Sie sind auf Seite 1von 22

STAGES OF DISASTER MANAGEMENT

Disaster Management can be explained with four components or stages namely 1. Mitigation or
Prevention 2. Preparedness 3. Response 4. Recovery

Disaster management is a cyclical process; the end of one phase is the beginning of another, as
illustrated by the diagram given below.

The mitigation and preparedness phases occur as improvements are made in anticipation of an event
(pre disaster activities). As the disaster unfolds, it is necessary to become involved in the immediate
response and long-term recovery phases.

Disaster Mitigation - Disaster Mitigation also referred to as Disaster Prevention refers to all actions
taken before a disaster to reduce its impacts. Mitigation is done to eliminate or reduce the vulnerability
or chance of occurrence or the effects of a disaster. Mitigation activities fall broadly into two categories
namely Structural mitigation (construction or technological projects which reduce economic and social
impacts eg. retrofitting of structures, construction of leeves etc) and Non-structural mitigation (policies
and practices which raise awareness of hazards or reduce the impact of disasters. eg. legislation, land
use planning, insurance etc). Mitigation is the most costefficient method for reducing the effect of
hazards although not always the most suitable. Mitigation also involves conducting hazard identification
and vulnerability analysis which are essential to the planning of all other phases.

Disaster Preparedness - Disaster Preparedness includes all activities done to attain a state of being ready
to react promptly and effectively in the event of a disaster. It means that a plan of action exists for an
emergency or disasters, and that it is clear as to what to do before and during the emergency or
disaster. Preparedness measures to be undertaken depends upon the analysis of hazard severity and
vulnerability, which is also the basis for deciding mitigation strategy. In some cases, an early warning
gives several hours to act. However, often no prior warning of an impending emergency is possible. Thus
preparedness for any disaster, with or without notice, requires a plan. It is essential to identify the
resources available, and ways to utilize them. It must also be reasonably certain that the plan will work
in an emergency situation
Disaster Response - It refers to activities occur during and immediately following a disaster that are
designed to provide emergency assistance to victims of the event and reduce the likelihood of
secondary damage. The five basic stages of response to an emergency or disaster are (i) Notification/
Warning (ii) Immediate Public Safety, (iii) Property Security, (iv) Public Welfare, and (v) Restoration. The
length of each stage depends upon the emergency and therefore it is also called as emergency response.

Disaster Recovery – It is the final phase of the disaster management cycle which includes all activities
done until all functional systems of the affected area return to normal, or near normal. It includes Short
term recovery and long term recovery. Shortterm recovery is the restoration of vital services and
facilities to minimum standards of operation and safety and is expected to be ready in days. Some
examples are replacement of severely damaged buildings, repair of water and sewer lines, resumption
of electricity and telephone services etc. Long-term recovery may continue for a number of years, and
refers to the state when community slowly returns to preemergency or better conditions. Long-term
recovery may include the construction and operation of new buildings, new electric lines etc. A key
element in the recovery phase is to develop and implement ways to reduce community's vulnerability to
GIS (GEOGRAPHICAL INFORMATION SYSTEM)

* Definition *Technical Information *Applications *Case Studies

1. DEFINITION

GIS (Geographic Information System) is a computer based system comprising hardware, software, data,
people and methodology that combine to provide answers to queries of a geographical nature as and
when required.

In simple words, GIS can be said as the evolution of maps. It can be referred to as maps in computers
which can be easily loaded with lots of valuable information.

Let's break down the term Geographic Information Systems

Geographic = a location. For example - a highway connecting two cities

Information = information about the location. For example - lanes in the a highway

System = that ties-in the above two

GIS is a unique because it combines location and information about the location. Using GIS, you can not
only see the 'place' but find out more information about the place.
2. TECHNICAL INFORMATION

1. Components of GIS

Any working GIS integrates five key components namely (1) Hardware (2) Software (3) Data (4) People
and (5) Methods

Computer Hardware: The general hardware component of a geographical information system is the
computer or work station. It is linked to a disk drive storage unit like external hard disk drives which
provides space for storing data and programs. A digitizer or scanner is used to convert data from maps
into digital form and send them to computer. A scanner is used for obtaining raster data while a digitizer
is a flat used for vectorisation of any map. A plotter is used to present the result of the data processing.
Computer Software: The GIS software includes the programs and the user interface for driving the
hardware. GIS software is essential to generate, store, analyze, manipulate and display geographic
information or data. A working GIS software should require user friendliness, functionalities,
compatibilities, updatability, documentation, and cost effectiveness.

The following is a list of GIS software.

ArcInfo, ArcView (Environmental Systems Research Institute - ESRI)

AutoCAD Maps (Autodesk)

Mapinfo (Mapinfo Corporation)

Microstation (Bentley Systems)

Gram ++ (IIT Mumbai)

Data: Data is the most important component of a GIS. Geographic data (Spatial Data) and related
information data (Aspatial Data) can be collected, compiled and often stored in a DBMS. The integration
of spatial and tabular data stored in a DBMS is a key functionality afforded by GIS.

People: GIS technology has limited value without the people who manage and develop plans for
applying it to real world problems. GIS users range from technical specialists, who design and maintain
the system, to engineers who provide and verify data and to those who use it for their everyday work.
This is what called 'brain ware' which is equally important as the Hardware and software..

Methods: A successful GIS operates according to a well designed implementation plan and business
rules, which are the models and operating practices unique to each organization.

2. Terms used in GIS

(a) Spatial/Geospatial Data: relating to 'space' or 'location'. E.g. Location of Coimbatore

(b) Aspatial Data: relating to information about the space or location. E.g. Population of
Coimbatore, land use maps of Coimbatore, streets in Coimbatore etc.

(c) GPS: Global Positioning System (GPS) is a satellite based system that gives accurate location
information anywhere on earth and can be traced using a computer.

(d) Raster Data and Vector Data: The raster data formats allow for storing real world coordinates of
each pixel in the data. The vector data allows for storing real-world objects are represented
using points, lines or polygons. All GIS data, contains two-types of information - location and
information about the location. So vector data will have coordinates (location) and attributes
(information about the location) while raster data will have only coordinates.

(e) Layers: GIS stores information about the world as a collection of thematic layers that can be
linked together. For example, layers of a dam may be soil profile, groundwater data,
hydrological profile,

3. GIS Workflow

The GIS workflow consists of following steps

Data Collection: To build any GIS, we need data. The data is collected, converted to a convenient format
and stored for use in subsequent processes.

Example: If you are building a GIS Disaster Response, one needs data on road networks in the city,
location of hospitals/fire stations/police stations, addresses of residents etc. Various tools such as GPS
devices, Aerial photos, Survey equipment etc. can be used for data collection

Display and Analysis: The stored data is displayed and analyzed as per requirement. The data is
displayed on a computer screen and the operator gives commands to perform analysis.

Example: To find the shortest route from a house to the nearest hospital, the operator analyzes using a
route finding algorithm on the roads data and the resulting path is displayed on the computer screen.
Many different types of data is displayed as different layers and they are analyzed together.

Sharing: The result of analysis needs to be shared with the decision maker for further action.

Example: In disaster response, the shortest route found using analysis, can be shared with the ambulance
driver in form of printed or verbal instruction.

3. APPLICATIONS OF GIS IN DM

1. It is used for hazard mapping

2. It can be useful for vulnerability assessment

3. It can be very useful for MIS and DSS

4. It can be useful for risk assessment in a particular area.

5. It can be useful for emergency response to locate dangerous points and to find shortest route
for the responders using network analysis.
6. It can be very useful for search and rescue operations in short term emergency response when
coupled with GPS and Remote Sensing

7. It can be useful for live GPS tracking and GIS tools of emergency resources

8. It can be used for finding evacuation routes and choosing emergency operation centres

9. It is used to organize damage information and evaluation of sites for reconstruction

10. It is used to forecast and simulate disaster occurrences with reference to hazards in a particular
areas

4. CASE STUDIES

(A) Analysis on Damage Areas of the Great Hanshin - Awaji Earthquake using GIS

The Great Hanshin - Awaji Earthquake magnitude with 7.2 on the Richer scale abruptly occurred
breaking the silence of the early morning of 17 January 1995. More than 5,000 people living in Kobe,
Japan were crushed to death.

The purpose of the study is to evaluate the impact from the Great Hanshin-Awaji Earthquake by using
GIS, in order to build a Disaster Management System in the near future. This will be useful to minimize
the casualties from natural disasters and to facilitate a quick response from the government in the event
of such natural disasters.

The study involved five major steps namely

Identification of Target Location

Base Data Analysis

Comparison of the data before and after damage

Damage analysis

Study of DMIS development problems

GIS for the disaster is necessary to minimize the casualties from the natural disasters and to facilitate a
quick response from the government in the event of such natural disasters.
But for developing countries, to digitize all houses in one area is almost impossible. Due to a lack of
housing map, a huge data storage and the cost of those computers is too expensive compared with the
daily cost of living are the reasons why it is difficult to build a GIS system.

(B) TSUNAMI RISK ANALYSIS & DISASTER MANAGEMENT BY USING GIS IN TURKEY

Sea disasters, especially tsunamis, can cause loss of lives and property damage when it comes to shores.
Locating the spatial distribution of a catastrophic event like tsunami and knowing its impact has vital
importance in response and recovery stages in case of disaster. Through disaster mitigation, lives and
property can be saved and environmental damage can be reduced.

In this study, for Göcek Bay, a tsunami simulation has been produced using NamiDANCE software. The
simulation results are used as input to produce inundation maps to detect the buildings which are
possibly prone to inundate in case of a tsunami. Based on the applied network modeling, the uses of
obtained outputs in the preparation of emergency action plans are discussed.

The main outcomes of the study are determining the inundated buildings and roads and calculating the
optimum routes using GIS to the closest facilities in case of emergency. The analyses conducted in this
study are based on the source data gathered. These data are integrated with spatial data in order to
determine the optimum routes from inundation zones to safe places, thus an evacuation plan was
assessed.

(C) VENTEN

It is hard to use disaster information from the satellite image for actual disaster management without
overlaying it to general geographical data. To solve this problem, GIS professionals in Japan have
developed VENTEN (Vehicle through Electric Network of disaster geographical information) which is
available to anyone and everyone. An Internet-based GIS disaster information system, “VENTEN”
(Vehicle through Electronic Network of disasTer gEographical informatioN), was developed to achieve a
state of the art disaster management system aided by GIS.

The objective of the development of the VENTEN system is to provide both a system and data (including
analysis results). This system is designed to be readily used with a personal computer connected to the
Internet and installed with any browser. Although various organizations were already providing, free or
at cost, not only basic map data including topographic and natural environment information, but also
GIS data, it was necessary to convert the data format to the requirements of the GIS software in use in
order to view and analyze these data.
Therefore, in the development of the VENTEN system, various GIS data were converted into a VENTEN-
compatible format to allow integrated management of these data and the hardware.

Thus the arrival of VENTEN, an Internet based GIS has made disaster management easy for not only a
disaster manager, but also a layman.

(D) Development of Network Analysis Software - GRAMNET

IIT Mumbai is developing a standalone software package to solve real world problems in networking
including analysis related to resource allocation and routing.

They also plan to integrate this GIS based software with their own GIS software GRAM (Geo-Reference
Area Management) package to enhance its capabilities.

The new software would be called GRAMNET. GRAMNET is a compact tool for solving network analysis
problems (viz.) routing, location and allocation of facilities. It accepts GRAM compatible .vec coverage
files, builds topology and stores it as .sat file.

The package models real world entities closely through network elements. Network arcs form the
framework of the network model. They represent real world structures such as highways, transmission
lines etc. All discrete locations lie on network nodes.

User can set the environment for network analysis by placing network elements at desired
locations.User can interactively set centers over network nodes before the demands are allocated to the
centers.

GRAMNET provides route, allocation, location/allocation processes. Route generates optimal routes
through user selected sequence of nodes taking care of barriers and stops. Allocation process allocates
the demand nodes to the nearest centres. Location/allocation process identifies optimal location of
centres so that overall traversal cost from/to demand nodes to their respective centres is minimized.

The software was developed on a trial basis for Bombay Balasino, Chatna Block and the total Cost of
Project worked to roughly 12 lakhs.

REMOTE SENSING

* Definition *Technical Information *Applications *Case Studies


1. DEFINITION

Remote sensing is the science of acquiring information about the Earth's surface without actually being
in contact with it.

This is done by sensing and recording reflected or emitted energy (data acquisition) and processing,
analyzing, and applying (data processing) that information.

2. DEFINITION

1. PROCESS

The process of remote sensing involves the following seven elements.


1. Energy Source or Illumination (A) - the first requirement for remote sensing is to have an energy
source which illuminates or provides electromagnetic energy to the target of interest.

2. Radiation and the Atmosphere (B) - as the energy travels from its source to the target, it will come in
contact with and interact with the atmosphere it passes through. This interaction may take place a
second time as the energy travels from the target to the sensor.

3. Interaction with the Target (C) - once the energy makes its way to the target through the
atmosphere, it interacts with the target depending on the properties of both the target and the
radiation.

4. Recording of Energy by the Sensor (D) - after the energy has been scattered by, or emitted from the
target, we require a sensor (remote - not in contact with the target) to collect and record the
electromagnetic radiation.

5. Transmission, Reception, and Processing (E) - the energy recorded by the sensor has to be
transmitted, often in electronic form, to a receiving and processing station where the data are
processed into an image (hardcopy and/or digital).

6. Interpretation and Analysis (F) - the processed image is interpreted, visually and/or digitally or
electronically, to extract information about the target which was illuminated.

7. Application (G) - the final element of the remote sensing process is achieved when we apply the
information we have been able to extract from the imagery about the target in order to better
understand it, reveal some new information, or assist in solving a particular problem.

The first four processes together constitute Data Acquisition Process while the last three processes are
called Data Processing Works.

2. ACTIVE AND PASSIVE REMOTE SENSING

As we have seen above, the fulcrum of remote sensing process is the energy source. The sun provides a
very convenient source of energy for remote sensing. The sun's energy is either reflected or absorbed
and then re-emitted, as it is for infrared wavelengths. Remote sensing systems which use the natural
energy source (sun) are called passive sensors.

Active sensors, on the other hand, provide their own energy source for illumination. The sensor emits
radiation which is directed toward the target to be investigated. The radiation reflected in microwave
wavelengths from that target is detected and measured by the sensor. Some examples of active sensors
are RADAR, LIDAR, Laser fluorosensor and synthetic aperture radar (SAR). The advantages for active
remote sensing include the ability to obtain measurements anytime, regardless of the time of day or
season.
3. PLATFORMS AND SENSORS

(A) Remote Sensing Platforms: Platforms in Remote Sensing refer to the carriers of sensors. The
platforms can be

Ground-based platforms: ground, vehicles and/or towers (upto 50m)

Airborne platforms: airplanes, helicopters, high-altitude aircrafts, balloons (upto 50 km)

Spaceborne platforms: from about 100 km to 36000 km

Space shuttle: 250-300 km

Space station: 300-400 km

Low-level satellites: 700-1500 km

High-level satellites: about 36000 km

(B) Remote Sensors: There are many sensors used in remote sensors which can be presented as follows
3. APPLICATIONS OF REMOTE SENSING IN DM

The various applications of remote sensing can be presented as follows.


4. CASE STUDIES

(A) THAMES RIVER STUDY

Among various natural phenomena we get rainfall, snow and four seasons that keep varying the
temperatures, soil moisture and humidity. With lot of land use changes today, the quantity of overland
flow and river flows is not the same and the possibility of finding a relationship between the
urbanization and river flows remote sensing and Geographic Information Systems (GIS) techniques can
be very useful.

Upper Thames River (UTR) watershed was chosen for this case study. This case study illustrates the
process of establishing a relationship between impervious area and river flows using remote sensing
techniques and through analyzing the hydrologic and meteorological data.

Findings from this case study can be used to form policies on land use planning and balanced
urbanization by the city development, planning and conservation authorities. Once the affect of
urbanization on river flows is quantified, the future trend would become possible to predict so that
measures to cope with increasing demand for residential/commercial areas can be met without risking
the increased intensity and extent of storm water in rainy periods.

The normally placid Thames was periodically subject to severe flooding which disrupted the new
communities built in the river's extensive floodplains. The study showed that tremendous urban
development has taken place in the watershed over three decades. Surface water area appeared to be
decreasing over the years – from 3.65% in 1974 to 2.73% in 2000.

Natural disasters cause damage to life and property all over the world in various forms. The pressure on
the earth's resources caused by increased population has resulted in increased vulnerability of human
and their infrastructure to the natural hazards, which have always existed. The result is a dynamic
equilibrium between these forces in which scientific and technological development plays a major role.
A useful technology like Remote Sensing can help the disaster mitigation process through better future
scenario predictions.

Such a study can be replicated for a city like Mumbai which is always torn by floods during every
monsoon season.

(B) RS & GIS IN GANGTOK

Geographic information system (GIS) and remote sensing (RS) are very useful and effective tools in
disaster management. Various disasters like earthquakes, landslides, floods, fires, tsunamis, volcanic
eruptions and cyclones are natural hazards that kill lots of people and destroy property and
infrastructures every year. Landslides are the most regular geological vulnerabilities in mountain
regions, particularly in Sikkim Himalaya. Remotely sensed data can be used very efficiently to assess
severity and impact of damage due to these disasters. In the disaster relief phase, GIS, grouped with
global positioning system (GPS) is extremely useful in search and rescue operations in areas that have
been devastated and where it is difficult to find one’s bearings. Disaster mapping is the drawing of areas
that have been through excessive natural or man-made troubles to the normal environment where
there is a loss of life, property and national infrastructures.

INTRANETS, EXTRANETS AND INTERNETS

* Intranet *Extranet *Internet *Corollary *Applications

1. INTRANET (INTERNAL NETWORK)

This is a network of computers in an organization where data can be shared within the organization and
the connected computers. It cannot be accessed or connected to the outside world.
For example, consider an office with a few PCs and a few printers all networked together. The network
would not be connected to the outside world. On one of the drives of one of the PCs there would be a
directory of web pages that comprise the Intranet. Other PCs on the network could access this Intranet
by pointing their browser (Netscape or Internet Explorer) to this directory.

Intranets are normally governed by FTP (File Transfer Protocol)

2. EXTRANET (EXTERNAL NETWORK)

An Extranet is actually an Intranet that is partially accessible to authorized outsiders. The actual server
(the computer that serves up the web pages) will reside behind a firewall. The firewall helps to control
access between the Intranet and Extranet permitting access to the Intranet only to people who are
suitably authorized. The level of access can be set to different levels for individuals or groups of outside
users. The access can be based on a username and password or an IP address. Extranets are normally
governed by a modified FTP (File Transfer Protocol) – FTP2

3. INTERNET (INTERNATIONAL NETWORK)

Internet is the world-wide network of computers accessible to anyone who knows their Internet
Protocol (IP) address, a unique set of numbers (such as 209.33.27.100) that defines the computer's
location. Most will have accessed a computer using a website address such as http://www.hcidata.com.
Before this named computer can be accessed, the name needs to be resolved (translated) into an IP
address. To do this your browser (for example Netscape or Internet Explorer) will access a Domain Name
Server (DNS) computer to lookup the name and return an IP address - or issue an error message to
indicate that the name was not found. Once your browser has the IP address it can access the remote
computer. The server may implement security at a directory level so that access is via a username and
password, but otherwise all the information is accessible.

Internet is governed by HTTP (Hyper Text Transfer Protocol)

4. COROLLARY

The firewall helps to control access between the Intranet and Internet to permit access to the Intranet
only to people who are members of the same company or organization. If the Intranet network is
connected to the Internet, the Intranet will reside behind a firewall and, if it allows access from the
Internet, will be an Extranet.

The differences between the Intranet, Internet and Extranet can be illustrated by the following diagrams

5. APPLICATIONS

The applications of these networking technologies in disaster management can be listed as follows

1. It can be used for easy communication between disaster managers

2. These technologies are vital to set up a Disaster MIS, DSS or accessible database

3. They are very essential in setting up a Disaster Information Network (DIN)

4. The Internet is useful for disaster information dissemination and early warning

5. The Intranet and Extranet would help in procurement and processing of data related to disasters

6. The Networking technologies can also be very helpful in disaster response training.

7. They can be used as a tool to facilitate community based disaster management


8. They can be used for a major role in DRR education and awareness

MIS (MANAGEMENT INFORMATION SYSTEM)

* Definition *Technical Information *Applications *Case Studies

1. DEFINITION

Management Information Systems (MIS) is a computer based package, covering the application of
people, technologies, and procedures collectively called information systems, to solving business
problems using easy availability of required information.

Another well used definition of MIS is that “MIS is a planned system of collecting, storing and
disseminating information needed to carry out the functions of management”

MIS is also defined by its three words

Management : Management is art of getting things done through and with the people in formally
organized groups

Information : Information is data that is processed and is presented in a form which assists the end user

System : A system is defined as a set of elements which are joined together to achieve a common
objective.

2. TECHNICAL INFORMATION

1. Objectives of MIS – The objectives of MIS are listed as follows

Data Capturing

Processing of Data

Storage of Information

Retrieval of Information

Dissemination of Information
2. Components of MIS – The components of a MIS or pre requisites to establish an MIS would
include

Hardware

Software

People

Database

MIS Architecture and Strategies

3. MIS Software – MIS Software should be tailor made. However some of the popular MIS
software adaptable for many applications are listed here

PRISM

EIMS

NSTMIS

4. MIS and ERP, MIS and DSS

ERP (Enterprise Resource Planning) activity and processing based

MIS (Management Information System) is information based

MIS (Management Information System) is basically a kind of link to facilitate information and
communication between managers across different areas in a business organization. DSS (Decision
Support System) is advancement from the original MIS. The essential difference between the two is in
focus. DSS, as the term indicates, is about taking reliable decisions. MIS, on the other hand, is about
focusing on the actual flow of information itself.
5. INFORMATION TYPES in MIS – Any MIS would have to cater to the following types of
information

Planning Information - Certain standard norms and specifications are used in planning of any activity.

Control Information - Reporting the status of an activity through a feedback mechanism is called the
Controlling Information.

Knowledge Information - A collection of information through the library records and the research
studies to build up a knowledge base as an information is known as Knowledge Information.

Organization Information - When the information is used by everybody in the organization, it is called
Organization Information.

Functional/ Operational Information - When the information is used in the operation of a business it is
called Functional/Operational Information.

Database Information - When the information has multiple use and application, it is called as database
information.

6. MIS SYSTEM DESIGN – The design and development of MIS for a particular requirement may
follow any one of two basic approaches namely

1. System Development Life Cycle

2. Prototyping

System Development Life Cycle - In order to develop a system successfully, it is managed by breaking
the total development process into smaller basic activities or phases. Any system development process,
in general, is understood to have the following phases:

i) Systems Planning

ii) Systems Analysis

iii) Systems Design

iv) Systems Implementation

v) Systems Operation and Support

Prototyping is the process of creating an incomplete model of the future full-featured system, which can
be used to let the users have a first idea of the completed program or allow the clients to evaluate the
program. The process of prototyping involves four steps namely

i) Identify basic requirements.

ii) Develop initial prototype.


iii) Review

iv) Revise and Enhance the Prototype

3. APPLICATIONS OF MIS IN DM

1. It is essential to establish a DSS (Decision Support Systems)

2. It can be used for setting up Disaster Information Network

3. It is used to learn about disasters hazards by a user, at his own pace & peace

4. It is used for hazard mapping

5. It can be useful for vulnerability assessment

6. It can be a very vital component in disaster preparedness plan

4. CASE STUDIES

(A) VULNERABILITY ATLAS OF INDIA

In 1997 the Government of India, Ministry of Urban Affairs & Employment constituted an Expert Group
to prepare a Vulnerability Atlas taking into account three natural hazards which are the most common
and damaging to India, namely earthquakes, cyclones and floods.

The zoning maps on macro level for the three hazards are available on small scale for the country as a
whole. To make this information readily available to the planners, administrators and disaster managers,
these maps were prepared on larger scale, state-wise, showing all the administrative units, namely, the
district boundaries, for easy identification of the areas covered by the zones of various intensity levels.

The Vulnerability Atlas contains the following information for each State and Union Territory of India:

(1) seismic hazard map

(2) cyclone and wind hazard map

(3) flood prone area map


(4) housing stock vulnerability table for each district

The Vulnerability Atlas has been published by the Building Materials and Technology Promotion Council
(BMTPC) and is an important input into the State level Disaster Management Planning.

Given that a DMIS would require digitization and information collection on key indicators at various
levels, the Atlas is an important step in the establishment of DMIS and represents the kind of work
required to be done in each country.

(B) INDIA DISASTER RESOURCE NETWORK

India Disaster Resource Network (IDRN), a web based information system, is a platform for managing
the inventory of equipments, skilled human resources and critical supplies for emergency response.

The primary focus is to enable the decision makers to find answers on availability of equipments and
human resources required to combat any emergency situation. This database will also enable them to
assess the level of preparedness for specific vulnerabilities.

IDRN is a national initiative collaborated by National Informatics Centre of Government of India and
UNDP. For corporate participation, IDRN has recently collaborated with BAI(Builders Association of
India) and CII(Confederation of Indian Industry)

IDRN has so far more than 80000 records from more than 530 districts

The data are obtained at district levels, digitized and verified at the State Level and integrated with the
national database available with National Informatics Centre and Ministry of Home Affairs. The data
transfer can be explained through the following illustration

Das könnte Ihnen auch gefallen