<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://wocatpedia.net/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wocatpedia.net/index.php?action=history&amp;feed=atom&amp;title=The_Vulnerability_Sourcebook</id>
		<title>The Vulnerability Sourcebook - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wocatpedia.net/index.php?action=history&amp;feed=atom&amp;title=The_Vulnerability_Sourcebook"/>
		<link rel="alternate" type="text/html" href="https://wocatpedia.net/index.php?title=The_Vulnerability_Sourcebook&amp;action=history"/>
		<updated>2026-05-12T14:53:57Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.19.7</generator>

	<entry>
		<id>https://wocatpedia.net/index.php?title=The_Vulnerability_Sourcebook&amp;diff=7826&amp;oldid=prev</id>
		<title>Stefanie Ettling at 15:49, 18 August 2014</title>
		<link rel="alternate" type="text/html" href="https://wocatpedia.net/index.php?title=The_Vulnerability_Sourcebook&amp;diff=7826&amp;oldid=prev"/>
				<updated>2014-08-18T15:49:51Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 15:49, 18 August 2014&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Author=GIZ&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Author=GIZ&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Year=2014&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Year=2014&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;|Pub Keywords=vulnerability, climate change, adaption&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Language=English&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Language=English&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub TOC=I. Introduction 12&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub TOC=I. Introduction 12&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 38:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;m8&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;m8&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Module 8: Presenting the outcomes of your vulnerability assessment 142&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Module 8: Presenting the outcomes of your vulnerability assessment 142&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;del style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Abstract=In recent years, vulnerability assessments (vulnerability assessments) have increasingly&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|Pub Abstract=In recent years, vulnerability assessments (vulnerability assessments) have increasingly&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;been used to identify climate change impact hotspots and to provide&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;been used to identify climate change impact hotspots and to provide&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Stefanie Ettling</name></author>	</entry>

	<entry>
		<id>https://wocatpedia.net/index.php?title=The_Vulnerability_Sourcebook&amp;diff=7825&amp;oldid=prev</id>
		<title>Stefanie Ettling: Created page with &quot;{{Publication |Pub Title=The Vulnerability Sourcebook |Pub Author=GIZ |Pub Year=2014 |Pub Language=English |Pub TOC=I. Introduction 12 Why this Vulnerability Sourcebook? 12 ...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wocatpedia.net/index.php?title=The_Vulnerability_Sourcebook&amp;diff=7825&amp;oldid=prev"/>
				<updated>2014-08-18T15:48:52Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Publication |Pub Title=The Vulnerability Sourcebook |Pub Author=GIZ |Pub Year=2014 |Pub Language=English |Pub TOC=I. Introduction 12 Why this Vulnerability Sourcebook? 12 ...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Publication&lt;br /&gt;
|Pub Title=The Vulnerability Sourcebook&lt;br /&gt;
|Pub Author=GIZ&lt;br /&gt;
|Pub Year=2014&lt;br /&gt;
|Pub Language=English&lt;br /&gt;
|Pub TOC=I. Introduction 12&lt;br /&gt;
Why this Vulnerability Sourcebook? 12&lt;br /&gt;
Who is the Vulnerability Sourcebook for? 13&lt;br /&gt;
How was the Vulnerability Sourcebook approach developed? 13&lt;br /&gt;
When should the Vulnerability Sourcebook be applied? 14&lt;br /&gt;
How should the Vulnerability Sourcebook be used? 14&lt;br /&gt;
II. Conceptual framework 18&lt;br /&gt;
1. Introduction 18&lt;br /&gt;
2. What is climate change vulnerability? 20&lt;br /&gt;
3. How is vulnerability assessed? 26&lt;br /&gt;
4. Linking new concepts 31&lt;br /&gt;
&lt;br /&gt;
III. Guidelines 35&lt;br /&gt;
m1&lt;br /&gt;
Module 1: Preparing the vulnerability assessment 38&lt;br /&gt;
m2&lt;br /&gt;
Module 2: Developing impact chains 54&lt;br /&gt;
m3&lt;br /&gt;
Module 3: Identifying and selecting indicators 72&lt;br /&gt;
m4&lt;br /&gt;
Module 4: Data acquisition and management 86&lt;br /&gt;
Glossary 164&lt;br /&gt;
Literature 171&lt;br /&gt;
IV. How to use your vulnerability&lt;br /&gt;
assessments for monitoring and evaluation (M&amp;amp;E) 155&lt;br /&gt;
m5&lt;br /&gt;
Module 5: Normalisation of indicator data 104&lt;br /&gt;
m6&lt;br /&gt;
Module 6: Weighting and aggregating of indicators 120&lt;br /&gt;
m7&lt;br /&gt;
Module 7: Aggregating vulnerability components to vulnerability 132&lt;br /&gt;
m8&lt;br /&gt;
Module 8: Presenting the outcomes of your vulnerability assessment 142&lt;br /&gt;
&lt;br /&gt;
|Pub Abstract=In recent years, vulnerability assessments (vulnerability assessments) have increasingly&lt;br /&gt;
been used to identify climate change impact hotspots and to provide&lt;br /&gt;
input for adaptation and development planning at local, national and regional&lt;br /&gt;
levels. Vulnerability assessments assumed particular significance in the context&lt;br /&gt;
of the National Adaptation Plan (NAP) process. This process was established in&lt;br /&gt;
2010 as part of the Cancun Adaptation Framework to complement existing shortterm&lt;br /&gt;
national adaptation programmes of action (NAPAs). It aims at reducing the&lt;br /&gt;
vulnerability of developing countries, especially the least developed countries&lt;br /&gt;
(LDCs) and the most vulnerable groups, by addressing medium- and long-term&lt;br /&gt;
adaptation needs. Consequently, assessment of climate change vulnerabilities at&lt;br /&gt;
different levels is an integral part of NAP implementation, as emphasised by the&lt;br /&gt;
Technical Guidelines for the National Adaptation Plan Process (LEG 2012).&lt;br /&gt;
|Pub Permission=I have read the Terms and Conditions and hereby accept them.&lt;br /&gt;
}}&lt;br /&gt;
{{Publication File Upload&lt;br /&gt;
|Pub File=GIZ Vulnerability Sourcebook - Guidelines for Assessments - GIZ 2014.pdf&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Stefanie Ettling</name></author>	</entry>

	</feed>