HERO_Meta-protocol 1 HERO Project’s Methodology for Protocol Development HERO-MEPRODE (Draft) Liem T. Tran and Shuang-Ye Wu 1. Introduction The purpose of this manuscript is to present a framework that can be used to develop a protocol in the HERO project’s context. In so doing, the manuscript focuses on three questions: (1) What should a HERO protocol be? (2) What should a process to develop HERO protocol be (say, meta-protocol)? (3) How to construct the HERO meta-protocol? In addressing these questions, vulnerability assessment protocol will be used as an illustration. However the general framework remains applicable to other types of HERO protocols. 2. What should a HERO protocol be? Definition of protocol: Code of correct conduct; rule; guideline. The optimal way to carry out a specific task/study given certain constraints/resources. A process or application of a methodology or a combination of various methodologies to study a particular subject. A HERO protocol should: Be dynamic: in terms of incorporating state-of-the-art methodologies/models and new data. The protocol should evolve readily as research progresses, adding new discoveries and prompting modification of existing components. Hence HERO protocol is not a single static methodology but a dynamic combination of various models/components serving various users’ needs stemming from a particular research question. Be robust: the protocol should accommodate a wide spectrum of potential users and their own needs: for example, the protocol should consist of components that can be chosen, activated and deactivated by the user. At a higher level, the protocol should advise users what tools/components are available and suitable to their needs given different levels of constraints/resources on data availability or funding (say, an expertknowledge-based system). Besides, the protocol should also be robust in terms of different future scenarios. Be balance in terms of approaches (e.g., qualitative versus quantitative, deterministic versus stochastic, etc.), scope (multi-temporal/spatial scales), and validity (logic between estimations and level of uncertainty). Be standardized: to maintain applicability and to enable comparisons among different regions. HERO_Meta-protocol 2 Be user-friendly in design, display, and operation: to allow users to enter, access data, overlay input/output data on color-coded maps of the study region for different scenarios and assumptions. Results of studies should be revisable within the protocol framework; databases can be updated easily; analyses can be run with new information without resetting the problem. Include non-proprietary methods and data only. HERO vulnerability assessment (HERO-VA) protocol The HERO-VA protocol aims to provide guidance for the application of a set of standard methodologies to evaluate the vulnerability of natural and social systems to both shortterm climate variability and long-term climate change. Vulnerability in this context is defined as the extent to which a natural or social system is susceptible to sustaining damage from climate variability and change. Vulnerability is thus a function of the sensitivity of a system to climate variability and change (the degree to which a system will be affected adversely to a given degree of climate variability and change) and the ability to adapt the system to such climate variability and change (the degree to which adjustments in practices, processes, or structures can moderate or offset the potential for damage due to a given change in climate). Under this framework, a highly vulnerable system would be one that is highly sensitive to modest changes in climate with the potential for substantial harmful effects, and one for which the ability to adapt is severely constrained (IPCC, 1998). Hence three main components of a HERO vulnerability protocol are: Risk: How can we investigate the present climate variability, mainly climate-related hazards such as flood, drought, storms, hails, winds, etc.? How can we predict and estimate future climate change and variability? Sensitivity: How do we analyze the possible impacts of climate variability and change on natural and social systems? How do we evaluate different natural and social systems respond to these impacts? What are the characteristics of these systems that make them more susceptible to damage caused by climate variability and change? Adaptation: How do we evaluate the effectiveness of adaptation strategies adopted either by individuals or collectively as national or international policies and agreements? Besides, two important issues which need to be addressed during a vulnerability assessment are: Uncertainty: How can uncertainties be expressed and integrated (“uncertainty” question)? And Policy: How can knowledge of vulnerability is transferred into decision-making process (“policy” question)? As discussed above, such a comprehensive vulnerability assessment protocol should be viewed as a dynamic evolving product rather than a static framework. The protocol should not only meet current needs of particular vulnerability assessments, but also be HERO_Meta-protocol 3 capable of incorporating theoretical and technical development in this area and readily reflect the state-of-the-art vulnerability research. 3. Methodology for protocol development (meta-protocol) Characteristics: Dynamic: As HERO protocol is defined as a dynamic rather than static product by itself, methodology for protocol development must be a dynamic and evolving process, too, to reflect progresses in research and databases development. Multi-criteria: a desired protocol needs to satisfy a set of different criteria. Some of the criteria might be more relevant or more important than other depending on context of the problem. For example, a rural region needs suitable tools to assess vulnerability of agricultural sector while a coastal area requires techniques for assessing risk of sea-level rise. Such different needs should be analyzed in the process of developing protocol and transferred into the developed protocol itself. The process of developing protocol also should be multi-criteria in terms experts from different disciplines participating in the process. A decision-making process: a desired process should accommodate judgments from different experts and participants into an integrated framework and provides means for building consensus. Well-structured: as the process of developing protocol is complicated and long-term, it should be facilitated by a highly-structured framework that can record and show different components/aspects, their relative importance, and their connections in the whole picture throughout the process. Flexible: the process should be flexible enough to allow dynamic transition in concepts, methodologies, or modules over time to meet changes, advances, and new findings in knowledge and technology. HERO-Methodology for protocol development (HERO-MEPRODE) HERO-MEPRODE is designed with four major phases in an iterative process allowing moving back and forth from one phase to another (Figure 1). HERO_Meta-protocol 4 Testing Protocol Constructing Protocol • Case studies • Case-study comparison Evaluation & Critical Analysis Seeking answers for HOW & WHY questions Structuring Problem Figure 1. HERO-MEPRODE framework Phase 1: structuring the problem Objective: to define the “right question” (WHAT question: What do we want?) and construct a framework for further analysis. Generally, this phase is to establish the “right question”, that is, to identify research aim and objectives. This is done by constructing a hierarchy to represent elements of the problem, i.e., breaking down the major research issue into smaller constituent parts at different levels. At the same time, special attention is given to careful definition of major terms and concepts. It is not unusual that one terminology or a subject may have different meanings to different people. For example, vulnerability assessment in the HERO context is not necessarily the same as those in disaster/hazard risk assessment approaches (although if modifications are made to include a baseline scenario, assessment of changes in disasters’ patterns and magnitudes due to climate change, and a comparison between the baseline and future scenarios regarding climate change, those adjusted approaches can be part of the HERO vulnerability assessment protocol). Hence a careful definition of the problem and what we want to know is extremely important to avoid the problem of getting the “right answer” for the “wrong question”. This phase is also to systematize the study in a highly-structured framework. As discussed in the above section, a sound protocol should satisfy a set of criteria. These criteria however may not have a same level of importance or generality. Some criteria may be more important or more general than others. On the other hand, the relative importance of a criterion might be different from one problem to another, from one person to another, or changing over time. Hence there is a need of a hierarchical framework to accommodate those aspects. Here we suggest the use of the Analytic Hierarchy Process developed by Saaty (1980). AHP is a systematic procedure to HERO_Meta-protocol 5 construct and represent the elements of a problem in a hierarchy format, breaking down the problem into smaller constituent parts at different levels. The hierarchy in AHP is often constructed from the top (goal from management standpoint), through intermediate levels (criteria on which subsequent levels depend) to the lowest level (usually a set of alternatives, possible actions). Usually, decision-makers are guided through a series of pair-wise comparison judgments to reveal the relative impact, or priority of the elements (e.g., criteria, alternatives) in the hierarchy. These judgments in turn are transformed to ratio-scale numbers representing relative weights of the elements at a certain level of the hierarchy, as well as globally. However, to avoid the computational burden of too many pair-wise comparisons, an absolute scale of judgment can be used. Details of the AHP methodology, the use of different (relative/absolute) scales, and how to construct the hierarchy can be seen in Saaty (1980, 1986, 2000). Figure 2 shows an example hierarchy of a desired HERO vulnerability assessment protocol. It aims to provide a comprehensive framework for conducting vulnerability assessment. However, if new elements emerge at a later stage, they can be easily incorporated into the hierarchy at their appropriate levels. However, it should be noted that this hierarch only provides an outline for a protocol. In order to operationalize the framework, more details are needed to fill out the lower levels of the hierarchy until theoretical issues are broken down into measurable variables. It is not necessary to bringing in details for the whole framework at the same time. Rather, efforts can be divided into fulfilling parts of the hierarchy so that they can be combined at a later stage. Figure 3 shows how part of the VA hierarchy can be further developed into a detailed framework for assessing people’s vulnerability to climate-related hazards. Tasks: construct a hierarchy of criteria defining what is a good protocol (e.g., vulnerability assessment, LULCC detection, LULCC driver detection, LULCC modeling). IN HERO-MEPRODE, the AHP hierarchy is used to arrange all desired features of an ideal protocol without listing what data or methodology to achieve those features. Tools: (Web-based) Delphi, AHP, e-notebook, annotation tools, knowledge presentation tools. Products: a framework to evaluate & develop protocol; collaboratory activities. Phase 2: Evaluation & critical analysis Objective: to examine/evaluate relevant existing studies using the framework developed in phase 1 to look for their good features that can be used in the being-developed protocol (HOW and WHY questions: How/Why a study/methodology/technique is relevant/applicable/important to the being-developed protocol). As mentioned above, a sound protocol should be robust regarding methodology. Hence it should reflect/combine/integrate strength (and weakness as well) of relevant studies/methodologies on the same subject. It not also describes effectively state-of-theart of the research but also provides a robust tool for a wide spectrum of potential users. HERO_Meta-protocol 6 Assessing Vulnerability to Climate Variability and Change Content Features Components of VA Other special issues Uncertainty Risk Long-term Climate Change Sensitivity Climate Variability Temperature Climaterelated Hazards Precipitation Flood Sea-Level Rise Drought Storms Hail, wind, etc Natural Environment Ecosystems Adaptability Huaman Environment Built Environment Water Resources Settlement Coastal systems Critical facilities Social Environment Infrastructure Individuals Future scenarios Households Communities Economic Environment Agriculture Forestry Fisheries Business Tourism Figure 2: A Hierarchical Framework for HERO-VA protocol Natural Environment Policy development Robust User-friendly Transparent Adaptable Generalisable Consistent Huaman Environment Individual choices and decisions Collective choices and decisions Policies and Agreements HERO_Meta-protocol 7 People's vulnerability to climate-related hazards Physical Vulnerability Hazards Type of damaging forces Extend Spatial Frequency Social Vulnerability Coping ability Exposure Location of people Location of property Temporal Built environment Social environment Intensity Location of infrastructure Resilience Backup facilities Value of property Insurance Personal Level Age Gender Health Ethnicity Education and skills Prior experience Household Level Income Size of family Proportion of wageearning adults House ownership Woman-headed household Community Level Political structure Stakeholder involvement Landuse planning Perception of decision makers Community hazard management planning Attitude Homelessness Mixed ethnicity New/old Fast/slow growing Figure 3: A Hierarchical Framework for Assessing People’s Vulnerability to Climate-Related Hazards. HERO_Meta-protocol 8 Tasks: evaluate existing techniques/methodologies/case studies using the framework developed in the first phase; critical analysis on the methodology/inputs/outputs of existing studies (e.g., why does that methodology get a very high score on that criterion but others; how data are used/formatted/displayed; etc.). Tools: (Web-based) Delphi, AHP, e-notebook, annotation tools, knowledge presentation tools, geocomputation, database development. Products: database, data geocomputational tools. & metadata standards, collaboratory activities, Appendix A shows a list of existing studies relevant to the development of the HERO vulnerability protocol. A detailed evaluation and critical analysis is under way to be carried out. Phase 3: constructing protocol Objective: to develop the desired protocol by modifying/improving/combining/ integrating methodologies/techniques analyzed in the second phase to meet the criteria elaborated in the first phase. Up to this phase we should have a good understanding of what pieces of the puzzle are available and what are missing. From that we will start building components of the protocol based on our priority (reflected in the hierarchy). Some tools/methodologies won’t be fit in the protocol without appropriate modification/improvement. The protocol should be designed in a flexible module format allowing adding /modifying a component without effect on the others. At an appropriate time during this phase, an expertknowledge-based system can be designed and developed to play the role of a decisionsupport tool that can advise users what tools/components are available and suitable to their needs given different levels of constraints/resources on data availability or funding. Tasks: critical analysis, computer programming, writing (written) protocol, develop (computer-based) protocol. Tools: geocomputation, AI tools, programming. Products: database, data & metadata standards, collaboratory geocomputational tools, report, protocol package, knowledge-based system. activities, Phase 4: testing protocol Objective: this phase is to test the applicability of the developed protocol to real-world problems. The developed protocol should be tested on different (HERO and more) sites by various users who may have different purposes. The protocol’s performance will be evaluated using the hierarchy developed in phase 1 and updated through out the process of developing the protocol. HERO_Meta-protocol 9 Tasks: testing components of the protocol, sensitivity analysis, uncertainty analysis. Tools: stand-alone package, geocollaboratory tools. Products: report, computer-based protocol. 4. Remarks HERO-MEPRODE is not a fixed but iterative/flexible process. We can jump forward or backward from one phase to another at any time during the process. For example, evaluation & critical analysis can be carry out to some extent at the beginning to get some idea of what criteria/components should be included in the criteria. In the same context, Case studies can be done in advance to test the applicability of some promising methodologies/techniques. Briefly, we can and should move back and forth dynamically from phase to phase to address and meet our needs/new knowledge/new technology. The hierarchy is a highly-structured way to record our knowledge/priority at a certain point during the process of developing the protocol. By comparing the hierarchies at two different points of time, we can see how our knowledge is changed/improved through time. The AHP framework facilitates collective efforts/consensus that are a MUST for the HERO project. HERO-MEPRODE allows different HERO groups and outside stakeholders (e.g., HERO sites, HEROINE, potential users) work together in an integrated process. REFERENCES IPCC. 1998. The Regional Impacts of Climate Change: An Assessment of Vulnerability. Cambridge: Cambridge University Press. Saaty, T.L. 1980. The Analytic Hierarchy Process, Planning, Priority Setting, and Resource Allocation. McGraw-Hill, New York, 287 pp. Saaty, T.L. 1986. Absolute and relative measurement with the AHP: the most livable cities in the US. Soci-Economic Planning Sciences 20(6): 327-331. Saaty, T.L. and Vargas, L.G. (2001). Models, Methods, Concepts & Applications of the Analytic Hierarchy Process. Boston : Kluwer Academic Publishers, 333 p. HERO_Meta-protocol 10 APPENDIX A A List of Existing Studies in Vulnerability Assessment Ben Wisner (UN University, CSU-Long Beach, Oberlin College). Social Vulnerability Assessment in Mexico City and Los Angeles. NOAA-VATA. Bill Easterling’s work on the Use of High-Resolution Climate Change Scenarios in the U. S. Great Plains to Simulate Crop Yields. Cutter et al. (2000). A GIS-Based Hazards Assessment for Georgetown County, South Carolina. Paper and . NOAA-VATA. Federal Emergency Management Agency (FEMA). 1997. Multi Hazards Identification and Risk Assessment: A Cornerstone of the National Mitigation Strategy. Washington, D.C.: Federal Emergency Management Agency. FEMA 386-2. Understanding Your Community's Risks (Identifying Hazards, And Determining Risks). FEMA Multi-Hazard Identification and Risk Assessment, A Cornerstone of the National Mitigation Strategy. FEMA-364. Planning for a Sustainable Future: The Link Between Hazard Mitigation and Livability. Haznet: w wide range of studies relevant to HERO vulnerability protocol. For example: Keillor J. Philip. Planning for a wider range of water levels along Great Lakes and ocean coasts. Johnson, L.A. Multi-Peril Loss Studies: A Comparative Approach to Assessing Vulnerability in the Caribbean. NOAA-VATA. Julio Kuroiwa (OAS, USDE). Human Safety and Regional Development: A Peruvian Experience. NOAA-VATA. MacKenzie Basin Impact Study. MARA project. Impact assessment of various sectors. ReVA project. Several ecological vulnerability assessment methods are developed. Sandy Eslinger (NOAA Coastal Services Center). Community Vulnerability Assessment Methodology – New Hanover County, North Carolina. NOAA-VATA. Stephen Bender (OAS). NOAA-VATA. Dominica National School Vulnerability Reduction Plan. HERO_Meta-protocol 11 Stephen Bender (OAS). The Vulnerability of the Energy Sector in Costa Rica. NOAAVATA. Stephen Bender (OAS). Vulnerability Assessment Study of the Ecuadorian Agricultural Sector. NOAA-VATA. Steve Dunn (Heinz Center).Evaluation of Erosion Hazards – United States Shoreline (Atlantic, Gulf, Pacific and Great Lakes). NOAA-VATA. Steven Stichter (OAS). Hazard Assessment and Vulnerability Reduction Plan for Jeremie, Haiti. NOAA-VATA. Tom Crowards (Agency Caribbean Development Bank). Comparative Vulnerability to Natural Disasters in the Caribbean. NOAA-VATA. Published literature: Blaikie, P. and H. Brookfield. 1987. Land Degradation and Society. London: Methuen. Blaikie, P., T. Cannon, I. Davis and B. Wisner. 1994. At Risk: Natural Hazards, People’s Vulnerability, and Disasters. London: Routledge. Bohle, H.G., T.E. Downing and M.J. Watts. 1994. “Climate change and social vulnerability: the sociology and geography of food insecurity”. Global Environmental Change 4:37-48. Bolin R, Bolton P. 1986. Race, Religion, and Ethnicity in Disaster Recovery. Institute of Behavioral Science, University of Colorado, Boulder, CO Bolin R, Klenow D. 1983. “Response of the elderly to disaster: an age-stratified analysis”. International Journal of Aging and Human Development 16:283-296 Bolin R, Stanford L. 1991. “Shelter, housing, and recovery: a comparison of US disasters”. Disasters 15:24-34 Burton, I., R. Kates and G.F. White. 1993. The Environment as Hazard, 2nd ed. New York: Guilford Press. Clark G, Moser S, Ratick S, Dow K, Meyer W, Emani S, Jin W, Kasperson J, Kasperson R, Schwarz H (1998) Assessing the vulnerability of coastal communities to extreme HERO_Meta-protocol 12 storms: The case of Revere, MA, USA. Mitigation and Adaptation Strategies for Global Change 3:59-82 Cutter, S.L. 1993. Living with Risk: The Geography of Technological Hazards. New York: Edward Arnold. Cutter, S.L. 1995. “The forgotten casualties: women, children, and environmental change”. Global Environmental Change 5:181-194. Cutter, S.L. 1996. “Vulnerability to environmental hazards.” Progress in Human Geography. 20(4):529-539. Cutter, S.L., J.T. Mitchell, and M.S. Scott. 2000. “Revealing the vulnerability of people and places: a case study of Georgetown County, South Carolina”. Annals of the Association of American Geographers 90(4):713-737. David SD, Baish S, Morrow BH (1999) Uncovering the hidden costs of coastal hazards. Environment 41(8):10-19. Dow, K. 1992. “Exploring differences in our common future(s): the meaning of vulnerability to global environmental change.” Geoforum. 23(3): 417-436. Drabek T, Key W (1984) Conquering Disaster: Family Recovery and Long-term Consequences. Irvington, New York Enarson, E. and B. Morrow. 1998. The Gendered Terrain of Disaster. New York: Praeger. Fisher A, Abler D, Barron E, Bord R, Crane R, DeWalle D, Knight CG, Najjar R, Nizeyimana E, O’Connor R, Rose A, Shortle J, Yarnal B (2000) Preparing for a changing climate: the potential consequences of climatic variability and change. Mid-Atlantic overview. The US Environmental Protection Agency, Washington, DC, and The Pennsylvania State University, University Park, PA Hewitt, K. ed. 1983. Interpretation of Calamity. Winchester, MA: Allen & Unwin. Hewitt, K. 1997. Region of Risk: A Geographical Introduction to Disasters. Essex: Longman. Hewitt, K and I. Burton. 1971. The Hazardousness of a Place: A Regional Ecology of Damaging Events. Toronto: University of Toronto. HERO_Meta-protocol 13 Institution of Civil Engineering. 1995. Megacities: Reducing Vulnerability to Natural Hazards. London: Thomas Telford Press. IPCC. 1998. The Regional Impacts of Climate Change: An Assessment of Vulnerability. Cambridge: Cambridge University Press. IPCC (2001) Summary for policymakers. Climate change 2001: impacts, adaptation, and vulnerability. A report of Working Group II of the Intergovernmental Panel on Climate Change. Accessed at http://www.ipcc.ch/pub/wg2SPMfinal.pdf Johnson, B.B. and V.T. Covello. 1989. The Social and Cultural Construction of Risk: Essays on Risk Selection and Perception. Dordrecht: D. Reidel Publishing. Kasperson J.X., R.E. Kasperson, and B.L. Turner III, eds. 1995. Regions at Risk: Comparisons of Threatened Environments. Tokyo: United Nations University Press. Krimsky, S. and D. Golding, eds. 1992. Social Theories of Risk. Westport, CT: Praeger. Liverman, D.M. 1990a. “Vulnerability to global environmental change.” In Understanding Global Environmental Change: The Contributions of Risk Analysis and Management. Edited by R.E. Kasperson, K. Dow, D. Golding, and J.Z. Kasperson. Worcester, MA: Earth Transformed Program, Clark University. Liverman, D.M. 1990b. “Drought in Mexico: climate, agriculture, technology and land tenure in Sonora and Puebla”. Annals of American Association of Geographers 80:49-72. Mileti, D (1999) Disasters by Design: a Reassessment of Natural Hazards in the United States. The Joseph Henry Press, Washington, DC Morrow BH (1999) Identifying and mapping community vulnerability. Disasters 23:1-18 Najjar RG, Walker HA, Anderson PJ, Barron EJ, Bord RJ, Gibson JR, Kennedy VS, Knight CG, Megonigal JP, O’Connor RE, Polsky CD, Psuty NP, Richards BA, Sorenson LG, Steele EM, Swanson RS (2000) The potential impacts of climate change on the mid-Atlantic coastal region. Climate Research 14:219-213 HERO_Meta-protocol 14 National Assessment Synthesis Team (2001) Climate change impacts on the United States: The potential consequences of climate variability and change. Cambridge University Press, New York National Research Council (NRC). 1991. A Safer Future: Reducing the Impacts of Natural Disasters. Washington: National Academy Press. O’Keefe, P., K. Westgate and B. Wisner. 1976. “Taking the naturalness out of natural disasters”. Nature 260:566-567. Palm, R. 1990. Natural Hazards: An Integrative Framework for Research and Planning. Baltimore: Johns Hopkins University Press. Palm, R. and J. Carroll. 1998. Illusions of Safety: Culture and Earthquake Hazard Response in California and Japan. Boulder, CO: Westview Press. Parr A (1987) Disasters and disabled persons: an examination of the safety needs of a neglected minority. Disasters 11:148-159 Perry, R. and M. Lindell. 1991. “The effects of ethnicity on evacuation decision making”. International Journal of Mass Emergencies and Disasters 9:47-68. Platt, R. 1995. “Lifelines: an emergency management priority for the United States in the 1990s”. Disasters 15:172-176. Quarantelli, E.L. 1988. “Disaster studies: an analysis of the social historical factors affecting the development of research in the area”. International Journal of Mass Emergencies and Disasters 5:285-310. Quarantelli E (1991) Patterns of sheltering and housing in American disasters. Preliminary Paper #170, Disaster Research Center, University of Delaware, Newark, DE Savadore L, Bucholz MT (1993) Great storms of the Jersey Shore. Down The Shore Publishing, Harvey Cedars, NJ HERO_Meta-protocol 15 Susman, P., P. O’Keefe and B. Wisner. 1983. “Global Disasters, a radical interpretation”. In K. Hewitt, ed. Interpretation of Calamity pp. 263-283. Boston: Allen & Unwin. Tobin, G. and B. Montz. 1997. Natural Hazards: Explanation and Integration. New York: Guilford Press. Torry, W. 1979. “Hazards, hazes, and holes: a critique of the Environment as Hazard and general reflections on disaster research”. Canadian Geographers 23:368-383. The H. John Heinz III Center for Science, Economics and the Environment (2000) The hidden costs of coastal hazards: implications for risk assessment and mitigation. Island Press, Washington, DC and Covelo, CA. Wilhite, D. and W. Easterling eds. 1987. Planning for Drought: Towards a Reduction of Societal Vulnerability. Boulder CO: Westview Press. Yanal, B. 1994. “Socioeconomic restructuring and vulnerability to environmental hazards in Bulgaria”. Disasters 8:95-106.