Article thumbnail

A systematic review of local vulnerability to climate change in developing country agriculture : In search of transparency, coherence and comparability

By Todd A. Crane, Aogán Delaney, Peter A. Tamás, Sabrina Chesterman and Polly Ericksen


In the mid-2000s, several highly-cited papers called for improving conceptual coherence and methodological transparency in vulnerability research to support greater policy relevance. As reducing vulnerability rises on political agendas, identifying empirically validated measures will become increasingly important in the design and evaluation ofmulti-site and multi-scale programmatic interventions. Using a systematic review methodology, we analyze the current range of conceptual frameworks, operationalizations and research methodologies as used in empirical studies of local-level vulnerability in agricultural settings. Detailed analysis of theories and methods provides a platform for moving toward reporting that supports valid comparisons between disparate studies. This in turn, enables the design and implementation of empirically-informed programmatic interventions. The results show that earlier concerns remain relevant. Even the best reported cases do not support aggregated analysis because conceptual ambiguity and methodological heterogeneity renders each study effectively unique. While conceptualization is broadly consolidating around the IPCC framework, declaration of that framework does not predict consistent operationalization. Furthermore, emerging alternative frameworks, especially Vulnerability as Expected Poverty, reveal important limitations of the IPCC framework. Findings also highlight that reporting practices in vulnerability research perpetuate problematic ambiguity. When designing and reporting research, we recommend addressing six key questions that can help specify the objectives of the study: (1) Is this system vulnerable? (2) To what is this system vulnerable? (3) How vulnerable is this system? (4)What is causing this system to be vulnerable? (5) How is vulnerability distributed within the system? (6) What is causing the observed distribution of vulnerability within the system

Topics: Educatie- en competentiestudies, Educatie- en Competentiestudies, Onderwijs- en leerwetenschappen, WASS, Education and Competence Studies, Education and Competence Studies, Education and Learning Sciences, WASS
Year: 2017
DOI identifier: 10.1002/wcc.464
OAI identifier:
Provided by: NARCIS
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.