Search results for: child vulnerability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2115

Search results for: child vulnerability

2115 Stop Forced Child Marriage: A Comparative Global Law Analysis

Authors: Michelle J. Miller

Abstract:

Millions of girls are forcibly married during the transitional period between puberty and adulthood. At a stage of vulnerability; cultural practices, religious rights, and social standards place girls in a position where they are catapult into womanhood. An advocate against forced child marriage could argue that child rights, cultural rights, religious rights, right to marry, right to life, right to health, right to education, right to be free from slavery, right to be free from torture, right to consent to marriage are all violated by the practice of child marriage. This paper will present how some of these rights are violated and how they establish the need for change.

Keywords: child marriage, forced child marriage, children's rights, religious rights, cultural rights

Procedia PDF Downloads 396
2114 Child Care Policy in Kazakhstan: A New Model

Authors: Dina Maratovna Aikenova

Abstract:

Child care policy must be a priority area of public authorities in any country. This study investigates child care policy in Kazakhstan in accordance with the current position of children and laws. The results show that Kazakhstan policy in this sphere needs more systematic model including state economic and social measures, parental involvement and role of non-government organizations.

Keywords: children, Kazakhstan, policy, vulnerability

Procedia PDF Downloads 450
2113 Concerns, Attitudes and Perceptions of Mothers about Child Vulnerability for Sexual Abuse

Authors: Rukhsana Kausar, Khadija Rasheed

Abstract:

This research explored general concerns, attitudes and perceptions of Pakistani mothers about their children’s vulnerability for sexual abuse and it also examined the effect of education and work status of mothers on their concerns and attitudes about the safety of their children. The sample consisted of 166 mothers comprising of 4 groups i.e. educated-working mothers, uneducated working mothers, educated non-working mothers and uneducated non-working mothers. This research comprised of two studies. Study 1 was carried out to construct two separate scales namely Maternal Concerns and Attitudes Scale for safety of Daughters (MCA-SD) and Maternal Concerns and Attitudes Scale for safety of Sons (MCA-SS) for assessing maternal concerns and attitudes about safety and protection of daughters and sons. These scales were used in study 2 with the objective to explore mothers’ general concerns, attitudes and perceptions of about child vulnerability for sexual abuse. Data were analyzed using two-way analysis of variance and independent-samples t-test. Educated mothers had more sense of responsibility, ensured more safety and provide more information about self-protection to their children as compared to uneducated mothers. Similarly non-working mothers showed more sense of responsibility and provided more information on self-protection to their children as compared to working mothers. Moreover, mothers living in nuclear family system trusted more on their relatives and other people for the protection of their children and ensured more safety of children than those living in joint family system. Findings have very important implications for protecting children from likely sexual abuse.

Keywords: mothers’ concerns, attitudes, perceptions, child vulnerability, child sexual abuse

Procedia PDF Downloads 410
2112 The Role of Physical Capital on the Accessibility of Livelihood of Indigenous People

Authors: Anjli Pathak, Harshit Sosan Lakra, Smriti Mishra

Abstract:

The increasing urbanization affects the external environment in which people exist and imposes livelihood vulnerability to shocks and stresses. Although research on the linkages between urbanization and vulnerability has been increasing, only a few studies have examined the caste/ethnicity in livelihood vulnerability. In this study, we explore how physical capital influences vulnerability among indigenous people in the context of livelihood. The study identifies the dimensions and indicators of physical capital that influence the profile of household vulnerability in the livelihood-building process. The result identified five dimensions and 19 indicators of livelihood vulnerability. The study also visualizes the inter-relationship between physical capital and other livelihood capital in formulating the livelihood vulnerability framework.

Keywords: urbanization, livelihood vulnerability, indigenous people, physical capital

Procedia PDF Downloads 45
2111 Contribution of Elderly Widows Orphans Family Support in reducing vulnerability among children affected by HIV in Kapchorwa District

Authors: Vicent Lwanga

Abstract:

Background: Elderly Widows Orphans Family Support, a Community Based Organization operating in Kapchorwa with the main focus of reducing economic and social vulnerability among children affected by HIV/AIDS. The survey on reducing vulnerability targeted HIV/AIDS affected households, which included 111 adults and 185 children. The broad objective of the study was to determine how the needs of the children affected by HIV/AIDS could be appropriately met by specifically examining the situation of children affected by HIV/AIDS and establishing their needs. Methodology: The survey applied a structured questionnaire. Parents whose consent for the interview of the children had been obtained then communicated to the selected child/children. If the child consented, an arrangement for the interview was made as regards the time and place of the interview. Lessons: Adult respondents included 22.2% males and 77.8% females. Child respondents were males, 49.5%, and females 50.5%. The majority of the households are from lower economic strata. 74.1% and 63.0% of males and females, respectively, indicated that their illness had affected their income-earning activities; some of the adults have lost their jobs due to AIDS. A fair number of the children are engaged in economic activity: some of those still in school worked after school for wages and looked after their siblings. The income earned was spent mostly on household needs and school fees — one-fifth of children linked parents` inability to do more of what they desired to their ill-health. Elderly Widows Orphans Family Support secured sponsors to educate 22 girls and 16 boys in the community. Income-generating projects like piggery and skill training are given to orphans. The specific vulnerability of HIV/AIDS orphan's needs is responded to now more than ever. Community organisations interventions such as financial support to orphans introduced to moderate the impact of the disease on orphans and families.

Keywords: aids, children, needs, vulnerability

Procedia PDF Downloads 108
2110 Application of Data Mining for Aquifer Environmental Assessment

Authors: Saman Javadi, Mehdi Hashemy, Mohahammad Mahmoodi

Abstract:

Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. The common way to provide vulnerability map is DRASTIC. Meanwhile, application of the method is not easy to apply for any aquifer due to choosing appropriate constant values of weights and ranks. In this study, a new approach using k-means clustering is applied to make vulnerability maps. Four features of depth to groundwater, hydraulic conductivity, recharge value and vadose zone were considered at the same time as features of clustering. Five regions are recognized out of the case study represent zones with different level of vulnerability. The finding results show that clustering provides a realistic vulnerability map so that, Pearson’s correlation coefficients between nitrate concentrations and clustering vulnerability is obtained 61%.

Keywords: clustering, data mining, groundwater, vulnerability assessment

Procedia PDF Downloads 569
2109 Child Marriage and the Law in Nigeria

Authors: Kolawole-Amao, Grace Titilayo

Abstract:

Children are the most vulnerable members of the society. The child is a foundation of the society and he/she assures its continuity. Thus, the survival, continuity and the standard of development of human society depends upon the protection, preservation, nurture and development of the child. In other words, the rights of a child must be protected and guaranteed for the assurance of a healthy society. The law is an instrument of social change in any society as well as a potent weapon to combat crime, achieve justice for the people and protect their rights. In Nigeria, child marriage still occurs, though its prevalence varies from one region to another. This paper shall Centre on child rights under the law in Nigeria, child marriage and its impact on the child, obstacles in eliminating child marriages and measures that have been adopted as well as the role of the law and its effect in deterring child marriage in Nigeria.

Keywords: child rights, child marriage, law, Nigeria

Procedia PDF Downloads 469
2108 Landslide Vulnerability Assessment in Context with Indian Himalayan

Authors: Neha Gupta

Abstract:

Landslide vulnerability is considered as the crucial parameter for the assessment of landslide risk. The term vulnerability defined as the damage or degree of elements at risk of different dimensions, i.e., physical, social, economic, and environmental dimensions. Himalaya region is very prone to multi-hazard such as floods, forest fires, earthquakes, and landslides. With the increases in fatalities rates, loss of infrastructure, and economy due to landslide in the Himalaya region, leads to the assessment of vulnerability. In this study, a methodology to measure the combination of vulnerability dimension, i.e., social vulnerability, physical vulnerability, and environmental vulnerability in one framework. A combined result of these vulnerabilities has rarely been carried out. But no such approach was applied in the Indian Scenario. The methodology was applied in an area of east Sikkim Himalaya, India. The physical vulnerability comprises of building footprint layer extracted from remote sensing data and Google Earth imaginary. The social vulnerability was assessed by using population density based on land use. The land use map was derived from a high-resolution satellite image, and for environment vulnerability assessment NDVI, forest, agriculture land, distance from the river were assessed from remote sensing and DEM. The classes of social vulnerability, physical vulnerability, and environment vulnerability were normalized at the scale of 0 (no loss) to 1 (loss) to get the homogenous dataset. Then the Multi-Criteria Analysis (MCA) was used to assign individual weights to each dimension and then integrate it into one frame. The final vulnerability was further classified into four classes from very low to very high.

Keywords: landslide, multi-criteria analysis, MCA, physical vulnerability, social vulnerability

Procedia PDF Downloads 280
2107 Role of Family for Grooming a Child: A Protective Step for Vulnerable Child

Authors: Arpita Sabat, Kanaklata Samal

Abstract:

A child is the most innocent being on the earth. It is born innocent but the family, the community, the institution and the world at large always butcher its innocence. This paper aims at the role of family for the development of a child in different ethnic or social groups. Family, in fact, is the nucleus in the growth and development of the child. A child grows up with the idea that a family is the world around him. The child tries to emulate consciously or unconsciously from the surrounding. This imitation has serious impact on the development of the child. It even sometimes cripples or stunts the growth of a mind. It results in the disability of the child. All policies about education or changing of curriculum can not bring about a change in the plight of a child’s life unless there is a serious thinking about the role of a family and the contribution of a family to the development of a child.

Keywords: vulnerable child, grooming, surrounding, role of family

Procedia PDF Downloads 300
2106 Children and Migration in Ghana: Unveiling the Realities of Vulnerability and Social Exclusion

Authors: Thomas Yeboah

Abstract:

In contemporary times, the incessant movement of northern children especially girls to southern Ghana at the detriment of their education is worrisome. Due to the misplaced mindset of the migrants concerning southern Ghana, majority of them move without an idea of where to stay and what to do exposing them to hash conditions of living. Majority find menial work in cocoa farms, illegal mining and head porterage business. This study was conducted in the Kumasi Metropolis to ascertain the major causes of child migration from the northern part of Ghana to the south and their living conditions. Both qualitative and quantitative tools of data collection and analysis were employed. The purposive sampling technique was used to select 90 migrants below 18 years. Specifically, interviews, focus group discussions and questionnaires were used to elicit responses from the units of analysis. The study revealed that the major cause of child migration from northern Ghana to the south is poverty. It was evident that respondents were vulnerable to the new environment in which they lived. They are exposed to harsh environmental conditions; sexual, verbal and physical assault; and harassment from arm robbers. The paper recommends that policy decisions should be able to create an enabling environment for the labour force in the north to ameliorate the compelling effects poverty has on child migration. Efforts should also be made to create a proper psychological climate in the minds of the children regarding their destination areas through sensitization and education.

Keywords: child migration, vulnerability, social exclusion, child labour, Ghana

Procedia PDF Downloads 417
2105 Groundwater Vulnerability of Halabja-Khurmal Sub-Basin

Authors: Lanja F. Rauf, Salahalddin S. Ali, Nadhir Al-Ansari

Abstract:

Evolving groundwater vulnerability from DRASTIC to modified DRASTIC methods helps choose the most accurate areas that are most delicate toward pollution. This study aims to modify DRASTIC with land use and water quality index for groundwater vulnerability assessment in the Halabja-Khurmal sub-basin, NE/Iraq. The Halabja- Khurmal sub-basin groundwater vulnerability index is calculated from nine hydrogeological parameters by the overlay weighting method. As a result, 1.3 % of the total area has a very high vulnerability value and 46.1 % with high vulnerability. The regions with high groundwater vulnerability have a high water table and groundwater recharge. Nitrate concentration was used to validate the result, and the Pearson correlation and recession analysis between the modified DRASTIC index and nitrate concentration depicted a strong relation with 0.76 and 0.7, respectively.

Keywords: groundwater vulnerability, modified DRASTIC, land-use, nitrate pollution, water quality index

Procedia PDF Downloads 67
2104 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law

Authors: Ida D. Souza, Lena Ashok

Abstract:

Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.

Keywords: child protection, best practices, juvenile justice, reformation teamwork

Procedia PDF Downloads 338
2103 Software Vulnerability Markets: Discoverers and Buyers

Authors: Abdullah M. Algarni, Yashwant K. Malaiya

Abstract:

Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.

Keywords: risk management, software security, vulnerability discoverers, vulnerability markets

Procedia PDF Downloads 225
2102 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 98
2101 “It Takes a Community to Save a Child”: A Qualitative Analysis of Child Trafficking Interventions from Practitioner Perspectives

Authors: Crispin Rakibu Mbamba

Abstract:

Twenty-two years after the adoption of the United Nation Trafficking Protocol, evidence suggest that child trafficking continues to rise. Community level factors, like poverty which creates the conditions for children’s vulnerability is key to the rise in trafficking cases in Ghana. Albeit, growing evidence suggestthat despite the vulnerabilities, communities have the capacity to prevent and address child trafficking issues. This study contributes to this positive agenda by exploring the ways in which communities (and the key actors) in Ghana contribute to child trafficking interventions.The study objective is explored through in-depth interviews with practitioners (including social workers) from an organization working in trafficking hotspots in Ghana. Interviews wereanalyzed thematically with the help of HyperRESEARCH software. From the in-depth interviews, three themes were identified as the ways in which communities are involved in child trafficking interventions: 1) engagement of community leaders, 2) community-led anti-trafficking committees and 3) knowledge about trafficking. Albeit the cultural differences, evidence on the instrumental role of community chiefs and leaders provide important learning on how to harness trafficking intervention measures and ensure better child protection practices. Based on the findings, we recommend the need to intensify trafficking awareness campaigns in rural communities where education is lacking to contribute to United Nations (UN) promoting Just, Peaceful and Inclusive societies’ mandate.

Keywords: child trafficking, community interventions, knowledge on trafficking, human trafficking intervention

Procedia PDF Downloads 79
2100 A New Social Vulnerability Index for Evaluating Social Vulnerability to Climate Change at the Local Scale

Authors: Cuong V Nguyen, Ralph Horne, John Fien, France Cheong

Abstract:

Social vulnerability to climate change is increasingly being acknowledged, and proposals to measure and manage it are emerging. Building upon this work, this paper proposes an approach to social vulnerability assessment using a new mechanism to aggregate and account for causal relationships among components of a Social Vulnerability Index (SVI). To operationalize this index, the authors propose a means to develop an appropriate primary dataset, through application of a specifically-designed household survey questionnaire. The data collection and analysis, including calibration and calculation of the SVI is demonstrated through application in case study city in central coastal Vietnam. The calculation of SVI at the fine-grained local neighbourhood scale provides high resolution in vulnerability assessment, and also obviates the need for secondary data, which may be unavailable or problematic, particularly at the local scale in developing countries. The SVI household survey is underpinned by the results of a Delphi survey, an in-depth interview and focus group discussions with local environmental professionals and community members. The research reveals inherent limitations of existing SVIs but also indicates the potential for their use in assessing social vulnerability and making decisions associated with responding to climate change at the local scale.

Keywords: climate change, local scale, social vulnerability, social vulnerability index

Procedia PDF Downloads 402
2099 Integration of Fuzzy Logic in the Representation of Knowledge: Application in the Building Domain

Authors: Hafida Bouarfa, Mohamed Abed

Abstract:

The main object of our work is the development and the validation of a system indicated Fuzzy Vulnerability. Fuzzy Vulnerability uses a fuzzy representation in order to tolerate the imprecision during the description of construction. At the the second phase, we evaluated the similarity between the vulnerability of a new construction and those of the whole of the historical cases. This similarity is evaluated on two levels: 1) individual similarity: bases on the fuzzy techniques of aggregation; 2) Global similarity: uses the increasing monotonous linguistic quantifiers (RIM) to combine the various individual similarities between two constructions. The third phase of the process of Fuzzy Vulnerability consists in using vulnerabilities of historical constructions narrowly similar to current construction to deduce its estimate vulnerability. We validated our system by using 50 cases. We evaluated the performances of Fuzzy Vulnerability on the basis of two basic criteria, the precision of the estimates and the tolerance of the imprecision along the process of estimation. The comparison was done with estimates made by tiresome and long models. The results are satisfactory.

Keywords: case based reasoning, fuzzy logic, fuzzy case based reasoning, seismic vulnerability

Procedia PDF Downloads 255
2098 Climate Change Vulnerability and Agrarian Communities: Insights from the Composite Vulnerability Index of Indian States of Andhra Pradesh and Karnataka

Authors: G. Sridevi, Amalendu Jyotishi, Sushanta Mahapatra, G. Jagadeesh, Satyasiba Bedamatta

Abstract:

Climate change is a main challenge for agriculture, food security and rural livelihoods for millions of people in India. Agriculture is the sector most vulnerable to climate change due to its high dependence on climate and weather conditions. Among India’s population of more than one billion people, about 68% are directly or indirectly involved in the agricultural sector. This sector is particularly vulnerable to present-day climate variability. In this contest this paper examines the Socio-economic and climate analytical study of the vulnerability index in Indian states of Andhra Pradesh and Karnataka. Using secondary data; it examines the vulnerability through five different sub-indicator of socio-demographic, agriculture, occupational, common property resource (CPR), and climate in respective states among different districts. Data used in this paper has taken from different sources, like census in India 2011, Directorate of Economics and Statistics of respective states governments. Rainfall data was collected from the India Meteorological Department (IMD). In order to capture the vulnerability from two different states the composite vulnerability index (CVI) was developed and used. This indicates the vulnerability situation of different districts under two states. The study finds that Adilabad district in Andhra Pradesh and Chamarajanagar in Karnataka had highest level of vulnerability while Hyderabad and Bangalore in respective states have least level of vulnerability.

Keywords: vulnerability, agriculture, climate change, global warming

Procedia PDF Downloads 433
2097 Assessing Social Vulnerability and Policy Adaption Application Responses Based on Landslide Risk Map

Authors: Z. A. Ahmad, R. C. Omar, I. Z. Baharuddin, R. Roslan

Abstract:

Assessments of social vulnerability, carried out holistically, can provide an important guide to the planning process and to decisions on resource allocation at various levels, and can help to raise public awareness of geo-hazard risks. The assessments can help to provide answers for basic questions such as the human vulnerability at the geo-hazard prone or disaster areas causing health damage, economic loss, loss of natural heritage and vulnerability impact of extreme natural hazard event. To overcome these issues, integrated framework for assessing the increasing human vulnerability to environmental changes caused by geo-hazards will be introduced using an indicator from landslide risk map that is related to agent based modeling platform. The indicators represent the underlying factors, which influence a community’s ability to deal with and recover from the damage associated with geo-hazards. Scope of this paper is particularly limited to landslides.

Keywords: social, vulnerability, geo-hazard, methodology, indicators

Procedia PDF Downloads 254
2096 Analysis of the Aquifer Vulnerability of a Miopliocene Arid Area Using Drastic and SI Models

Authors: H. Majour, L. Djabri

Abstract:

Many methods in the groundwater vulnerability have been developed in the world (methods like PRAST, DRIST, APRON/ARAA, PRASTCHIM, GOD). In this study, our choice dealt with two recent complementary methods using category mapping of index with weighting criteria (Point County Systems Model MSCP) namely the standard DRASTIC method and SI (Susceptibility Index). At present, these two methods are the most used for the mapping of the intrinsic vulnerability of groundwater. Two classes of groundwater vulnerability in the Biskra sandy aquifer were identified by the DRASTIC method (average and high) and the SI method (very high and high). Integrated analysis has revealed that the high class is predominant for the DRASTIC method whereas for that of SI the preponderance is for the very high class. Furthermore, we notice that the method SI estimates better the vulnerability for the pollution in nitrates, with a rate of 85 % between the concentrations in nitrates of groundwater and the various established classes of vulnerability, against 75 % for the DRASTIC method. By including the land use parameter, the SI method produced more realistic results.

Keywords: DRASTIC, SI, GIS, Biskra sandy aquifer, Algeria

Procedia PDF Downloads 461
2095 Mapping the Intrinsic Vulnerability of the Quaternary Aquifer of the Eastern Mitidja (Northern Algeria)

Authors: Abida Haddouche, Ahmed Chrif Toubal

Abstract:

The Neogene basin of the Eastern Mitidja, object of the study area, represents potential water resources and especially groundwater reserves. This water is an important economic; this resource is highly sensitive which need protection and preservation. Unfortunately, these waters are exposed to various forms of pollution, whether from urban, agricultural, industrial or merely accidental. This pollution is a permanent risk of limiting resource. In this context, the work aims to evaluate the intrinsic vulnerability of the aquifer to protect and preserve the quality of this resource. It will focus on the disposal of water and land managers a cartographic document accessible to locate the areas where the water has a high vulnerability. Vulnerability mapping of the Easter Mitidja quaternary aquifer is performed by applying three methods (DRASTIC, DRIST, and GOD). Comparison and validation results show that the DRASTIC method is the most suitable method for aquifer vulnerability of the study area.

Keywords: Aquifer of Mitidja, DRASTIC method, geographic information system (GIS), vulnerability mapping

Procedia PDF Downloads 360
2094 [Keynote Talk]: Water Resources Vulnerability Assessment to Climate Change in a Semi-Arid Basin of South India

Authors: K. Shimola, M. Krishnaveni

Abstract:

This paper examines vulnerability assessment of water resources in a semi-arid basin using the 4-step approach. The vulnerability assessment framework is developed to study the water resources vulnerability which includes the creation of GIS-based vulnerability maps. These maps represent the spatial variability of the vulnerability index. This paper introduces the 4-step approach to assess vulnerability that incorporates a new set of indicators. The approach is demonstrated using a framework composed of a precipitation data for (1975–2010) period, temperature data for (1965–2010) period, hydrological model outputs and the water resources GIS data base. The vulnerability assessment is a function of three components such as exposure, sensitivity and adaptive capacity. The current water resources vulnerability is assessed using GIS based spatio-temporal information. Rainfall Coefficient of Variation, monsoon onset and end date, rainy days, seasonality indices, temperature are selected for the criterion ‘exposure’. Water yield, ground water recharge, evapotranspiration (ET) are selected for the criterion ‘sensitivity’. Type of irrigation and storage structures are selected for the criterion ‘Adaptive capacity’. These indicators were mapped and integrated in GIS environment using overlay analysis. The five sub-basins, namely Arjunanadhi, Kousiganadhi, Sindapalli-Uppodai and Vallampatti Odai, fall under medium vulnerability profile, which indicates that the basin is under moderate stress of water resources. The paper also explores prioritization of sub-basinwise adaptation strategies to climate change based on the vulnerability indices.

Keywords: adaptive capacity, exposure, overlay analysis, sensitivity, vulnerability

Procedia PDF Downloads 293
2093 Girl Child Education: A Veritable Tool to Gender Equality and Empowerment

Authors: Egena Obaje Innocent

Abstract:

In Africa generally and Nigeria in particular one the major setbacks for the girl-child is her deprivation or denial if you like to equal opportunity to education. In most Nigerian communities which are male dominated parents make no pretense of their preference of the male children when it come to the choice of who to send to school between the male and female child. Indeed, certain inhibiting cultural and religious practices are the root cause of this annually. It is against this background that this paper looked at the phenomenon the girl-child education, causes of the negligent its effects on the girl child and nation remedies and conclusion.

Keywords: education, empowerment, girl child, gender equality

Procedia PDF Downloads 436
2092 Assessing the Vulnerability Level in Coastal Communities in the Caribbean: A Case Study of San Pedro, Belize

Authors: Sherry Ann Ganase, Sandra Sookram

Abstract:

In this paper, the vulnerability level to climate change is analysed using a comprehensive index, consisting of five pillars: human, social, natural, physical, and financial. A structural equation model is also applied to determine the indicators and relationships that exist between the observed environmental changes and the quality of life. Using survey data to model the results, a value of 0.382 is derived as the vulnerability level for San Pedro, where values closer to zero indicates lower vulnerability and values closer to one indicates higher vulnerability. The results showed the social pillar to be most vulnerable, with the indicator ‘participation’ ranked the highest in its cohort. Although, the environmental pillar is ranked as least vulnerable, the indicators ‘hazard’ and ‘biodiversity’ obtained scores closer to 0.4, suggesting that changes in the environment are occurring from natural and anthropogenic activities. These changes can negatively influence the quality of life as illustrated in the structural equation modelling. The study concludes by reporting on the need for collective action and participation by households in lowering vulnerability to ensure sustainable development and livelihood.

Keywords: climate change, participation, San Pedro, structural equation model, vulnerability index

Procedia PDF Downloads 587
2091 Assessment of Social Vulnerability of Urban Population to Floods – a Case Study of Mumbai

Authors: Sherly M. A., Varsha Vijaykumar, Subhankar Karmakar, Terence Chan, Christian Rau

Abstract:

This study aims at proposing an indicator-based framework for assessing social vulnerability of any coastal megacity to floods. The final set of indicators of social vulnerability are chosen from a set of feasible and available indicators which are prepared using a Geographic Information System (GIS) framework on a smaller scale considering 1-km grid cell to provide an insight into the spatial variability of vulnerability. The optimal weight for each individual indicator is assigned using data envelopment analysis (DEA) as it avoids subjective weights and improves the confidence on the results obtained. In order to de-correlate and reduce the dimension of multivariate data, principal component analysis (PCA) has been applied. The proposed methodology is demonstrated on twenty four wards of Mumbai under the jurisdiction of Municipal Corporation of Greater Mumbai (MCGM). This framework of vulnerability assessment is not limited to the present study area, and may be applied to other urban damage centers.

Keywords: urban floods, vulnerability, data envelopment analysis, principal component analysis

Procedia PDF Downloads 337
2090 Multiplying Vulnerability of Child Health Outcome and Food Diversity in India

Authors: Mukesh Ravi Raushan

Abstract:

Despite consideration of obesity as a deadly public health issue contributing 2.6 million deaths worldwide every year developing country like India is facing malnutrition and it is more common than in Sub-Saharan Africa. About one in every three malnourished children in the world lives in India. The paper assess the nutritional health among children using data from total number of 43737 infant and young children aged 0-59 months (µ = 29.54; SD = 17.21) of the selected households by National Family Health Survey, 2005-06. The wasting was measured by a Z-score of standardized weight-for-height according to the WHO child growth standards. The impact of education with place of residence was found to be significantly associated with the complementary food diversity score (CFDS) in India. The education of mother was positively associated with the CFDS but the degree of performance was lower in rural India than their counterpart from urban. The result of binary logistic regression on wasting with WHO seven types of recommended food for children in India suggest that child who consumed the milk product food (OR: 0.87, p<0.0001) were less likely to be malnourished than their counterparts who did not consume, whereas, in case of other food items as the child who consumed food product of seed (OR: 0.75, p<0.0001) were less likely to be malnourished than those who did not. The nutritional status among children were negatively associated with the protein containing complementary food given the child as those child who received pulse in last 24 hour were less likely to be wasted (OR: 0.87, p<0.00001) as compared to the reference categories. The frequency to feed the indexed child increases by 10 per cent the expected change in child health outcome in terms of wasting decreases by 2 per cent in India when place of residence, education, religion, and birth order were controlled. The index gets improved as the risk for malnutrition among children in India decreases.

Keywords: CFDS, food diversity index, India, logistic regression

Procedia PDF Downloads 228
2089 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 47
2088 Root Causes of Child Labour in Hargeisa, Somaliland

Authors: Abdikarim Yusuf

Abstract:

This study uses data from Somalia to analyse child labour using a descriptive and qualitative method. The study set out to identify root causes of child labour in Hargeisa and its implications for children. The study shows that poverty, droughts, family separation, and loss of properties are primary drivers of child labour in Hargeisa. The study found that children work in very difficult jobs such as car wash, casual work, and shoe shining for boys while girls work as housemaids, selling tea, Khat and sometimes are at risk of exploitation such as sexual abuse, rape and harassment. The majority of the parents responded that they don’t know any policy, act or law that protects children. Men showed greater awareness than the women respondents in recognizing child labour as a child rights violation.

Keywords: abuse, child, violence, protection

Procedia PDF Downloads 122
2087 Cooperation and Conflict in Child Rearing Practices among Parents in Indian Context

Authors: Jilly John

Abstract:

The paper reports one of the study conducted to explore the dimensions of child rearing practice and effects of power difference among parents on child rearing practices adopted in the families. The first objective investigated dimensions of child rearing practices (a) overprotection (b) disciplinarian, (c) esteem building, (d) normal, (e) harsh (f) ridicule, and (g) rejection. The second objective investigated difference among father and mother on child rearing practices. The results of the study revealed that dimensions of child rearing practices are crucial variables which resulted in form of major deviations in distribution of parents in the seven dimensions. Analysis of objective two revealed that harsh and ridicule dimensions of child rearing practices are significantly different among father and mother. The dimensions are also different when the parents are employed and according to the type of families. Thus the results of the study present the possibility of changed child rearing practices among Indian families in relation to prevalent sociodemographic changes and indicate the necessity to re-examine culture-based explanations on child rearing practices.

Keywords: child rearing practices, dimensions of child rearing, difference among parents, Indian families

Procedia PDF Downloads 375
2086 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 73