All articles for the topic: Computer security

54f5f405d190escreen-shot-2015-03-03-at-17 - climate adaptation.

Assessing current social vulnerability to climate change

Executive summary

This paper describes a participatory methodology used to assess the current vulnerability of local communities in the Congo Basin. Vulnerability has been studied...

Read more
5387164c142e4istock-000019847055large-365x365 - climate adaptation.

Integrating climate change concerns into disaster management planning: The case of Gorakhpur, India

Image courtesy iStock © Gawrav Sinha

Summary of Adaptation Challenge

Gorakhpur District is recognised as one of the most flood-prone districts in Eastern Uttar...

Read more
52cd66cba70d9970-971 - climate adaptation.

Vulnerability assessment of livelihoods in Lower Mekong Basin

Adaptation challenge In Vietnam’s Mekong Delta, key plans, policies and regulations for flood management are ambiguous and often not directly applicable to the local context especially to...
Read more
5076c43e3e213india - climate adaptation.

Strategies into Policies at District level in India

Summary

This project aimed to develop and validate risk communication products to improve the understanding of all concerned stakeholders on scientific, social and policy issues...

Read more

Cameroon TNS Baseline- Temporal Reference

The time period considered for the current vulnerability analysis covers at least three decades. In several occasions, local perceptions were captured during focus group discussions or through...

Read more
4f8d7a9a669a3photo-report - climate adaptation.

Vulnerability indicators at the urban level

Vulnerability indicators are a valuable tool to identify vulnerable spots, guide the allocation of adaptation funding, communicate and raise awareness, and monitor the effectiveness of policies.

Read more

Tools and Methods for vulnerability

It is important to distinguish between tools aimed at climate impact assessments, for example crop models or water planning models, and methods designed specifically to collect local level...

Read more
4f7c7258f30393colores - climate adaptation.

Delivering Adaptation

Image: http://www.cco.gov.co/mizc3.htm

This experience is an innovative effort on the comprehension of the potential benefits of a risk management approach in the...

Read more
Workshop Mali

Guidance for assessing vulnerability

Guidance for assessing vulnerability​ and links to examples

Read more

Colombia Vulnerability Assessment 2

Natural Susceptibility of San Andres de Tumaco

Mangrove ecosystems in Tumaco face major pressures that make them susceptible, diminishing their capacity to adapt to potential impacts caused by...

Read more

VA adaptation planning

The process of vulnerability assessment provides you with an understanding of key areas which are particularly sensitive to climate change and need to be addressed. The next question is how to...
Read more

Share VA info

If/when you and your colleagues have conducted a vulnerability assessment in the area(s) you are working, it would be great to share it with other weADAPT users, so that we can learn from and...

Read more

Vulnerability assessment

This module explores first a series of frameworks used to assess vulnerability, showing how the definition and interpretation of vulnerability has evolved over time. It also introduces the steps...

Read more

ADx Tool Compendium

This page lists a selection of tools documented in earlier projects and meetings, which are highly related to the concepts of climate change adaptation.

Expert meetings on Tools

The...

Read more
4f310207362b2250px-lesotho-landscape-1 - climate adaptation.

Dynamic vulnerability

Lesotho landscape (photo: Sukaina Bharwani)

Vulnerability is a complex and by definition it encompasses many attributes or multiple stresses (social, economic,...

Read more

Appendix A: Developing a livelihood-sensitivity matrix

This page shows how to develop a livelihood sensitivity matrix that can be used in several ways:

- To synthesize existing knowledge on climate vulnerability in a fairly rapid participatory...

Read more

Short course training: Vulnerability-exposure exercise

The Exercise

For this session participants of stream 1 and 2 were distributed into groups. Each group focused on a case study. The following countries were selected for the case studies:

...
Read more

Short course training: Plenary discussion of vulnerability frameworks

Go to Vulnerability Frameworks to learn about the objectives and steps of this exercise, as well as the key issues that came out when we assessed each framework in the plenary discussion.

...

Read more

Short course training: Introduction to the Climate Change Explorer

Note: The Climate Change Explorer has now been superceded by the CSAG Climate Information Portal (CIP). The principles are the same and CIP builds on extensive user feedback from use of the...

Read more

Short course training: Exploring decision-making analysis methods

In this session, we move from identifying baseline, current vulnerability, to combining this with options for adaptation, in a scenario-based context. That is, introducing a variety of plausible...

Read more

Multiple pathways

There have been many different experiences of NeWater Project partners in uncovering answers to our research questions. Depending on the goal, the context and the target audience there are...

Read more
colombia ncap - climate adaptation.

Methodology of Colombia NCAP Project

This article describes the methodological framework used in the Colombia NCAP project. 

Read more

ACCCA/ENDA Communities Tigray Project

Committee meeting in Kihen Tabia

Project Description

This ACCCA project brings together poor communities in drought-hit regions of northern Ethiopia with technical...

Read more
Subscribe to RSS - Computer security