Chapter3-p2-1 - Chapter 3 Risk and Vulnerability Part 2 R =...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 3 Risk and Vulnerability Part 2 R = H V R = H Topics 1. Risk Evaluation 2. Risk Acceptability 3. Risk Perception 4. Vulnerability 5. Conclusion Risk Management Process ISO, 3100 Risk Evaluation Conducted to determine the relative seriousness of hazard risks By the time risk evaluation begins, hazards will have been identified, described, mapped, and analyzed Communities are rarely able to mitigate all risks Not all risks require immediate / any action Some risks can be reduced easily, others may require huge cash resources, time, and a committed effort to achieve even slight reductions Other factors: Risk acceptability, risk perception, risk benefits Why Evaluate Risk? Identify which risks require referral to other agencies Identify which risks require treatment by the disaster managers Further evaluate risks using judgment based upon available data and anecdotal evidence, to further determine the accuracy of the final risk value recorded. Examples of Risk Evaluation Methods Creating a risk matrix Comparing hazard risks against levels of risk estimated during the analysis process with previously established risk evaluation criteria Evaluating risks according to the SMAUG methodology Risk Matrix: example SMAUG Methodology S eriousness M anageability A cceptability U rgency G rowth Risk Acceptability Influence Personal (dread factor/ voluntary or involuntary) Political / Social Economic Criticisms: Money influences the acceptability of risk Valuing life is not ethical An undemocratic process Risk Acceptability Influence Decisions About Risks / Risk...
View Full Document

This note was uploaded on 03/15/2012 for the course ADMS 2700 taught by Professor Aliasg during the Fall '12 term at York University.

Page1 / 24

Chapter3-p2-1 - Chapter 3 Risk and Vulnerability Part 2 R =...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online