Screen 1 of 20 Vulnerability Vulnerability Assessment LEARNING OBJECTIVES Define the purpose and scope of vulnerability assessment. Understand how vulnerability.

Slides:



Advertisements
Similar presentations
Discourses and Framings of Climate Change: What Literatures Do We Need to Review? To realize synergies there is a need to indentify common objectives for.
Advertisements

ENTITIES FOR A UN SYSTEM EVALUATION FRAMEWORK 17th MEETING OF SENIOR FELLOWSHIP OFFICERS OF THE UNITED NATIONS SYSTEM AND HOST COUNTRY AGENCIES BY DAVIDE.
1 Africa Regional Consultations Summary & Recommendations 17 October 2003 By. H. Rukato Second International Conference on Early Warning, Bonn, Germany.
Implementing NICE guidance
ASSESSMENT & PLANNING FOR POST-DISASTER RECOVERY OF COMMUNITY INFRASTRUCTURE United Nations Development Programme Bureau for Crisis Prevention & Recovery.
Lucila Beato UNMIL/HRPS
THE NEW FOOD SECURITY ASSESSMENT TOOLS Central Asia Regional Risk Assessment Conference Almaty April 2011.
A hazard in itself is not a disaster.. It has the potential to become one when it happens to populations who have certain vulnerabilities and insufficient.
Screen 1 of 43 Reporting Food Security Information Reporting Formats for Food Security Report Types Learning Objectives At the end of this lesson you will.
Title: Gender and Age related impact of Disability on Household Economic Vulnerability: analysis from the REVEAL study in Myanmar Introduction and Method:
1.2. Food Security Fundamentals
Screen 1 of 24 Reporting Food Security Information Understanding the User’s Information Needs At the end of this lesson you will be able to: define the.
Community-based Disaster Management
UN Roundtable on Older Persons in the 2004 Tsunami February 13-14, 2006 Recommendations.
Health Aspect of Disaster Risk Assessment Dr AA Abubakar Department of Community Medicine Ahmadu Bello University Zaria Nigeria.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Session 6Slide 6-1 Risk Management Lessons from Outside the United States Session 6 Slide Deck.
At the end of this module, participants should have a better understanding of the following : Elements of Gender Mainstreaming Basics of Gender Analysis.
Vulnerability and Adaptation Assessments Hands-On Training Workshop
SPECA Regional Workshop on Disability Statistics: Dec 13-15, 2006 Purposes of Disability Statistics Jennifer Madans and Barbara Altman National Center.
Piloting the Household Vulnerability Index to Improve Targeting in WVI programmes in Lesotho, Swaziland and Zimbabwe Tendayi Kureya
Advanced EFSA Learning Programme Session 1.2. WFP Conceptual Framework: Food and Nutrition Security.
What is Business Analysis Planning & Monitoring?
Screen 1 of 28 Baseline Food Security Assessments Selecting a Baseline Assessment Method LEARNING OBJECTIVES At the end of the lesson, you will be able.
Key Elements of Legislation For Disaster Risk Reduction Second Meeting of Asian Advisory Group of Parliamentarians for DRR 5-7 February, 2014, Vientiane,
Traditional Knowledge Basic system of Local decisions Specific and not universal Transmitted orally or by observation, Rather tacit knowledge, Knowledge.
Hazards Risk Management Course Revision Project Update George Haddow June 2012.
UNDP-GEF Adaptation 0 0 Impact of National Communications on Process of Integrating Climate Change into National Development Policies UNFCCC Workshop on.
SESSION 1: SETTING PRIORITIES – SITUATION ANALYSIS.
1 Mid-Term Review of the Hyogo Framework for Action Roadmap to Disaster Risk Reduction in the Americas & HFA Mid-Term Review.
Module 2 Stakeholder analysis. What’s in Module 2  Why do stakeholder analysis ?  Identifying the stakeholders  Assessing stakeholders importance and.
MIFIRA Framework Lecture 3 Other response analysis tools Chris Barrett and Erin Lentz February 2012.
Screen 1 of 26 Markets Assessment and Analysis Markets and Food Security LEARNING OBJECTIVES Identify the components of a typical market assessment for.
Disaster Risk Management and Examples of Early Warning Projects at the The Inter-American Development Bank.
Screen 1 of 26 Baseline Food Security Assessments Introduction to Baseline and Action-oriented Assessments LEARNING OBJECTIVES At the end of this lesson.
UNDP Handbook for conducting technology needs assessments and Preliminary analysis of countries’ TNAs UNFCCC Seminar on the development and transfer on.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
PPA 502 – Program Evaluation Lecture 2c – Process Evaluation.
Response Analysis MBRRR Training Session 2.1. Response Analysis: Overview Setting the scene Defining response analysis Why response choice matters Situating.
Screen 1 of 29 Unit: Food Security Information Systems and Networks Lesson 3: Improving Food Security Information Systems LEARNING OBJECTIVES At the end.
Advanced EFSA Learning Programme Session 3.3. Situation Analysis Step 4 Analysis of Coping Strategies 1.
Approach to GEF IW SCS Impact Evaluation Aaron Zazueta Reference Group Meeting Bangkok, Thailand September 27, 2010.
Screen 1 of 22 Food Security Policies – Formulation and Implementation Policy Monitoring and Evaluation LEARNING OBJECTIVES Define the purpose of a monitoring.
Scenario building workshop Dec Objectives of the workshop: Impact Intervention  Introduce different scenario building concepts and tools  Develop.
SANREM TOP Framework GECAFS Interpretation. SEE Conditions (Social, Economic, Environmental) Assessed Practices Changed KASAC (Knowledge, Attitudes, Skills,
Screen 1 of 20 Unit: Food Security Information Systems and Networks Food Security Information Systems At the end of this lesson you will be able to: understand.
Concern Worldwide’s Approach to Disaster Risk Reduction.
PAT Market Information for Food Security Analysis Session 1.3 WFP Markets Learning Programme Price Analysis Training.
The AIACC Project Assessments of Impacts and Adaptations to Climate Change Neil Leary, AIACC Science Director AIACC Regional Workshop for Latin America.
Advanced EFSA Learning Programme Session 4.3. Forecast Analysis & Scenario Development.
Social Analysis Workshop on Country Analytical Work June 19, 2001 Anis Ahmad Dani World Bank, Social Development Department.
Integrating Disaster Risk Reduction into Humanitarian Programmes Lessons learnt and recommendations following the FRIEND Program.
TST Market Information for Food Security Analysis Session 1.3 WFP Markets Learning Programme Trader Survey Training V2.
Logical Framework Approach 1. Approaches to Activity Design Logical Framework Approach (LFA) – Originally developed in the 1970s, this planning process.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
ACCRA Who we are, what we do and where we work. Why should you be interested? How can you contribute?
Screen 1 of 22 Food Security Policies – Formulation and Implementation Establishment of a Food Security Policy Framework LEARNING OBJECTIVES Explain the.
Evaluation What is evaluation?
ITC-ILO/ACTRAV Course A Trade Union Training on Occupational Safety, Health & HIV/AIDS (26/11 – 07/12/2012, Turin) Introduction to National Occupational.
Aid Effectiveness Project Syrian Refugees Jordan.
Support to Strengthening Devolved Structures’ Capacity for Emergency Preparedness and Response (EPR) 12 th October 2016 The 4 th National Symposium on.
Traditional Knowledge
Hazards Planning and Risk Management Risk Analysis and Assessment
Session Situation Analysis Step 5 Chronic & Transitory Food Insecurity
Gender mainstreaming in environmental
What is PACE EH? PACE EH is a process for assessing and analyzing the environmental health of communities and for creating plans to address threats and.
Session 1.3. Types of EFSA in the Region
Session 2.1. Overview: 6 Steps of EFSA Situation Analysis
Efsa Session 1.1. Workshop for Advanced Assessors in Emergency Food Security Assessment.
Civil Society Facility and Media Programme Call for proposals: EuropeAid/162473/DH/ACT/Multi Webinar no. 3: Preparing effective Concept Note.
Presentation transcript:

Screen 1 of 20 Vulnerability Vulnerability Assessment LEARNING OBJECTIVES Define the purpose and scope of vulnerability assessment. Understand how vulnerability assessment relates to early warning monitoring activities, food security response planning and national policy and programme development. Identify the criteria to select among the tools available for conducting vulnerability assessments.

Screen 2 of 20 Vulnerability Vulnerability Assessment INTRODUCTION how the concept of vulnerability is applied in practice to conducting Vulnerability Assessments (VA); and how the assessment results can be useful in decision making. This presentation explains:

Screen 3 of 20 Vulnerability Vulnerability Assessment INTRODUCTION VA -> emphasis on the constantly changing conditions faced by households. Vulnerability analysis is not a single or standard measurement system. It brings together different data sets to investigate causes of food insecurity and predict changes over time.

Screen 4 of 20 Vulnerability Vulnerability Assessment From analysis to action THE VULNERABILITY FRAMEWORK VA methods share a common conceptual framework. Vulnerability analysis Situational Analysis Assessment of risks/hazards Assessment of Risk to food insecurity

Screen 5 of 20 Vulnerability Vulnerability Assessment THE VULNERABILITY FRAMEWORK There is no single way to undertake a vulnerability assessment. Many different methodologies have been applied to the task.

Screen 6 of 20 Vulnerability Vulnerability Assessment Administrative zone LEVELS OF ASSESSMENT Vulnerability Assessment can be conducted at multiple levels: Community Household Individual Within a livelihood zone National or global level

Screen 7 of 20 Vulnerability Vulnerability Assessment LEVELS OF ASSESSMENT There is also a considerable amount of interaction between the different methods. The methods used for data collection and analysis will be adapted according to the level of assessment used.

Screen 8 of 20 Vulnerability Vulnerability Assessment VULNERABLE GROUPS A common feature of many vulnerability assessments is the identification of vulnerable groups. Groups of people with shared characteristics: of demographic nature; location specific; or occupation specific  Who and how many people are vulnerable.  Where they are.  Why they are vulnerable. Such vulnerability profiles indicate:

Screen 9 of 20 Vulnerability Vulnerability Assessment VULNERABLE GROUPS Understanding these variations plays a key role in identifying interventions and targeting those that are most vulnerable and excluding the less vulnerable. The nature and extent of vulnerability varies amongst social groups.

Screen 10 of 20 Vulnerability Vulnerability Assessment VULNERABLE GROUPS We have found that not all members of the defined vulnerable group are equally vulnerable. Some women-headed households have far greater assets than the poorer male-headed households... The criteria used to determine inclusion in our programmes excludes many of the newly vulnerable. For example the farm workers who have lost their jobs do not qualify for assistance.

Screen 11 of 20 Vulnerability Vulnerability Assessment USES OF VULNERABILITY ASSESSMENT The main situations where vulnerability assessment can be usefully applied are: Early Warning System (EWS) Emergency Programming Risk & vulnerability reduction 

Screen 12 of 20 Vulnerability Vulnerability Assessment USES OF VULNERABILITY ASSESSMENT Primary purpose of an EWS -> to monitor the incidence of shocks in order to give timely warning to decisions makers. Early Warning System Establishing an EWS to monitor the incidence of the large number of shocks that could negatively affect FS would be expensive. A risk and vulnerability assessment can provide an estimation of the most important shocks and hazards for a location or population group. This information will help an EWS manager to prioritize which hazards and shocks to monitor in a specific area.

Screen 13 of 20 Vulnerability Vulnerability Assessment In the context of emergency programming, VA is closely related to strengthening ex-post coping mechanisms. A VA can provide the context to predict the impact of shocks and hazards, and forecast the probable FS impacts. In this case the emphasis is on predicting the FS outcome. USES OF VULNERABILITY ASSESSMENT Emergency Programming  It helps to prepare an emergency response to a specific shock.

Screen 14 of 20 Vulnerability Vulnerability Assessment This analysis can be used to formulate, fine tune or review either programme or project level activities or strategies and policies. It primarily supports recommendations for medium and longer- term interventions to strengthen ex-ante risk management, in both development and emergency programming. In this context the emphasis is on analysing the causal factors underlying vulnerability to food insecurity. The focus is on present livelihood characteristics, risks and interventions. USES OF VULNERABILITY ASSESSMENT Risk & vulnerability reduction It guides the design of interventions to reduce people’s long-term vulnerability.

Screen 15 of 20 Vulnerability Vulnerability Assessment RISK MANAGEMENT TERMS Risk management terms: Prevention Mitigation Coping

Screen 16 of 20 Vulnerability Vulnerability Assessment There is no such thing as a standard “vulnerability assessment methodology”. A multiplicity of purposes for VA has resulted in a multiplicity of VA methods. SELECTING THE RIGHT METHOD Within vulnerability assessment there is an enormous diversity of objectives and analytical approaches. VA is not a single method VA is not is not necessarily a distinct analytical process

Screen 17 of 20 Vulnerability Vulnerability Assessment SELECTING THE RIGHT METHOD In conducting a VA, the starting point should be clarity on the purpose or objective, of the analysis. From this it is possible to identify a typology of approaches to VA and the methods that can be used. EARLY WARNING SYSTEM  EMERGENCY PROGRAMMING RISK & VULNERABILITY REDUCTION

Screen 18 of 20 Vulnerability Vulnerability Assessment SELECTING THE RIGHT METHOD Ultimately the choice of vulnerability assessment method will depend on a variety of institutional and technical considerations. Technical issuesInstitutional issues Institutions participating in and responsible for the assessment. Their organizational mandate and response capacity. Decisions to be taken as a consequence of the assessment Data and information available. financial resources available. skills possessed by the analysts.

Screen 19 of 20 Vulnerability Vulnerability Assessment Within the USAID FEWS Project, VA was initially used to help place its famine early warning indicators in their proper socioeconomic context, as a means to improve the interpretation of those indicators. However, the purpose of VA has evolved from: Case study: How methods are adapted to institutional needs developing a more informed basis for predicting severe episodes of food insecurity; to targeting the most food insecure and vulnerable populations and monitoring their situation over time. Methods were explicitly chosen/developed to answer these questions. SELECTING THE RIGHT METHOD

Screen 20 of 20 Vulnerability Vulnerability Assessment SUMMARY Vulnerability Assessment can be used to describe an analysis of different parts of the overall problem of why people may become food insecure in the future. Vulnerability analysis starts by assessing the current level of food security, and then incorporates the elements of risk and risk management into an analysis that is more forward-looking and dynamic. The main applications of vulnerability analysis are to: provide a context for early warning; improve emergency response planning; and lead to long-term reductions vulnerability and food insecurity through development interventions. There is no one analysis approach or method, and the selection of an appropriate technique will depend on a mix of institutional and technical considerations.