1 / 14

General Approach to Vulnerability Analysis

WFP/IFAD Annual PMO Workshop. General Approach to Vulnerability Analysis. Flowchart of VAM Activities. Interpretation. Analysis. Mapping. Indicator identification. Verification. Data checking and processing. Targeting, needs assessment, m&e, disaster preparedness,etc.

wowen
Download Presentation

General Approach to Vulnerability Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WFP/IFAD Annual PMO Workshop General Approach to Vulnerability Analysis WFP/China VAM Unit

  2. Flowchart of VAM Activities Interpretation Analysis Mapping Indicator identification Verification Data checking and processing Targeting, needs assessment, m&e, disaster preparedness,etc. Data collection Field visits PROGRAMMING WFP/China VAM Unit

  3. Steps on Vulnerability Analysis Step I---- Field Visits WFP/China VAM Unit

  4. Steps on Vulnerability Analysis Step II---- Data Collection WFP/China VAM Unit

  5. Steps on Vulnerability Analysis Step III---- Data Checking and Processing WFP/China VAM Unit

  6. Steps on Vulnerability Analysis Step IV---- Indicator Identification WFP/China VAM Unit

  7. Steps on Vulnerability Analysis Step V---- Data Analysis WFP/China VAM Unit

  8. Steps on Vulnerability Analysis Step VI---- Interpretation of Analysis Results WFP/China VAM Unit

  9. Steps on Vulnerability Analysis Step VII---- Mapping WFP/China VAM Unit

  10. Steps on Vulnerability Analysis Step VIII---- Field Verification and Reporting WFP/China VAM Unit

  11. Steps on Vulnerability Analysis Step IX---- Integration of Analysis into Programming WFP/China VAM Unit

  12. Output of Vulnerability Analysis • A. Food Security Profiling • Description of typical determinants of food security, including: • Production of crops, meat, etc. • Amounts of food purchased in the market • Other sources of food besides production and purchasing • Income sources WFP/China VAM Unit

  13. Output of Vulnerability Analysis • Vulnerability Analysis • Risks to food shocks/shortages • Coping mechanism • Who is chronically food insecure? Where? Why? • Who is periodically food insecure? Where? Why? • Who is vulnerable to food insecure? Where? Why? WFP/China VAM Unit

  14. Output of Vulnerability Analysis Food security monitoring Early warning Emergency Needs Assessment Targeting Intervention designing WFP/China VAM Unit

More Related