2019
DOI: 10.5846/stxb201802020289
|View full text |Cite
|
Sign up to set email alerts
|

Research progress on vulnerability: from theoretical research to comprehensive practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Qualitative vulnerability assessment is often carried out by means of inductive and comparative analysis. Vulnerability assessment based on the inductive approach is usually driven by past empirical data and field research materials to explore the growth pattern and development characteristics of the vulnerability of the research object, so as to predict and analyze the future development trend of vulnerability [35]. Vulnerability assessment based on the comparative method is based on comparing two types of interrelated data, and extrapolating the patterns and trends of one type of data from the evolution of the other [44].…”
Section: Qualitative Assessment Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Qualitative vulnerability assessment is often carried out by means of inductive and comparative analysis. Vulnerability assessment based on the inductive approach is usually driven by past empirical data and field research materials to explore the growth pattern and development characteristics of the vulnerability of the research object, so as to predict and analyze the future development trend of vulnerability [35]. Vulnerability assessment based on the comparative method is based on comparing two types of interrelated data, and extrapolating the patterns and trends of one type of data from the evolution of the other [44].…”
Section: Qualitative Assessment Methodsmentioning
confidence: 99%
“…The layer superimposition method [73] allows for both qualitative and quantitative analysis [35], by superimposing layers representing different vulnerability elements or layers representing different forms of disturbance, and thus visually capturing the spatial distribution of vulnerability in terms of form and state of difference.…”
Section: Layer Superimposition Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Using the region of Zhu Jiang River in China as a research object, Kang (2015) constructed a linear calculation model between natural disaster loss in cultivated land and cultivated land area, submerged height and disaster loss rate [8]. Yang (2019) pointed out that research on disaster management in recent years has been gradually shifting from the large-scale areas to the small-scale areas, as disaster management in small-scale areas was found to have better practical guiding significance [9]. To the best of our knowledge, there is no published research on forecasting waterlogging economic loss in a subway station project.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, with the massive gathering of population and industries, the increasing shortage of water resources, fluctuations in food supply, dramatic increase in energy demand, and damage to ecological functions have become increasingly severe, and the water, energy, food, and ecological nexus systems have emerged with prominent vulnerability characteristics. Vulnerability is a comprehensive concept that includes risk, sensitivity, adaptability, resilience, resilience and other related elements, and there is no clear boundary between the components (Yang et al, 2019). The widely accepted elements of vulnerability are exposure, sensitivity, and adaptive capacity, as indicated in the IPCC report (IPCC, 2001).…”
Section: Introductionmentioning
confidence: 99%