Vulnerability assessment

A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.

Vulnerability assessment has many things in common with risk assessment. Assessments are typically performed according to the following steps:

  1. Cataloging assets and capabilities (resources) in a system.
  2. Assigning quantifiable value (or at least rank order) and importance to those resources
  3. Identifying the vulnerabilities or potential threats to each resource
  4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

"Classical risk analysis is principally concerned with investigating the risks surrounding a plant (or some other object), its design and operations. Such analysis tend to focus on causes and the direct consequences for the studied object. Vulnerability analysis, on the other hand, focus both on consequences for the object itself and on primary and secondary consequences for the surrounding environment. It also concerns itself with the possibilities of reducing such consequences and of improving the capacity to manage future incidents." (Lövkvist-Andersen, et al., 2004) In general, a vulnerability analysis serves to "categorize key assets and drive the risk management process." (United States Department of Energy, 2002)1

In the United States, guides providing valuable considerations and templates for completing a vulnerability assessment are available from numerous agencies including the Department of Energy, the Environmental Protection Agency, and the United States Department of Transportation, just to name a few.

Several academic research papers including Turner et al. (2003),[1] Ford and Smith (2004),[2] Adger (2006),[3] Fraser (2007)[4] and Patt et al. (2010)[5] amongst others, have provided a detail review of the diverse epistemologies and methodologies in vulnerability research. Turner et al. (2003)[1] for example proposed a framework that illustrates the complexity and interactions involved in vulnerability analysis, draws attention to the array of factors and linkages that potentially affects the vulnerability of a couple of human–environment systems. The framework makes use of nested flowcharts to show how social and environmental forces interact to create situations vulnerable to sudden changes. Ford and Smith (2004), propose an analytical framework, based on research with Canadian arctic communities. They suggest that, the first stage is to assess current vulnerability by documenting exposures and current adaptive strategies. This should be followed by a second stage that estimates directional changes in those current risk factors and characterizes the community’s future adaptive capacity. Ford and Smith’s (2004) framework utilizes historic information including how communities have experienced and addressed climatic hazards, with information on what conditions are likely to change, and what constraints and opportunities there are for future adaptation.

Vulnerabilities versus risks in project management

In project management, vulnerabilities are weak areas within the organization, and these weak areas can be dealt with once they are identified: they can be reduced, controlled or eliminated (e.g., sub-performing machinery). They contrast sharply with risks: risks are threats that come from outside the organization (e.g., exchange rate when doing business internationally); the latter has little control over them.

Vulnerabilities and risks go hand in hand: an organization may have a lot of vulnerabilities (e.g., in its production processes) yet experience little risks from the environment in which it operates (e.g., little competition), or else it may have few vulnerabilities but face a very challenging environment full of, for example, politico-legal upheavals. Organizations are only vulnerable if they face risks, and risks become significant only if the organization feels vulnerable towards them. Generally speaking, organizations trade off between operating in risky environments and the level of vulnerabilities they accept to bear. In project management, points of vulnerabilities (POVs) impede most particularly on the calendar of tasks and activities, the costs and the norms of quality (the triple constraints). Risks (unlike POVs) refer to the eight areas of activity: (Plan) financial and organizational;(Processes) environmental and technological; (People) marketing and sociocultural; and (Power) legal and political[6].

See also

References

  1. Álvarez-Miranda, E., Candia-Véjar, A., Carrizosa, E., & Pérez-Galarce, F. (2014). Vulnerability Assessment of Spatial Networks: Models and Solutions. In Combinatorial Optimization (pp. 433–444). Springer International Publishing. DOI:10.1007/978-3-319-09174-7_37
  2. Handbook of International Electrical Safety Practices
  3. US Department of Energy. (2002). Vulnerability Assessment Methodology, Electric Power Infrastructure.
  1. 1 2 Turner, B. L.; Kasperson, R. E.; Matson, P. A.; McCarthy, J. J.; Corell, R. W.; Christensen, L.; Eckley, N.; Kasperson, J. X.; Luers, A.; Martello, M. L.; Polsky, C.; Pulsipher, A.; Schiller, A. (5 June 2003). "Science and Technology for Sustainable Development Special Feature: A framework for vulnerability analysis in sustainability science". Proceedings of the National Academy of Sciences. 100 (14): 8074–8079. doi:10.1073/pnas.1231335100.
  2. Ford, James D.; Barry Smit (Dec 2004). "A Framework for Assessing the Vulnerability of Communities in the Canadian Arctic to Risks Associated with Climate Change". Arctic. 57 (4): 389–400. JSTOR 40512642. doi:10.14430/arctic516.
  3. Adger, W. Neil (August 2006). "Vulnerability". Global Environmental Change. 16 (3): 268–281. doi:10.1016/j.gloenvcha.2006.02.006.
  4. Fraser, Evan D. G. (August 2008). "Travelling in antique lands: using past famines to develop an adaptability/resilience framework to identify food systems vulnerable to climate change". Climatic Change. 83 (4): 495–514. doi:10.1007/s10584-007-9240-9.
  5. Patt, Anthony; Dagmar Schröter; Richard Klein; Anne Cristina de la Vega-Leinert (2010). Assessing vulnerability to global environmental change : making research useful for adaptation decision making and policy (1st paperback ed.). London: Earthscan. ISBN 9781849711548.
  6. Mesly, Olivier (2017). Project feasibility – Tools for uncovering points of vulnerability. New York, NY:Taylor and Francis, CRC Press, 546 pages, ISBN 9 781498 757911.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.