JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for RADIX Archives


RADIX Archives

RADIX Archives


RADIX@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

RADIX Home

RADIX Home

RADIX  September 2015

RADIX September 2015

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Sendai framework drags old HFA definition of vulnerability like Marley's ghost his chains!

From:

James Lewis <[log in to unmask]>

Reply-To:

James Lewis <[log in to unmask]>

Date:

Sun, 27 Sep 2015 13:55:54 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (39 lines)

Greetings Ben and all Radixers:

Some earlier thoughts now relevant to this crucial discussion are 
expressed in Lewis (2014), from which, with hesitation, I will offer the 
following comments:

Vulnerability in relation to natural hazards has been discussed since as 
long ago as 1976 (O'Keefe et al) by which it was made apparent that 
vulnerability is not contained by "characteristics of a person or group" 
unless characteristics are recognised to be, at least in part, the 
result of superimposition, in one way or another, by others. Causative 
processes of vulnerablity are not usually contained within such a group 
or within any other. There is a mass of literature which demonstrates 
vulnerability to be the result of dynamic processes, often over long 
periods of time, most of them beyond the influence of the vulnerable, or 
those who will be made to become so.

Another concern is that it would be helpful if "susceptibility" was not 
used to explain vulnerability. First, because it may serve to place the 
onus for being susceptible upon the person or group, as an internal 
issue of its own making. Secondly, because the vulnerable themselves 
often may be, or may become, susceptible to further mistreatments or 
derogations which intensify their vulnerability. Sadly, there are 
numerous examples of such behaviours.

O’Keefe, P.,Westgate, K. andWisner, B. (1976), “Taking the naturalness 
out of natural disasters”,
Nature, Vol. 260, pp. 566-567.

Lewis, James (2014) "The susceptibility of the vulnerable: Some 
realities reassessed". DPM, 23/1, Emerald.

Best wishes to all -

James

-- 
James Lewis Datum International www.datum-international.eu

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
July 2013
June 2013
May 2013
April 2013
February 2013


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager