A new bivariate risk classifier for flood management considering hazard and socio-economic dimensions

Mohit Prakash Mohanty, H Vittal, Vinay Yadav, Subimal Ghosh, Goru Srinivasa Rao, Subhankar Karmakar*

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

Identification of flood-risk dynamics is pivotal for refurbishing the existing and future flood-management options. The present study quantifies the marginal and compound contributions of hazard and vulnerability to flood-risk through an innovative concept of Risk-classifier, designed in the form of a 5 × 5 choropleth. The proposed framework is demonstrated at the finest administrative scale of village-level over Jagatsinghpur district in Mahanadi River basin, Odisha (India) for two-time frames: Scenario-I (1970–2011) and Scenario-II (1970–2001). An increase in high and very high hazard and vulnerable villages is noticed in Scenario-I, the majority of them lying in the coastal stretches (S-E region) and adjoining flood plains of Mahanadi River (N–W region). Scenario-I is characterized by the majority of hazard-driven and compound (both hazard and vulnerability) risk villages, while Scenario II is characterized by a majority of vulnerability driven-risk villages. For the vulnerability-driven risk villages, rigorous enforcement of policies and mitigation schemes are recommended, while for hazard-driven risk villages, enhancement of structural measures and flood-plain zoning should be exercised. Such exhaustive flood-risk information may serve as a valuable cartographic product for the civic authorities and stakeholders and help in prioritizing flood mitigation actions for improved environmental planning and management.
Original languageEnglish
Article number109733
JournalJournal of Environmental Management
Volume255
ISSN0301-4797
DOIs
Publication statusPublished - 2020

Keywords

  • Choropleth
  • Decadal change
  • Environmental planning and management
  • Flood risk
  • Hazard
  • Socio-economic vulnerability

Cite this