As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.展开更多
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
4 October 2013, Shenzhen-ZTE has been selected by U Mobile Sdn Bhd to provide a disaster recovery system to make Malaysia's most dynamic and innovative 3G mobile network more resilient and robust. U Mobile will depl...4 October 2013, Shenzhen-ZTE has been selected by U Mobile Sdn Bhd to provide a disaster recovery system to make Malaysia's most dynamic and innovative 3G mobile network more resilient and robust. U Mobile will deploy ZTE's DR solution in the core network, increasing the backup capabilities of the network infrastructure. The agreement between U Mobile and ZTE was signed today in Kuala Lumpur. ZTE's DR solution will be implemented on U Mobile's core transmission and IPCORE equipment and will significantly reduce service recovery times and improve network stability and reliability.展开更多
Shifting demographics—that is, the growing number of older adults in Canada and internationally—and intersecting climatic risks create a complex landscape of aging in place in disaster contexts. Some older adults ar...Shifting demographics—that is, the growing number of older adults in Canada and internationally—and intersecting climatic risks create a complex landscape of aging in place in disaster contexts. Some older adults are vulnerable due to their underlying health conditions and limited physical mobility. Yet they also exhibit resilience in a distinct manner, owing to their wealth of knowledge, wisdom, and ability to navigate adversities. This article elucidates potential avenues for promoting the involvement of older adults in disaster recovery efforts. Our intention is to recognize and foster older adult resilience and mitigate vulnerability by drawing upon insights from the study titled “In the Aftermath of the 2016 Alberta Wildfires: The Role of Social Work Practitioners and Human Service Professionals in Long-Term Disaster Recovery.” Employing a qualitative research approach, that study recruited 51 participants for semistructured interviews and focus groups. A thematic analysis of the collected data unveiled the pivotal roles played by social workers and human service practitioners in facilitating recovery from the 2016 wildfires in the research. Notably, three overarching themes emerged concerning the promotion of older adults' involvement in disaster recovery: fostering supportive relationships, building partnerships and enhancing collaboration, and addressing ongoing challenges. These findings offer valuable insights into how social work practitioners and human service professionals can effectively facilitate the engagement of older adults in disaster recovery initiatives. This article emphasizes the significance of actively promoting the participation of older adults in disaster mitigation efforts, thereby fostering greater resilience within communities.展开更多
With the rapid popularity of cloud computing paradigm, disaster recovery using cloud resources becomes an attractive approach. This paper presents a practical multi-cloud based disaster recovery service model: DR- Cl...With the rapid popularity of cloud computing paradigm, disaster recovery using cloud resources becomes an attractive approach. This paper presents a practical multi-cloud based disaster recovery service model: DR- Cloud. With DR-Cloud, resources of multiple cloud service providers can be utilized cooperatively by the disaster recovery service provider. A simple and unified interface is exposed to the customers of DR-Cloud to adapt the heterogeneity of cloud service providers involved in the disaster recovery service, and the internal processes between clouds are invisible to the customers. DR-Cloud proposes multiple optimization scheduling strategies to balance the disaster recovery objectives, such as high data reliability, low backup cost, and short recovery time, which are also transparent to the customers. Different data scheduling strategies based on DR-Cloud are suitable for different kinds of data disaster recovery scenarios. Experimental results show that the DR-Cloud model can cooperate with cloud service providers with various parameters effectively, while its data scheduling strategies can achieve their optimization objectives efficiently and are widely applicable.展开更多
The Tohoku Regional Bureau(TRB) of the Ministry of Land, Infrastructure, Transport and Tourism(MLIT) performed various actions in response to the 2011 Great East Japan Earthquake and Tsunami. The total disaster recove...The Tohoku Regional Bureau(TRB) of the Ministry of Land, Infrastructure, Transport and Tourism(MLIT) performed various actions in response to the 2011 Great East Japan Earthquake and Tsunami. The total disaster recovery and reconstruction period is expected to last for 10 years, of which the first five years are regarded as the concentrated reconstruction period. As of 2013, a majority of the mega projects that involved restoration actions have been completed, which indicates a more effective rate of completion compared with the MLIT projects performed in normal non-disaster situations. This short article explains the management process of the recovery and reconstruction utilized by the TRB—an interorganizational process—from a business process management(BPM) perspective and creates a simple organization construction diagram of the entire process. The study focused on the transactions and actor roles to identify their strengths. The findings indicate the utilization of different operational procedures in some parts of the process, the importance of liaison role, as well as some obstacles. The lessons learned from this analysis can assist managers and researchers in designing and managing restoration processes for future disasters.展开更多
Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods ...Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods are structure-dependent. It is hard to share the DR resources between different DR systems, which made it expensive. We present a structure-independent disaster recovery theory and its implementation methods in this paper. By backup the whole system but not just the data, the goal of device and application-independent disaster recovery has been achieved. We further present a parallel recovery model and an on demand data retrieval method based on the theory. Some implementation details of prototype recovery system are also discussed. With the methods independent from specific devices or applications, the cost of disaster recovery infrastructure can be essentially reduced by resource sharing. Experiments show that the recovery time has also been greatly shortened with little service degradation.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability qua...The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability quantification,which is acceptable for networks carrying complex traffic flows.Complex network traffic is considered as general multi-rate,heterogeneous traffic,where the individual bandwidth demands may aggregate in complex,nonlinear ways.Blocking probability is the chosen measure for survivability analysis.We study an arbitrary topology and some other known topologies for the network.Independent and dependent failure scenarios as well as deterministic and random traffic models are investigated.Finally,we provide survivability evaluation results for different network configurations.The results show that by using about 50%of the link capacity in networks with a relatively high number of links,the blocking probability remains near zero in the case of a limited number of failures.展开更多
This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol s...This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same.展开更多
A number of indices have been developed for measuring vulnerability to disasters, but little attention has been paid to recovery indices. Post-disaster periods are usually divided into four phases. The terms establish...A number of indices have been developed for measuring vulnerability to disasters, but little attention has been paid to recovery indices. Post-disaster periods are usually divided into four phases. The terms established by the United Nations Development Programme for post-disaster phases—relief, early recovery, recovery, and development—are used in this article. This research examines the hypothesis that the boundaries between post-disaster recovery phases are fuzzy and should be defined by the progress achieved in the recovery process, rather than by the amount of time elapsed since the event. The methodology employed involved four steps: fieldwork, mapping,identification of indicators, and assessment. The case study area was the city of L'Aquila in the Abruzzo region of central Italy, which was struck by an earthquake in April2009. For each phase of the recovery process in L'Aquila a score was calculated based on the progress observed in2016, 7 years after the earthquake. The highest score went to the early recovery phase(14 points), followed by the recovery phase(13 points), the development phase(12points), and the relief phase(4 points). The results demonstrate the possibility of defining post-disaster recovery phases in an affected area based on measuring achievements through indicators rather than defining recovery phases in terms of elapsed time after a disaster.展开更多
The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) represents an inclusive approach to disaster risk reduction, linked to development and recovery. Building on previous international guidelines, the SF...The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) represents an inclusive approach to disaster risk reduction, linked to development and recovery. Building on previous international guidelines, the SFDRR promotes practical and measurable outcomes for reducing disaster losses, including indicators to measure progress towards seven specific global targets.Evaluated in the context of the priorities and global targets of the SFDRR, the article considers the case of the Great East Japan Earthquake and Tsunami of 2011 to illustrate advances and limitations in pre-disaster tsunami hazard engineering and post-disaster recovery. With respect to the targets set out in the Sendai Framework related to risk reduction and tsunami engineering, especially Priority 1,understanding disaster risk, there have been significant advances in hazard assessment and systems for tsunami detection and warning. Although the SFDRR emphasizes actions in the recovery phase through Priority 4, enhancing disaster preparedness with an emphasis on the concept of build back better, on its own this does not function as a clear directive for guiding recovery. However, the overall people-centered and inclusive approach of the SFDRR, as well as the global targets and several sub-priorities, can be a useful way to shape good practices in recovery and evaluate recovery progress.展开更多
Resettlement and relocation are among the most difficult policies to put into practice, but they may be the best ways to minimize future risks to settlements exposed to natural hazards both before and after disaster e...Resettlement and relocation are among the most difficult policies to put into practice, but they may be the best ways to minimize future risks to settlements exposed to natural hazards both before and after disaster events. As climate-related disasters and forced migration become increasingly common worldwide, governments, humanitarian or development actors,and policymakers must now prioritize the implementation of a dignified and effective resettlement program as part of their planning and management responsibilities. Much of this effectiveness depends on the stakeholders and beneficiaries' understanding and knowledge of the different resettlement phases, culture and customs of affected populations, activities, and the associated implementation challenges, costs, and benefits. Serious games are used in a variety of contexts to increase awareness, train and build capacity in stakeholders and beneficiaries. This article presents a serious game developed to educate practitioners, local agencies, students, and the public to understand the complexities and challenges involved in a successful resettlement. The game is based on a real proposed resettlement project initiated in the Chiradzulu District in southern Malawi after Cyclone Freddy in March 2023, which caused widespread flooding and landslides, forcing some villages to relocate permanently. The progression in the Road to Resettlement Game consists of six primary levels: land and site preparation, housing and livelihood, water, sanitation, and hygiene, health, education, and protection. These levels are meant to be completed in a sequence that adheres to the principles of resettlement. By engaging in the serious table-top board game, players gain an understanding of the resettlement activities, their sequence, and the associated practical(technical and social) and financial challenges.展开更多
With the explosion of information nowadays, applying data storage safety requirements has become a new challenge, especially in high data available cluster environments. With the emergence of Storage Area Networks (S...With the explosion of information nowadays, applying data storage safety requirements has become a new challenge, especially in high data available cluster environments. With the emergence of Storage Area Networks (SANs), storage can be network-based and consolidated, and mass data movements via Fiber Channels (FCs) can be of very high speed. Based on these features, this paper introduces a dual-node storage cluster designed for remote mirroring as a concurrent data replication method to protect data during system failures. This design takes full advantage of a SAN system's benefits, and it adopts a synchronous protocol to guarantee a fully up-to-date data copy on the remote site. By developing a Linux kernel module to control the I/O flow and by using the technologies of software Logic Unit Number (LUN) masking, background online resynchronization and a self-management daemon, we have achieved a reliable mirroring system with the characteristics of server-free data replication, fault tolerance, online disaster recovery and high performance. In this study, we implemented the design in a remote mirror subsystem built on a software Fiber Channel Storage Area Network (FC-SAN) system.展开更多
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
基金Supported by the 10th Five Year High-Tech Researchand Development Plan of China (2002AA1Z67101)
文摘Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘4 October 2013, Shenzhen-ZTE has been selected by U Mobile Sdn Bhd to provide a disaster recovery system to make Malaysia's most dynamic and innovative 3G mobile network more resilient and robust. U Mobile will deploy ZTE's DR solution in the core network, increasing the backup capabilities of the network infrastructure. The agreement between U Mobile and ZTE was signed today in Kuala Lumpur. ZTE's DR solution will be implemented on U Mobile's core transmission and IPCORE equipment and will significantly reduce service recovery times and improve network stability and reliability.
基金supported in part by funding from the Social Sciences and Humanities Research Council of Canada (SSHRC)。
文摘Shifting demographics—that is, the growing number of older adults in Canada and internationally—and intersecting climatic risks create a complex landscape of aging in place in disaster contexts. Some older adults are vulnerable due to their underlying health conditions and limited physical mobility. Yet they also exhibit resilience in a distinct manner, owing to their wealth of knowledge, wisdom, and ability to navigate adversities. This article elucidates potential avenues for promoting the involvement of older adults in disaster recovery efforts. Our intention is to recognize and foster older adult resilience and mitigate vulnerability by drawing upon insights from the study titled “In the Aftermath of the 2016 Alberta Wildfires: The Role of Social Work Practitioners and Human Service Professionals in Long-Term Disaster Recovery.” Employing a qualitative research approach, that study recruited 51 participants for semistructured interviews and focus groups. A thematic analysis of the collected data unveiled the pivotal roles played by social workers and human service practitioners in facilitating recovery from the 2016 wildfires in the research. Notably, three overarching themes emerged concerning the promotion of older adults' involvement in disaster recovery: fostering supportive relationships, building partnerships and enhancing collaboration, and addressing ongoing challenges. These findings offer valuable insights into how social work practitioners and human service professionals can effectively facilitate the engagement of older adults in disaster recovery initiatives. This article emphasizes the significance of actively promoting the participation of older adults in disaster mitigation efforts, thereby fostering greater resilience within communities.
基金supported by the National High-Tech Research and Development(863)Program of China(No.2012AA012609)
文摘With the rapid popularity of cloud computing paradigm, disaster recovery using cloud resources becomes an attractive approach. This paper presents a practical multi-cloud based disaster recovery service model: DR- Cloud. With DR-Cloud, resources of multiple cloud service providers can be utilized cooperatively by the disaster recovery service provider. A simple and unified interface is exposed to the customers of DR-Cloud to adapt the heterogeneity of cloud service providers involved in the disaster recovery service, and the internal processes between clouds are invisible to the customers. DR-Cloud proposes multiple optimization scheduling strategies to balance the disaster recovery objectives, such as high data reliability, low backup cost, and short recovery time, which are also transparent to the customers. Different data scheduling strategies based on DR-Cloud are suitable for different kinds of data disaster recovery scenarios. Experimental results show that the DR-Cloud model can cooperate with cloud service providers with various parameters effectively, while its data scheduling strategies can achieve their optimization objectives efficiently and are widely applicable.
文摘The Tohoku Regional Bureau(TRB) of the Ministry of Land, Infrastructure, Transport and Tourism(MLIT) performed various actions in response to the 2011 Great East Japan Earthquake and Tsunami. The total disaster recovery and reconstruction period is expected to last for 10 years, of which the first five years are regarded as the concentrated reconstruction period. As of 2013, a majority of the mega projects that involved restoration actions have been completed, which indicates a more effective rate of completion compared with the MLIT projects performed in normal non-disaster situations. This short article explains the management process of the recovery and reconstruction utilized by the TRB—an interorganizational process—from a business process management(BPM) perspective and creates a simple organization construction diagram of the entire process. The study focused on the transactions and actor roles to identify their strengths. The findings indicate the utilization of different operational procedures in some parts of the process, the importance of liaison role, as well as some obstacles. The lessons learned from this analysis can assist managers and researchers in designing and managing restoration processes for future disasters.
基金Supported by the National Basic Research Program of China (Grant No. 2007CB311100)
文摘Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods are structure-dependent. It is hard to share the DR resources between different DR systems, which made it expensive. We present a structure-independent disaster recovery theory and its implementation methods in this paper. By backup the whole system but not just the data, the goal of device and application-independent disaster recovery has been achieved. We further present a parallel recovery model and an on demand data retrieval method based on the theory. Some implementation details of prototype recovery system are also discussed. With the methods independent from specific devices or applications, the cost of disaster recovery infrastructure can be essentially reduced by resource sharing. Experiments show that the recovery time has also been greatly shortened with little service degradation.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability quantification,which is acceptable for networks carrying complex traffic flows.Complex network traffic is considered as general multi-rate,heterogeneous traffic,where the individual bandwidth demands may aggregate in complex,nonlinear ways.Blocking probability is the chosen measure for survivability analysis.We study an arbitrary topology and some other known topologies for the network.Independent and dependent failure scenarios as well as deterministic and random traffic models are investigated.Finally,we provide survivability evaluation results for different network configurations.The results show that by using about 50%of the link capacity in networks with a relatively high number of links,the blocking probability remains near zero in the case of a limited number of failures.
文摘This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same.
基金partly funded by the Austrian Science Fund (FWF) through the GIScience Doctoral College (DK W1237-N23)the Afro-Asiatisches Institut- Salzburg (AAI Salzburg) for complementary financial support towards this researchthe COLFUTURO foundation for the promotion of this scientific work
文摘A number of indices have been developed for measuring vulnerability to disasters, but little attention has been paid to recovery indices. Post-disaster periods are usually divided into four phases. The terms established by the United Nations Development Programme for post-disaster phases—relief, early recovery, recovery, and development—are used in this article. This research examines the hypothesis that the boundaries between post-disaster recovery phases are fuzzy and should be defined by the progress achieved in the recovery process, rather than by the amount of time elapsed since the event. The methodology employed involved four steps: fieldwork, mapping,identification of indicators, and assessment. The case study area was the city of L'Aquila in the Abruzzo region of central Italy, which was struck by an earthquake in April2009. For each phase of the recovery process in L'Aquila a score was calculated based on the progress observed in2016, 7 years after the earthquake. The highest score went to the early recovery phase(14 points), followed by the recovery phase(13 points), the development phase(12points), and the relief phase(4 points). The results demonstrate the possibility of defining post-disaster recovery phases in an affected area based on measuring achievements through indicators rather than defining recovery phases in terms of elapsed time after a disaster.
基金supported by the Core Research Cluster of Disaster Science in Tohoku University (Designated National University)Tokio Marine & Nichido Fire Insurance Co., Ltd.Willis Research Network (WRN)。
文摘The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) represents an inclusive approach to disaster risk reduction, linked to development and recovery. Building on previous international guidelines, the SFDRR promotes practical and measurable outcomes for reducing disaster losses, including indicators to measure progress towards seven specific global targets.Evaluated in the context of the priorities and global targets of the SFDRR, the article considers the case of the Great East Japan Earthquake and Tsunami of 2011 to illustrate advances and limitations in pre-disaster tsunami hazard engineering and post-disaster recovery. With respect to the targets set out in the Sendai Framework related to risk reduction and tsunami engineering, especially Priority 1,understanding disaster risk, there have been significant advances in hazard assessment and systems for tsunami detection and warning. Although the SFDRR emphasizes actions in the recovery phase through Priority 4, enhancing disaster preparedness with an emphasis on the concept of build back better, on its own this does not function as a clear directive for guiding recovery. However, the overall people-centered and inclusive approach of the SFDRR, as well as the global targets and several sub-priorities, can be a useful way to shape good practices in recovery and evaluate recovery progress.
文摘Resettlement and relocation are among the most difficult policies to put into practice, but they may be the best ways to minimize future risks to settlements exposed to natural hazards both before and after disaster events. As climate-related disasters and forced migration become increasingly common worldwide, governments, humanitarian or development actors,and policymakers must now prioritize the implementation of a dignified and effective resettlement program as part of their planning and management responsibilities. Much of this effectiveness depends on the stakeholders and beneficiaries' understanding and knowledge of the different resettlement phases, culture and customs of affected populations, activities, and the associated implementation challenges, costs, and benefits. Serious games are used in a variety of contexts to increase awareness, train and build capacity in stakeholders and beneficiaries. This article presents a serious game developed to educate practitioners, local agencies, students, and the public to understand the complexities and challenges involved in a successful resettlement. The game is based on a real proposed resettlement project initiated in the Chiradzulu District in southern Malawi after Cyclone Freddy in March 2023, which caused widespread flooding and landslides, forcing some villages to relocate permanently. The progression in the Road to Resettlement Game consists of six primary levels: land and site preparation, housing and livelihood, water, sanitation, and hygiene, health, education, and protection. These levels are meant to be completed in a sequence that adheres to the principles of resettlement. By engaging in the serious table-top board game, players gain an understanding of the resettlement activities, their sequence, and the associated practical(technical and social) and financial challenges.
基金This work is supported by the National Natural Science Foundation of China under Grant No.10576018the National Grand Fundamental Research 973 Program of China under Grant No.2004CB318205the Program for New Century Excellent Talents in University.
文摘With the explosion of information nowadays, applying data storage safety requirements has become a new challenge, especially in high data available cluster environments. With the emergence of Storage Area Networks (SANs), storage can be network-based and consolidated, and mass data movements via Fiber Channels (FCs) can be of very high speed. Based on these features, this paper introduces a dual-node storage cluster designed for remote mirroring as a concurrent data replication method to protect data during system failures. This design takes full advantage of a SAN system's benefits, and it adopts a synchronous protocol to guarantee a fully up-to-date data copy on the remote site. By developing a Linux kernel module to control the I/O flow and by using the technologies of software Logic Unit Number (LUN) masking, background online resynchronization and a self-management daemon, we have achieved a reliable mirroring system with the characteristics of server-free data replication, fault tolerance, online disaster recovery and high performance. In this study, we implemented the design in a remote mirror subsystem built on a software Fiber Channel Storage Area Network (FC-SAN) system.