This website uses cookies to ensure you have the best experience. Learn more

Vulnerability Assessment Of Northern Ghana To Climate Variability

1653 words - 7 pages

THEORETICAL CONSIDERATIONS

Emerging from research in natural hazards, the concept of vulnerability to environmental risks which entered development debates in the 1990s, have been applied widely in climate related issues with different disciplines and policy communities (Wisner et al. 2004). Vulnerability is defined as a “measure of a person or group’s exposure to the effects of a natural hazard, including the degree to which they can recover from the impact of that event” (Blaikie et al. 1994). This view focuses on factors such as the frequency, intensity and nature of the physical hazard as key components of vulnerability and the exposure of communities to such hazards, paying less ...view middle of the document...

Exposure refers to the degree to which a particular unit or system is put under climatic stress (Gbetibouo et al. 2010). It may be in a form of long-term changes in climatic conditions or changes in climatic variability, including the magnitude and frequency of extreme events. Sensitivity refers to the degree to which a system is modified or affected by internal or external disturbances (Gallopin 2006). Adaptive capacity refers to the potential to adapt and reduce a system’s vulnerability (Luers 2005). The capacity to adapt to climate variability will vary significantly in accordance with level of development and resource capacity.



METHODOLOGY
Study Region
The northern part of Ghana (approximately 97000km2) comprises the Upper East (UER), Upper West (UWR) and Northern region (NR) (Figure 1). These are considered as three most deprived regions among the ten regions of Ghana (Ghana Statistical Service (GSS) 2010). Northern Ghana falls within the Guinea and Sudan Savannah agro-ecological zones and the majority of the households in the regions reside in rural areas, are engaged in rainfed agricultural and land-based economic activities. Millet and Sorghum are two main principal crops, only cultivated under rainfed in this part of the country. Other rainfed crops include maize, rice and peanuts. Seasonal rainfall distribution is monomodal with averages ranging from 900-1100mm. The rainfall season starts in April and ends in October reaching its peak in August, followed by a long dry season from October to April. Temperatures are high throughout the year with an average of 28oC.

Figure 1: Map of Ghana (a) showing the northern Ghana (b) with vegetation type (Source: Dosu 2011)

Data Collection and Analysis
Climatic data including rainfall, maximum temperature and minimum temperature parameters for the three regions covering a period from 1961–2010 were collected from the Ghana Meteorological Agency. Monthly millet and sorghum production data from 1991-2010 were collected from the Statistics, Research and Information Directorate of Ministry of Food and Agriculture (MOFA 2011) and aggregated into yearly production. For socioeconomic data used for vulnerability analyses, 350 farmers from the economically active population in each region were randomly selected and interviewed using a semi-structured questionnaire. Data obtained from these interviews were then corroborated with data from 2010 national census (GSS, 2010).

Climate Trend Analysis
The averages of annual rainfall, maximum temperature and minimum temperature (1961–2010) for each region were computed and analysed using Excel. Descriptive statistics were run to determine number of occurrence of a variable, means and extent of variations. The variability of monthly rainfall was expressed with the coefficient of variation (CV) using mean annual rainfall data. A high CV indicated that the high spatial variability. These analyses aimed to provide a deeper understanding of...

Find Another Essay On Vulnerability Assessment of Northern Ghana to Climate Variability

Assessment of genetic diversity in some safflower genotypes showing variability for salt tolerance

996 words - 4 pages et al. 2012). Genetic diversity refers to variation within and between living objects which is heritable. Assessment of genetic diversity is an essential tool for selection as well as for genetic improvement of plants (Ramanatha and Hodgkin 2002). Previously, studying on genetic diversity bounded by morphological, agronomical and biochemical parameters. In 1990s with the advent of molecular markers, analysis of genetic diversity was done with

The vulnerability of computerised accounting information systems to computer crime

1509 words - 6 pages what methods do they use, the vulnerability of information system made these computer crimes possible. Vulnerability is one factors to risk analysis, the other two factors are threats and countermeasures (Pool 1995). Computerised Accounting Information System (CAIS) stored on and transmitted by the information on computer, all that information being stored and transmitted has vulnerability, which can be exploited by a threat, just like attacking

The vulnerability of computerised accounting information systems to computer crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the

Vulnerability of computerised accounting information systems to computer crime

1597 words - 6 pages AbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures of

Assessment Of Climate Change Conference Statement And Commitments:

923 words - 4 pages A) Assessment of Climate Change Conference Statement and Commitments: International NGO (Non-Government Organization) i) The ambition in the statement and commitments is in the desired direction of recognizing that human action is influencing the global climate, and that efforts must be undertaken by all Parties to control greenhouse gas emissions. However, the statement and commitments are just a small start in what must be an ongoing and ever

The art of Italy and Northern Europe from 1300 to

1674 words - 7 pages The Art of Italy and Northern Europe from 1300 to 1520 The years between 1300 to 1520, commonly known as the Renaissance, was an era of extraordinarily advanced achievements made in the art world. Techniques that began to be utilized at this period of time made the artworks surpass those of any other preceding movement."A word of caution is necessary when speaking of a 'rebirth' of the spirit of antiquity. In Italy, much more so than in northern

Vulnerability of evapotranspiration to urbanisation: a multi-criteria decision-making and artificial neural network approach

1450 words - 6 pages shortage of water availability; in their words, “vulnerability to water shortages changes as cities grow”. Verbeiren et al.(2013) also stressed the impact of population change on rainfall–runoff relationships using a remote sensing approach.Finally, Pathirana etal. (2014 ) showed that an increase in the level of urbanisationis likely to increase the severity of extreme events. They simulated four scenarios of urbanisation with a coupled climate and

Assess the extent to which Strategic Environmental Assessment (SEA) can contribute towards mitigation and adaptation to climate change futures

1827 words - 7 pages adaptation objective/task should be assigned to each PPP. Vulnerability assessment of alternatives under changing and uncertain scenario should be carried out to judge the best suitable option (Byer et al. 2012). On the other hand base line environment can be significantly changed by variable climate upon which the impact of the proposal will be evaluated. SEA should define specifically the baseline environment; and should also portray specific

The Extent to which Strategic Environmental Assessment (SEA) Can Contribute towards Mitigation and Adaptation to Climate Change Futures

1923 words - 8 pages Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge, United Kingdom and New York, NY, USA: Cambridge University Press. IPCC. (2014a). Summary for Policymakers. In T. F. Stocker et al., eds. Climate Change 2014: Impacts, Adaptation, and Vulnerability. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge, United Kingdom and New York, NY, USA

Contribution of Deforestation and Degradation to Climate Change

703 words - 3 pages goods and services (FAO, 2003). Climate change: It refers to a statistically significant variation in either the mean state of the climate or in its variability, persisting for an extended period (typically decades or longer). Climate change may be due to natural internal processes or external forcings, or to persistent anthropogenic changes in the composition of the atmosphere or in land use (IPCC, 2001). Effects of deforestation and degradation

The Effects of Climate Change to Polar Bears

715 words - 3 pages Are you aware of climate change? Many people are clueless on the temperature change that our world is going through this very second. This change is affecting many species especially polar bears and even us humans. The polar bears could potentially because extinct due to their homes melting away and there food sources becoming harder to excess. People of the third world countries are the ones greatly affected by this climate change because of

Similar Essays

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1167 words - 5 pages 2.3 Vulnerability assessment tools Vulnerability assessment tools are a requirement for a successful vulnerability assessment as indicated in item 2.2 above (Perry nd). Security assessment tools detect and stop malware and any other attempt to crack computer systems. They are categorised into network security assessment tools and Web security assessment tools. Network vulnerability scanning focus on both sides of the firewall, within and

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1214 words - 5 pages 2.2 Performing vulnerability assessments Vulnerability assessments are conducted to secure computer networks from attacks. Administrators usually consider patching and deploying antivirus. Vulnerability assessments should be set to run constantly to alert the administrator of any change that may be detected on the network to ensure network security protection (Carabott 2011). Performing a successful vulnerability assessment for the company

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1339 words - 6 pages /research-laboratory/article/hash-functions. Accessed on 2013/11/15. Orde, C & Poarch, D. (2012). 8 steps to an effective vulnerability assessment. Available from http://focus.forsythe.com/articles/211/8-Steps-to-an-Effective-Vulnerability-Assessment. Accessed on 2013/11/18. Perry, J. (nd). Lessons learned in the establishment of a vulnerability assessment program. Available from: http://www.educause.ed/ir/library/powerpoint/SER0565.pps. Accessed

Assessment Of Households’ Vulnerability To Food Insecurity And Determinant Factors In Developning Countries: The Case Of Ethiopia

1612 words - 7 pages write up of Dissertation Once the data are collected, it will be entered into STATA statistical software. Analysis of the caloric content of the household’s food consumption and dietary diversity will be computed in order to establish each household’s as food secure and food insecure on the basis of the established cut-off. This will be followed by estimating their level of vulnerability to food insecurity as well as assessment of influencing