Protocol - Human Environment Regional Observatory Network

advertisement
HERO_Meta-protocol
1
HERO Project’s Methodology for Protocol Development
HERO-MEPRODE
(Draft)
Liem T. Tran and Shuang-Ye Wu
1. Introduction
The purpose of this manuscript is to present a framework that can be used to develop
a protocol in the HERO project’s context. In so doing, the manuscript focuses on three
questions: (1) What should a HERO protocol be? (2) What should a process to develop
HERO protocol be (say, meta-protocol)? (3) How to construct the HERO meta-protocol?
In addressing these questions, vulnerability assessment protocol will be used as an
illustration. However the general framework remains applicable to other types of HERO
protocols.
2. What should a HERO protocol be?
Definition of protocol:
 Code of correct conduct; rule; guideline.
 The optimal way to carry out a specific task/study given certain constraints/resources.
 A process or application of a methodology or a combination of various methodologies
to study a particular subject.
A HERO protocol should:
 Be dynamic: in terms of incorporating state-of-the-art methodologies/models and new
data. The protocol should evolve readily as research progresses, adding new discoveries
and prompting modification of existing components. Hence HERO protocol is not a
single static methodology but a dynamic combination of various models/components
serving various users’ needs stemming from a particular research question.
 Be robust: the protocol should accommodate a wide spectrum of potential users and
their own needs: for example, the protocol should consist of components that can be
chosen, activated and deactivated by the user. At a higher level, the protocol should
advise users what tools/components are available and suitable to their needs given
different levels of constraints/resources on data availability or funding (say, an expertknowledge-based system). Besides, the protocol should also be robust in terms of
different future scenarios.
 Be balance in terms of approaches (e.g., qualitative versus quantitative, deterministic
versus stochastic, etc.), scope (multi-temporal/spatial scales), and validity (logic between
estimations and level of uncertainty).
 Be standardized: to maintain applicability and to enable comparisons among different
regions.
HERO_Meta-protocol
2
 Be user-friendly in design, display, and operation: to allow users to enter, access data,
overlay input/output data on color-coded maps of the study region for different scenarios
and assumptions. Results of studies should be revisable within the protocol framework;
databases can be updated easily; analyses can be run with new information without
resetting the problem.

Include non-proprietary methods and data only.
HERO vulnerability assessment (HERO-VA) protocol
The HERO-VA protocol aims to provide guidance for the application of a set of standard
methodologies to evaluate the vulnerability of natural and social systems to both shortterm climate variability and long-term climate change. Vulnerability in this context is
defined as the extent to which a natural or social system is susceptible to sustaining
damage from climate variability and change. Vulnerability is thus a function of the
sensitivity of a system to climate variability and change (the degree to which a system
will be affected adversely to a given degree of climate variability and change) and the
ability to adapt the system to such climate variability and change (the degree to which
adjustments in practices, processes, or structures can moderate or offset the potential for
damage due to a given change in climate). Under this framework, a highly vulnerable
system would be one that is highly sensitive to modest changes in climate with the
potential for substantial harmful effects, and one for which the ability to adapt is severely
constrained (IPCC, 1998).
Hence three main components of a HERO vulnerability protocol are:
 Risk: How can we investigate the present climate variability, mainly climate-related
hazards such as flood, drought, storms, hails, winds, etc.? How can we predict and
estimate future climate change and variability?
 Sensitivity: How do we analyze the possible impacts of climate variability and change
on natural and social systems? How do we evaluate different natural and social
systems respond to these impacts? What are the characteristics of these systems that
make them more susceptible to damage caused by climate variability and change?
 Adaptation: How do we evaluate the effectiveness of adaptation strategies adopted
either by individuals or collectively as national or international policies and
agreements?
Besides, two important issues which need to be addressed during a vulnerability
assessment are:
 Uncertainty: How can uncertainties be expressed and integrated (“uncertainty”
question)? And
 Policy: How can knowledge of vulnerability is transferred into decision-making
process (“policy” question)?
As discussed above, such a comprehensive vulnerability assessment protocol should
be viewed as a dynamic evolving product rather than a static framework. The protocol
should not only meet current needs of particular vulnerability assessments, but also be
HERO_Meta-protocol
3
capable of incorporating theoretical and technical development in this area and readily
reflect the state-of-the-art vulnerability research.
3. Methodology for protocol development (meta-protocol)
Characteristics:
 Dynamic: As HERO protocol is defined as a dynamic rather than static product by
itself, methodology for protocol development must be a dynamic and evolving process,
too, to reflect progresses in research and databases development.
 Multi-criteria: a desired protocol needs to satisfy a set of different criteria. Some of
the criteria might be more relevant or more important than other depending on context of
the problem. For example, a rural region needs suitable tools to assess vulnerability of
agricultural sector while a coastal area requires techniques for assessing risk of sea-level
rise. Such different needs should be analyzed in the process of developing protocol and
transferred into the developed protocol itself. The process of developing protocol also
should be multi-criteria in terms experts from different disciplines participating in the
process.
 A decision-making process: a desired process should accommodate judgments from
different experts and participants into an integrated framework and provides means for
building consensus.
 Well-structured: as the process of developing protocol is complicated and long-term,
it should be facilitated by a highly-structured framework that can record and show
different components/aspects, their relative importance, and their connections in the
whole picture throughout the process.
 Flexible: the process should be flexible enough to allow dynamic transition in
concepts, methodologies, or modules over time to meet changes, advances, and new
findings in knowledge and technology.
HERO-Methodology for protocol development (HERO-MEPRODE)
HERO-MEPRODE is designed with four major phases in an iterative process
allowing moving back and forth from one phase to another (Figure 1).
HERO_Meta-protocol
4
Testing Protocol
Constructing Protocol
• Case studies
• Case-study
comparison
Evaluation & Critical Analysis
Seeking answers for HOW &
WHY questions
Structuring Problem
Figure 1. HERO-MEPRODE framework
Phase 1: structuring the problem
Objective: to define the “right question” (WHAT question: What do we want?) and
construct a framework for further analysis.
Generally, this phase is to establish the “right question”, that is, to identify research
aim and objectives. This is done by constructing a hierarchy to represent elements of the
problem, i.e., breaking down the major research issue into smaller constituent parts at
different levels. At the same time, special attention is given to careful definition of
major terms and concepts. It is not unusual that one terminology or a subject may have
different meanings to different people. For example, vulnerability assessment in the
HERO context is not necessarily the same as those in disaster/hazard risk assessment
approaches (although if modifications are made to include a baseline scenario,
assessment of changes in disasters’ patterns and magnitudes due to climate change, and a
comparison between the baseline and future scenarios regarding climate change, those
adjusted approaches can be part of the HERO vulnerability assessment protocol). Hence
a careful definition of the problem and what we want to know is extremely important to
avoid the problem of getting the “right answer” for the “wrong question”.
This phase is also to systematize the study in a highly-structured framework. As
discussed in the above section, a sound protocol should satisfy a set of criteria. These
criteria however may not have a same level of importance or generality. Some criteria
may be more important or more general than others. On the other hand, the relative
importance of a criterion might be different from one problem to another, from one
person to another, or changing over time. Hence there is a need of a hierarchical
framework to accommodate those aspects. Here we suggest the use of the Analytic
Hierarchy Process developed by Saaty (1980). AHP is a systematic procedure to
HERO_Meta-protocol
5
construct and represent the elements of a problem in a hierarchy format, breaking down
the problem into smaller constituent parts at different levels. The hierarchy in AHP is
often constructed from the top (goal from management standpoint), through intermediate
levels (criteria on which subsequent levels depend) to the lowest level (usually a set of
alternatives, possible actions). Usually, decision-makers are guided through a series of
pair-wise comparison judgments to reveal the relative impact, or priority of the elements
(e.g., criteria, alternatives) in the hierarchy. These judgments in turn are transformed to
ratio-scale numbers representing relative weights of the elements at a certain level of the
hierarchy, as well as globally. However, to avoid the computational burden of too many
pair-wise comparisons, an absolute scale of judgment can be used. Details of the AHP
methodology, the use of different (relative/absolute) scales, and how to construct the
hierarchy can be seen in Saaty (1980, 1986, 2000).
Figure 2 shows an example hierarchy of a desired HERO vulnerability assessment
protocol. It aims to provide a comprehensive framework for conducting vulnerability
assessment. However, if new elements emerge at a later stage, they can be easily
incorporated into the hierarchy at their appropriate levels. However, it should be noted
that this hierarch only provides an outline for a protocol. In order to operationalize the
framework, more details are needed to fill out the lower levels of the hierarchy until
theoretical issues are broken down into measurable variables. It is not necessary to
bringing in details for the whole framework at the same time. Rather, efforts can be
divided into fulfilling parts of the hierarchy so that they can be combined at a later stage.
Figure 3 shows how part of the VA hierarchy can be further developed into a detailed
framework for assessing people’s vulnerability to climate-related hazards.
Tasks: construct a hierarchy of criteria defining what is a good protocol (e.g.,
vulnerability assessment, LULCC detection, LULCC driver detection, LULCC
modeling). IN HERO-MEPRODE, the AHP hierarchy is used to arrange all desired
features of an ideal protocol without listing what data or methodology to achieve those
features.
Tools: (Web-based) Delphi, AHP, e-notebook, annotation tools, knowledge presentation
tools.
Products: a framework to evaluate & develop protocol; collaboratory activities.
Phase 2: Evaluation & critical analysis
Objective: to examine/evaluate relevant existing studies using the framework developed
in phase 1 to look for their good features that can be used in the being-developed protocol
(HOW and WHY questions: How/Why a study/methodology/technique is
relevant/applicable/important to the being-developed protocol).
As mentioned above, a sound protocol should be robust regarding methodology.
Hence it should reflect/combine/integrate strength (and weakness as well) of relevant
studies/methodologies on the same subject. It not also describes effectively state-of-theart of the research but also provides a robust tool for a wide spectrum of potential users.
HERO_Meta-protocol
6
Assessing Vulnerability to Climate Variability and Change
Content
Features
Components of VA
Other special issues
Uncertainty
Risk
Long-term
Climate
Change
Sensitivity
Climate
Variability
Temperature
Climaterelated
Hazards
Precipitation
Flood
Sea-Level
Rise
Drought
Storms
Hail, wind, etc
Natural
Environment
Ecosystems
Adaptability
Huaman
Environment
Built
Environment
Water
Resources
Settlement
Coastal
systems
Critical
facilities
Social
Environment
Infrastructure
Individuals
Future
scenarios
Households
Communities
Economic
Environment
Agriculture
Forestry
Fisheries
Business
Tourism
Figure 2: A Hierarchical Framework for HERO-VA protocol
Natural
Environment
Policy
development
Robust
User-friendly
Transparent
Adaptable
Generalisable
Consistent
Huaman
Environment
Individual
choices and
decisions
Collective
choices and
decisions
Policies and
Agreements
HERO_Meta-protocol
7
People's vulnerability to climate-related hazards
Physical Vulnerability
Hazards
Type of
damaging
forces
Extend
Spatial
Frequency
Social Vulnerability
Coping
ability
Exposure
Location of people
Location of property
Temporal
Built
environment
Social
environment
Intensity
Location of infrastructure
Resilience
Backup facilities
Value of property
Insurance
Personal
Level
Age
Gender
Health
Ethnicity
Education
and skills
Prior experience
Household
Level
Income
Size of family
Proportion of wageearning adults
House ownership
Woman-headed
household
Community
Level
Political structure
Stakeholder
involvement
Landuse planning
Perception of
decision makers
Community hazard
management planning
Attitude
Homelessness
Mixed ethnicity
New/old
Fast/slow
growing
Figure 3: A Hierarchical Framework for Assessing People’s Vulnerability to Climate-Related Hazards.
HERO_Meta-protocol
8
Tasks: evaluate existing techniques/methodologies/case studies using the framework
developed in the first phase; critical analysis on the methodology/inputs/outputs of
existing studies (e.g., why does that methodology get a very high score on that criterion
but others; how data are used/formatted/displayed; etc.).
Tools: (Web-based) Delphi, AHP, e-notebook, annotation tools, knowledge presentation
tools, geocomputation, database development.
Products: database, data
geocomputational tools.
&
metadata
standards,
collaboratory
activities,
Appendix A shows a list of existing studies relevant to the development of the HERO
vulnerability protocol. A detailed evaluation and critical analysis is under way to be
carried out.
Phase 3: constructing protocol
Objective:
to develop the desired protocol by modifying/improving/combining/
integrating methodologies/techniques analyzed in the second phase to meet the criteria
elaborated in the first phase.
Up to this phase we should have a good understanding of what pieces of the puzzle
are available and what are missing. From that we will start building components of the
protocol based on our priority (reflected in the hierarchy). Some tools/methodologies
won’t be fit in the protocol without appropriate modification/improvement. The protocol
should be designed in a flexible module format allowing adding /modifying a component
without effect on the others. At an appropriate time during this phase, an expertknowledge-based system can be designed and developed to play the role of a decisionsupport tool that can advise users what tools/components are available and suitable to
their needs given different levels of constraints/resources on data availability or funding.
Tasks: critical analysis, computer programming, writing (written) protocol, develop
(computer-based) protocol.
Tools: geocomputation, AI tools, programming.
Products: database, data & metadata standards, collaboratory
geocomputational tools, report, protocol package, knowledge-based system.
activities,
Phase 4: testing protocol
Objective: this phase is to test the applicability of the developed protocol to real-world
problems.
The developed protocol should be tested on different (HERO and more) sites by
various users who may have different purposes. The protocol’s performance will be
evaluated using the hierarchy developed in phase 1 and updated through out the process
of developing the protocol.
HERO_Meta-protocol
9
Tasks: testing components of the protocol, sensitivity analysis, uncertainty analysis.
Tools: stand-alone package, geocollaboratory tools.
Products: report, computer-based protocol.
4. Remarks
 HERO-MEPRODE is not a fixed but iterative/flexible process. We can jump forward
or backward from one phase to another at any time during the process. For example,
evaluation & critical analysis can be carry out to some extent at the beginning to get some
idea of what criteria/components should be included in the criteria. In the same context,
Case studies can be done in advance to test the applicability of some promising
methodologies/techniques. Briefly, we can and should move back and forth dynamically
from phase to phase to address and meet our needs/new knowledge/new technology.
 The hierarchy is a highly-structured way to record our knowledge/priority at a certain
point during the process of developing the protocol. By comparing the hierarchies at two
different points of time, we can see how our knowledge is changed/improved through
time.
 The AHP framework facilitates collective efforts/consensus that are a MUST for the
HERO project.
 HERO-MEPRODE allows different HERO groups and outside stakeholders (e.g.,
HERO sites, HEROINE, potential users) work together in an integrated process.
REFERENCES
IPCC. 1998. The Regional Impacts of Climate Change: An Assessment of Vulnerability.
Cambridge: Cambridge University Press.
Saaty, T.L. 1980. The Analytic Hierarchy Process, Planning, Priority Setting, and
Resource Allocation. McGraw-Hill, New York, 287 pp.
Saaty, T.L. 1986. Absolute and relative measurement with the AHP: the most livable
cities in the US. Soci-Economic Planning Sciences 20(6): 327-331.
Saaty, T.L. and Vargas, L.G. (2001). Models, Methods, Concepts & Applications of the
Analytic Hierarchy Process. Boston : Kluwer Academic Publishers, 333 p.
HERO_Meta-protocol
10
APPENDIX A
A List of Existing Studies in Vulnerability Assessment
Ben Wisner (UN University, CSU-Long Beach, Oberlin College). Social Vulnerability
Assessment in Mexico City and Los Angeles. NOAA-VATA.
Bill Easterling’s work on the Use of High-Resolution Climate Change Scenarios in the U.
S. Great Plains to Simulate Crop Yields.
Cutter et al. (2000). A GIS-Based Hazards Assessment for Georgetown County, South
Carolina. Paper and . NOAA-VATA.
Federal Emergency Management Agency (FEMA). 1997. Multi Hazards Identification
and Risk Assessment: A Cornerstone of the National Mitigation Strategy.
Washington, D.C.: Federal Emergency Management Agency.
FEMA 386-2. Understanding Your Community's Risks (Identifying Hazards, And
Determining Risks).
FEMA Multi-Hazard Identification and Risk Assessment, A Cornerstone of the National
Mitigation Strategy.
FEMA-364. Planning for a Sustainable Future: The Link Between Hazard Mitigation and
Livability.
Haznet: w wide range of studies relevant to HERO vulnerability protocol. For example:
Keillor J. Philip. Planning for a wider range of water levels along Great Lakes and
ocean coasts.
Johnson, L.A. Multi-Peril Loss Studies: A Comparative Approach to Assessing
Vulnerability in the Caribbean. NOAA-VATA.
Julio Kuroiwa (OAS, USDE). Human Safety and Regional Development: A Peruvian
Experience. NOAA-VATA.
MacKenzie Basin Impact Study.
MARA project. Impact assessment of various sectors.
ReVA project. Several ecological vulnerability assessment methods are developed.
Sandy Eslinger (NOAA Coastal Services Center). Community Vulnerability Assessment
Methodology – New Hanover County, North Carolina. NOAA-VATA.
Stephen Bender (OAS).
NOAA-VATA.
Dominica National School Vulnerability Reduction Plan.
HERO_Meta-protocol
11
Stephen Bender (OAS). The Vulnerability of the Energy Sector in Costa Rica. NOAAVATA.
Stephen Bender (OAS). Vulnerability Assessment Study of the Ecuadorian Agricultural
Sector. NOAA-VATA.
Steve Dunn (Heinz Center).Evaluation of Erosion Hazards – United States Shoreline
(Atlantic, Gulf, Pacific and Great Lakes). NOAA-VATA.
Steven Stichter (OAS).
Hazard Assessment and Vulnerability Reduction Plan for
Jeremie, Haiti. NOAA-VATA.
Tom Crowards (Agency Caribbean Development Bank). Comparative Vulnerability to
Natural Disasters in the Caribbean. NOAA-VATA.
Published literature:
Blaikie, P. and H. Brookfield. 1987. Land Degradation and Society. London: Methuen.
Blaikie, P., T. Cannon, I. Davis and B. Wisner. 1994. At Risk: Natural Hazards,
People’s Vulnerability, and Disasters. London: Routledge.
Bohle, H.G., T.E. Downing and M.J. Watts.
1994.
“Climate change and social
vulnerability: the sociology and geography of food insecurity”.
Global
Environmental Change 4:37-48.
Bolin R, Bolton P. 1986. Race, Religion, and Ethnicity in Disaster Recovery. Institute of
Behavioral Science, University of Colorado, Boulder, CO
Bolin R, Klenow D.
1983. “Response of the elderly to disaster: an age-stratified
analysis”. International Journal of Aging and Human Development 16:283-296
Bolin R, Stanford L. 1991.
“Shelter, housing, and recovery: a comparison of US
disasters”. Disasters 15:24-34
Burton, I., R. Kates and G.F. White. 1993. The Environment as Hazard, 2nd ed. New
York: Guilford Press.
Clark G, Moser S, Ratick S, Dow K, Meyer W, Emani S, Jin W, Kasperson J, Kasperson
R, Schwarz H (1998) Assessing the vulnerability of coastal communities to extreme
HERO_Meta-protocol
12
storms: The case of Revere, MA, USA. Mitigation and Adaptation Strategies for
Global Change 3:59-82
Cutter, S.L. 1993. Living with Risk: The Geography of Technological Hazards. New
York: Edward Arnold.
Cutter, S.L.
1995.
“The forgotten casualties: women, children, and environmental
change”. Global Environmental Change 5:181-194.
Cutter, S.L. 1996. “Vulnerability to environmental hazards.”
Progress in Human
Geography. 20(4):529-539.
Cutter, S.L., J.T. Mitchell, and M.S. Scott. 2000. “Revealing the vulnerability of people
and places: a case study of Georgetown County, South Carolina”. Annals of the
Association of American Geographers 90(4):713-737.
David SD, Baish S, Morrow BH (1999) Uncovering the hidden costs of coastal hazards.
Environment 41(8):10-19.
Dow, K.
1992.
“Exploring differences in our common future(s): the meaning of
vulnerability to global environmental change.” Geoforum. 23(3): 417-436.
Drabek T, Key W (1984) Conquering Disaster: Family Recovery and Long-term
Consequences. Irvington, New York
Enarson, E. and B. Morrow. 1998. The Gendered Terrain of Disaster. New York:
Praeger.
Fisher A, Abler D, Barron E, Bord R, Crane R, DeWalle D, Knight CG, Najjar R,
Nizeyimana E, O’Connor R, Rose A, Shortle J, Yarnal B (2000) Preparing for a
changing climate: the potential consequences of climatic variability and change.
Mid-Atlantic overview. The US Environmental Protection Agency, Washington, DC,
and The Pennsylvania State University, University Park, PA
Hewitt, K. ed. 1983. Interpretation of Calamity. Winchester, MA: Allen & Unwin.
Hewitt, K. 1997. Region of Risk: A Geographical Introduction to Disasters. Essex:
Longman.
Hewitt, K and I. Burton. 1971. The Hazardousness of a Place: A Regional Ecology of
Damaging Events. Toronto: University of Toronto.
HERO_Meta-protocol
13
Institution of Civil Engineering. 1995. Megacities: Reducing Vulnerability to Natural
Hazards. London: Thomas Telford Press.
IPCC. 1998. The Regional Impacts of Climate Change: An Assessment of Vulnerability.
Cambridge: Cambridge University Press.
IPCC (2001) Summary for policymakers. Climate change 2001: impacts, adaptation, and
vulnerability. A report of Working Group II of the Intergovernmental Panel on
Climate Change. Accessed at http://www.ipcc.ch/pub/wg2SPMfinal.pdf
Johnson, B.B. and V.T. Covello. 1989. The Social and Cultural Construction of Risk:
Essays on Risk Selection and Perception. Dordrecht: D. Reidel Publishing.
Kasperson J.X., R.E. Kasperson, and B.L. Turner III, eds. 1995. Regions at Risk:
Comparisons of Threatened Environments. Tokyo: United Nations University Press.
Krimsky, S. and D. Golding, eds. 1992. Social Theories of Risk. Westport, CT: Praeger.
Liverman, D.M.
1990a.
“Vulnerability to global environmental change.” In
Understanding Global Environmental Change: The Contributions of Risk Analysis
and Management.
Edited by R.E. Kasperson, K. Dow, D. Golding, and J.Z.
Kasperson. Worcester, MA: Earth Transformed Program, Clark University.
Liverman, D.M. 1990b. “Drought in Mexico: climate, agriculture, technology and land
tenure in Sonora and Puebla”. Annals of American Association of Geographers
80:49-72.
Mileti, D (1999) Disasters by Design: a Reassessment of Natural Hazards in the United
States. The Joseph Henry Press, Washington, DC
Morrow BH (1999) Identifying and mapping community vulnerability. Disasters 23:1-18
Najjar RG, Walker HA, Anderson PJ, Barron EJ, Bord RJ, Gibson JR, Kennedy VS,
Knight CG, Megonigal JP, O’Connor RE, Polsky CD, Psuty NP, Richards BA,
Sorenson LG, Steele EM, Swanson RS (2000) The potential impacts of climate
change on the mid-Atlantic coastal region. Climate Research 14:219-213
HERO_Meta-protocol
14
National Assessment Synthesis Team (2001) Climate change impacts on the United
States: The potential consequences of climate variability and change. Cambridge
University Press, New York
National Research Council (NRC). 1991. A Safer Future: Reducing the Impacts of Natural
Disasters. Washington: National Academy Press.
O’Keefe, P., K. Westgate and B. Wisner. 1976. “Taking the naturalness out of natural disasters”.
Nature 260:566-567.
Palm, R. 1990.
Natural Hazards: An Integrative Framework for Research and Planning.
Baltimore: Johns Hopkins University Press.
Palm, R. and J. Carroll. 1998. Illusions of Safety: Culture and Earthquake Hazard Response in
California and Japan. Boulder, CO: Westview Press.
Parr A (1987) Disasters and disabled persons: an examination of the safety needs of a neglected
minority. Disasters 11:148-159
Perry, R. and M. Lindell. 1991. “The effects of ethnicity on evacuation decision making”.
International Journal of Mass Emergencies and Disasters 9:47-68.
Platt, R. 1995. “Lifelines: an emergency management priority for the United States in the 1990s”.
Disasters 15:172-176.
Quarantelli, E.L. 1988. “Disaster studies: an analysis of the social historical factors affecting the
development of research in the area”.
International Journal of Mass Emergencies and
Disasters 5:285-310.
Quarantelli E (1991) Patterns of sheltering and housing in American disasters. Preliminary Paper
#170, Disaster Research Center, University of Delaware, Newark, DE
Savadore L, Bucholz MT (1993) Great storms of the Jersey Shore. Down The Shore
Publishing, Harvey Cedars, NJ
HERO_Meta-protocol
15
Susman, P., P. O’Keefe and B. Wisner. 1983. “Global Disasters, a radical
interpretation”. In K. Hewitt, ed. Interpretation of Calamity pp. 263-283. Boston:
Allen & Unwin.
Tobin, G. and B. Montz. 1997. Natural Hazards: Explanation and Integration. New
York: Guilford Press.
Torry, W. 1979. “Hazards, hazes, and holes: a critique of the Environment as Hazard
and general reflections on disaster research”. Canadian Geographers 23:368-383.
The H. John Heinz III Center for Science, Economics and the Environment (2000) The
hidden costs of coastal hazards: implications for risk assessment and mitigation.
Island Press, Washington, DC and Covelo, CA.
Wilhite, D. and W. Easterling eds. 1987. Planning for Drought: Towards a Reduction of
Societal Vulnerability. Boulder CO: Westview Press.
Yanal, B. 1994. “Socioeconomic restructuring and vulnerability to environmental
hazards in Bulgaria”. Disasters 8:95-106.
Download