Verified Document

Lifecycle Of Natural And Human Caused Disasters Essay

Disaster Life Cycles and Major Disaster Events Please attachment

A disaster is an encounter between human population and the forces of harm in harm's way with its influences being in the ecological context (McDaniels & Small, 2004). Disaster causing hazards follow from either natural occurrences or human activities. Natural disasters include volcanic eruptions, floods, forest fires or wildfires, tornadoes and hurricanes. Human disasters include terrorist attacks, war and deforestation (Wynne, 2008). In this paper, floods and war are the chosen disasters for discussion.

Disaster Life Cycle

Disaster life cycle gives four main components that help to reduce vulnerability to people with high potential of suffering or reducing its severity once it occurs. These include mitigation, preparedness, response and recovery (Grossi & Kunreuther, 2005). Mitigation entails exercises for minimizing or preventing the negative effects of possible disasters. Mitigation involves an analysis of possible...

In the case for a hazard relating to floods, storm watching is necessary to give an analysis for a likely hit and strength of a storm causing floods. Ideal strategies to prevent loss of life and property will be flood-proofing homes and offices close to the risk areas.
Disaster preparedness calls for planning and preparations to help disaster vulnerable individuals and communities to get ready for disaster (Grossi & Kunreuther, 2005). These actions include stocking food, water, medical facilities and identifying willing individuals and groups to help deal with the disaster. Floods present a situation locking out individuals from accessing necessary amenities and supplies. Disaster preparedness calls for creating attention to the vulnerable groups to prepare for the likely situation in order to help in their survival and reduce further potential risks such as illness, starvation, or…

Sources used in this document:
References

Grossi, P., & Kunreuther, H. (2005). Catastrophe Modeling: A New Approach to Managing Risk. (Eds) New York: Springer.

McDaniels, T., & Small, M.J. (2004). Valuing Risk Management Choices, (Risk Analysis and Society. An Interdisciplinary Characterization of the Field) Cambridge: Cambridge University Press.

Wynne, B. (2008). Risk and Environment as Legitimatory Discourses of Technology: Reflexivity Inside Out? Current Sociology, 50(30), 459-477.
Cite this Document:
Copy Bibliography Citation

Related Documents

Risk Management the Objective of This Study
Words: 1690 Length: 5 Document Type: Essay

Risk Management The objective of this study is to discuss the role and nature of organizational risk management in justice and security organizations and why it is so important. The following will be addressed in the assessment; (1) risk planning and resource identification; (2) management of risk in justice and security organizations; (3) costs associated in managing risk; (4) consequences of failing to manage risk; and benefits; and (5) benefits a

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

It Infrastructure Project Description the
Words: 7426 Length: 25 Document Type: Capstone Project

Secured real time protocol (SRTP) is also being identified to enhance the security parameter of WAN and LAN network elements. "SRTP provides protection with encryption keys for wired and wireless networks including bandwidth limited channels." (Guillen and Chacon 2009 P. 690). There is also a growing use of IP secure to protect organization from the interception of data over the LAN and WAN environment. To enhance network security, Chen, Horng,

Supply Chain Planning Under Uncertainty:
Words: 12190 Length: 44 Document Type: Research Proposal

Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning

Business Workplace Continuity and Contingency
Words: 3113 Length: 10 Document Type: Thesis

Threats due to weather include floods, earthquakes, hurricanes, tornadoes and blizzards. Planning for weather events should be very realistic in nature. Major weather events usually occur in 25, 50 and 100-year cycles. Disease outbreaks are also a big threat. A potential flu pandemic could be detrimental to many businesses. For example, the bird flu pandemic scenarios that are floating around are being modeled on the Spanish flu pandemic of

Global Warming Effects on the Ecosystem
Words: 1903 Length: 6 Document Type: Essay

Global Warming Effects on the Ecosystem What is global warming? What is an ecosystem? The effects of global warming on the ecosystem The natural world and its eco systems are being drastically changed today. The original setting and workings of these phenomenons is being affected by a variety of elements in the world and these changes are noticeably visible around us in different ways. The way in which these eco systems function and operate

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now