551 research outputs found

    THE ROUTINE DISASTER: A CASE STUDY IN EL SALVADOR

    Get PDF
    A 2010 report by the UN Disaster Assessment and Coordination ranked El Salvador as the most vulnerable country in the world to natural disasters, with roughly 95% of the population at risk. The combination of recurring natural disasters and high vulnerability in a relatively small country has led to repeated exposure of local residents to significant natural phenomena of all sorts, including earthquakes, flooding, landslides, volcanic eruptions, and hurricanes. The effect of disaster assistance can be multi-faceted and this report examines the case of flooding hazards of a small town in the south-eastern San Miguel region of the country, called El Borbollón, in which assistance seems to have become a natural part of the local economy. . This community sits at the base of a large watershed. Wet season flooding events raise the lake levels by 1 to 3 meters almost every year, completely submerging the town’s main road. Occasional 4 to 6 meter flooding events cause the evacuation of 1000+ community members; this occurred most recently during Tropical Depression 12-E in the 2011 wet season. I argue that a purely hydrological approach to assessing the local flood hazard is insufficient. First, I evaluate the magnitude of the Tropical Depression 12-E flooding event via HEC-HMS computer modeling and GIS, coupled with an analysis of ASTER satellite imagery. Parallel hazard and vulnerability analyses were conducted, and I describe my findings from a social research perspective. I find that locals have largely decided to co-exist with this recurring flood event, because they have much to gain by living in a perpetually at-risk condition, through the benevolence of aid organizations. This exposes a fundamental question: is it still a disaster if it is routine? By examining the role that large-scale flooding events play on the lives of local inhabitants, we present examine a scenario that more closely represents the multifaceted reality in which we live. Similar situations likely exist elsewhere, and lessons learned here may be more broadly applicable. The existence of a routine disaster means revisions might be necessary to government, scientist, and aid organization strategies

    Avian blood parasites in an endangered columbid: Leucocytozoon marchouxi in the Mauritian Pink Pigeon Columba mayeri

    Get PDF
    There is increasing evidence that pathogens can play a significant role in species decline. This study of a complete free-living species reveals a cost of blood parasitism to an endangered host, the Pink Pigeon Columba mayeri, endemic to Mauritius. We investigated the prevalence and effect of infection of the blood parasite, Leucocytozoon marchouxi, in the free-living Pink Pigeon population. Overall, L. marchouxi infection prevalence detected was 18·3%. Juveniles were more likely to be infected than older birds and there was geographical variation in infection prevalence. Survival of birds infected with L. marchouxi was lower than that of uninfected birds to 90 days post-sampling. This study suggests that while common haematozoa are well tolerated in healthy adults, these parasites may have greater pathogenic potential in susceptible juveniles. The study is unusual given its completeness of species sampling (96%) within a short time-period, the accurate host age data, and its focus on blood parasites in a threatened bird species. Species for which long-term life-history data are available for every individual serve as valuable models for dissecting the contribution of particular pathogens to species decline

    \u3cem\u3ePhytophthora cinnamomi\u3c/em\u3e Colonized Reclaimed Surface Mined Sites in Eastern Kentucky: Implications for the Restoration of Susceptible Species

    Get PDF
    Appalachian forests are threatened by a number of factors, especially introduced pests and pathogens. Among these is Phytophthora cinnamomi, a soil-borne oomycete pathogen known to cause root rot in American chestnut, shortleaf pine, and other native tree species. This study was initiated to characterize the incidence of P. cinnamomi on surface mined lands in eastern Kentucky, USA, representing a range of time since reclamation (10, 12, 15, and 20 years since reclamation). Incidence of P. cinnamomi was correlated to soil properties including overall soil development, as indicated by a variety of measured soil physical and chemical parameters, especially the accumulation of soil organic carbon. P. cinnamomi was detected in only two of the four sites studied, aged 15 and 20 years since reclamation. These sites were generally characterized by higher organic matter accumulation than the younger sites in which P. cinnamomi was not detected. These results demonstrate that P. cinnamomi is capable of colonizing reclaimed mine sites in Appalachia; additional research is necessary to determine the impact of P. cinnamomi on susceptible tree species at these sites

    Measuring the Changing Cost of Cybercrime

    Get PDF
    In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the cloud. The use of social networks has become extremely widespread. The executive summary is that about half of all property crime, by volume and by value, is now online. We hypothesised in 2012 that this might be so; it is now established by multiple victimisation studies. Many cybercrime patterns appear to be fairly stable, but there are some interesting changes. Payment fraud, for example, has more than doubled in value but has fallen slightly as a proportion of payment value; the payment system has simply become bigger, and slightly more efficient. Several new cybercrimes are significant enough to mention, including business email compromise and crimes involving cryptocurrencies. The move to the cloud means that system misconfiguration may now be responsible for as many breaches as phishing. Some companies have suffered large losses as a side-effect of denial-of-service worms released by state actors, such as NotPetya; we have to take a view on whether they count as cybercrime. The infrastructure supporting cybercrime, such as botnets, continues to evolve, and specific crimes such as premium-rate phone scams have evolved some interesting variants. The overall picture is the same as in 2012: traditional offences that are now technically ‘computer crimes’ such as tax and welfare fraud cost the typical citizen in the low hundreds of Euros/dollars a year; payment frauds and similar offences, where the modus operandi has been completely changed by computers, cost in the tens; while the new computer crimes cost in the tens of cents. Defending against the platforms used to support the latter two types of crime cost citizens in the tens of dollars. Our conclusions remain broadly the same as in 2012: it would be economically rational to spend less in anticipation of cybercrime (on antivirus, firewalls, etc.) and more on response. We are particularly bad at prosecuting criminals who operate infrastructure that other wrongdoers exploit. Given the growing realisation among policymakers that crime hasn’t been falling over the past decade, merely moving online, we might reasonably hope for better funded and coordinated law-enforcement action
    • 

    corecore