• No results found

The role of individuals’ risk representations in risk management - case-study on lahars in Arequipa (Peru)

N/A
N/A
Protected

Academic year: 2020

Share "The role of individuals’ risk representations in risk management - case-study on lahars in Arequipa (Peru)"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1 Location of the surveyed neighbourhoods in Arequipa on the hazard zone map (modified from Vargas Franco et al
Fig. 2 Classification of the answers to the question: “Can you indicate the importance (more or less important) that you lend to these socialconcerns in comparison with risks such as lahars, earthquakes, volcanic eruption?”
Fig. 3 Ranking of the first 3 answers to the question: “Can you rank these natural hazards from the more important to the less important for you?”
Fig. 4 Answer to the question: “Which authority do you trust in for the information on the lahars you receive?” (N = 209)
+4

References

Related documents

It was decided that with the presence of such significant red flag signs that she should undergo advanced imaging, in this case an MRI, that revealed an underlying malignancy, which

The paper is discussed for various techniques for sensor localization and various interpolation methods for variety of prediction methods used by various applications

Twenty-five percent of our respondents listed unilateral hearing loss as an indication for BAHA im- plantation, and only 17% routinely offered this treatment to children with

Field experiments were conducted at Ebonyi State University Research Farm during 2009 and 2010 farming seasons to evaluate the effect of intercropping maize with

To resolve the potential effect of H pylori colonisation on hBD1 and hBD2 mRNA expression in the gastric mucosa, semiquan- titative RT-PCR analyses was performed on biopsies

bursts and hence the length of the newly created leader segments as the background electric field

Using key-homomorphic constrained PRFs as constructed in this paper, in Section 5 we construct a scheme for outsourced storage that supports proxy re-encryption and fine-grained