Groundwater vulnerability assessment for the Banyas Catchment of the Syrian coastal area using GIS and the RISKE method.

    Science.gov (United States)

    Kattaa, Bassam; Al-Fares, Walid; Al Charideh, Abdul Rahman

    2010-05-01

    Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and landuse planning. This contribution aims at estimating aquifer vulnerability by applying the RISKE model in Banyas Catchment Area (BCA), Tartous Prefecture, west Syria. An additional objective is to demonstrate the combined use of the RISKE model and a geographical information system (GIS) as an effective method for groundwater pollution risk assessment. The RISKE model uses five environmental parameters (Rock of aquifer media, Infiltration, Soil media, Karst, and Epikarst) to characterize the hydro-geological setting and evaluate aquifer vulnerability. The elevated eastern and low western part of the study area was dominated by high vulnerability classes, while the middle part was characterized by moderate vulnerability classes. Based on the vulnerability analysis, it was found that 2% and 39% of BCA is under low and high vulnerability to groundwater contamination, respectively, while more than 52% and 5% of the area of BCA can be designated as an area of moderate and very high vulnerability to groundwater contamination, respectively. The GIS technique has provided an efficient environment for analyses and high capabilities of handling a large amount of spatial data. Copyright 2009 Elsevier Ltd. All rights reserved.

  7. The importance of assessing climate change vulnerability to address species conservation

    Science.gov (United States)

    Karen E. Bagne; Megan M. Friggens; Sharon J. Coe; Deborah M. Finch

    2014-01-01

    Species conservation often prioritizes attention on a small subset of "special status" species at high risk of extinction, but actions based on current lists of special status species may not effectively moderate biodiversity loss if climate change alters threats. Assessments of climate change vulnerability may provide a method to enhance identification of...

  8. Multi-level significance of vulnerability indicators. Case study: Eastern Romania

    Science.gov (United States)

    Stanga, I. C.; Grozavu, A.

    2012-04-01

    Vulnerability assessment aims, most frequently, to emphasize internal fragility of a system comparing to a reference standard, to similar systems or in relation to a given hazard. Internal fragility, either biophysical or structural, may affect the capacity to predict, to prepare for, to cope with or to recover from a disaster. Thus, vulnerability is linked to resilience and adaptive capacity. From local level to global one, vulnerability factors and corresponding indicators are different and their significance must be tested and validated in a well-structured conceptual and methodological framework. In this paper, the authors aim to show the real vulnerability of rural settlements in Eastern Romania in a multi-level approach. The research area, Tutova Hills, counts about 3421 sq.km and more than 200.000 inhabitants in 421 villages characterized by deficient accessibility, lack of endowments, subsistential agriculture, high pressure on natural environment (especially on forest and soil resources), poverty and aging process of population. Factors that could influence the vulnerability of these rural settlements have been inventoried and assigned into groups through a cluster analysis: habitat and technical urban facilities, infrastructure, economical, social and demographical indicators, environment quality, management of emergency situations etc. Firstly, the main difficulty was to convert qualitative variable in quantitative indicators and to standardize all values to make possible mathematical and statistical processing of data. Secondly, the great variability of vulnerability factors, their different measuring units and their high amplitude of variation require different method of standardization in order to obtain values between zero (minimum vulnerability) and one (maximum vulnerability). Final vulnerability indicators were selected and integrated in a general scheme, according to their significance resulted from an appropriate factor analysis: linear and

  9. Physical assessment of coastal vulnerability under enhanced land subsidence in Semarang, Indonesia, using multi-sensor satellite data

    Science.gov (United States)

    Husnayaen; Rimba, A. Besse; Osawa, Takahiro; Parwata, I. Nyoman Sudi; As-syakur, Abd. Rahman; Kasim, Faizal; Astarini, Ida Ayu

    2018-04-01

    Research has been conducted in Semarang, Indonesia, to assess coastal vulnerability under enhanced land subsidence using multi-sensor satellite data, including the Advanced Land Observing Satellite (ALOS) Phased Array type L-band SAR (PALSAR), Landsat TM, IKONOS, and TOPEX/Poseidon. A coastal vulnerability index (CVI) was constructed to estimate the level of vulnerability of a coastline approximately 48.68 km in length using seven physical variables, namely, land subsidence, relative sea level change, coastal geomorphology, coastal slope, shoreline change, mean tidal range, and significant wave height. A comparison was also performed between a CVI calculated using seven parameters and a CVI using six parameters, the latter of which excludes the land subsidence parameter, to determine the effects of land subsidence during the coastal vulnerability assessment. This study showed that the accuracy of coastal vulnerability was increased 40% by adding the land subsidence factor (i.e., CVI 6 parameters = 53%, CVI 7 parameters = 93%). Moreover, Kappa coefficient indicated very good agreement (0.90) for CVI 7 parameters and fair agreement (0.3) for CVI 6 parameters. The results indicate that the area of very high vulnerability increased by 7% when land subsidence was added. Hence, using the CVI calculation including land subsidence parameters, the very high vulnerability area is determined to be 20% of the total coastline or 9.7 km of the total 48.7 km of coastline. This study proved that land subsidence has significant influence on coastal vulnerability in Semarang.

  10. Risk of the residents, infrastructure and water bodies by flash floods and sediment transport - assessment for scale of the Czech Republic

    Science.gov (United States)

    Dostál, Tomáš; Krása, Josef; Bauer, Miroslav; Strouhal, Luděk; Jáchymová, Barbora; Devátý, Jan; David, Václav; Koudelka, Petr; Dočkal, Martin

    2015-04-01

    Pluvial and flash floods, related to massive sediment transport become phenomenon nowadays, under conditions of climate changes. Storm events, related to material damages appear at unexpected places and their effective control is only possible in form of prevention. To apply preventive measures, there have to be defined localities with reasonable reliability, which are endangered by surface runoff and sediment transport produced in the subcatchments, often at agriculturally used landscape. Classification of such localities, concerning of potential damages and magnitude of sediment transport shall be also included within the analyses, to design control measures effectively. Large scale project for whole territory of the Czech Republic (ca 80.000 km2) has therefore been granted b the Ministry of Interior of the Czech Republic, with the aim to define critical points, where interaction between surface runoff connected to massive sediment transport and infrastructure or vulnerable water bodies can occur and to classify them according to potential risk. Advanced GIS routines, based on analyses of land use, soil conditions and morphology had been used to determine the critical points - points, where significant surface runoff occurs and interacts with infrastructure and vulnerable water bodies, based exclusively on the contributing area - flow accumulation. In total, ca 150.000 critical points were determined within the Czech Republic. For each of critical points, its subcatchment had then been analyzed in detail, concerning of soil loss and sediment transport, using simulation model WATEM/SEDEM. The results were used for classification of potential risk of individual critical points, based on mean soil loss within subcatchment, total sediment transport trough the outlet point and subcatchment area. The classification has been done into 5 classes. The boundaries were determined by calibration survey and statistical analysis, performed at three experimental catchments area

  11. Development and assessment of indices to determine stream fish vulnerability to climate change and habitat alteration

    Science.gov (United States)

    Sievert, Nicholas A.; Paukert, Craig P.; Tsang, Yin-Phan; Infante, Dana M.

    2016-01-01

    Understanding the future impacts of climate and land use change are critical for long-term biodiversity conservation. We developed and compared two indices to assess the vulnerability of stream fish in Missouri, USA based on species environmental tolerances, rarity, range size, dispersal ability and on the average connectivity of the streams occupied by each species. These two indices differed in how environmental tolerance was classified (i.e., vulnerability to habitat alteration, changes in stream temperature, and changes to flow regimes). Environmental tolerance was classified based on measured species responses to habitat alteration, and extremes in stream temperatures and flow conditions for one index, while environmental tolerance for the second index was based on species’ traits. The indices were compared to determine if vulnerability scores differed by index or state listing status. We also evaluated the spatial distribution of species classified as vulnerable to habitat alteration, changes in stream temperature, and change in flow regimes. Vulnerability scores were calculated for all 133 species with the trait association index, while only 101 species were evaluated using the species response index, because 32 species lacked data to analyze for a response. Scores from the trait association index were greater than the species response index. This is likely due to the species response index's inability to evaluate many rare species, which generally had high vulnerability scores for the trait association index. The indices were consistent in classifying vulnerability to habitat alteration, but varied in their classification of vulnerability due to increases in stream temperature and alterations to flow regimes, likely because extremes in current climate may not fully capture future conditions and their influence on stream fish communities. Both indices showed higher mean vulnerability scores for listed species than unlisted species, which provided a coarse

  12. Spatial vulnerability assessment : methodology for the community and district level applied to floods in Buzi, Mozambique

    International Nuclear Information System (INIS)

    Kienberger, S.

    2010-01-01

    Within this thesis a conceptual model is presented which allows for the definition of a vulnerability assessment according to its time and spatial scale and within a multi-dimensional framework, which should help to design and develop appropriate methodologies and adaptation of concepts for the required scale of implementation. Building on past experiences with participatory approaches in community mapping in the District of Buzi in Mozambique, the relevance of such approaches for a community-based disaster risk reduction framework is analysed. Finally, methodologies are introduced which allow the assessment of vulnerability and the prioritisation of vulnerability factors at the community level. At the district level, homogenous vulnerability regions are identified through the application of integrated modelling approaches which build on expert knowledge and weightings. A set of indicators is proposed, which allow the modelling of vulnerability in a data-scarce environment. In developing these different methodologies for the community and district levels, it has been identified that the monitoring of vulnerability and the identification of trends is essential to addressing the objective of a continuous and improved disaster risk management. In addition to the technical and methodological challenges discussed in this thesis, the commitment from different stakeholders and the availability of capacity in different domains is essential for the successful, practical implementation of the developed approaches. (author)

  13. Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal

    Science.gov (United States)

    Matin, M. A.; Chitale, V. S.

    2016-12-01

    Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few

  14. An assessment of groundwater potential and vulnerability in the Upper Manyame Sub-Catchment of Zimbabwe

    Science.gov (United States)

    Misi, Alfred; Gumindoga, Webster; Hoko, Zvikomborero

    2018-06-01

    Severe depletion and pollution of groundwater resources are of rising concern in the Upper Manyame Sub-Catchment (UMSC); Zimbabwe's most urbanised sub-catchment. Despite groundwater playing a pivotal role in the provision of potable water in the sub-catchment, it is under serious threat from anthropogenic stressors which include sewage effluents and leachates from landfills, among others. Inadequate scientific knowledge pertaining to the spatio-temporal variability of groundwater storage and vulnerability in the UMSC is further compromising its sustainability. Therefore, comprehensive assessments of UMSC's Groundwater Potential (GP) and vulnerability are crucial for its effective management. This study assessed GP and vulnerability in the UMSC using Geographic Information Systems and Remote Sensing techniques. Groundwater conditioning factors: geology, slope, land-use, drainage density, topographic index, altitude, recharge and rainfall were used to develop GP zones. Validation of the GP map was done by correlating estimated GP with historical borehole yields. An assessment of groundwater vulnerability was done at micro-catchment level (Marimba) using the GOD model; a three parameter Index Overlay Model. Marimba is the most urbanised and has the second highest borehole density. It also exhibits similar landuse characteristics as the UMSC. Furthermore, groundwater quality in Marimba was assessed from 15 sampling sites. Fifteen drinking water parameters were analysed based on the standard methods for Water and Wastewater Examination. The potability of groundwater was then assessed by comparing the measured water quality parameters with the Standards Association of Zimbabwe (SAZ) drinking water standards and/or WHO guidelines for drinking water. Repeated Measures ANOVA and Principal Component Analysis (PCA) were used to assess the spatio-temporal variations in groundwater quality and to identify key parameters, respectively. About 72% (2725.9 km2) of the UMSC was

  15. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    Science.gov (United States)

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  16. Tsunami vulnerability analysis in the coastal town of Catania, Sicily: methodology and results

    Science.gov (United States)

    Pagnoni, Gianluca; Tinti, Stefano; Gallazzi, Sara; Tonini, Roberto; Zaniboni, Filippo

    2010-05-01

    Catania lies on the eastern coast of Sicily and is one of the most important towns in Sicily as regards history, tourism and industry. Recent analyses conducted in the frame of the project TRANSFER have shown that it is exposed not only to tsunamis generated locally, but also to distant tsunamis generated in the western Hellenic arc. In the frame of the European project SCHEMA different scenarios covering local sources such as the 11 January 1693 event and the 1908 case as well as remote sources such as the 365 AD tsunami have been explored through numerical modelling in order to assess the vulnerability of the area to tsunami attacks. One of the primary outcomes of the scenario analysis is the quantification of the inundation zones (location, extension along the coast and landward). Taking the modelling results on flooding as input data, the analysis has focussed on the geomorphological characteristics of the coasts and on the buildings and infrastructure typology to make evaluation of the vulnerability level of the Catania area. The coast to the south of the harbour of Catania is low and characterized by a mild slope: topography reaches the altitude of 10 m between 300-750 m distance from the shoreline. Building density is low, and generally tourist structures prevail on residential houses. The zone north of the harbour is high-coast, with 10 m isoline usually close to the coastline, and little possibility for flood to penetrate deep inland. Here there are three small marinas with the corresponding services and infrastructure around, and the city quarters consists of residential buildings. Vulnerability assessment has been carried out by following the methodology developed by the SCHEMA consortium, distinguishing between primary (type and material) and secondary criteria (e.g. ground, age, foundation, orientation, etc.) for buildings, and by adopting a building damage matrix, basically depending on building type and water inundation depth. Data needed for such

  17. Vulnerability assessment to frost disaster in dieng volcanic highland using spatial multi-criteria evaluation

    Science.gov (United States)

    Pradana, A.; Rahmanu, Y. A.; Prabaningrum, I.; Nurafifa, I.; Hizbaron, D. R.

    2018-04-01

    Dieng Volcanic Highland is one of frost disaster prone area which is very unique phenomenon in tropical region. Frost indicated by appearance of frozen dew or ice layer on the ground or vegetation surface due air inversion and cold temperatures during midnight in dry season. Appearance of frost significantly causes plant damage and losses on agricultural land, while the impacts were strongly influenced by level of vulnerability within agricultural communities. This study aims to analyze the impact of frost on agricultural land in Dieng, to identify characteristics of physical, social, economic vulnerability and coping capacity of agricultural communities to frost disaster in Dieng, and to estimate total vulnerability of frost disasters in Dieng through SMCE scenario. Research was conducted in Dieng Village, Wonosobo and Dieng Kulon Village, Banjarnegara. Method to assess vulnerability level is performed by Spatial Multi Criteria Evaluation (SMCE) method using ILWIS software through a combination of physical, social, and economic vulnerability regarding frost hazard, as well as coping capacity of farmers. Data collected by interview within different agricultural plots using questionnaire and in-depth interview method on frost affected agricultural land. Impact of frost mostly causes damage on potato agricultural land than any other types of commodities, such as carrot, leek or cabbage. Losses varies in range of 0 million to 55 million rupiah, at most events in range of 10 million to 15 million rupiah during frost season on July-August-September. Main factors determining vulnerability comes from crop losses, preparedness effort, and type of commodity. Agricultural land dominated by high level physical vulnerability (95.37 percent), high level social vulnerability (70.79 percent), moderate level economic vulnerability (79.23 percent) and moderate level coping capacity (73.18 percent). All five scenarios indicated that level of total vulnerability vary only from

  18. An integrated framework for assessing vulnerability to climate change and developing adaptation strategies for coffee growing families in Mesoamerica.

    Directory of Open Access Journals (Sweden)

    María Baca

    Full Text Available The Mesoamerican region is considered to be one of the areas in the world most vulnerable to climate change. We developed a framework for quantifying the vulnerability of the livelihoods of coffee growers in Mesoamerica at regional and local levels and identify adaptation strategies. Following the Intergovernmental Panel on Climate Change (IPCC concepts, vulnerability was defined as the combination of exposure, sensitivity and adaptive capacity. To quantify exposure, changes in the climatic suitability for coffee and other crops were predicted through niche modelling based on historical climate data and locations of coffee growing areas from Mexico, Guatemala, El Salvador and Nicaragua. Future climate projections were generated from 19 Global Circulation Models. Focus groups were used to identify nine indicators of sensitivity and eleven indicators of adaptive capacity, which were evaluated through semi-structured interviews with 558 coffee producers. Exposure, sensitivity and adaptive capacity were then condensed into an index of vulnerability, and adaptation strategies were identified in participatory workshops. Models predict that all target countries will experience a decrease in climatic suitability for growing Arabica coffee, with highest suitability loss for El Salvador and lowest loss for Mexico. High vulnerability resulted from loss in climatic suitability for coffee production and high sensitivity through variability of yields and out-migration of the work force. This was combined with low adaptation capacity as evidenced by poor post harvest infrastructure and in some cases poor access to credit and low levels of social organization. Nevertheless, the specific contributors to vulnerability varied strongly among countries, municipalities and families making general trends difficult to identify. Flexible strategies for adaption are therefore needed. Families need the support of government and institutions specialized in impacts of

  19. A Preliminary Tsunami vulnerability analysis for Bakirkoy district in Istanbul

    Science.gov (United States)

    Tufekci, Duygu; Lutfi Suzen, M.; Cevdet Yalciner, Ahmet; Zaytsev, Andrey

    2016-04-01

    Resilience of coastal utilities after earthquakes and tsunamis has major importance for efficient and proper rescue and recovery operations soon after the disasters. Vulnerability assessment of coastal areas under extreme events has major importance for preparedness and development of mitigation strategies. The Sea of Marmara has experienced numerous earthquakes as well as associated tsunamis. There are variety of coastal facilities such as ports, small craft harbors, and terminals for maritime transportation, water front roads and business centers mainly at North Coast of Marmara Sea in megacity Istanbul. A detailed vulnerability analysis for Yenikapi region and a detailed resilience analysis for Haydarpasa port in Istanbul have been studied in previously by Cankaya et al., (2015) and Aytore et al., (2015) in SATREPS project. In this study, the methodology of vulnerability analysis under tsunami attack given in Cankaya et al., (2015) is modified and applied to Bakirkoy district of Istanbul. Bakirkoy district is located at western part of Istanbul and faces to the North Coast of Marmara Sea from 28.77oE to 28.89oE. High resolution spatial dataset of Istanbul Metropolitan Municipality (IMM) is used and analyzed. The bathymetry and topography database and the spatial dataset containing all buildings/structures/infrastructures in the district are collated and utilized for tsunami numerical modeling and following vulnerability analysis. The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability assessment parameters in the district according to vulnerability and resilience are defined; and scored by implementation of a GIS based TVA with appropriate MCDA methods. The risk level is computed using tsunami intensity (level of flow depth from simulations) and TVA results at every location in Bakirkoy district. The preliminary results are presented and discussed

  20. A Tool for Assessing Financial Vulnerabilities in the Household Sector

    OpenAIRE

    Shubhasis Dey; Ramdane Djoudad; Yaz Terajima

    2008-01-01

    In this article, the authors build on the framework used in the Bank of Canada's Financial System Review to assess the evolution of household indebtedness and financial vulnerabilities in response to changing economic conditions. To achieve this, they first compare two microdata sets generated by Ipsos Reid's Canadian Financial Monitor and Statistics Canada's Survey of Financial Security. They find that the surveys are broadly comparable, despite methodological differences. This enables them ...

  1. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.

    Science.gov (United States)

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-05-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3-22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed

  2. Assessment of Intrinsic Vulnerability to Contamination for the Alluvial Aquifer in El-Fayoum Depression Using the Drastic Method

    International Nuclear Information System (INIS)

    Ahmed, M.A.

    2012-01-01

    Intrinsic vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. The vulnerability for the alluvial aquifer in El-Fayoum depression was assessed by applying the Drastic model as well as utilizing sensitivity analyses to evaluate the reliability of this model. This method uses seven parameters including climatic, geological, and hydrogeological conditions controlling the seepage of pollutant substances to groundwater. Vulnerability maps were produced by applying the Generic and Agricultural models according to the Drastic charter. The resulting agricultural Drastic vulnerability map indicates that 23.3%, 22.7% and 12.4% of El-Fayoum depression is under low, low-moderate and moderately high vulnerability of groundwater contamination, respectively, while 41.6% of the area of study can be designated as an area of moderate vulnerability of groundwater contamination. Resulting maps revealed that the potential for polluting groundwater with agricultural chemicals is greater than with Generic Drastic index pollutants. Depth to water table parameter inflicted the largest impact on the intrinsic vulnerability of the alluvial aquifer in El-Fayoum depression. Both the map removal and single-parameter sensitivity analyses indicated that the vulnerability index is the least sensitive to the removal of the recharge and hydraulic conductivity parameters but is highly sensitive to the removal of depth to water parameter.

  3. Airborne biological hazards and urban transport infrastructure: current challenges and future directions.

    Science.gov (United States)

    Nasir, Zaheer Ahmad; Campos, Luiza Cintra; Christie, Nicola; Colbeck, Ian

    2016-08-01

    Exposure to airborne biological hazards in an ever expanding urban transport infrastructure and highly diverse mobile population is of growing concern, in terms of both public health and biosecurity. The existing policies and practices on design, construction and operation of these infrastructures may have severe implications for airborne disease transmission, particularly, in the event of a pandemic or intentional release of biological of agents. This paper reviews existing knowledge on airborne disease transmission in different modes of transport, highlights the factors enhancing the vulnerability of transport infrastructures to airborne disease transmission, discusses the potential protection measures and identifies the research gaps in order to build a bioresilient transport infrastructure. The unification of security and public health research, inclusion of public health security concepts at the design and planning phase, and a holistic system approach involving all the stakeholders over the life cycle of transport infrastructure hold the key to mitigate the challenges posed by biological hazards in the twenty-first century transport infrastructure.

  4. A qualitative study of vulnerability to HIV infection: Places and ...

    African Journals Online (AJOL)

    unhcc

    limited availability of services and infrastructure for its residents Majority of residents in such places were daily ... those who work in restaurants and engaged in petty trade were found to be relatively more vulnerable group of .... Data quality assurance: Discussion guides were ..... Internal migration to Nairobi's slums: linking.

  5. Use of the NatureServe Climate Change Vulnerability Index as an Assessment Tool for Reptiles and Amphibians: Lessons Learned

    Science.gov (United States)

    Tuberville, Tracey D.; Andrews, Kimberly M.; Sperry, Jinelle H.; Grosse, Andrew M.

    2015-10-01

    Climate change threatens biodiversity globally, yet it can be challenging to predict which species may be most vulnerable. Given the scope of the problem, it is imperative to rapidly assess vulnerability and identify actions to decrease risk. Although a variety of tools have been developed to assess climate change vulnerability, few have been evaluated with regard to their suitability for certain taxonomic groups. Due to their ectothermic physiology, low vagility, and strong association with temporary wetlands, reptiles and amphibians may be particularly vulnerable relative to other groups. Here, we evaluate use of the NatureServe Climate Change Vulnerability Index (CCVI) to assess a large suite of herpetofauna from the Sand Hills Ecoregion of the southeastern United States. Although data were frequently lacking for certain variables (e.g., phenological response to climate change, genetic variation), sufficient data were available to evaluate all 117 species. Sensitivity analyses indicated that results were highly dependent on size of assessment area and climate scenario selection. In addition, several ecological traits common in, but relatively unique to, herpetofauna are likely to contribute to their vulnerability and need special consideration during the scoring process. Despite some limitations, the NatureServe CCVI was a useful tool for screening large numbers of reptile and amphibian species. We provide general recommendations as to how the CCVI tool's application to herpetofauna can be improved through more specific guidance to the user regarding how to incorporate unique physiological and behavioral traits into scoring existing sensitivity factors and through modification to the assessment tool itself.

  6. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that

  7. Assessing inter- and intraspecific variability of xylem vulnerability to embolism in oaks

    DEFF Research Database (Denmark)

    Lobo, Albin; Torres-Ruiz, José M.; Burlett, Regis

    2018-01-01

    for future afforestation. However, the presence of long vessels makes it difficult to assess xylem vulnerability to embolism in these species. Thanks to the development of a flow centrifuge equipped with a large rotor, we quantified (i) the between species variability of embolism resistance in four native...

  8. Cyber Security: Critical Infrastructure Controls Assessment Framework

    Science.gov (United States)

    2011-05-01

    the threats to and 3 • Patch and configuration management • Vulnerability and incident t 2 vulnerabilities • Recommendations to reduce 4 managemen 5... Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Purpose P id i t hrov e an overv ew on assessmen

  9. Data related uncertainty in near-surface vulnerability assessments for agrochemicals in the San Joaquin Valley.

    Science.gov (United States)

    Loague, Keith; Blanke, James S; Mills, Melissa B; Diaz-Diaz, Ricardo; Corwin, Dennis L

    2012-01-01

    Precious groundwater resources across the United States have been contaminated due to decades-long nonpoint-source applications of agricultural chemicals. Assessing the impact of past, ongoing, and future chemical applications for large-scale agriculture operations is timely for designing best-management practices to prevent subsurface pollution. Presented here are the results from a series of regional-scale vulnerability assessments for the San Joaquin Valley (SJV). Two relatively simple indices, the retardation and attenuation factors, are used to estimate near-surface vulnerabilities based on the chemical properties of 32 pesticides and the variability of both soil characteristics and recharge rates across the SJV. The uncertainties inherit to these assessments, derived from the uncertainties within the chemical and soil data bases, are estimated using first-order analyses. The results are used to screen and rank the chemicals based on mobility and leaching potential, without and with consideration of data-related uncertainties. Chemicals of historic high visibility in the SJV (e.g., atrazine, DBCP [dibromochloropropane], ethylene dibromide, and simazine) are ranked in the top half of those considered. Vulnerability maps generated for atrazine and DBCP, featured for their legacy status in the study area, clearly illustrate variations within and across the assessments. For example, the leaching potential is greater for DBCP than for atrazine, the leaching potential for DBCP is greater for the spatially variable recharge values than for the average recharge rate, and the leaching potentials for both DBCP and atrazine are greater for the annual recharge estimates than for the monthly recharge estimates. The data-related uncertainties identified in this study can be significant, targeting opportunities for improving future vulnerability assessments. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America

  10. Physical and institutional vulnerability assessment method applied in Alpine communities. Preliminary Results of the SAMCO-ANR Project in the Guil Valley (French Southern Alps)

    Science.gov (United States)

    Carlier, Benoit; Dujarric, Constance; Puissant, Anne; Lissak, Candide; Viel, Vincent; Bétard, François; Madelin, Malika; Fort, Monique; Arnaud-Fassetta, Gilles

    2015-04-01

    The Guil catchment is particularly prone to torrential and gravitational hazards such as floods, debris flows, landslides or avalanches due to several predisposing factors (bedrock supplying abundant debris, strong hillslope-channel connectivity) in a context of summer Mediterranean rainstorms as triggers. These hazards severely impact the local population (fatalities, destruction of buildings and infrastructures, loss of agricultural land, road closures). Since the second half of the 20th century, the progressive decline of agro-pastoralism and the development of tourism activities led to a concentration of human stakes on alluvial cones and valley bottom, therefore an increase of vulnerability for mountainous communities. Following the 1957 and 2000 catastrophic floods and the 1948 and 2008 avalanche episodes, some measures were taken to reduce exposure to risks (engineering works, standards of construction, rescue training…). Nevertheless, in front of urban expansion (land pressures and political pressures) and obsolescence of the existing protective measures, it is essential to reassess the vulnerability of the stakes exposed to hazards. Vulnerability analysis is, together with hazard evaluation, one of the major steps of risk assessment. In the frame of the SAMCO project designed for mountain risk assessment, our goal is to estimate specific form of vulnerability for communities living in the Upper Guil catchment in order to provide useful documentation for a better management of the valley bottom and the implementation of adequate mitigation measures. Here we present preliminary results on three municipalities of the upper Guil catchment: Aiguilles, Abriès, and Ristolas. We propose an empirical semi-quantitative indicator of potential hazards consequences on element at risk (based on GIS) with an application to different (local and regional scale) scales. This indicator, called Potential Damage Index, enable us to describe, quantify, and visualize direct

  11. A qualitative study of vulnerability to HIV infection: Places and ...

    African Journals Online (AJOL)

    Vulnerability of places are linked to overcrowding, being hub of in-migrants and transistors, and with limited availability of services and infrastructure for its residents Majority of residents in such places were daily laborers, female sex workers, students who are living away from family, widows, separated and divorced women, ...

  12. Constructing the Indicators of Assessing Human Vulnerability to Industrial Chemical Accidents: A Consensus-based Fuzzy Delphi and Fuzzy AHP Approach.

    Science.gov (United States)

    Fatemi, Farin; Ardalan, Ali; Aguirre, Benigno; Mansouri, Nabiollah; Mohammadfam, Iraj

    2017-04-10

    Industrial chemical accidents have been increased in developing countries. Assessing the human vulnerability in the residents of industrial areas is necessary for reducing the injuries and causalities of chemical hazards. The aim of this study was to explore the key indicators for the assessment of human vulnerability in the residents living near chemical installations. The indicators were established in the present study based on the Fuzzy Delphi method (FDM) and Fuzzy Analytic Hierarchy Process (FAHP). The reliability of FDM and FAHP was calculated. The indicators of human vulnerability were explored in two sets of social and physical domains. Thirty-five relevant experts participated in this study during March-July 2015. According to experts, the top three indicators of human vulnerability according to the FDM and FAHP were vulnerable groups, population density, and awareness. Detailed sub-vulnerable groups and awareness were developed based on age, chronic or severe diseases, disability, first responders, and residents, respectively. Each indicator and sub-indicator was weighted and ranked and had an acceptable consistency ratio. The importance of social vulnerability indicators are about 7 times more than physical vulnerability indicators. Among the extracted indicators, vulnerable groups had the highest weight and the greatest impact on human vulnerability. however, further research is needed to investigate the applicability of established indicators and generalizability of the results to other studies. Fuzzy Delphi; Fuzzy AHP; Human vulnerability; Chemical hazards.

  13. Identification and assessment of potential vulnerabilities in the poultry meat production chain to dangerous agents and substances

    NARCIS (Netherlands)

    Schwägele, F.C.; Andrée, S.; Beraquet, N.; Castrillon, M.; Winkel, C.; Garforth, D.; Cnossen, H.J.; Lucas Luijckx, N.B.; Ayalew, G.

    2009-01-01

    The specific targeted European research project ΣChain (2006) addresses existing as well as potential vulnerabilities within food chains. One of the food chains within the focus of ΣChain is dealing with poultry meat. Fundamental for the assessment of potential vulnerabilities in the chain is basic

  14. Spatial-temporal eco-environmental vulnerability assessment and its influential factors based on Landsat data

    Science.gov (United States)

    Anh, N. K.; Liou, Y. A.; Ming-Hsu, L.

    2016-12-01

    Regional land use/land cover (LULC) changes lead to various changes in ecological processes and, in turn, alter regional micro-climate. To understand eco-environmental responses to LULC changes, eco-environmental evaluation is thus required with aims to identify vulnerable regions and influential factors, so that practical measures for environmental protection and management may be proposed. The Thua Thien - Hue Province has been experiencing urbanization at a rapid rate in both population and physical size. The urban land, agricultural land, and aquaculture activities have been invasively into natural space and caused eco-environment deterioration by land desertification, soil erosion, shrinking forest resources,…etc. In this study, an assessment framework that is composed by 11 variables with 9 of them constructed from Landsat time series is proposed to serve as basis to examine eco-environmental vulnerability in the Thua Thien - Hue Province in years 1989, 2003, and 2014. An eco-environmental vulnerability map is assorted into six vulnerability levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities. Result shows that there is an increasing trend in eco-environmental vulnerability in general with expected evolving distributions in heavy and very heavy vulnerability levels, which mainly lying on developed land, bare land, semi bare land, agricultural land, and poor and recovery forests. In contrast, there is a significant decline in potential vulnerability level. The contributing factors of an upward trend in medium, heavy, and very heavy levels include: (i) a large natural forest converted to plantation forest and agriculture land; and (ii) significant expansion of developed land leading to difference in thermal signatures in urban areas as compared with those of the surrounding areas. It is concluded that anthropogenic processes with transformation on LULC has amplified the vulnerability of eco-environment in the study

  15. Interpreting transnational infrastructure vulnerability: European blackout and the historical dynamics of transnational electricity governance

    International Nuclear Information System (INIS)

    Vleuten, Erik van der; Lagendijk, Vincent

    2010-01-01

    Recent transnational blackouts exposed two radically opposed interpretations of Europe's electricity infrastructure, which inform recent and ongoing negotiations on transnational electricity governance. To EU policy makers such blackouts revealed the fragility of Europe's power grids and the need of a more centralized form of governance, thus legitimizing recent EU interventions. Yet to power sector spokespersons, these events confirmed the reliability of transnational power grids and the traditional decentralized governance model: the disturbances were quickly contained and repaired. This paper inquires the historic legacies at work in these conflicting interpretations and associated transnational governance preferences. It traces the power sector's interpretation to its building of a secure transnational power grid from the 1950s through the era of neoliberalization. Next it places the EU interpretation and associated policy measures against the historical record of EU attempts at transnational infrastructure governance. Uncovering the historical roots and embedding of both interpretations, we conclude that their divergence is of a surprisingly recent date and relates to the current era of security thinking. Finally we recommend transnational, interpretative, and historical analysis to the field of critical infrastructure studies.

  16. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  17. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  18. Beyond exposure, sensitivity and adaptive capacity: A response based ecological framework to assess species climate change vulnerability

    Science.gov (United States)

    Fortini, Lucas B.; Schubert, Olivia

    2017-01-01

    As the impacts of global climate change on species are increasingly evident, there is a clear need to adapt conservation efforts worldwide. Species vulnerability assessments (VAs) are increasingly used to summarize all relevant information to determine a species’ potential vulnerability to climate change and are frequently the first step in informing climate adaptation efforts. VAs commonly integrate multiple sources of information by utilizing a framework that distinguishes factors relevant to species exposure, sensitivity, and adaptive capacity. However, this framework was originally developed for human systems, and its use to evaluate species vulnerability has serious practical and theoretical limitations. By instead defining vulnerability as the degree to which a species is unable to exhibit any of the responses necessary for persistence under climate change (i.e., toleration of projected changes, migration to new climate-compatible areas, enduring in microrefugia, and evolutionary adaptation), we can bring VAs into the realm of ecological science without applying borrowed abstract concepts that have consistently challenged species-centric research and management. This response-based framework to assess species vulnerability to climate change allows better integration of relevant ecological data and past research, yielding results with much clearer implications for conservation and research prioritization.

  19. Performance of Oil Infrastructure during Hurricane Harvey

    Science.gov (United States)

    Bernier, C.; Kameshwar, S.; Padgett, J.

    2017-12-01

    Three major refining centers - Corpus Christi, Houston, and Beaumont/Port Arthur - were affected during Hurricane Harvey. Damage to oil infrastructure, especially aboveground storage tanks (ASTs), caused the release of more than a million gallons of hazardous chemicals in the environment. The objective of this presentation is to identify and gain a better understanding of the different damage mechanisms that occurred during Harvey in order to avoid similar failures during future hurricane events. First, a qualitative description of the damage suffered by ASTs during Hurricane Harvey is presented. Analysis of aerial imagery and incident reports indicate that almost all spills were caused by rainfall and the associated flooding. The largest spill was caused by two large ASTs that floated due to flooding in the Houston Ship Channel releasing 500,000 gallons of gasoline. The vulnerability of ASTs subjected to flooding was already well known and documented from previous storm events. In addition to flooding, Harvey also exposed the vulnerability of ASTs with external floating roof to extreme rainfall; more than 15 floating roofs sank or tilted due to rain water accumulation on them, releasing pollutants in the atmosphere. Secondly, recent fragility models developed by the authors are presented which allow structural vulnerability assessment of floating roofs during rainfall events and ASTs during flood events. The fragility models are then coupled with Harvey rainfall and flood empirical data to identify the conditions (i.e.: internal liquid height or density, drainage system design and efficiency, etc.) that could have led to the observed failures during Hurricane Harvey. Finally, the conditions causing tank failures are studied to propose mitigation measures to prevent future AST failures during severe storm, flood, or rainfall events.

  20. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport