IDEAS home Printed from https://ideas.repec.org/a/kap/porgrv/v9y2009i4p325-341.html
   My bibliography  Save this article

Post-Katrina Hazard Mitigation on the Gulf Coast

Author

Listed:
  • Beverly Cigler

Abstract

No abstract is available for this item.

Suggested Citation

  • Beverly Cigler, 2009. "Post-Katrina Hazard Mitigation on the Gulf Coast," Public Organization Review, Springer, vol. 9(4), pages 325-341, December.
  • Handle: RePEc:kap:porgrv:v:9:y:2009:i:4:p:325-341
    DOI: 10.1007/s11115-009-0095-6
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s11115-009-0095-6
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11115-009-0095-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Howard Kunreuther, 2002. "Risk Analysis and Risk Management in an Uncertain World," Risk Analysis, John Wiley & Sons, vol. 22(4), pages 655-664, August.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Adam E. Clark & Ronald R. Hagelman & Richard W. Dixon, 2020. "Modeling a contraflow evacuation method for tropical cyclone evacuations in Nueces County, Texas," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(3), pages 2757-2786, September.
    2. Virgil Henry Storr & Stefanie Haeffele-Balch & Laura E. Grube, 2017. "Social capital and social learning after Hurricane Sandy," The Review of Austrian Economics, Springer;Society for the Development of Austrian Economics, vol. 30(4), pages 447-467, December.
    3. Daniel Burleson & Hanadi Rifai & Jennifer Proft & Clint Dawson & Philip Bedient, 2015. "Vulnerability of an industrial corridor in Texas to storm surge," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 77(2), pages 1183-1203, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Walter W. Piegorsch, 2010. "Translational benchmark risk analysis," Journal of Risk Research, Taylor & Francis Journals, vol. 13(5), pages 653-667, July.
    2. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    3. Bruno Spilak & Wolfgang Karl Härdle, 2022. "Tail-Risk Protection: Machine Learning Meets Modern Econometrics," Springer Books, in: Cheng-Few Lee & Alice C. Lee (ed.), Encyclopedia of Finance, edition 0, chapter 92, pages 2177-2211, Springer.
    4. Wesley E Highfield & Sarah A Norman & Samuel D Brody, 2013. "Examining the 100‐Year Floodplain as a Metric of Risk, Loss, and Household Adjustment," Risk Analysis, John Wiley & Sons, vol. 33(2), pages 186-191, February.
    5. Jingyu Liu & Walter W. Piegorsch & A. Grant Schissler & Susan L. Cutter, 2018. "Autologistic models for benchmark risk or vulnerability assessment of urban terrorism outcomes," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 181(3), pages 803-823, June.
    6. Walter W. Piegorsch & Susan L. Cutter & Frank Hardisty, 2007. "Benchmark Analysis for Quantifying Urban Vulnerability to Terrorist Incidents," Risk Analysis, John Wiley & Sons, vol. 27(6), pages 1411-1425, December.
    7. Jing Zeng & Jiuchang Wei & Dingtao Zhao & Weiwei Zhu & Jibao Gu, 2017. "Information-seeking intentions of residents regarding the risks of nuclear power plant: an empirical study in China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 87(2), pages 739-755, June.
    8. Canhoto, Ana Isabel, 2021. "Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective," Journal of Business Research, Elsevier, vol. 131(C), pages 441-452.
    9. Raymond A. Zilinskas & Bruce Hope & D. Warner North, 2004. "A Discussion of Findings and Their Possible Implications from a Workshop on Bioterrorism Threat Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 901-908, August.
    10. Bruno Spilak & Wolfgang Karl Hardle, 2020. "Tail-risk protection: Machine Learning meets modern Econometrics," Papers 2010.03315, arXiv.org, revised Aug 2021.
    11. Max Resende & Alexandre Ferreira, 2021. "A machine learning approach to risk disclosure reporting," Economics Bulletin, AccessEcon, vol. 41(2), pages 234-251.
    12. Michèle Marti & Michael Stauffacher & Jörg Matthes & Stefan Wiemer, 2018. "Communicating Earthquake Preparedness: The Influence of Induced Mood, Perceived Risk, and Gain or Loss Frames on Homeowners’ Attitudes Toward General Precautionary Measures for Earthquakes," Risk Analysis, John Wiley & Sons, vol. 38(4), pages 710-723, April.
    13. Munan Li & Alan L. Porter, 2018. "Facilitating the discovery of relevant studies on risk analysis for three-dimensional printing based on an integrated framework," Scientometrics, Springer;Akadémiai Kiadó, vol. 114(1), pages 277-300, January.
    14. Ajita Atreya & Susana Ferreira, 2015. "Seeing is Believing? Evidence from Property Prices in Inundated Areas," Risk Analysis, John Wiley & Sons, vol. 35(5), pages 828-848, May.
    15. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    16. Bridget M. Hutter & Clive J. Jones, 2007. "From government to governance: External influences on business risk management," Regulation & Governance, John Wiley & Sons, vol. 1(1), pages 27-45, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:porgrv:v:9:y:2009:i:4:p:325-341. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.