An application of ‘Big Data’ in flood risk management

D. Morrison, G. Aitken, L. Beevers, G. Wright

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


Vulnerability can be conceptualised as a three-dimensional space that comprises of susceptibility, exposure and resilience. These components are pertinent in enhancing our understanding of how physical and social systems react and are integral to successful Flood Risk Management. The emergence of ‘Big Data’ provides a unique opportunity to understand the vulnerability of our systems on a deeper level. This paper provides preliminary insights into the applicability of Big Data in FRM through a mixed-methods approach that considers three components of vulnerability. We highlight that Big Data can be useful when applied to top-down and bottom-up strategies alike to understand the interplay between exposure, susceptibility and resilience and their implications in better protecting our social system. Overall, this paper aims to further the discussion on the integration of top-down and bottom-up FRM strategies and interdependence of scales of vulnerability to flooding.

Original languageEnglish
Title of host publicationRiver Flow 2020
Subtitle of host publicationProceedings of the 10th Conference on Fluvial Hydraulics
EditorsWim Uijttewaal, Mario J. Franca, Daniel Valero, Victor Chavarrias, Claudia Ylla Arbos, Ralph Schielen, Ralph Schielen, Alessandra Crosato
Place of PublicationLondon
PublisherCRC Press
Number of pages9
ISBN (Electronic)9781003110958
ISBN (Print)9780367627737
Publication statusPublished - 2020
Event10th Conference on Fluvial Hydraulics 2020 - Virtual, Delft, Netherlands
Duration: 7 Jul 202010 Jul 2020


Conference10th Conference on Fluvial Hydraulics 2020
Abbreviated titleRiver Flow 2020
CityVirtual, Delft

ASJC Scopus subject areas

  • Fluid Flow and Transfer Processes
  • Geotechnical Engineering and Engineering Geology


Dive into the research topics of 'An application of ‘Big Data’ in flood risk management'. Together they form a unique fingerprint.

Cite this