IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v29y2009i10p1381-1394.html
   My bibliography  Save this article

Vulnerability Assessment of Mining Subsidence Hazards

Author

Listed:
  • Olivier Deck
  • Thierry Verdel
  • Romuald Salmon

Abstract

Between 1996 and 1999, five mining subsidence events occurred in the iron‐ore field in Lorraine, France, and damaged several hundred buildings. Because of the thousand hectares of undermined areas, an assessment of the vulnerability of buildings and land is necessary for risk management. Risk assessment methods changed from initial risk management decisions that took place immediately after the mining subsidence to the risk assessment studies that are currently under consideration. These changes reveal much about the complexity of the vulnerability concept and about difficulties in developing simple and relevant methods for its assessment. The objective of this article is to present this process, suggest improvements on the basis of theoretical definitions of the vulnerability, and give an operational example of vulnerability assessment in the seismic field. The vulnerability is divided into three components: weakness, stakes value, and resilience. Final improvements take into account these three components and constitute an original method of assessing the vulnerability of a city to subsidence.

Suggested Citation

  • Olivier Deck & Thierry Verdel & Romuald Salmon, 2009. "Vulnerability Assessment of Mining Subsidence Hazards," Risk Analysis, John Wiley & Sons, vol. 29(10), pages 1381-1394, October.
  • Handle: RePEc:wly:riskan:v:29:y:2009:i:10:p:1381-1394
    DOI: 10.1111/j.1539-6924.2009.01238.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2009.01238.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2009.01238.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Mathew C. Schmidtlein & Roland C. Deutsch & Walter W. Piegorsch & Susan L. Cutter, 2008. "A Sensitivity Analysis of the Social Vulnerability Index," Risk Analysis, John Wiley & Sons, vol. 28(4), pages 1099-1114, August.
    2. William L. McGill & Bilal M. Ayyub & Mark Kaminskiy, 2007. "Risk Analysis for Critical Asset Protection," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1265-1281, October.
    3. Yacov Y. Haimes, 2006. "On the Definition of Vulnerabilities in Measuring Risks to Infrastructures," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 293-296, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    2. Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
    3. Gainbi Park & Zengwang Xu, 2022. "The constituent components and local indicator variables of social vulnerability index," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 110(1), pages 95-120, January.
    4. Hiba Baroud & Jose E. Ramirez‐Marquez & Kash Barker & Claudio M. Rocco, 2014. "Stochastic Measures of Network Resilience: Applications to Waterway Commodity Flows," Risk Analysis, John Wiley & Sons, vol. 34(7), pages 1317-1335, July.
    5. Yong-Ling Zhang & Wen-Jiao You, 2014. "Social vulnerability to floods: a case study of Huaihe River Basin," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 71(3), pages 2113-2125, April.
    6. Mohammad Abdul Quader & Amanat Ullah Khan & Matthieu Kervyn, 2017. "Assessing Risks from Cyclones for Human Lives and Livelihoods in the Coastal Region of Bangladesh," IJERPH, MDPI, vol. 14(8), pages 1-26, July.
    7. Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
    8. Nikole Guerrero & Marta Contreras & Alondra Chamorro & Carolina Martínez & Tomás Echaveguren, 2023. "Social vulnerability in Chile: challenges for multi-scale analysis and disaster risk reduction," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 117(3), pages 3067-3102, July.
    9. Paul R. Garvey & Richard A. Moynihan & Les Servi, 2013. "A macro method for measuring economic‐benefit returns on cybersecurity investments: The table top approach," Systems Engineering, John Wiley & Sons, vol. 16(3), pages 313-328, September.
    10. Alice Barreca & Rocco Curto & Diana Rolando, 2018. "Housing Vulnerability and Property Prices: Spatial Analyses in the Turin Real Estate Market," Sustainability, MDPI, vol. 10(9), pages 1-20, August.
    11. Barbara Tchórzewska-Cieślak & Katarzyna Pietrucha-Urbanik & Mohamed Eid, 2021. "Functional Safety Concept to Support Hazard Assessment and Risk Management in Water-Supply Systems," Energies, MDPI, vol. 14(4), pages 1-13, February.
    12. Yacov Y. Haimes, 2011. "Responses to Terje Aven's Paper: On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience," Risk Analysis, John Wiley & Sons, vol. 31(5), pages 689-692, May.
    13. Novak, D.C. & Sullivan, J.F. & Sentoff, K. & Dowds, J., 2020. "A framework to guide strategic disinvestment in roadway infrastructure considering social vulnerability," Transportation Research Part A: Policy and Practice, Elsevier, vol. 132(C), pages 436-451.
    14. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    15. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    16. Bista, Raghu, 2019. "Groping climate vulnerability in western mountainous Nepal: applying climate vulnerability index," MPRA Paper 99047, University Library of Munich, Germany, revised 04 Jan 2019.
    17. H Jönsson & J Johansson & H Johansson, 2008. "Identifying critical components in technical infrastructure networks," Journal of Risk and Reliability, , vol. 222(2), pages 235-243, June.
    18. Corinne Curt & Jean‐Marc Tacnet, 2018. "Resilience of Critical Infrastructures: Review and Analysis of Current Approaches," Risk Analysis, John Wiley & Sons, vol. 38(11), pages 2441-2458, November.
    19. Spyridoula Kakia & Georgia Pozoukidou & Dimitra G. Vagiona, 2023. "Providing an Integrated Vulnerability Assessment Indicator System (VAIS) to Measure the Spatial Vulnerability of Areas near Seveso Establishments in Thessaloniki (Greece)," Sustainability, MDPI, vol. 15(3), pages 1-18, January.
    20. Wang, Jia & Ni, Shunjiang & Shen, Shifei & Li, Shuying, 2019. "Empirical study of crowd dynamic in public gathering places during a terrorist attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1-9.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:29:y:2009:i:10:p:1381-1394. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.