All articles for the topic: Cyberwarfare

Cameroon TNS Baseline- Temporal Reference

The time period considered for the current vulnerability analysis covers at least three decades. In several occasions, local perceptions were captured during focus group discussions or through...

Read more
4f8d7a9a669a3photo-report - climate adaptation.

Vulnerability indicators at the urban level

Vulnerability indicators are a valuable tool to identify vulnerable spots, guide the allocation of adaptation funding, communicate and raise awareness, and monitor the effectiveness of policies.

Read more

Tools and Methods for vulnerability

It is important to distinguish between tools aimed at climate impact assessments, for example crop models or water planning models, and methods designed specifically to collect local level...

Read more

Share VA info

If/when you and your colleagues have conducted a vulnerability assessment in the area(s) you are working, it would be great to share it with other weADAPT users, so that we can learn from and...

Read more

Vulnerability assessment

This module explores first a series of frameworks used to assess vulnerability, showing how the definition and interpretation of vulnerability has evolved over time. It also introduces the steps...

Read more

ADx Tool Compendium

This page lists a selection of tools documented in earlier projects and meetings, which are highly related to the concepts of climate change adaptation.

Expert meetings on Tools

The...

Read more

Appendix A: Developing a livelihood-sensitivity matrix

This page shows how to develop a livelihood sensitivity matrix that can be used in several ways:

- To synthesize existing knowledge on climate vulnerability in a fairly rapid participatory...

Read more

Short course training: Vulnerability-exposure exercise

The Exercise

For this session participants of stream 1 and 2 were distributed into groups. Each group focused on a case study. The following countries were selected for the case studies:

...
Read more

Short course training: Plenary discussion of vulnerability frameworks

Go to Vulnerability Frameworks to learn about the objectives and steps of this exercise, as well as the key issues that came out when we assessed each framework in the plenary discussion.

...

Read more

Short course training: Introduction to the Climate Change Explorer

Note: The Climate Change Explorer has now been superceded by the CSAG Climate Information Portal (CIP). The principles are the same and CIP builds on extensive user feedback from use of the...

Read more

Short course training: Exploring decision-making analysis methods

In this session, we move from identifying baseline, current vulnerability, to combining this with options for adaptation, in a scenario-based context. That is, introducing a variety of plausible...

Read more

Multiple pathways

There have been many different experiences of NeWater Project partners in uncovering answers to our research questions. Depending on the goal, the context and the target audience there are...

Read more
4f310207362b2250px-lesotho-landscape-1 - climate adaptation.

Dynamic vulnerability

Lesotho landscape (photo: Sukaina Bharwani)

Vulnerability is a complex and by definition it encompasses many attributes or multiple stresses (social, economic,...

Read more

ACCCA/ENDA Communities Tigray Project

Committee meeting in Kihen Tabia

Project Description

This ACCCA project brings together poor communities in drought-hit regions of northern Ethiopia with technical...

Read more
Subscribe to RSS - Cyberwarfare