An end-to-end assessment of extreme weather impacts on food security

被引:1
|
作者
Chavez, Erik [1 ,2 ]
Conway, Gordon [1 ]
Ghil, Michael [3 ,4 ,5 ,6 ]
Sadler, Marc [7 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Ctr Environm Policy, London SW7 1NA, England
[2] Univ London Imperial Coll Sci Technol & Med, Sch Business, Dept Finance, London SW7 2AZ, England
[3] Ecole Normale Super, Dept Geosci, F-75230 Paris 05, France
[4] Ecole Normale Super, Environm Res & Teaching Inst, F-75230 Paris 05, France
[5] Univ Calif Los Angeles, Dept Atmospher & Ocean Sci, Los Angeles, CA 90095 USA
[6] Univ Calif Los Angeles, Inst Geophys & Planetary Phys, Los Angeles, CA 90095 USA
[7] World Bank, Agr & Environm Serv Dept, Risk & Markets Practice, Washington, DC 20433 USA
基金
美国国家科学基金会;
关键词
CLIMATE; MODELS; RICE; TEMPERATURE; YIELDS; MAIZE;
D O I
10.1038/NCLIMATE2747
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Both governments and the private sector urgently require better estimates of the likely incidence of extreme weather events(1), their impacts on food crop production and the potential consequent social and economic losses(2). Current assessments of climate change impacts on agriculture mostly focus on average crop yield vulnerability(3) to climate and adaptation scenarios(4,5). Also, although new-generation climate models have improved and there has been an exponential increase in available data(6), the uncertainties in their projections over years and decades, and at regional and local scale, have not decreased(7,8). We need to understand and quantify the non-stationary, annual and decadal climate impacts using simple and communicable risk metrics(9) that will help public and private stakeholders manage the hazards to food security. Here we present an 'end-to-end' methodological construct based on weather indices and machine learning that integrates current understanding of the various interacting systems of climate, crops and the economy to determine short-to long-term risk estimates of crop production loss, in different climate and adaptation scenarios. For provinces north and south of the Yangtze River in China, we have found that risk profiles for crop yields that translate climate into economic variability follow marked regional patterns, shaped by drivers of continental-scale climate. We conclude that to be cost-effective, region-specific policies have to be tailored to optimally combine different categories of risk management instruments.
引用
收藏
页码:997 / +
页数:6
相关论文
共 50 条
  • [1] An end-to-end assessment of extreme weather impacts on food security
    Erik Chavez
    Gordon Conway
    Michael Ghil
    Marc Sadler
    [J]. Nature Climate Change, 2015, 5 : 997 - 1001
  • [2] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [3] End-to-end security assessment framework for connected vehicles
    Evans, David
    Calvo, Daniel
    Arroyo, Adrian
    Manilla, Alejandro
    Gomez, David
    [J]. 2019 22ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2019,
  • [4] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [5] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [6] SECUPerf: End-to-End Security and Performance Assessment of Cloud Services
    Xiong, Kaiqi
    Pantangi, Ajay
    Makati, Mufaddal
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1747 - 1752
  • [7] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [8] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [9] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [10] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447