Remove 2013 Remove Hazard Remove Vulnerability
article thumbnail

Resilience is an illusion

Emergency Planning

Previously (Alexander 2013), I thought that Holling was wrong about resilience. Secondly, and more importantly, vulnerability, risk, impact and their controlling factors are all trending. I recommend going back to vulnerability and endeavouring to identify, understand and reduce it. What can we do instead? Holling, C.S

article thumbnail

Foresight

Emergency Planning

The cascade is a result of the progression of a shock through different kinds of vulnerability. It is obvious that military instability is likely to complicate and retard the process of getting natural hazard impacts under control. There has recently been a surge of research interest in disaster and conflict (ref).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

An example of this for the 2013 GAR can be found in Di Mauro (2014). Unofficial voices have suggested that the 'cure to damage ratio' for natural hazards is 1:43. Global probabilistic assessment of risk from natural hazards for the Global Assessment Report 2013 (GAR13). The GAR notes that "we all live in communities".

article thumbnail

Towards a Taxonomy of Disasters

Emergency Planning

The study of disasters is a 'lateral discipline' that, to varying degrees embraces at least 42 other disciplines and professions (Alexander 2013). Warming has already begun to have a substantial effect on the magnitude and frequency of meteorological hazards. Disaster is fundamentally a social phenomenon. Alexander, D. Alexander, D.E.

article thumbnail

The hidden costs of shadow IT: How unsanctioned tech impacts your budget

Online Computers

In 2013, thieves stole two laptops from Horizon Blue Cross Blue Shield of New Jersey (Horizon BCBSNJ), the state’s largest healthcare provider. Using unauthorized laptops illustrates the hazards of shadow IT within a company. This data breach led to Horizon BCBSNJ paying $1.1

article thumbnail

Top Risk Analysis Tools

Reciprocity

1, Guide for Conducting Risk Assessments ; International Standardization Organization’s (ISO) ISO/IEC 27001:2013, Information Security Management ; And to supplement this framework, ISO also created ISO/IEC 27005:2018, Information Technology – Security Techniques – Information Security Risk Management.

article thumbnail

Using Budget Principles to Prepare for Future Pandemics and Other Disasters

National Center for Disaster Prepardness

At the same time, we see widening inequalities in who has access to recovery resources, and disparities in vulnerability that are too often predictable by socioeconomic status, race and ethnicity. In an era of threats and vulnerabilities that are increasing in complexity we need to simplify the process.