Identifying contributing factors to threats

Slides:



Advertisements
Similar presentations
Determine conservation objects: (biodiversity-dependent) human wellbeing objects Phase I Preparation and Initial Conceptualisation Step 3 © Christina Lehmann.
Advertisements

Determine conservation objects: biodiversity objects Phase I Preparation and Initial Conceptualisation Step 2 © Christina Lehmann 2014.
Analysis of systemic activity and the strategic relevance of stresses, threats and contributing factors Phase II Systemic Vulnerability and Risk Analysis.
Analysis of the future criticality of stresses, threats and contributing factors Phase II Systemic risk and vulnerability analysis Step 12 © Pierre Ibisch.
Operational planning and implementation of measures Phase IV Implementation and (non)-knowledge management Step 25 © Pierre Ibisch 2014.
CASE STUDIES IN PROJECT MANAGEMENT
Understand the relevant actors and stakeholders Phase II Systemic Vulnerability and Risk Analysis Step 15 © Christina Lehmann 2015.
Analysis of knowledge and manageability of stresses, threats and contributing factors Phase II Systemic Vulnerability and Risk Analysis Step 16 © Pierre.
Monitoring of results, impacts and research Phase IV Implementation and (non)-knowledge management Step 26 © CEEM 2014.
Page 1 FICCI MSME Workshop /10/2015 Making BDS Market Work For MSEs Amit Kumar, GIZ Private Sector Development.
Revision and validation Phase II Systemic Vulnerability and Risk Analysis Step 16 © Pierre Ibisch 2014.
Identification of existing strategies and “strategy mapping” Phase III Evaluation, prioritisation and strategy formulation Step 17 © Pierre Ibisch 2014.
Knowledge and non-knowledge management Phase IV Implementation and (non)-knowledge management Step 27 © Pierre Ibisch 2013.
Results webs, goal and objective setting and monitoring design Phase III Comprehensive evaluation, prioritization and strategy formulation Step 24 © Pierre.
Analysis and filling of strategic gaps: the development of complementary strategies Phase III Comprehensive evaluation, prioritization and strategy formulation.
Define the geographical scope of management Phase I Preparation and Initial Conceptualisation Step 1 © Christina Lehmann 2014.
Organise, revise and complete the systemic conceptual model Phase II Systemic risk and vulnerability analysis Step 8 © Pierre Ibisch 2014.
Evaluation and revision of the underlying concept Phase IV Implementation and (non)-knowledge management Step 29 © Pierre Ibisch 2013.
Spatial analysis and priority setting Phase II Systemic risk and vulnerability analysis Step 9 © Christina Lehmann 2014.
The Greenhouse Effect Subtitle. What you need today: Pencil Bellringer sheet Everything else on the counter. Bellringer # 3 What are greenhouse gases?
Define the initial management vision Phase I Preparation and Initial Conceptualisation Step 4 © Christina Lehmann 2014.
2A.Develop a Formal Action Plan: Results Chains. Copyright and Use Terms Under this license, you are free to share this presentation and adapt it for.
Assessment of the current status of the biodiversity objects Phase II Systemic Vulnerability and Risk Analysis Step 5 © Christina Lehmann 2014.
Dr Wiktor Szydarowski Freelance consultant NDPHS SWG meeting Stockholm, 10 February 2015 Progress in developing the NDPHS Strategy 2020.
Projects, Events and Training
Introduction to the New Extensionist
Balticclimate A template for spatial planners
Assessment and prioritization of existing strategies
GENDER TOOLS FOR ENERGY PROJECTS Module 2 Unit 2
Workshop to develop theories of change
Stakeholder consultations
Managing for Results Capacity in Higher Education Institutions
Phase II Systemic Risk and Vulnerability Analysis Step 6
Cycles of the Earth & Biogeochemical Cycles
8.10 Feedback Loops and Climate
Carbon: Transformations in Matter and Energy
© Foundations of Success
Measuring Outcomes of GEO and GEOSS: A Proposed Framework for Performance Measurement and Evaluation Ed Washburn, US EPA.
Visualisation of systemic relationships
Business Environment Dr. Aravind Banakar –
Business Environment Dr. Aravind Banakar –
Assess criticality of stresses, threats and contributing factors
Pre and post workshop assessments
Global Warming Noadswood Science, 2016.
Summary.
Overview of this module
Claire NAUWELAERS, independent policy expert
Module I.5 Getting to Yes: Negotiating Agreement without Giving In Trainer: [Name] Country teams that want to realize key NAP tasks need to have a good.
Module 0.1 Participants introduction / Preliminary stocktaking Trainer: [Name] Note to trainer:   During the NAP country-level training, the participants.
Module I.3 Process overview on NAP Trainer: [Name]
Module V.2 NAP as a living document Trainer: [Name]
Consultation & Participation
Understanding the Context for Strategy Development
HEI ICI REPORTING RESULTS
Preparing Tables and Figures: Some Basics
Visualisation of systemic relationships I
Comprehensive evaluation, prioritization and strategy formulation
Four-step approach (2) Identify adaptation options
CATHCA National Conference 2018
1.3 Energy and Equilibria Significant Ideas
Setting the Scene Karin Zaunberger DG ENV B2
Energy performance and Carbon emissions Assessment and Monitoring tool
Energy performance and Carbon emissions Assessment and Monitoring tool
Carbon: Transformations in Matter and Energy
Change Control Diagram
Understanding your Impact on Well-Being of Future Generations (Wales) Act 2015 Contributing to and Reporting on the 7 Wellbeing Goals, Local Wellbeing.
Threats to Biodiversity Climate Change
ROMANIA 2019 NEEDS IDENTIFICATION ROMANIA 2019.
Directorate General for Agriculture and Rural Development
Civil Society Facility and Media Programme Call for proposals: EuropeAid/162473/DH/ACT/Multi Webinar no. 3: Preparing effective Concept Note.
Presentation transcript:

Identifying contributing factors to threats © Pierre Ibisch 2014 Phase II Systemic risk and vulnerability analysis Step 7

Credits and conditions of use © Centre for Econics and Ecosystem Management, 2014 The Centre for Econics and Ecosystem Management strongly recommends that this presentation is given by experts familiar with the adaptive management process in general (especially as designed as the Conservation Measures Partnership’s Open Standards for the Practice of Conservation) as well as the MARISCO Method itself. You are free to share this presentation and adapt it for your use under the following conditions: You must attribute the work in the manner specified by the authors (but not in any way that suggests that they endorse you or your use of the work). You may not use this work for commercial purposes. If you alter, transform, or build upon this work, you must remove the Centre for Econics and Ecosystem Management logo, and you may distribute the resulting work only under the same or similar conditions to this one.   This material was created under the leadership and responsibility of Prof. Dr. Pierre Ibisch and Dr. Peter Hobson, co-directors of the Centre for Econics and Ecosystem Management, which was jointly established by Eberswalde University for Sustainable Development and Writtle College. Compare: Ibisch, P.L. & P.R. Hobson (eds.) (2014): The MARISCO method: Adaptive MAnagement of vulnerability and RISk at COnservation sites. A guidebook for risk-robust, adaptive, and ecosystem-based conservation of biodiversity. Centre for Econics and Ecosystem Management, Eberswalde (ISBN 978-3-00-043244-6). 195 pp. - The Powerpoint Presentation was conceived by Christina Lehmann and Pierre Ibisch. Authors of graphs and photographs are indicated on the corresponding slides. Supported by the Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH on behalf of the Bundesministerium für wirtschaftliche Zusammenarbeit und Entwicklung (BMZ). 7. Identify contributing factors to threats

7. Identify contributing factors to threats

Learning objectives Participants are able to facilitate the process of identifying contributing factors to threats and building up cause-effect chains/webs between threats and contributing factors causing these threats directly or as root causes resulting, which results in a conceptual model of the situation on site. Participants have a clear understanding of the rationale of this crucial step on the one hand to promote a common understanding of the conservation situation among various stakeholders by visualising problems, needs, opportunities and conflicts and on the other hand to present a structured and logical framework upon which to build strategies in the next stage of exercise. 7. Identify contributing factors to threats

Outline What does identifying contributing factors to threats mean? Why identifying contributing factors to threats? How do we identify contributing factors to threats? Practical Tips ? 7. Identify contributing factors to threats

What does identifying contributing factors to threats mean? This final analysis of elements presents a structured and logical framework upon which to build strategies in the next stage of the exercise Reflection on human activities and identifying their direct and indirect impact on the environment Pictures: Christina Lehmann 2014 © Christina Lehmann 2014 7. Identify contributing factors to threats

Contributing Factors Human activity or Natural environmental events Directly or indirectly result in a threat They often add up syner- gistically → many smaller contributing factors accu- mulate and worsen 7. Identify contributing factors to threats

Examles for Contributing Factors Pictures: Christina Lehmann 2012 & 2014 © Christina Lehmann 2012-2014 7. Identify contributing factors to threats

Why identifying contributing factors to threats? Important to understand the variety of contributing factors as root causes for threats in order to change or eliminate them Recognition of own participants’ role in this complex system Basis to find compromises between stakeholders’ needs and conservation Also recognition of unchangeable driving factors in order to be able to adapt Crucial preparatory step towards the formulation of effective management strategies ME Element + - 7. Identify contributing factors to threats

How do we identify contributing factors to threats? Gathering of several factors/ actions that contribute to threats → put them onto rectangular orange MARISCO factor cards © CEEM 2014 7. Identify contributing factors to threats

How do we identify contributing factors to threats? © CEEM 2014 7. Identify contributing factors to threats

How do we identify contributing factors to threats? One threat can have several contributing factors; one contributing factor can influence several other elements Connections between contributing factors and threats continuously reveal the network which represents the complexity of the system of the biodiversity object Focus on contributing factors that have a negative impact on bio-diversity object Cause-effect chains throughout the network show the complexity of the system and are sometimes non-linear and can show occasions of synergistic effects, escalations and positive & negative feedback loops > depicts un-predictability of the system © Pierre Ibisch 2013 7. Identify contributing factors to threats

Positive Feedback Loop If higher input increases output or if fewer input decreases output (rather destructive nature) Example: Temperature growth – arctic ice melting relationship When the greenhouse effect intensifies and the average air temperature rises, the arctic ice melts – result: less “white surface” on the earth (lower albedo). This causes an increase in energy uptake through the earth which causes further melting of arctic ice. + + Ice-Graphik:http://www.greenpeace.de/themen/arktis/bilder-von-der-arktis-expedition-teil-2 © Nick Cobbing 2009 7. Identify contributing factors to threats

Negative Feedback Loop If higher input decreases output or if fewer input increases output Example: Predator – prey relationship Lions consume antelopes. The more lions consume antelopes (due to sufficient supply) the stronger the number of antelopes decreases. Once the amount of antelopes is too low for lions to survive, the latter decrease, while the former increase again. + Pictures: Christina Lehmann 2014 © Christina Lehmann 2014 - © Christina Lehmann 2014 7. Identify contributing factors to threats

Synergistic effect CLIMATE CHANGE An effect arising between two or more entities/factors that produces an effect greater than the sum of their individual effects Example: Climate Change Climate change is much faster and more intensively happening, when it is driven by many several factors, instead of just one (e.g. greenhouse gas emissions, deforestation, urbanisation, etc.) CLIMATE CHANGE © Christina Lehmann 2012-2014 7. Identify contributing factors to threats

How do we identify contributing factors to threats? Guiding Questions for the identification of contributing factors to threats: What are the reasons for the appearance of a threat or a factor? Which relevant actors and stakeholders are involved in causing a threat? What are their reasons for doing so? Are there any factors from those listed that have a positive influence on another contributing factor or threat? 7. Identify contributing factors to threats

Practical Tips For large and rather heterogeneous workshop groups, building focus groups that concentrate on the causal analysis of selected threats or sectors has proven effective As this is the basis for the current (often dysfunctional) condition of ecosystems and the whole complexity and extent of the problems becomes obvious, workshop participants tend to become helpless and discouraged → Explain to them that this is not “the end” → This situation analysis is basic for solution and strategy development 7. Identify contributing factors to threats