2011
DOI: 10.1016/j.ocecoaman.2010.12.008
|View full text |Cite
|
Sign up to set email alerts
|

Assessment and management of coastal multi-hazard vulnerability along the Cuddalore–Villupuram, east coast of India using geospatial techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 144 publications
(59 citation statements)
references
References 18 publications
0
48
0
2
Order By: Relevance
“…Most vulnerability methodologies make use of a combination of theory-driven, data-driven, and normative approaches. Theory-driven approaches, also known as deductive approaches, are based on existing scientific knowledge in the form of conceptual frameworks, theories or models about the system considered to identify relevant variables, and determine their relationships, and generate a list of components (Moss et al, 2001, Schröter, 2004a, Adger & Vincent, 2005, Yohe et al, 2006b, Mahendra et al, 2011. Data-driven approaches, or inductive approaches, select vulnerability variables based on their statistical relationship with observed vulnerability outcomes (e.g., mortality due to natural hazards) (Briguglio, 1995, Peduzzi et al, 2002, Brooks et al, 2005, Dilley et al, 2005, Eriksen & Kelly, 2007, Tol & Yohe, 2007.…”
Section: Different Approaches To Vulnerability Indexationmentioning
confidence: 99%
“…Most vulnerability methodologies make use of a combination of theory-driven, data-driven, and normative approaches. Theory-driven approaches, also known as deductive approaches, are based on existing scientific knowledge in the form of conceptual frameworks, theories or models about the system considered to identify relevant variables, and determine their relationships, and generate a list of components (Moss et al, 2001, Schröter, 2004a, Adger & Vincent, 2005, Yohe et al, 2006b, Mahendra et al, 2011. Data-driven approaches, or inductive approaches, select vulnerability variables based on their statistical relationship with observed vulnerability outcomes (e.g., mortality due to natural hazards) (Briguglio, 1995, Peduzzi et al, 2002, Brooks et al, 2005, Dilley et al, 2005, Eriksen & Kelly, 2007, Tol & Yohe, 2007.…”
Section: Different Approaches To Vulnerability Indexationmentioning
confidence: 99%
“…A preliminary review of coastal hazard assessment methods was carried out (De Pippo et al, 2008;Mahendra, Mohanty, Bisoyi, Srinivasa Kumar, & Nayak, 2011;Nunes et al, 2009;Pendleton, Thieler, & Jeffress, 2005). Given the intended audience of this study, hazard levels were assessed using the methodology of the Regional Coastal Plan (Regione Puglia, 2007), with improvements made in order to reflect the characteristics of the study area.…”
Section: Methodsmentioning
confidence: 99%
“…Rather than using the entire, huge amount data, it is more effective to conduct analysis by selecting data that conform to the purpose of the study, and IT is essential in dealing with environmental data that are increasing in such a way [33]. In addition, effective analysis of natural/environmental Big Data related to sea level rise, coastal erosion, floods, etc., is also very useful in disaster prevention [2,34,35]. Not only is IT effectively used in the analysis of such environmental data, but it is also closely associated with Geographic Information Systems, which are used for the comprehensive analysis of each region's land use, geological constraints, generation quantities, access roads, existing electrical grids, etc., which are used for selecting the optimum location of renewable energy generation facilities [36].…”
Section: Classification Of Big Data For the Effective Utilization Of mentioning
confidence: 99%