Skip to main content

Advertisement

Log in

Zoning and spatial vulnerability assessment with emphasis on infrastructure using GIS (case study: Kurdistan Province, Iran)

  • Original Paper
  • Published:
Arabian Journal of Geosciences Aims and scope Submit manuscript

Abstract

The vulnerability of any country’s infrastructure to natural and anthropogenic factors serves as one of the most important issues, which in turn may cause irreparable damage. The present practical and developmental study aims to shed light on the spatial vulnerability of infrastructure in Kurdistan province (Iran) from the perspective of passive defense using analytic network process (ANP) in a GIS environment and also zoning vulnerability infrastructure against natural and human factors. The results obtained from the study of spatial pattern and zoning of vulnerability show that the spatial distribution of infrastructure in Kurdistan province is centralized and clustered, and in terms of vulnerability, about 80% of this province have moderate to very high vulnerability. The reason behind this is the poor condition of the physical indicators and the concentration of the main infrastructure in a small part of the province, necessitating more attention to land management and passive defense plans.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Aftab A, Nazimfar H, Mousavi M, Eshghi A (2016) The impact of geographical factors on passive defense in the frontier areas of West Azerbaijan Province (with emphasis on military center locations). Frontier Studies Journal. Fourth Year, Second Edition, pp. 155–127. (In Persian)

  • Asadi M, Jahanbakhsh Asl S (2016) Suitable sites for wind power plants constructed in East Azerbaijan using FuzzyAnalytical hierarchy process (FAHP) method. J Remote Sens Geogr Inf Syst Nat Resour 4:109–195 ((In Persian with English abstract))

    Google Scholar 

  • Azizi MM, Barnafar M (2012) Urban vulnerability assessment due to air strikes. Journal of Passive Defense Science and Technology. Third Year, No. 2, Exodus 127–137

  • Baeza A, Bojorquez-Tapia LA, Janssen M A, Eakin H (2019) Operationalizing the feedback between institutional decision-making, sociopolitical infrastructure, and environmental risk in urban vulnerability analysis. Journal of Environmental Management. 241:407–417. https://doi.org/10.1016/j.jenvman.2019.03.138

  • Bagheri E, Ghorbani AA (2008) The state of the art in critical infrastructure protection: a framework for convergence. Int J Crit Infrastr 4(3):215–44. https://www.ee.ryerson.ca/~bagheri/papers/CIPFramework.pdf

  • Bassani M, Rossetti L, Catani L (2020) Spatial analysis of road crashes involving vulnerable road users in support of road safety management strategies. Transp Res Proc 45:394–401. https://doi.org/10.1016/j.trpro.2020.03.031

    Article  Google Scholar 

  • Desalegn H, Mulu A (2021) Flood vulnerability assessment using GIS at Fetam watershed, upper Abbay basin. Ethiopia Heliyon 7. https://doi.org/10.1016/j.heliyon.2020.e05865

  • Dong X, Jiang L, Zeng S, Guo R, Zeng Y (2020) Vulnerability of urban water infrastructures to climate change at city level. Resour Conserv Recycl 161:104918. https://doi.org/10.1016/j.resconrec.2020.104918

    Article  Google Scholar 

  • Ghosh S, Chatterjee ND, Dinda S (2021) Urban ecological security assessment and forecasting using integrated DEMATEL-ANP and CA-Markov models: a case study on Kolkata Metropolitan Area. India Sustain Cities Soc 68:102773. https://doi.org/10.1016/j.scs.2021.102773

    Article  Google Scholar 

  • Haimes YY (2006) On the definition of vulnerabilities in measuring risks to infrastructures. Risk Anal 26(2):293–296. https://doi.org/10.1111/j.1539-6924.2006.00755.x

    Article  Google Scholar 

  • Huang ChN, Liou JJH, Chuang YCh (2014) A method for exploring the interdependencies and importance of critical infrastructures. Knowl-Based Syst 55:66–74. https://doi.org/10.1016/j.knosys.2013.10.010

    Article  Google Scholar 

  • Johansson J, Hassel H, Zio E (2013) Reliability and vulnerability analyses of critical infrastructures: comparing two approaches in the context of power systems. Reliab Eng Syst Saf 120:27–38. https://doi.org/10.1016/j.ress.2013.02.027

    Article  Google Scholar 

  • Kazemi S, Tabrizi N (2015). Assessment of urban space safety with emphasis on passive defense indicators (case study: Amol City). J Urban Plan Stud. Year Three, (9):11-26

  • Keyvanfar A, Shafaghat A, Ismail N, Mohamad S, Ahmad A (2021) Multifunctional retention pond for stormwater management: a decision-support model using Analytical Network Process (ANP) and Global Sensitivity Analysis (GSA). Ecol Ind 124:107317. https://doi.org/10.1016/j.ecolind.2020.107317

    Article  Google Scholar 

  • Leritina G, Hauskenc K (2011) Preventive strike vs. false targets and protection in the fence strategy. Reliab Eng Syst Saf l96(8):912–924. https://doi.org/10.1016/j.ress.2011.03.008

  • Inanloo B, Tansel B, Shams K, Jin X, Gan A (2016) A decision aid GIS-based risk assessment and vulnerability analysis approach for transportation and pipeline networks. Saf Sci 84:57–66. https://doi.org/10.1016/j.ssci.2015.11.018

    Article  Google Scholar 

  • McDaniels T, Chang S, Peterson K, Mikawoz J, Reed D (2007) Empirical framework for characterizing infrastructure failure interdependencies. J Infrastruct Syst 13(3):175–184 ((In Persian with English abstract))

    Article  Google Scholar 

  • McEntire DA (2005) Why vulnerability matters – exploring the merit of an inclusive disaster reduction concept. Disaster Prev Manag 14(2):206–222. https://doi.org/10.1108/09653560510595209

    Article  Google Scholar 

  • Movahedinia J (2007) Foundations. Passive Defense, Malek Ashtar University of Technology, Tehran, First Edition. (In Persian)

  • Najafnezhad Asl S, Mohammadi Moghadam Y, Poormoosavi SM (2019) The role of passive defense in urban crisis management from urban managers’ perspective. Int J Hum Capital Urban Manag 4(3):205–212. https://doi.org/10.22034/IJHCUM.2019.03.05

    Article  Google Scholar 

  • Nasution BI, Kurniawan R, Siagian TH, Fudholi A (2020) Revisiting social vulnerability analysis in Indonesia: an optimized spatial fuzzy clustering approach. Int J Disaster Risk Reduct 51:101801. https://doi.org/10.1016/j.ijdrr.2020.101801

    Article  Google Scholar 

  • Nouraei H, Rezaei N, Abbaspour RA (2011) Spatial evaluation and analysis of post-earthquake local communication networks performance from the passive defense perspective. J Passive Def Sci Technol. Second Year, (3):151–160. (In Persian with English abstract). https://doi.org/10.22059/jurbangeo.2019.265008.968

  • Ouyang M (2016) Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks. Reliab Eng Syst Saf 154:106–116. https://doi.org/10.1016/j.ress.2016.05.007

    Article  Google Scholar 

  • Ramezani A, Malek MAS, Hosnavi H, R. (2018) Developing a spatial methodology to reduce the vulnerability of critical infrastructures against intelligent air-based threats. Int J Crit Infrastruct Prot 23:126–138. https://doi.org/10.1016/j.ijcip.2018.10.001

    Article  Google Scholar 

  • Rueda DF, Calle E (2016) Using interdependency matrices to mitigate targeted attacks on interdependent networks: a case study involving a power grid and backbone telecommunications networks. Int J Crit Infrastruct Prot 16. https://doi.org/10.1016/j.ijcip.2016.11.004

  • Saaty TL (1999) Fundamentals of the analytic network process. Proceedings of ISAHP 1999, Kobe, Japan. http://ergonomia.ioz.pwr.wroc.pl/download/AnpSaaty.pdf

  • Saaty TL (2006) Decision making with the analytic network process: economic, political, social and technological applications with benefits, opportunities, costs and risks. Pittsburgh, Springer.https://doi.org/10.1007/0-387-33987-6

  • SalmanMahiny AR, Kamyab HR (2011) Remote sensing and applied geographic information systems with Idrissi software (translation). By Eastman, vol. Ronald. Mehr Mehdis Publications .596 p. (In Persian)

  • Shamsipour AA, Sheikh M (2010) Mapping sensitive areas and environmental vulnerability in the western part of Fars by fuzzy classification method and hierarchical analysis. J Nat Geogr Res 37:53–68 ((In Persian))

    Google Scholar 

  • Yazdani MH, Sayedin A (2016) Investigating the vulnerability of the city from the perspective of non-factor defense (case study: Ardabil city). J Geogr Inf 25(100):17–17 ((In Persian with English abstract))

    Google Scholar 

  • Zarqani S, Azami H (2011) Analysis of military-security considerations in preparing and locating military centers and resorts with emphasis on Khorasan Razavi province. J Teach Humanit - Space Plan Prep 15(2):141–161 ((In Persian))

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farzam Hasti.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

The DEM of the area was acquired from National Cartographic Center (NCC) of Iran.

The set of factor layers implemented in this study were obtained from Land Management Office of Kurdistan Province, which is the leading institute in conducting land use planning studies in the region. To determine the centers of gravity and the importance of each infrastructure, the tables provided in the passive defense organization of the country have been used.

Additional information

Responsible Editor: Amjad Kallel

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hasti, F., Rouhi, H., Pezhooli, N. et al. Zoning and spatial vulnerability assessment with emphasis on infrastructure using GIS (case study: Kurdistan Province, Iran). Arab J Geosci 15, 115 (2022). https://doi.org/10.1007/s12517-021-09383-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12517-021-09383-3

Keywords

Navigation