Professional Documents
Culture Documents
Vulnerabilities Information Technology Energy Supply Water Supply Transportation Communication Disaster Management
Vulnerabilities Information Technology Energy Supply Water Supply Transportation Communication Disaster Management
istheprocessofidentifying,quantifying,andprioritizing(orranking)thevulnerabilitiesinasystem.
Examplesofsystemsforwhichvulnerabilityassessmentsareperformedinclude,butarenotlimitedto,
informationtechnologysystems,energysupplysystems,watersupplysystems,transportationsystems,
andcommunicationsystems.Suchassessmentsmaybeconductedonbehalfofarangeofdifferent
organizations,fromsmallbusinessesuptolargeregionalinfrastructures.Vulnerabilityfromthe
perspectiveofdisastermanagementmeansassessingthethreatsfrompotentialhazardstothe
populationandtoinfrastructure.Itmaybeconductedinthepolitical,social,economicor
environmentalfields.
Vulnerabilityassessmenthasmanythingsincommonwithriskassessment.Assessmentsaretypically
performedaccordingtothefollowingsteps:
1.
Catalogingassetsandcapabilities(resources)inasystem.
2.
Assigningquantifiablevalue(oratleastrankorder)andimportancetothoseresources
3.
Identifyingthevulnerabilitiesorpotentialthreatstoeachresource
4.
Mitigatingoreliminatingthemostseriousvulnerabilitiesforthemostvaluableresources
"Classicalriskanalysisisprincipallyconcernedwithinvestigatingtheriskssurroundingaplant(or
someotherobject),itsdesignandoperations.Suchanalysistendtofocusoncausesandthedirect
consequencesforthestudiedobject.Vulnerabilityanalysis,ontheotherhand,focusbothon
consequencesfortheobjectitselfandonprimaryandsecondaryconsequencesforthesurrounding
environment.Italsoconcernsitselfwiththepossibilitiesofreducingsuchconsequencesandof
improvingthecapacitytomanagefutureincidents."(LvkvistAndersen,etal.,2004)Ingeneral,a
vulnerabilityanalysisservesto"categorizekeyassetsanddrivetheriskmanagementprocess."(United
StatesDepartmentofEnergy,2002)1
IntheUnitedStates,guidesprovidingvaluableconsiderationsandtemplatesforcompletinga
vulnerabilityassessmentareavailablefromnumerousagenciesincludingtheDepartmentofEnergy,
theEnvironmentalProtectionAgency,andtheUnitedStatesDepartmentofTransportation,justto
nameafew.
SeveralacademicresearchpapersincludingTurneretal.(2003),[1]FordandSmith(2004),[2]Adger
(2006),[3]Fraser(2007)[4]andPattetal.(2010)[5]amongstothers,haveprovidedadetailreviewofthe
diverseepistemologiesandmethodologiesinvulnerabilityresearch.Turneretal.(2003) [1]forexample
proposedaframeworkthatillustratesthecomplexityandinteractionsinvolvedinvulnerability
analysis,drawsattentiontothearrayoffactorsandlinkagesthatpotentiallyaffectsthevulnerabilityof
acoupleofhumanenvironmentsystems.Theframeworkmakesuseofnestedflowchartstoshowhow
socialandenvironmentalforcesinteracttocreatesituationsvulnerabletosuddenchanges.Fordand
Smith(2004),proposeananalyticalframework,basedonresearchwithCanadianarcticcommunities.
Theysuggestthat,thefirststageistoassesscurrentvulnerabilitybydocumentingexposuresand
currentadaptivestrategies.Thisshouldbefollowedbyasecondstagethatestimatesdirectional
changesinthosecurrentriskfactorsandcharacterizesthecommunitysfutureadaptivecapacity.Ford
andSmiths(2004)frameworkutilizeshistoricinformationincludinghowcommunitieshave
experiencedandaddressedclimatichazards,withinformationonwhatconditionsarelikelytochange,
andwhatconstraintsandopportunitiesthereareforfutureadaptation.