位置:成果数据库 > 期刊 > 期刊详情页
脆弱性的概念及其评价方法
  • 期刊名称:地理科学进展,2008,27(2):19-25.
  • 时间:0
  • 分类:P641.8[天文地球—地质矿产勘探;天文地球—地质学] TP311[自动化与计算机技术—计算机软件与理论;自动化与计算机技术—计算机科学与技术]
  • 作者机构:[1]中国科学院东北地理与农业生态研究所,长春130012, [2]中国科学院研究生院,北京100039
  • 相关基金:国家自然科学基金重点项目(40635030)、国家重点基础研究发展计划项目专(2004CB418507-2)共同资助.
  • 相关项目:东北地区矿业城市人地系统脆弱性与可持续性研究
中文摘要:

脆弱性研究是全球变化及可持续性科学领域关注的热点问题和重要的分析工具,随着脆弱性研究受到越来越多的关注.对脆弱性的概念和评价方法的研究日益深入。对国内外相关研究中出现的脆弱性概念进行了归纳总结.并深入讨论了不同学者就脆弱性概念初步达成的共识及存在的分歧。在此基础上明确了脆弱性概念的内涵。依据脆弱性评价的思路.将国内外脆弱性研究中出现脆弱性评价方法分为五大类。分析了各种评价方法的优缺点.指出了脆弱性评价中应遵循的基本原则。最后。结合脆弱性研究的发展趋势,指出面向多重扰动的脆弱性评价、耦合系统的脆弱性评价、复杂系统的不确定问题、脆弱性评价的尺度问题等是目前脆弱性评价研究中亟待开展的研究内容.

英文摘要:

"Vulnerability" is a new research frontier in the domain of sustainability science and global environment change, and the term is now a central concept in a variety of research contexts such as natural hazards, climate change, land use change, and sustainable development; meanwhile, vulnerability research is perceived by many researchers as a new science which deals with the mechanism, the process of interactions between human and environment, and the regional sustainable development. Finding a generally applicable conceptual framework and robust assessment methods of vulnerability which are key factors to determine the development of vulnerability science, is a challenge facing vulnerability science. Recent years, researchers from different disciplines draw growing attention to the concept and assessment methods of vulnerability,leading to a rapid progress on the concept and assessment methods of vulnerability. The paper analyzed the different definitions of vulnerability from literatures both abroad and domestic, and illustrated the convergences and divergences among these definitions; based on ,this, we discussed the exact meaning of the term, maintaining that the sensitivity and coping capacity. of system to perturbations impinging on it are the main characteristics of vulnerability of system. In addition, we reviewed the methods used in vulnerability assessment, and classified these methods into five categories according to their assessing process, we evaluated the weaknesses and strengths of each method respectively,then put forward some principles that should be followed in the process of vulnerability assessment, such as choosing simple assessment methods at first and then, with complicated ones later, paying attention to the trade-off between data transformation and results interpretation, focusing on key processes of the generation of vulnerability and making use of multiple methods in a complementary manner. Finally, according to the new trends in vulnerability research, the paper brought forward s

同期刊论文项目
同项目期刊论文