SlideShare a Scribd company logo
Gender and disaster risk reduction Gender mainstreaming and gender analysis in work addressing risk reduction Gendered analysis of capacity and vulnerability Gender and Disaster Risk Reduction : A training pack
A gendered CVA matrix Categories and factors Capacity Vulnerability Women Men Women Men Physical or material         Social or organisational         Attitudinal or motivational        
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
A gendered CVA enables us to: ,[object Object],[object Object]
Where can we use a gendered CVA? ,[object Object],[object Object],[object Object],[object Object],[object Object]
A gendered CVA – assessing change over time ,[object Object],[object Object],[object Object]
Oxfam GB, July 2011 This presentation is part of Gender and Disaster Risk Reduction: A training pack available in full from www.oxfam.org.uk/genderdrrpack

More Related Content

Viewers also liked

Yellow River Basin Focal Project: Intervention Analysis
Yellow River Basin Focal Project: Intervention AnalysisYellow River Basin Focal Project: Intervention Analysis
Yellow River Basin Focal Project: Intervention Analysis
Water, food and livelihoods in River Basins: Basin Focal Projects
 
Policy and Gender Analysis: Northern Uganda
Policy and Gender Analysis: Northern UgandaPolicy and Gender Analysis: Northern Uganda
Policy and Gender Analysis: Northern Uganda
CGIAR
 
Gender Analysis of health and nutrition
Gender Analysis of health and nutritionGender Analysis of health and nutrition
Gender Analysis of health and nutritionRashmi PK
 
Gender analysis Survey
Gender analysis SurveyGender analysis Survey
Gender analysis Survey
Jaya Nepal
 
Gender: From gender analysis to transforming gender norms: using empowerment ...
Gender: From gender analysis to transforming gender norms: using empowerment ...Gender: From gender analysis to transforming gender norms: using empowerment ...
Gender: From gender analysis to transforming gender norms: using empowerment ...IFSD14
 
Stakeholder analysis for small-scale water resource project in Thailand
Stakeholder analysis for small-scale water resource project in ThailandStakeholder analysis for small-scale water resource project in Thailand
Stakeholder analysis for small-scale water resource project in ThailandPiriya Uraiwong
 
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
FAO
 
Adaptive mechanism of exotic cattle2
Adaptive mechanism of  exotic cattle2Adaptive mechanism of  exotic cattle2
Adaptive mechanism of exotic cattle2Surjeet Singh
 
Feasibility Report on autoshop
Feasibility Report on autoshopFeasibility Report on autoshop
Feasibility Report on autoshop
mudassar yasin yasin
 
Feasibility Report
Feasibility ReportFeasibility Report
Feasibility Reportjoh03251
 
An introduction to socio-economic and gender analysis
An introduction to socio-economic and gender analysisAn introduction to socio-economic and gender analysis
An introduction to socio-economic and gender analysis
ILRI
 
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
International Water Management Institute (IWMI)
 
Best analytics tool
 Best analytics tool Best analytics tool
Best analytics tool
Ritu Sarkar
 
KASH-Shiriki - Gender Analysis Report
KASH-Shiriki - Gender Analysis ReportKASH-Shiriki - Gender Analysis Report
KASH-Shiriki - Gender Analysis ReportSilvanos Owuori
 
Spider diagram for gender analysis
Spider diagram for gender analysisSpider diagram for gender analysis
Spider diagram for gender analysis
Md. Shariful Hoque
 
Using qualitative methods for gender analysis
Using qualitative methods for gender analysisUsing qualitative methods for gender analysis
Using qualitative methods for gender analysis
IFPRI Gender
 
Overview of IWMI-Central Asia’s research and its application to mitigate impa...
Overview of IWMI-Central Asia’s research and its application to mitigate impa...Overview of IWMI-Central Asia’s research and its application to mitigate impa...
Overview of IWMI-Central Asia’s research and its application to mitigate impa...
International Water Management Institute (IWMI)
 

Viewers also liked (20)

Yellow River Basin Focal Project: Intervention Analysis
Yellow River Basin Focal Project: Intervention AnalysisYellow River Basin Focal Project: Intervention Analysis
Yellow River Basin Focal Project: Intervention Analysis
 
Policy and Gender Analysis: Northern Uganda
Policy and Gender Analysis: Northern UgandaPolicy and Gender Analysis: Northern Uganda
Policy and Gender Analysis: Northern Uganda
 
Gender Analysis of health and nutrition
Gender Analysis of health and nutritionGender Analysis of health and nutrition
Gender Analysis of health and nutrition
 
Gender analysis Survey
Gender analysis SurveyGender analysis Survey
Gender analysis Survey
 
Gender: From gender analysis to transforming gender norms: using empowerment ...
Gender: From gender analysis to transforming gender norms: using empowerment ...Gender: From gender analysis to transforming gender norms: using empowerment ...
Gender: From gender analysis to transforming gender norms: using empowerment ...
 
Stakeholder analysis for small-scale water resource project in Thailand
Stakeholder analysis for small-scale water resource project in ThailandStakeholder analysis for small-scale water resource project in Thailand
Stakeholder analysis for small-scale water resource project in Thailand
 
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
MASSCOTE: Modernization of Management, Operation, and Maintenance of Irrigati...
 
Adaptive mechanism of exotic cattle2
Adaptive mechanism of  exotic cattle2Adaptive mechanism of  exotic cattle2
Adaptive mechanism of exotic cattle2
 
Feasibility Report on autoshop
Feasibility Report on autoshopFeasibility Report on autoshop
Feasibility Report on autoshop
 
Feasibility Report
Feasibility ReportFeasibility Report
Feasibility Report
 
An introduction to socio-economic and gender analysis
An introduction to socio-economic and gender analysisAn introduction to socio-economic and gender analysis
An introduction to socio-economic and gender analysis
 
Smart Phone Apps: Scientific Validation Quantification of Water Conservation
Smart Phone Apps: Scientific Validation Quantification of Water ConservationSmart Phone Apps: Scientific Validation Quantification of Water Conservation
Smart Phone Apps: Scientific Validation Quantification of Water Conservation
 
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
Introduction to Gender Analytical Tools in the agricultural sector and Tips o...
 
Best analytics tool
 Best analytics tool Best analytics tool
Best analytics tool
 
KASH-Shiriki - Gender Analysis Report
KASH-Shiriki - Gender Analysis ReportKASH-Shiriki - Gender Analysis Report
KASH-Shiriki - Gender Analysis Report
 
Spider diagram for gender analysis
Spider diagram for gender analysisSpider diagram for gender analysis
Spider diagram for gender analysis
 
Using qualitative methods for gender analysis
Using qualitative methods for gender analysisUsing qualitative methods for gender analysis
Using qualitative methods for gender analysis
 
Practical tips on how to conduct livelihoods and gender analysis
Practical tips on how to conduct livelihoods and gender analysisPractical tips on how to conduct livelihoods and gender analysis
Practical tips on how to conduct livelihoods and gender analysis
 
Overview of IWMI-Central Asia’s research and its application to mitigate impa...
Overview of IWMI-Central Asia’s research and its application to mitigate impa...Overview of IWMI-Central Asia’s research and its application to mitigate impa...
Overview of IWMI-Central Asia’s research and its application to mitigate impa...
 
Gender analysis
Gender analysisGender analysis
Gender analysis
 

Similar to Gender mainstreaming and gender analysis in work addressing risk reduction: Gendered analysis of capacity and vulnerability

Gender mainstreaming and gender analysis in work addressing risk reduction: C...
Gender mainstreaming and gender analysis in work addressing risk reduction: C...Gender mainstreaming and gender analysis in work addressing risk reduction: C...
Gender mainstreaming and gender analysis in work addressing risk reduction: C...
Oxfam GB
 
Gender mainstreaming and gender analysis in work addressing risk reduction: W...
Gender mainstreaming and gender analysis in work addressing risk reduction: W...Gender mainstreaming and gender analysis in work addressing risk reduction: W...
Gender mainstreaming and gender analysis in work addressing risk reduction: W...
Oxfam GB
 
Write a 5–6 page, APA-formatted report that explains the respons.docx
Write a 5–6 page, APA-formatted report that explains the respons.docxWrite a 5–6 page, APA-formatted report that explains the respons.docx
Write a 5–6 page, APA-formatted report that explains the respons.docx
johnbbruce72945
 
Community Based Disaster Risk Assessment......
Community Based Disaster Risk Assessment...... Community Based Disaster Risk Assessment......
Community Based Disaster Risk Assessment...... MINTU DEBNATH
 
Training module on vulnerability assessment (I)
Training module on vulnerability assessment (I)Training module on vulnerability assessment (I)
Training module on vulnerability assessment (I)weADAPT
 
Writing Sample (Double Edged Sword Livelihoods in Emergencies)
Writing Sample (Double Edged Sword Livelihoods in Emergencies)Writing Sample (Double Edged Sword Livelihoods in Emergencies)
Writing Sample (Double Edged Sword Livelihoods in Emergencies)Rosemary Taing
 
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...Applying Research on Risk & Resilience to Assessment of Children with Sexual ...
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...Jane Gilgun
 
A guide for gender sensitive approach to dm
A guide for gender sensitive approach to dmA guide for gender sensitive approach to dm
A guide for gender sensitive approach to dm
دكتور تامر عبدالله شراكى
 
OverviewWrite a 5 page, APA-formatted report that explains the r.docx
OverviewWrite a 5 page, APA-formatted report that explains the r.docxOverviewWrite a 5 page, APA-formatted report that explains the r.docx
OverviewWrite a 5 page, APA-formatted report that explains the r.docx
smile790243
 
Social capital and disaster Earlier Earlier in the course, you explo.docx
Social capital and disaster Earlier Earlier in the course, you explo.docxSocial capital and disaster Earlier Earlier in the course, you explo.docx
Social capital and disaster Earlier Earlier in the course, you explo.docx
pbilly1
 
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docxSYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
perryk1
 
7.2.1 Assessing progress in VGCE
7.2.1 Assessing progress in VGCE7.2.1 Assessing progress in VGCE
7.2.1 Assessing progress in VGCE
NAP Events
 
Environmental Strategies in Prevention presentation
Environmental Strategies in Prevention presentationEnvironmental Strategies in Prevention presentation
Environmental Strategies in Prevention presentationJoshua S. Greer, Ed.D
 
Fostering Resilience
Fostering ResilienceFostering Resilience
Fostering Resilienceufvcssc
 
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
ICIMOD
 
Application Comparative Analysis of Systemic CrisesAs.docx
Application Comparative Analysis of Systemic CrisesAs.docxApplication Comparative Analysis of Systemic CrisesAs.docx
Application Comparative Analysis of Systemic CrisesAs.docx
spoonerneddy
 
Using the empirical research article that your instructor approved i
Using the empirical research article that your instructor approved iUsing the empirical research article that your instructor approved i
Using the empirical research article that your instructor approved i
heiditownend
 
1-2 PAGESState additional risk andor protective factors you thi.docx
1-2 PAGESState additional risk andor protective factors you thi.docx1-2 PAGESState additional risk andor protective factors you thi.docx
1-2 PAGESState additional risk andor protective factors you thi.docx
aulasnilda
 
Sarah mc kune
Sarah mc kuneSarah mc kune
Sarah mc kuneClimDev15
 
Develop critical insights about the impact of poverty on.docx
Develop critical insights about the impact of poverty on.docxDevelop critical insights about the impact of poverty on.docx
Develop critical insights about the impact of poverty on.docx
bkbk37
 

Similar to Gender mainstreaming and gender analysis in work addressing risk reduction: Gendered analysis of capacity and vulnerability (20)

Gender mainstreaming and gender analysis in work addressing risk reduction: C...
Gender mainstreaming and gender analysis in work addressing risk reduction: C...Gender mainstreaming and gender analysis in work addressing risk reduction: C...
Gender mainstreaming and gender analysis in work addressing risk reduction: C...
 
Gender mainstreaming and gender analysis in work addressing risk reduction: W...
Gender mainstreaming and gender analysis in work addressing risk reduction: W...Gender mainstreaming and gender analysis in work addressing risk reduction: W...
Gender mainstreaming and gender analysis in work addressing risk reduction: W...
 
Write a 5–6 page, APA-formatted report that explains the respons.docx
Write a 5–6 page, APA-formatted report that explains the respons.docxWrite a 5–6 page, APA-formatted report that explains the respons.docx
Write a 5–6 page, APA-formatted report that explains the respons.docx
 
Community Based Disaster Risk Assessment......
Community Based Disaster Risk Assessment...... Community Based Disaster Risk Assessment......
Community Based Disaster Risk Assessment......
 
Training module on vulnerability assessment (I)
Training module on vulnerability assessment (I)Training module on vulnerability assessment (I)
Training module on vulnerability assessment (I)
 
Writing Sample (Double Edged Sword Livelihoods in Emergencies)
Writing Sample (Double Edged Sword Livelihoods in Emergencies)Writing Sample (Double Edged Sword Livelihoods in Emergencies)
Writing Sample (Double Edged Sword Livelihoods in Emergencies)
 
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...Applying Research on Risk & Resilience to Assessment of Children with Sexual ...
Applying Research on Risk & Resilience to Assessment of Children with Sexual ...
 
A guide for gender sensitive approach to dm
A guide for gender sensitive approach to dmA guide for gender sensitive approach to dm
A guide for gender sensitive approach to dm
 
OverviewWrite a 5 page, APA-formatted report that explains the r.docx
OverviewWrite a 5 page, APA-formatted report that explains the r.docxOverviewWrite a 5 page, APA-formatted report that explains the r.docx
OverviewWrite a 5 page, APA-formatted report that explains the r.docx
 
Social capital and disaster Earlier Earlier in the course, you explo.docx
Social capital and disaster Earlier Earlier in the course, you explo.docxSocial capital and disaster Earlier Earlier in the course, you explo.docx
Social capital and disaster Earlier Earlier in the course, you explo.docx
 
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docxSYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
 
7.2.1 Assessing progress in VGCE
7.2.1 Assessing progress in VGCE7.2.1 Assessing progress in VGCE
7.2.1 Assessing progress in VGCE
 
Environmental Strategies in Prevention presentation
Environmental Strategies in Prevention presentationEnvironmental Strategies in Prevention presentation
Environmental Strategies in Prevention presentation
 
Fostering Resilience
Fostering ResilienceFostering Resilience
Fostering Resilience
 
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
SWaRMA_IRBM_Module3_#1, Gendered vulnerabilities and the socioeconomic driver...
 
Application Comparative Analysis of Systemic CrisesAs.docx
Application Comparative Analysis of Systemic CrisesAs.docxApplication Comparative Analysis of Systemic CrisesAs.docx
Application Comparative Analysis of Systemic CrisesAs.docx
 
Using the empirical research article that your instructor approved i
Using the empirical research article that your instructor approved iUsing the empirical research article that your instructor approved i
Using the empirical research article that your instructor approved i
 
1-2 PAGESState additional risk andor protective factors you thi.docx
1-2 PAGESState additional risk andor protective factors you thi.docx1-2 PAGESState additional risk andor protective factors you thi.docx
1-2 PAGESState additional risk andor protective factors you thi.docx
 
Sarah mc kune
Sarah mc kuneSarah mc kune
Sarah mc kune
 
Develop critical insights about the impact of poverty on.docx
Develop critical insights about the impact of poverty on.docxDevelop critical insights about the impact of poverty on.docx
Develop critical insights about the impact of poverty on.docx
 

More from Oxfam GB

Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
Tiger Worm Toilets (Oxfam Public Health Engineering webinar) Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
Oxfam GB
 
Wealth: Having it all and wanting more
Wealth: Having it all and wanting moreWealth: Having it all and wanting more
Wealth: Having it all and wanting more
Oxfam GB
 
Steps towards a living wage in global supply chains
Steps towards a living wage in global supply chainsSteps towards a living wage in global supply chains
Steps towards a living wage in global supply chains
Oxfam GB
 
Sunrise: Bringing together sustainable sourcing and development
Sunrise: Bringing together sustainable sourcing and developmentSunrise: Bringing together sustainable sourcing and development
Sunrise: Bringing together sustainable sourcing and development
Oxfam GB
 
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply ChainSUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
Oxfam GB
 
How can NGOs work effectively with companies?
How can NGOs work effectively with companies?How can NGOs work effectively with companies?
How can NGOs work effectively with companies?
Oxfam GB
 
Tea in Kenya
Tea in KenyaTea in Kenya
Tea in Kenya
Oxfam GB
 
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in IndiaSunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
Oxfam GB
 
How ic ts can make a difference to livelihoods av3 no effects
How ic ts can make a difference to livelihoods av3 no effectsHow ic ts can make a difference to livelihoods av3 no effects
How ic ts can make a difference to livelihoods av3 no effectsOxfam GB
 
Learning event powerpoint template gender indicators
Learning event powerpoint template gender indicatorsLearning event powerpoint template gender indicators
Learning event powerpoint template gender indicatorsOxfam GB
 
How ICTs can make a difference to livelihoods
How ICTs can make a difference to livelihoodsHow ICTs can make a difference to livelihoods
How ICTs can make a difference to livelihoodsOxfam GB
 
Coffee group
Coffee groupCoffee group
Coffee groupOxfam GB
 
Learning event thurs slides v1
Learning event thurs slides v1Learning event thurs slides v1
Learning event thurs slides v1Oxfam GB
 
Learning event tues slides
Learning event tues slidesLearning event tues slides
Learning event tues slidesOxfam GB
 
Opt bwf pp for oxfam 20 02-2014 with comments
Opt bwf pp for oxfam 20 02-2014 with commentsOpt bwf pp for oxfam 20 02-2014 with comments
Opt bwf pp for oxfam 20 02-2014 with commentsOxfam GB
 
Oxfam italy livestock programme (short version)
Oxfam italy  livestock programme (short version)Oxfam italy  livestock programme (short version)
Oxfam italy livestock programme (short version)Oxfam GB
 
Arm vra & pcva arm
Arm vra &  pcva armArm vra &  pcva arm
Arm vra & pcva armOxfam GB
 
Arm resilient agr arm
Arm resilient agr armArm resilient agr arm
Arm resilient agr armOxfam GB
 
Opt enterprise dev opt presentation mi 2014
Opt enterprise dev opt presentation  mi 2014Opt enterprise dev opt presentation  mi 2014
Opt enterprise dev opt presentation mi 2014Oxfam GB
 
Azb strawberry ppt
Azb strawberry pptAzb strawberry ppt
Azb strawberry pptOxfam GB
 

More from Oxfam GB (20)

Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
Tiger Worm Toilets (Oxfam Public Health Engineering webinar) Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
Tiger Worm Toilets (Oxfam Public Health Engineering webinar)
 
Wealth: Having it all and wanting more
Wealth: Having it all and wanting moreWealth: Having it all and wanting more
Wealth: Having it all and wanting more
 
Steps towards a living wage in global supply chains
Steps towards a living wage in global supply chainsSteps towards a living wage in global supply chains
Steps towards a living wage in global supply chains
 
Sunrise: Bringing together sustainable sourcing and development
Sunrise: Bringing together sustainable sourcing and developmentSunrise: Bringing together sustainable sourcing and development
Sunrise: Bringing together sustainable sourcing and development
 
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply ChainSUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
SUNRISE 2.0 Case Study: Unilever’s inclusive Black Soy Supply Chain
 
How can NGOs work effectively with companies?
How can NGOs work effectively with companies?How can NGOs work effectively with companies?
How can NGOs work effectively with companies?
 
Tea in Kenya
Tea in KenyaTea in Kenya
Tea in Kenya
 
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in IndiaSunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
Sunrise 2.0 Case Study: Unilever’s Inclusive Tomato Supply Chain in India
 
How ic ts can make a difference to livelihoods av3 no effects
How ic ts can make a difference to livelihoods av3 no effectsHow ic ts can make a difference to livelihoods av3 no effects
How ic ts can make a difference to livelihoods av3 no effects
 
Learning event powerpoint template gender indicators
Learning event powerpoint template gender indicatorsLearning event powerpoint template gender indicators
Learning event powerpoint template gender indicators
 
How ICTs can make a difference to livelihoods
How ICTs can make a difference to livelihoodsHow ICTs can make a difference to livelihoods
How ICTs can make a difference to livelihoods
 
Coffee group
Coffee groupCoffee group
Coffee group
 
Learning event thurs slides v1
Learning event thurs slides v1Learning event thurs slides v1
Learning event thurs slides v1
 
Learning event tues slides
Learning event tues slidesLearning event tues slides
Learning event tues slides
 
Opt bwf pp for oxfam 20 02-2014 with comments
Opt bwf pp for oxfam 20 02-2014 with commentsOpt bwf pp for oxfam 20 02-2014 with comments
Opt bwf pp for oxfam 20 02-2014 with comments
 
Oxfam italy livestock programme (short version)
Oxfam italy  livestock programme (short version)Oxfam italy  livestock programme (short version)
Oxfam italy livestock programme (short version)
 
Arm vra & pcva arm
Arm vra &  pcva armArm vra &  pcva arm
Arm vra & pcva arm
 
Arm resilient agr arm
Arm resilient agr armArm resilient agr arm
Arm resilient agr arm
 
Opt enterprise dev opt presentation mi 2014
Opt enterprise dev opt presentation  mi 2014Opt enterprise dev opt presentation  mi 2014
Opt enterprise dev opt presentation mi 2014
 
Azb strawberry ppt
Azb strawberry pptAzb strawberry ppt
Azb strawberry ppt
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Gender mainstreaming and gender analysis in work addressing risk reduction: Gendered analysis of capacity and vulnerability

  • 1. Gender and disaster risk reduction Gender mainstreaming and gender analysis in work addressing risk reduction Gendered analysis of capacity and vulnerability Gender and Disaster Risk Reduction : A training pack
  • 2. A gendered CVA matrix Categories and factors Capacity Vulnerability Women Men Women Men Physical or material         Social or organisational         Attitudinal or motivational        
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Oxfam GB, July 2011 This presentation is part of Gender and Disaster Risk Reduction: A training pack available in full from www.oxfam.org.uk/genderdrrpack