article thumbnail

Reflections on the Turkish-Syrian Earthquakes of 6th February 2023: Building Collapse and its Consequences

Emergency Planning

Most of them are highly vulnerable to seismic forces. It is a mixture of simple errors, lax procedures, ignorance, deliberate evasion, indifference to public safety, untenable architectural fashions, corruption and failure to enforce the codes. It is these that collapse. Natural Hazards and Earth System Sciences 15: 931-945. Ecemis, S.Z.

article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

One of the most intransigent problems with the predecessor of the Sendai Framework, Hyogo Framework for Action, 2005-2015, was its resolute reliance on a 'top-down' approach. Studies showed that the HFA had had little impact at the local level (GNCSODR 2015). GNCSODR 2015. Views From the Frontline: Beyond 2015.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Haiti: has there been progress in disaster reduction since the last big earthquake?

Emergency Planning

A changing situation The eminent anthropologist Anthony Oliver-Smith argued [vi] that in Haiti colonialism has left an enduring legacy of vulnerability to disasters. In his words, "the colonial institutions’ assiduous extraction of surpluses left the population both destitute and vulnerable to hazards for centuries to come."

article thumbnail

Detecting and Confronting Procurement Fraud

Risk Management Monitor

This figure dwarfs other areas such as corporate tax avoidance, where HMRC estimates that $94 billion (£70 billion) was avoided between 2011 and 2015. Here are three ways to help your business become less vulnerable to fraudulent activity: 1. It is estimated that over $2 trillion (£1.6 What Can Be Done?

article thumbnail

4 Components of an Effective IoT Security Strategy

Behavior Group

By BizTech on 19 December 2016 IoT Security, information security, threat prevention Recent breaches have shown the vulnerability of the Internet of Things, but IT departments can defend against hackers with a multifaceted approach to security. Louis in July 2015, Andy Greenberg felt a sudden blast of air… Continue reading.

article thumbnail

Why Hostile Vehicle Incidents Can’t Be Ignored

Security Industry Association

If you cannot reach them, ask officials in Austin Texas where four persons were killed and 25 injured at SXSW by a drunk driver fleeing arrest, or ask the same question in Stillwater, Oklahoma, where four were killed and 46 injured in 2015 at the Oklahoma State University homecoming parade by an impaired driver, and see if they can speak with you.

article thumbnail

Data Storage and Backup Security: How to Defend Against Ransomware

Solutions Review

Examples include the NIST Security Guidelines for Storage Infrastructure (published in 2020), ISO 27040 (published in 2015), and SNIA’s storage security publications. An unidentified strain of ransomware targeting a zero-day vulnerability in SAN storage software has hit your storage plane.

Backup 52