• Tools and Resources
  • Customer Services
  • Conflict Studies
  • Development
  • Environment
  • Foreign Policy
  • Human Rights
  • International Law
  • Organization
  • International Relations Theory
  • Political Communication
  • Political Economy
  • Political Geography
  • Political Sociology
  • Politics and Sexuality and Gender
  • Qualitative Political Methodology
  • Quantitative Political Methodology
  • Security Studies
  • Share This Facebook LinkedIn Twitter

Article contents

Environmental security and climate change.

  • Simon Dalby Simon Dalby Balsillie School of International Affairs, Wilfrid Laurier University
  • https://doi.org/10.1093/acrefore/9780190846626.013.168
  • Published in print: 01 March 2010
  • Published online: 22 December 2017
  • This version: 30 June 2020
  • Previous version

Environmental security focuses on the ecological conditions necessary for sustainable development. It encompasses discussions of the relationships between environmental change and conflict as well as the larger global policy issues linking resources and international relations to the necessity for doing both development and security differently. Climate change has become an increasingly important part of the discussion as its consequences have become increasingly clear. What is not at all clear is in what circumstances climate change may turn out to be threat multiplier leading to conflict. Earth system science findings and the recognition of the scale of human transformations of nature in what is understood in the 21st century to be a new geological epoch, the Anthropocene, now require environmental security to be thought of in terms of preventing the worst dangers of fragile states being unable to cope with the stresses caused by rapid environmental change or perhaps the economic disruptions caused by necessary transitions to a post fossil fueled economic system. But so far, at least, this focus on avoiding the worst consequences of future climate change has not displaced traditional policies of energy security that primarily ensure supplies of fossil fuels to power economic growth. Failure to make this transition will lead to further rapid disruptions of climate and add impetus to proposals to artificially intervene in the earth system using geoengineering techniques, which might in turn generate further conflicts from states with different interests in how the earth system is shaped in future. While the Paris Agreement on Climate Change recognized the urgency of tackling climate change, the topic has not become security policy priority for most states, nor yet for the United Nations, despite numerous policy efforts to securitize climate change and instigate emergency responses to deal with the issue. More optimistic interpretations of the future suggest possibilities of using environmental actions to facilitate peace building and a more constructive approach to shaping earth’s future.

  • Anthropocene
  • development
  • earth system
  • environment
  • geoengineering
  • planetary boundary
  • safe operating system
  • sustainability

Updated in this version

Updated references, enhanced discussions of security and political geography.

Environmental Security and Sustainable Development

The contemporary formulation of environmental security was effectively put on the international policy agenda by the World Commission on Environment and Development (WCED) in its 1987 report, Our Common Future . While the report is best remembered for its advocacy of sustainable development and its catalyzing role in shaping the agenda that led to the 1992 United Nations Conference on Environment and Development (UNCED), the so called “Earth Summit,” environmental security is specified in the report as the provision of the conditions necessary for sustainable development. Environmental security is also unlikely to be a possibility in the long-term future if sustainable development is not followed as an overarching economic priority. Thus, the two formulations mutually reinforced each other. Without environmental security sustainable development was unlikely to succeed because conflict and disruption would prevent sensible initiatives. Likewise, if sustainability wasn’t a policy priority, in the long run, ecological destruction would prevent its accomplishment.

While the exact trajectory of climate change wasn’t clear in the 1980s, and Our Common Future suggested that much more science was needed, it was noted as a significant issue that needed attention in formulating environmental security. Other matters, including the dangers of the cold war arms race, were highlighted; clearly nuclear military preparations were anathema to long-term survival and the possibilities of environmental security:

Perhaps the greatest threat to the Earth’s environment, to sustainable human progress, and indeed to survival is the possibility of nuclear war, increased daily by the continuing arms race and its spread to outer space. The search for a more viable future can only be meaningful in the context of a more vigorous effort to renounce and eliminate the development of means of annihilation. (WCED, 1987 , p. 35)

While the dangers of nuclear warfare and the possibilities of a nuclear winter disrupting climate patterns for years, or even decades, were on people’s minds in the 1980s (Sagan & Turco, 1990 ), environmental security was understood as a larger planetary concern needing attention and, implicitly, a very different formulation of security. “The time has come to break out of past patterns. Attempts to maintain social and ecological stability through old approaches to development and environmental protection will increase instability. Security must be sought through change” (WCED, 1987 , p. 250). Simultaneously, Our Common Future suggested that there were growing sources of environmental conflict where resource shortages fed into violence in many underdeveloped parts of the world. Wise use of renewable resources, to ensure their sustainable yields, was a key part of providing environmental security too. Quite how resource shortages were causing conflict wasn’t clearly specified in the report; this was simply assumed to be the case and assumed to be a situation that was getting worse. That there were numerous environmental problems in need of attention isn’t in doubt, but the assumption that scarcity was the cause of the difficulties went more or less unexamined.

Three decades later, as the science on climate change and the role of fossil fuel consumption in particular is highlighted as a key cause of global warming, it is clear that the problem that needs attention is not a matter of scarcity. While climate disruptions may cause local scarcities of water in particular, the problem with climate change is that there is too much fossil fuel, not too little, being used in the global economy. As climate change accelerates, security is increasingly a matter of infrastructure provision and vulnerabilities to extreme events (Dalby, 2009 ). Fossil fuel’s geographical distribution likewise has consequences for geopolitics and the conduct of climate policy, which does not make global coordination of climate change efforts easy (McGlade & Ekins, 2015 ). Renewable energy is widely dispersed and, given the lack of fossil fuels, access and transportation difficulties are much less likely to be a matter of geopolitical disputes (Overland, 2019 ). However, despite this, much of the discussion about climate change and security replicates the earlier discussion of the 1990s, on environmental causation of conflict, without focusing on the larger system transformation that climate change is driving and the consequences of that for security broadly understood.

This is changing, however, as discussions of climate risk and the need to rethink environmental contexts and interconnections in the global political system become clear, in the aftermath of the Paris Agreement on Climate Change of 2015 , and the toll rises of casualties from storms, droughts, fires, and floods as a result of accelerating climate change. Earth system science, in its nascent stages when Our Common Future was being written, has progressed by leaps and bounds, and the necessity of thinking through human vulnerabilities, in what is now widely called the Anthropocene, has become clear to most researchers (Lewis & Maslin, 2018 ). This is not necessarily clear to many policy makers still working within traditional developmental frameworks and energy supply security agendas. The contrast between traditional energy security priorities with energy independence as top priority, for the United States in particular (Yergin, 2011 ), and climate change policy (Nyman, 2018 ), is especially stark in the Trump administration, a matter that highlights the importance of politics in deciding on priorities in security planning.

Our Common Future didn’t provide a precise definition of environmental security, but it clearly suggested that environmental stress was a cause of conflict and that sustainable development required stable environmental conditions to succeed. Hence, environmental security emerged as a policy goal despite the lack of a clear definition as to what it entailed. These themes subsequently shaped both the policy and scholarly agendas in the 1990s, engaging the relationships between environment and insecurity, widely understood, as well as the more specific research focus on environmental change causing conflict (Dalby, 2002 ). While scholarly and policy attention to environment temporarily receded in the early years of the 21st century , during the war on terror, climate concerns reactivated this discussion in updated form, especially in the aftermath of hurricane Katrina in 2005 , an event that raised numerous questions about human vulnerability and the capabilities of states to provide security for their citizens in the face of accelerating climate change.

Various formulations of climate security emerged (McDonald, 2013 ), and in parallel with the discussion in the 1990s, scholars set about trying to clarify the role of climate in causing conflict while simultaneously addressing how this new discussion of human vulnerabilities required updated formulations of security. Most recently, this research and the policy debate have been shaped by the findings of earth system science and emergent discussion of the policy implications of the Anthropocene era (Dalby, 2020 ). In all this, there is no commonly accepted definition of either environmental or climate security, beyond a general sense that predictable weather conditions are key to human flourishing, both directly in agricultural societies, and indirectly given the vulnerabilities of urban societies to infrastructural disruptions.

To explicate all this further, the rest of this article looks back briefly to the discussion in the 1990s concerning environmental change and conflict, then observes the reinvention of the environmental causation arguments and their links to security in the middle of the first decade of the new millennium. Subsequent sections deal with the emergence of the larger earth system science discussion, which documents the scale and urgency of dealing with climate change, energy security that frequently contradicts climate policy, the emergence of climate risk as a policy focus, the discussion of climate securitization, and possibilities of planetary geoengineering; finally, the chapter draws some tentative conclusions about future research directions.

Environment and Conflict

While Our Common Future assumed relationships between resource shortages and conflict, quite how this relationship actually worked wasn’t clear in the report. Two major research projects were undertaken in the 1990s to address the question of how environmental change might generate conflict, in what conditions, where, and with what implications for policy. Thomas Homer-Dixon ( 1999 ) led a team of researchers that investigated a number of case studies, including South Africa, Rwanda, Pakistan, and elsewhere to trace the casual pathways between environmental change and what he termed acute conflict. One of the initial problems turned out to be that security was such an imprecise term that it wasn’t practical as a research agenda if causal relationships were the key to the investigation. Hence, this project focused more narrowly on acute conflict, rather than security more generally. Guenter Baechler ( 1999 ) led a parallel series of investigations that more closely looked at matters of development and discrimination in terms of access to environmental resources in rural areas.

In very broad terms, both research efforts concluded that environmental matters alone weren’t key to predicting conflict. While they were obviously important in numerous situations, key intervening variables included historical patterns of grievance and conflict as well as the competence and legitimacy of existing governmental structures. Scarcity wasn’t obviously a causal factor, and clearly it emerged that in crisis conditions elites often acted to enhance their power and control over resources, a matter that accelerated the marginalization of rural communities. Maldevelopment in Baechler’s ( 1998 ) terms was a key problem and, as such, policies that dealt with the perverse consequences of rural transformation and focused on practical matters in particular contexts were key to sustainable economic activities that were likely to avoid conflict. Elite appropriation of resources was also a theme in Colin Kahl’s ( 2006 ) detailed field-based studies of Kenya and the Philippines. This finding is broadly in parallel with the political ecology literature that has long investigated the power relations in rural transformations linked to development and economic change (Peluso & Watts, 2001 ).

Simultaneously, another series of research efforts were looking to the role of resources in civil wars and larger scale conflict in the Global South. Here, the discussion suggested that control over extraction and export of resources, including timber, oil, diamonds, and coltan, was a key to understanding patterns of violence in the Global South (Bannon & Collier, 2003 ). This is a long-standing pattern in traditional geopolitics, where rivalries over access to resources is a cause of conflict, and in cases such as the Japanese entry into the Second World War, major warfare too (Le Billon, 2013 ). Controlling resource streams and the revenues that they generate may be a way to power and wealth in poor areas that is much more tempting than waiting for long-term economic development to enrich a society. This suggests that local cases of resource abundance may be much more important than scarcity as causes of conflict generation (Le Billon, 2005 ). But it is important to note that most of the resources in these discussions concerning diamonds, minerals, and petroleum, in particular, are not strictly environmental matters. Hence, the discussion of resource curses, Dutch disease, and related resource economics issues are often tangential to environmental security matters.

These studies all suggest in one way or another that theories of locally generated violence as the source of environmental conflict are inadequate; clearly, the larger global economy and the political economy of resource supplies is key to explaining conflict in particular locations, although the causal link is frequently indirectly environmental, at best. Clearly too, while war is related to famine and frequently involves the use of food as a weapon, starving people are usually far too busy trying to find food to initiate large scale conflict despite the practicalities of violence often involved in these situations (Watts, 2013 ). Food riots are frequently urban phenomena emphasizing the importance of economics in insecurity, but large-scale insurrections are at best indirectly related to resource scarcities. As the Arab spring phenomenon suggested global food prices matter; rapid increases in these are often the trigger for political unrest; but environmental matters are indirectly rather than directly involved here as a cause of conflict (Homer-Dixon et al., 2015 ).

In terms of wider interpretations of environmental security, it was also clear in the 1990s that matters of pollution, food shortages, inadequate nutrition, and lack of safe drinking water were substantial hazards to populations in many places. These concerns were part of the larger discussion of human vulnerability (Adger, 2006 ) and human security that incorporated environmental matters into its overarching formulation of the dangers faced by the poorest parts of humanity that threatened their prospects for development (Adger et al., 2014 ). Environmental security in these terms is compromised by many factors, not just those related to overt conflict (Floyd & Matthew, 2013 ); the discussion of specifically environmental security spills over into larger concerns with human security broadly understood (O’Brien, Wolf, & Sygna, 2013 ). Both the narrow version of conflict-related environmental change and the broader understanding of human security having an environmental component fed into the policy discussion of sustainable development.

Climate and Conflict

The failure of the American state to deal effectively with the aftermath of hurricane Katrina and the flooding of New Orleans, in 2005 , dramatically increased the policy attention given to the matter of vulnerabilities to climate change. In 2007 , the discussion once again found its way into policy debates in the United States and the United Kingdom (Mabey, 2007 ) with a number of high-profile publications coinciding with the publication of the Intergovernmental Panel on Climate Change (IPCC) climate assessment and the controversy over Al Gore’s documentary movie An Inconvenient Truth , which shared a Nobel prize with the IPCC and won an Oscar. Both the CNA Corporation ( 2007 ) and the Centre for Security and International Studies (Campbell, Gulledge, McNeill, Podesta, & Ogden, 2007 ) published reports on national security and climate change in 2007 , to be followed soon by the German Advisory Board on Climate Change ( 2008 ) and the US Army War College analysis of national security and climate change (Pumphrey, 2008 ).

A key formulation in this literature in the United States was the idea of climate change as a threat multiplier (CNA Military Advisory Board, 2014 ), something that added to other sources of instability, and in light of the focus on terrorism, a potential source of discontent and terrorist recruitment. Hence this was seen as an issue for national security, and something worth thinking through in terms of long-term strategy. It once again raised the question of the causal links between environmental change, this time explicitly as a result of climate change induced weather variability, and conflict generation. An updated formulation suggested that climate was better understood as a catalyst of conflict (CNA Military Advisory Board, 2014 ). In parallel, the American military became concerned that storms and rising sea levels might render its facilities vulnerable (Briggs & Matejova, 2019 ); a decade before, Tyndall Airforce Base in Florida was badly damaged by hurricane action in 2018 . Vulnerabilities of facilities and the potential for growing interventions to deal with disaster relief and insurgencies aggravated by climate change made climate a matter for military attention regardless of the lack of interest from the Bush, and subsequently the Trump administration in Washington (Klare, 2019 ).

These concerns generated a renewed research focus on environmental conflict and revived the 1990s discussions as to the appropriate frameworks for analysis and methods to investigate political consequences of climate change. A research literature emerged addressing both the empirical studies and policy implications with some quantitative analyses suggesting a clear indication that weather events and larger scale climate change do cause violent conflict (Hsiang & Burke, 2014 ; Hsiang, Meng, & Cane, 2011 ). But other research produced results that are much less certain on connections between civil wars and climate (Buhaug, 2015 ), suggesting that the empirical evidence about such things as drought causing conflict is less than consistent or less than clear (Theisen, Holtermann, & Buhaug, 2012 ). Special issues of Political Geography in 2007 and in 2014 and the Journal of Peace Research in 2012 (see Gleditsch, 2012 ) have generated both empirical investigations and methodological disputes about how to tackle the relationships between climate change and conflict. In Africa, where many of these studies are done, detailed research doesn’t obviously link climate to large scale conflict (O’Loughlin et al., 2012 ). A key part of the methodological debate here in terms of whether large studies are what is required, or whether, given the large variation of social and geographical circumstances over which climate change occurs, data aggregation across diverse situations is in fact useful (Buhaug, 2015 ; Busby, 2018 ; Ide, Link, Scheffran, & Schilling, 2016 ).

These findings are sometimes complicated by the inclusion of large-scale historical events and more contemporary cases as well as their inclusion of a variety of scales from individual acts of aggression all the way up to climate as a factor in civilizational collapse (Hsiang, Burke, & Miguel, 2013 ). Historical studies linking up with new scientific analysis of climate records suggest very clearly that the period of the little ice age, especially in the 17th century , when agricultural production and food supplies were severely compromised in many parts of the world, is related to wars and political conflict (Parker, 2013 ). Similar investigations of the decline of the Western Roman Empire suggest that climate, and in this case disease, were key factors in these historical events (Harper, 2017 ). But great care has to be taken to generalize from these past events to draw conclusions about present trends given the sheer scale of transformations in the global economy over the last few generations, and the emergence of international institutions of aid and governance.

While some large statistical studies claim there is a relationship between climate and conflict, detailed empirical work on the ground repeatedly suggests that if there is such a relationship it is relatively weak in comparison to issues of development and governance (Selby, 2014 ). Focusing on livelihood issues and historical trajectories in particular places suggests specific local factors are crucially important in understanding relationships of violence (Deligiannis, 2012 ). There are numerous difficulties with data sets, distinguishing dependent and independent variables, universal causation claims, and the scales involved (Meierding, 2016a ). Likewise, difficulties occur in terms of how media reports code events, whether civil wars are the focus or more general outbreaks of violence, the scale at which events register in these sets, given that national aggradation over large states may produce spurious correlations, and their completeness as a record of political conflict (Buhaug, 2015 ).

Some quantitative analyses focusing on Africa have suggested that there is a relationship between warming and civil war in Africa (Burke, Miguel, Satyanath, Dykema, & Lobell, 2009 ), but detailed investigation of the statistical claims seems to suggest that the relationships between conflict and environmental change are anything but clear, especially in the case of Eastern Africa (Raleigh & Kniveton, 2012 ). The scholarly research on this theme comes to diverse conclusions. “Sweeping generalizations have undermined a genuine understanding of any climate–conflict link, whereas cumulative results from the numerous studies of individual communities are difficult to summarize” (O’Loughlin et al., 2012 , p. 18344). The finer points of the methodological debate are beyond the scope of this chapter (see Bretthauer, 2017 ), but efforts to integrate different research methods are obviously important to get greater clarity on which connections are most important (van Baalen & Mobjork, 2018 ). While rural disruptions are clearly a matter influenced by weather (Busby, 2018 ), the question as to whether distress turns to conflict relates to the political and social circumstances in particular cases, and the particular ways that rural political economy channels social change into conflict, migration, or collaboration (Ide et al., 2016 ). Nonetheless, despite the lack of clarity about results, this literature has fed into policy analyses of climate risks and the need to consider conflict risks as a matter of foreign policy in Europe (Detges, 2017 ), and in the United States (Werrell & Femia, 2017 ).

A noteworthy attempt to resolve some of the conflicting claims in the empirical discussions by a process of expert elicitation among the key researchers appeared in Nature (Mach et al., 2019 ). This synthesis suggests that four drivers of conflict are especially important in subnational contexts: low socioeconomic development, low capabilities of the state, intergroup inequality (for example, ethnic differences across groups), and recent history of violent conflict. What is unclear is the importance of climate variability, although there is agreement that further climate change will amplify conflict risks. Much of this is simply because, to date, climate disruptions have been small relative to other conflict drivers. Nonetheless, this research effort continues because “Given that conflict has pervasive detrimental human, economic, and environmental consequences, climate-conflict linkages—even if small—would markedly influence the social costs of carbon and decisions to limit future climate change” (Mach et al., 2019 ). The concerns about climate change are about future possibilities, which climate projections suggest will be severe for most societies (Steffen & Rockstrom, 2018 ), but there is no agreement in the scholarly literature that there is a substantial empirical record of this so far in the 21st century . In the policy discussions that draw on this work, there is considerable concern that climate change induced conflict will change the geostrategic situation in dangerous and unpredictable ways, not least as a result of extrapolations from the war in Syria.

Multiple accounts suggested that one of the causes of the Syrian civil war was the migration by unemployed farmers from drought stricken eastern areas to Syrian cities (Gleick, 2014 , Kelley, Mohtadi, Cane, Seager, & Kushnir, 2015 ; Werrell, Femia, & Sternberg, 2015 ). If climate change had induced the drought, which in turn removed agricultural livelihoods from rural areas, and these people, upset with the failure of the government to assist them protested then, so the argument went, here is a case of climate-induced conflict. Careful subsequent analysis of the case and the evidence on which it is based cast considerable doubt on the whole situation, both as to whether climate change had caused the drought in 2007 and subsequent years, and whether the protestors who were attacked by state security forces included substantial numbers of displaced farm workers (Selby, Dahi, Frolich, & Hulme, 2017 ). While rural distress in Syria clearly happened in those years (Daoudy, 2020 ), the causal link via formulations of migration and political protest all the way through to the subsequent civil war is difficult to establish (Ide, 2018 ; Selby, 2018 ). The violent suppression of protest would seem to be key to subsequent events, and the history of regime violence against protests is nothing new in Syria.

Overall, it may be more important to inquire into how large-scale processes of globalization have played out in the region and how the responses of particular regimes to the ongoing warfare since 9/11 have shaped political rivalries (Swain & Jägerskog, 2016 ). In these terms, the role of oil in geopolitical competition is important too, and American intervention in particular is a key factor in the larger patterns of violence. That said, even if so-called oil wars , to gain access to specific supplies, may be overrated as a direct cause of war (Meierding, 2016b ), there is a long history of conflict around oil in the Middle East in particular (Bichler & Nitzan, 2004 ). Now global food markets and climate disruptions are adding additional complications to this pattern. In terms of causal factors relating violence and change 21st century events are heavily influenced by the global economy and multiple interconnected crises in the political architecture of the international system (Homer-Dixon et al., 2015 ).

The Anthropocene

The Syrian case also poses the question as to how much the drought might have been caused or aggravated by anthropogenic climate change. The question of attribution, as it has come to be known, in terms of either the increased likelihood or the severity of damaging weather events (Kirchmeier-Young, Gillett, Zwiers, Cannon, & Anslow, 2019 ), raises issues of responsibility and hence liability, as well potential conflicts if victims of increased storm activity and other climate-change related disruptions seek recompense for their suffering (Byers, Franks, & Gage, 2017 ). As critical scholars have emphasized, as extreme events escalate, people in the Global South in particular, who had very little to do with causing climate change, are its victims. Hence climate justice is a key part of geopolitical discourse, even if representatives of states that have caused the bulk of climate change downplay it, and repeatedly refuse to comprehensively discuss loss and damage as part of international climate change negotiations (Chaturvedi & Doyle, 2015 ).

All of which is even more complicated by the fact that climate change is but one of the phenomena in play as human actions transform ecosystems in most parts of the earth system. Earlier discussions of global change (Steffen et al., 2004 ) have fed into what is known as earth system science and changed our understanding of how planet Earth works. The scale of human activities suggests that we live in new circumstances, in a planetary system that we are remaking drastically and quickly, so much so that it is widely accepted that we live in a new geological epoch named the Anthropocene (Lewis & Maslin, 2018 ).

This science provides at least some of the answers to the questions raised in Our Common Future concerning the trajectory of climate change and other environmental factors. Prominent among the formulations in this new Earth System Science is the suggestion that the Holocene period of the last ten thousand years provided conditions within which we know humanity can flourish (Davies, 2016 ). All of human history has occurred since the last glaciation, a period of relative stability in the planetary climate that has allowed agriculture to develop and has provided predictable conditions for complex economies to persist over long periods. During this time human actions have dramatically transformed landscapes by removing forests and changing habitats and species mixes in most of the ecologically productive terrestrial ecosystems (Ellis, 2018 ). The impact of European colonization linked the world into a global capitalist economy.

Most recently, in the period since the middle of the 20th century , now known as the great acceleration (McNeill & Engelke, 2016 ), earlier fossil fuel-powered industry has been dramatically expanded by petroleum-powered globalization. This has involved the vast increase in the use of fertilizers, the introduction of dangerous chlorofluorocarbons and other things into the system, the widespread use of plastics and concrete to change habitats and modes of living, and the diversion of much of the fresh water systems of the planet due to dams, irrigation, and urban water systems. The planet is increasingly an artificial entity due to the expansion of this “technosphere,” which now measures in trillions of tons of material (Zalesiewicz et al., 2017 ).

In earth system science terms, the period of the Holocene provided a “safe operating space” for humanity, a set of conditions within which we know humanity could flourish (Rockstrom et al., 2009 ). Doing so required that the earth system operate within a number of key “planetary boundaries,” beyond which dramatic disruptions not previously known in human history would result (Steffen et al., 2015 ). In contrast to the Holocene period, the previous million years witnessed a series of glacial periods in what effectively was a lengthy ice age marked by brief warmer “inter-glacial” periods. Current trajectories suggest that we are heading toward a hothouse earth pathway, where rapid and accelerating climate change will be the norm (Steffen & Rockstrom, 2018 ).

This trajectory will further disrupt historical ecological systems and agriculture on land, and will, through pollution, warming, and acidification of the oceans, damage oceanic ecologies fundamentally. As life is primarily an oceanic phenomenon this has profound consequences for all of life, not just humanity; this is the new context of rapid planetary change that we face in the Anthropocene (Angus, 2016 ). Environmental security at the largest scale now requires policies that lead to a “stabilized earth” system, one not too far from the conditions that pertained in the Holocene (Steffen & Rockstrom, 2018 ). The alternative “hothouse earth” pathway offers no indications that civilization can function in conditions of ongoing drastic disruptions, a theme that has received widespread popular commentary (Wallace-Wells, 2019 ).

Risks, Fragility and Adaptation

Early in 2019 , the International Renewable Energy Agency (IRENA) published a report by the Global Commission on the Geopolitics of Energy Transformation that didn’t mince words on the scale of the current transformation:

The accelerating deployment of renewables has set in motion a global energy transformation that will have profound geopolitical consequences. Just as fossil fuels have shaped the geopolitical map over the last two centuries, the energy transformation will alter the global distribution of power, relations between states, the risk of conflict, and the social, economic and environmental drivers of geopolitical instability. (Global Commission, 2019 , p. 12).

This is important, as climate is increasingly being discussed in terms of risks. Mabey, Gulledge, Finel, and Silverthorne ( 2011 ) offered a discussion of climate security in terms of risk analysis, suggesting that, because this formulation is both insightful and familiar to security planners, it should be efficacious in security policy circles. However, while they suggested that risk analysis is useful, they did emphasize a key point that frequently gets lost in the discussion. Normal risk assessments work with a scale that has high probability, low impact events on one end and low probability high risk events on the other. This is not the situation faced by climate analysts (Ruttinger, 2017 ). The present trajectory is clearly leading to high probability high impact futures, and this requires careful thinking about what risks, where and when, need attention in security planning. Focusing on water issues in particular, it is clear that matters of infrastructure and the political economy of access to supplies is key to insecurity, and hence a crucial part of the relationship between climate change and insecurities in particular places (Zografos, Goulden, & Kallis, 2014 ). Likewise, cooperation across international boundaries is important in water management, and cooperation is necessary to effectively deal with extreme events and supply disruptions; at least so far, the vast majority of cases of cross-boundary water difficulties have generated cooperative efforts rather that conflict (Dinar & Dinar, 2017 ).

A report on “A New Climate for Peace,” presented to the G7 meetings in Germany in 2015 , identified seven “compound fragility risks” to states in coming decades as climate change stresses weak states beyond what they may be able to cope with effectively. These risks encompassed: local resource competition,; livelihood insecurity and migration, extreme weather events, volatile food prices and provision, transboundary water management, sea-level rise and coastal degradation, and notably, concern that climate policies may have unintended consequences. This final point draws on studies suggesting that, if adaptation strategies don’t think about specific local conditions carefully, they may aggravate injustices or generate responses that make climate adaptation more difficult. These “backdraft effects” (Dabelko, Herzer, Null, Parker, & Sticklor, 2013 ) may “boomerang” (Swatuk & Wirkus, 2018 ) on aid programs and enhance insecurities, especially where the political economy of climate adaptation perpetuates traditional development efforts relying on engineering projects that fail to take ecological and political conditions in fragile states into account (Sovacool & Linner, 2016 ).

Noting that geopolitical rivalries remain a major problem in the international system, Mobjork, Smith, and Ruttinger ( 2016 ) emphasized the importance of managing them peacefully to facilitate effective climate actions. Similar concerns have been expressed by US AID concerning the risks of climate change and fragile states where “threat multipliers” may enhance the consequences of climate disruptions (Moran, et al., 2018 ; Null & Risi, 2016 ). These considerations have been brought to larger audiences in the documentary movie The Age of Consequences and in the TV series “Years of Living Dangerously.” As with earlier efforts, including the ENVSEC initiative (Hardt, 2018 ), there remains the difficulty with these formulations that focus on the dangers of instability in the Global South, but in the process focus on the symptoms of climate change rather than the causes in metropolitan consumption of fossil fuels (Dalby, 2013 ). This is not to deny the complex consequences of climate change in rural underdeveloped regions that need urgent attention, but the first task in dealing with climate change is the rapid reduction in the use of fossil fuels, and this is something that the affluent consumers of the world need to attend to, especially as the social costs of climate change are mounting in affluent states, too (Ricke, Drouet, Caldeira, & Tavoni, 2018 ).

Invoking a universal climate crisis, where everyone is equally affected or capable of dealing with the consequences, or focusing just on its symptoms rather than causes is to misconstrue the geopolitics of environmental security (Chaturvedi & Doyle, 2015 ). This is especially so when Malthusian fears of growing African populations and climate migration are fed into the policy discourse (Hartmann, 2014 ). In so far as climate migration is an issue, much of the dislocation is within states, and while climate is a factor in long-distance migration, disentangling it from political and economic processes is difficult. The World Bank has estimated that as many as 2.8% of the population in sub-Saharan Africa, South Asia, and Latin America may be forced to move as a result of slow onset climate change (Rigaud et al., 2018 ). While these are large absolute numbers, relative to the dynamics of urbanization and economic change in these regions, they are relatively small amounts. How states respond to cross-border distress migration is one of the key themes that the revival of xenophobic geopolitics poses for sustainable development and effective climate adaptation strategies; the past cases of closing borders to prevent migration from disasters presents alarming precedents (Smith, 2007 ).

Geoengineering and Conflict?

Given the very slow response to increasingly clear indications of rising dangers caused by climate change, discussions of the possibilities of artificially cooling the earth have emerged. Technical fixes to reduce the amount of sunlight reaching the earth’s surface include increasing cloud cover by spraying seawater into the lower atmosphere, and most popular, mimicking the cooling effect of volcano eruptions by injecting sulphur dioxide into the stratosphere (National Research Council, 2015 ). While these might be effective in temporarily reducing insolation, their most articulate advocates make it clear this is a really bad idea that only makes sense as a last-resort temporary measure to buy time while energy systems are converted away from fossil fuel use (Keith, 2013 ). This provides one form of environmental security in that it, if it were to work successfully, it might keep earth’s overall temperature within, to use the earth science system terms, the safe operating space of a stabilized earth system.

While such interventions might work to reduce temperatures, they are also likely to have further largely unpredictable consequences, such as changing the patterns of monsoon rainfall in Asia. Hence, as critics argue, such initiatives need to be avoided and sensible climate mitigation strategies followed instead (Hamilton, 2013 ). If, however, geoengineering efforts were undertaken and disruptions of the monsoon happen, with all the likely consequences for crop production in a region that is populated by more than half of humanity, the disruptions would be severe. If in these circumstances, one state’s leaders were to blame another’s geoengineering efforts for the disruptions and issue ultimatums to cease and desist using such technologies, the possibilities of major conflict loom. While no one took Iranian President Ahmadinejad seriously when he claimed, in 2011 , that European states had been using weather modification techniques to cause a drought in Iran, the precedent is troubling (Dalby & Moussavi, 2017 ).

While overt conflict might not result from geoengineering, the discussion of the potential consequences now includes investigations into possibilities of countermeasures (Parker, Horton, & Keith, 2018 ), a situation that implies, and as has been suggested repeatedly, that security in these terms can only be provided by careful agreements and cooperative efforts by governments and corporations who might actually produce these technologies and use them (Burns & Strauss, 2013 ). The continued failure of the international system to grapple effectively with climate change makes it increasingly unlikely that the planet will be maintained within the aspirational targets of 1.5 or 2 °Celsius average heating above pre-industrial levels (IPCC, 2018 ). As heating accelerates in coming decades, it seems increasingly likely that efforts to artificially cool the planet will be attempted whether or not there is widespread consensus among the global community. The possibilities of unilateral action may be over rated, not least because of the possibilities of countermeasures by other actors, but the potential for conflict over diverging priorities and unclear causal mechanisms in the earth system is, potentially, a major security nightmare for policy makers. As such, environmental security is far more likely to be provided by rapid decarbonization than efforts to deal with the effects of failure to do so.

Securitizing Climate Change

At the largest scale, questions of climate disruptions link up with historical discussions of the causes of major events in human history (Harper, 2017 ; Parker, 2013 ). These offer useful lessons for the future of civilization and the possibilities of humanity causing either the collapse of civilization (Diamond, 2005 ), or, in worst-case scenarios, our own extinction (Wallace-Wells, 2019 ). So far, climate change and the larger discussion of the Anthropocene have not shifted the priorities of macro securitization from traditional concerns with nuclear weapons, state rivalries, or terrorism (Buzan & Waever, 2009 ). Nightmare scenarios loom of the future of a planet where the long-term legacy of contemporary actions is a “plutocene” (Glikson, 2017 ), as in a geological epoch where future strata are marked by plutonium as a consequence of future nuclear wars, whether directly caused by climate disruptions or other Anthropocene events, if the new geological circumstances are not addressed quickly.

In terms of securitization theory, linking climate to security has had a mixed success in gaining policy traction (Floyd, 2010 ); the issue is complex, and while climate is an existential threat to many entities, the complexity of the matter defies easy encapsulation in traditional modes of security thinking (Mayer, 2012 ). In the United Kingdom, under the Blair and Brown governments, it was understood to be a policy issue that mattered (Rothe, 2016 ). Elsewhere, in case studies dealing with Germany, Mexico, and Turkey, the difficulties of getting coherent narratives and national attention suggest how complex the issue is, not least because of the various referent objects—individuals, states, and the planet itself—that are invoked (Diez, von Lucke, &Wellman, 2016 ). So far, at least, efforts to make climate change a security priority have had mixed results in the United States. While President Obama invoked the language of security in making climate a security priority, climate policy has had to deal with opposition from the fossil fuel lobby, and subsequently, the enthusiastic endorsement of fossil fuel exploitation by the Trump administration. The sheer complexity of American politics and the conflicting dynamics between interventionist and de-regulationist tendencies in the neoliberal state make for contradictory trajectories (MacNeil, 2017 ).

If climate change is understood to be a global security issue (Goldstein, 2016 ), then the obvious focus for attention to this matter is the United Nations security council. This body has considered the matter of climate security a number of times but hasn’t generated the necessary momentum to deal with climate as a matter of urgency (Scott & Ku, 2018 ). This is not least because the permanent members include the largest carbon dioxide producers, and the sense of urgency generated in scientific analyses of the current trajectory don’t translate into political responses when fossil fuel industry influence is so widespread. Activists have been making the case for emergency action on climate for many years (Spratt & Sutton, 2009 ), invoking metaphors of wartime, like mobilizations, as necessary to tackle the scale of the problem with the necessary speed (McKibben, 2016 ), but so far with little effective traction on international institutions.

The major achievement of the 2015 Paris Agreement and its rapid acceptance by most of the major states is in fact the agreement that this predicament is real and that it needs to be dealt with in coming years by most of humanity. That said, the contradictions between universal aspiration and national commitments remain to be resolved (Höhne et al., 2017 ). In Bruno Latour’s ( 2018 ) terms, all politics is now somehow related to climate, either as a focal point for attempts at collective action, or as a series of policies mobilized to resist these, as in the case of climate denial efforts and fossil fuel company obstruction of climate change initiatives. It also requires focusing on where international investments go, to coal powered generation stations, or into efforts to restore and more effectively manage forests so they can sequester carbon (Gaffney, Crona, Dauriach, & Galaz, 2018 ).

Keeping the earth system within its safe operating space, which is now the key to environmental security, requires rapid action (IPCC, 2018 ). Environmental security can’t be provided by violent actions after disruptions. It needs to be built into planning and preparation for likely disruptions that are already in the system, but it simultaneously needs to work on the rapid elimination of fossil fuel-based combustion everywhere. Clearly environmental management efforts, the use of parks, pollution prevention, and sustainable yield strategies for resource management alone are not adequate to the tasks facing security planners. In Peter Dauvergne’s ( 2016 ) terms, this “environmentalism of the rich” has failed to deal with either the colonial legacies of destruction of indigenous peoples and their places, or the disruption of numerous ecosystems due to the resource extractions and pollution generated by the scale of the global economy. Neither can traditional modes of “fortress conservation,” using armed forces to keep local populations away from traditional territories to supposedly protect them (Duffy, 2016 ). Similarly, assumptions that isolated regions can somehow protect societies from larger environmental disruptions are premised on a failure to understand the interconnections in the earth system and a nostalgia for inappropriate national containment strategies based on territorial sovereignty (White, 2014 ).

Earth’s Future

In so far as peaceful cooperation among the great powers occurs and violence is contained to relatively small areas that are disrupted by climate shocks, the possibilities for environmental peacemaking add another dimension to the policy discussion (Swain & Öjendal, 2018 ). While regional local peace initiatives, peace parks, and peace building around shared waterways and cooperative resource management are useful initiatives, they are all subject to large scale collaborative efforts of the major powers to slow and eventually stop climate change. All this requires a recognition of the new context of the Anthropocene, where caring for ecosystems rather than extracting resources from them is key to security provision on the largest scale (Harrington & Shearing, 2017 ). It is about more than plans to make societies resilient (Grove, 2018 ); what is needed now is transformative thinking to prepare for the disruptions that are inevitably coming, even if decarbonization does eventually lead to a stabilized earth system in future (Kareiva & Fuller, 2016 ).

In many rural areas in the global economy, however, corporations and military agencies continue to expand their control over resources at the sometimes violent expense of local people anxious to maintain traditional modes of livelihood and control over their territories (Buxton & Hayes, 2016 ). Activists who protest often get killed in the process, while international meddling gets the blame (Matejova, Parker, & Dauvergne, 2018 ). As Our Common Future suggested, in 1987 , many of these practices will have to change if sustainability is to be the priority. How to transition to more ecologically sensible modes of economy is now a key theme in the discussions of environment, security, and peace (Brauch, Oswald Spring, Grin, & Scheffran, 2016 ). The problem with climate change in particular, and the Anthropocene in general, is precisely that what has been secured so far is what is now endangering environmental security for all in coming decades (Dalby, 2020 ). Regional efforts and environmental peacebuilding will undoubtedly be useful, especially in areas where major rivers matter to multiple states, as in the case of the Himalayas (Huda & Ali, 2018 ), but these efforts will only work in the long run if the planet avoids the hothouse pathway of runaway climate change.

The states that are most obviously vulnerable to climate are the low-lying, small island states that face immediate questions of survival, and many other states in the Global South that are vulnerable to agricultural disruptions caused by storms and droughts, but lack the means to make their existential plight a matter of concern for the larger international community (Chaturvedi & Doyle, 2015 ). While climate change may be the largest existential crisis facing human kind, the United Nations has not formulated an effective response (Scott & Ku, 2018 ); a global problem still faces the persistent political problems of multiple jurisdictions and politics, where relative gains are still valued in international politics despite the likely disasters that temporary benefits may confer on the collectivity in the longer term (Harris, 2013 ). The Paris Agreement of 2015 does recognize the necessity of dealing with climate change but still relies on states to craft plans to tackle greenhouse gas emissions without any overarching authority to enforce compliance, even with the limited ambitions states have so far shown in dealing with this issue (Falkner, 2016 ). Climate has so far been understood as a development issue and a matter of inter-state rules, the “law between and development within” approach in Conca’s ( 2015 ) formulation. In turn, this raises the question of whether the United Nations might have better success in thinking about climate if it was considered in terms of its functions to protect human rights and its peace building and conflict prevention roles.

More specifically, this requires thinking about survival as a matter of economic production and shifting from fossil-fueled modes to more renewable ones. In terms of geopolitics, it requires a shift, from assumptions of competitive antagonisms as the basic premise for international politics and security problems, to assumptions of the possibilities of resilient peace as an attainable goal for the United Nations (Barnett, 2019 ). As Conca ( 2019 ) suggests, focusing on the consequences of climate change in such places as the Lake Chad basin and Iraq, where climate migrants and instability are linked to environmental change, if not directly to conflict, may facilitate actions by the United Nations that might accrue to a larger general series of policy initiatives.

Future Research

In light of the growing discussion of security in the Anthropocene (Harrington & Shearing, 2017 ), to do so will also require more fundamental rethinking of environmental security to focus more explicitly on the ecological functioning of the planetary system, a matter of “ecological security” in McDonald’s ( 2018 ) terms, referring to a functional earth system, rather than simply taking the environment as a source of resources, or the contextual backdrop for human affairs. The implications of this new Anthropocene context suggest the need for further research looking at the interconnections between places in the earth system, matters sometimes now encompassed in the literature of environmental geopolitics (O’Lear, 2018 , 2020 ), as well as more work in the emerging field of environmental peacebuilding. This latter work focuses on practical measures to use environmental cooperation as a tool for post-conflict reconstruction (Krampe, 2017 ) and the promotion of quality peace conditions.

Nonetheless, unless this new framing has a comprehensive rethinking of rural ecologies and their interconnections into the global economy, there remain dangers that many of the problems with traditional development projects may stymie innovations (Ide, 2020 ). How to avoid these in working on climate adaptations (Sovacool & Linner, 2016 ) is clearly a key theme for new research on ecology and security in the next stage of the Anthropocene. Research in the future must focus on transition strategies (Brauch et al., 2016 ), especially in energy systems (Looney, 2017 ) and on how to accelerate social transformations (Linner & Wibeck, 2019 ), rather than looking to traditional themes of security studies concerned with conflict, war, and its prevention. As Our Common Future suggested, at the beginning of the environmental security discussion, security has to be sought in terms of change.

Digital Resources

  • Intergovernmental Panel on Climate Change (IPCC). This site contains many of the published IPCC reports online.
  • Earth System Governance . A key network of social science research on the earth system.
  • Center for Climate and Security . A clearing house for military and policy materials linking climate and security.
  • Planetary Security Initiative . A consortium of international think tanks researching climate and related security issues directed by the Netherlands Foreign Ministry.
  • Real Climate . Where climate scientists discuss contemporary scientific developments and their human implications.
  • United Nations Environment Programme’s Global Environmental Outlook Programme provides links to the latest GEO documents that summarize the changing conditions of the biosphere.
  • Woodrow Wilson International Center for Scholars, Environmental Change and Security Program hosts the a key online source in the New Security Beat Blog

Bibliography

  • Adger, W. N. (2006). Vulnerability. Global Environmental Change , 16 (3), 268–281.
  • Adger, N. , Pulhin, J. , Barnett, J. , Dabelko, G. , Hovelsrud, G. , Levy, M. , . . . Vogel, C. (2014). Human security. In C. Field & V. Barros (Eds.), Climate change 2014: Impacts, adaptation, and vulnerability. Part A: Global and sectoral aspects (pp. 755–791). Cambridge, UK: Cambridge University Press.
  • Angus, I. (2016). Facing the Anthropocene: Fossil capitalism and the crisis of the earth system New York, NY: Monthly Review Press.
  • Baechler, G. (1998). Why environmental transformation causes violence: A synthesis. Environmental Change and Security Project Report , 4 (1), 24–44.
  • Baechler, G. (1999). Violence through environmental discrimination: Causes, Rwanda arena, and conflict model . Dordrecht, The Netherlands: Kluwer.
  • Bannon, I. , & Collier, P. (2003). Natural resources and violent conflict: Options and actions . Washington, DC: World Bank.
  • Barnett, J. (2019). Global environmental change I: Climate resilient peace? Progress in Human Geography , 43 (5), 927 – 936.
  • Bichler, S. , & Nitzan, J. (2004). Dominant capital and new wars. Journal of World Systems Research , 10 (2), 255 – 327.
  • Bradshaw, M. (2014). Global energy dilemmas: Energy security, globalization and climate change Cambridge, UK: Polity.
  • Brauch, H. G. , Oswald Spring, U. , Grin, J. , & Scheffran, J. (Eds.). (2016). Handbook on sustainability transition and sustainable peace . Berlin, Germany: Springer.
  • Bretthauer, J. M. (2017). Climate change and resource conflict: The role of scarcity London, UK: Routledge.
  • Briggs, C. , & Matejova, M. (2019). Disaster security Cambridge, UK: Cambridge University Press.
  • Buhaug, H. (2015). Climate–conflict research: Some reflections on the way forward? WIREs Climate Change , 6 (3), 269 – 275.
  • Burke, M. B. , Miguel, E. , Satyanath, S. , Dykema, J. A. , & Lobell, D. B. (2009). Warming increases the risk of civil war in Africa. Proceedings of the National Academy of Sciences , 106 (49), 20670 – 20674.
  • Burns, W. C. G. , & Strauss, A.L. (Eds.). (2013). Climate change geoengineering: Philosophical perspectives, legal issues, and governance frameworks . Cambridge, UK: Cambridge University Press.
  • Busby, J. (2018). Taking stock: The field of climate and security. Current Climate Change Reports , 44 (4), 338 – 346.
  • Buxton, N. , & Hayes, B. (Eds.). (2016). The secure and the dispossessed . London, UK: Pluto.
  • Buzan, B. , & Ole Wæver, O. (2009). Macrosecuritisation and security constellations: Reconsidering scale in securitisation theory. Review of International Studies , 35 (2), 253 – 276.
  • Byers, M. , Franks, K. , & Gage, A. (2017). The internationalization of climate damages litigation. Washington Journal of Environmental Law and Policy , 7 (2), 264 – 319.
  • Campbell, K. M. , Gulledge, J. , McNeill, J. R. , Podesta, J. , & Ogden, P. (2007). The age of consequences: The foreign policy and national security implications of global climate change . Washington, DC: Center for Strategic and International Studies.
  • Chaturvedi, S. , & Doyle, T. (2015). Climate terror: A critical geopolitics of climate change . London, UK: Palgrave Macmillan.
  • CNA Corporation . (2007). National security and the threat of climate change . Alexandria, VA: CNA Corporation.
  • CNA Military Advisory Board . (2014). National security and the accelerating risks of climate Change . Alexandria, VA: CNA Corporation.
  • Conca, K. (2015). An unfinished foundation . Oxford, UK: Oxford University Press.
  • Conca, K. (2019). Is there a role for the UN Security Council on climate change? Environment: Science and Policy for Sustainable Development , 61 (1), 4 – 15.
  • Dabelko, G. , Herzer, L. , Null, S. , Parker, M. , & Sticklor, R. (Eds.). (2013). Backdraft: The conflict potential of climate change adaptation and mitigation. Woodrow Wilson Center Environmental Change and Security Program Report , 14 (2), 1 – 60.
  • Dalby, S. (2002). Environmental security . Minneapolis, MN: University of Minnesota Press.
  • Dalby, S. (2009). Security and environmental change . Cambridge, UK: Polity Press.
  • Dalby, S. (2013). Climate change: New dimensions of environmental security. RUSI Journal , 158 (3), 34–43.
  • Dalby, S. (2020). Anthropocene geopolitics: Globalization, security, sustainability . Ottawa, ON: University of Ottawa Press.
  • Dalby, S. , & Moussavi, Z. (2017). Environmental security, geopolitics and the case of Lake Urmia’s disappearance. Global Change, Peace and Security , 29 (1), 39–55.
  • Daoudy, M. (2020). The origins of the Syrian conflict: Climate change and human security . Cambridge, UK: Cambridge University Press.
  • Dauvergne, P. (2016). Environmentalism of the rich . Cambridge, MA: MIT Press.
  • Davies, J. (2016). The birth of the Anthropocene . Berkeley, CA: University of California Press.
  • Deligiannis, T. (2012). The evolution of environment-conflict research: Toward a livelihood framework. Global Environmental Politics , 12 (1), 78–100.
  • Detges, A. (2017). Climate and conflict: Reviewing the statistical evidence, a summary for policymakers . Berlin, Germany: Adelphi.
  • Diamond, J. (2005). Collapse: How societies choose to fail or succeed . New York, NY: Viking.
  • Diez, T. , von Lucke, F. , & Wellmann, Z. (2016). The securitization of climate change: Actors, processes, and consequences . London, UK: Routledge.
  • Dinar, S. , & Dinar, A. (2017). International water scarcity and variability: Managing resource use across political boundaries . Berkeley, CA: University of California Press.
  • Duffy, R. (2016). War by conservation. Geoforum , 69 , 238–248.
  • Dunlap, A. , & Fairhead, J. (2014). The militarisation and marketisation of nature: An alternative lens to “climate-conflict.” Geopolitics , 19 (4), 937–961.
  • Ellis, Erle C. (2018), Anthropocene: A very short introduction , Oxford: Oxford University Press.
  • Environment, Conflict, and Cooperation (ECC) . (2016). A new climate for peace: Taking action on climate and fragility risks .
  • Falkner, R. (2016). The Paris agreement and the new logic of international climate politics. International Affairs , 92 (5), 1107–1125.
  • Floyd, R. (2010). Security and the environment: Securitization theory and US environmental security policy . Cambridge, UK: Cambridge University Press.
  • Floyd, R. , & Matthew, R. (Eds.). (2013). Environmental security: Approaches and issues . London, UK: Routledge.
  • Gaffney, O. , Crona, B. , Dauriach, A. , & Galaz, V. (2018). Sleeping financial giants: Opportunities in financial leadership for climate stability . Stockholm, Sweden: Stockholm Resilience Centre.
  • German Advisory Council on Global Change . (2008). Climate change as a security risk . London, UK: Earthscan.
  • Gleditsch, N. P. (2012). Whither the weather? Climate change and conflict. Journal of Peace Research , 49 (1), 5–9.
  • Gleick, P. (2014). Water, drought, climate change, and conflict in Syria. Weather, Climate and Society , 6 (3), 331–340.
  • Glikson, A. (2017). Plutocene: Blueprints for a post-Anthropocene greenhouse earth . Berlin, Germany: Springer.
  • Global Commission on the Geopolitics of Energy Transformation . (2019). A new world: The geopolitics of energy transformation . Abu Dhabi, United Arab Emirates: International Renewable Energy Agency.
  • Goldstein, J. (2016). Climate change as a global security issue. Journal of Global Security Studies , 1 (1), 95–98.
  • Grove, K. (2018). Resilience . New York, NY: Routledge.
  • Hamilton, C. (2013). Earthmasters: The dawn of the age of climate engineering . New Haven, CT: Yale University Press.
  • Hardt, J. N. (2018). Environmental security in the Anthropocene: Assessing theory and practice . London, UK: Routledge.
  • Harper, K. (2017). The fate of Rome: Climate, disease, and the end of empire . Princeton, NJ: Princeton University Press.
  • Harrington, C. , & Shearing, C. (2017). Security in the Anthropocene: Reflections on safety and care . Bielefeld, Germany: Transcript Verlag.
  • Harris, P. (2013). What’s wrong with climate politics and how to fix it . Cambridge, UK: Polity.
  • Hartmann, E. (2014). Converging on disaster: Climate security and the Malthusian anticipatory regime for Africa. Geopolitics , 19 (4), 757–783.
  • Höhne, N. , Kuramochi, T. , Warnecke, C. , Röser, F. , Fekete, H. , Hagemann, M. , . . . Gonzales, S. (2017). The Paris agreement: Resolving the inconsistency between global goals and national contributions. Climate Policy , 17 (1), 16–32.
  • Homer-Dixon, T. (1999). Environment, scarcity, and violence . Princeton NJ: Princeton University Press.
  • Homer-Dixon, T. , Walker, B. , Biggs, R. , Crépin, A. S. , Folke, C. Lambin, E. F. , . . . Troell, M. (2015). Synchronous failure: The emerging causal architecture of global crisis . Ecology and Society , 20 (3).
  • Hsiang, S. , & Burke, M. (2014). Climate, conflict, and social stability: What does the evidence say? Climatic Change , 123 (1), 39–55.
  • Hsiang, S. M. , Burke, M. , & Miguel, E. (2013). Quantifying the influence of climate on human conflict . Science , 341 (6151), 1235367.
  • Hsiang, S. M. , Meng, K. C. , & Cane, M. A. (2011). Civil conflicts are associated with the global climate. Nature , 476 (7361), 438–441.
  • Huda, M. S. , & Ali, S. H. (2018). Environmental peacebuilding in South Asia: Establishing consensus on hydroelectric projects in the Ganges-Bramaputra-Megna (GBM) basin. Geoforum , 96 , 160–171.
  • Ide, T. (2018). Climate war in the middle east? Drought, the Syrian Civil War and the state of climate-conflict research. Current Climate Change Reports , 4 (4), 347–54.
  • Ide, T. (2020). The dark side of environmental peacebuilding. World Development , 127 , 104777.
  • Ide, T. , Link, P. M. , Scheffran, J. , & Schilling, J. (2016). The climate-conflict nexus: Pathways, regional links and case studies. In H.-G. Brauch , U. Oswald Spring , J. Grin , & J. Scheffran (Eds.), Sustainability transition and sustainable peace handbook (pp. 285–304). New York, NY: Springer.
  • Intergovernmental Panel on Climate Change (IPCC) . (2018). Global warming of 1.5 °C , Special Report.
  • Kahl, C. (2006). States, scarcity, and civil strife in the developing World . Princeton, NJ: Princeton University Press.
  • Kareiva, P. , & Fuller, E. (2016). Beyond resilience: How to better prepare for the profound disruption of the Anthropocene. Global Policy , 7 (S1), 107–118.
  • Keith, D. (2013). A case for climate engineering . Cambridge MA: MIT Press.
  • Kelley, C. P. , Mohtadi, S. , Cane, M. A. , Seager, R. , & Kushnir, Y. (2015). Climate change in the Fertile Crescent and implications of the recent Syrian drought. Proceedings of the National Academy of Sciences , 112 (11), 3241–3246.
  • Kirchmeier-Young, M. C. , Gillett, N. P. , Zwiers, F. W. , Cannon, A. J. , & Anslow, F. S. (2019). Attribution of the influence of human induced climate change on an extreme fire season. Earth’s Future , 7 (1), 2–10.
  • Klare, M. T. (2019). All hell breaking loose: The Pentagon’s perspective on climate change . New York, NY: Metropolitan Books.
  • Krampe, F. (2017). Towards sustainable peace: A new research agenda for post-conflict natural resource management. Global Environmental Politics , 17 (4), 1–8.
  • Latour, B. (2018). Down to earth: Politics in the new climatic regime . Cambridge, UK: Polity.
  • Le Billon, P. (2005). Fuelling war: Natural resources and armed conflict . Adelphi paper no. 373. Oxford, UK: Routledge, for the International Institute of Strategic Studies.
  • Le Billon, P. (2013). Wars of plunder: Conflicts, profits and the politics of resources . Oxford, UK: Oxford University Press.
  • Lewis, S. , & Maslin, M. (2018). The human planet: How we created the Anthropocene . London, UK: Pelican Books.
  • Linner, B.-O. , & Wibeck, W. (2019). Sustainability transformations: Agents and drivers across societies . Cambridge, UK: Cambridge University Press.
  • Looney, R. E. (Ed.). (2017). Handbook of transitions to energy and climate security . New York, NY: Routledge.
  • Mabey, N. (2007). Delivering climate security: International security responses to a climate changed world . Whitehall paper no. 69. London, UK: Royal United Services Institute.
  • Mabey, N. , Gulledge, J. , Finel, B. , & Silverthorne, K. (2011). Degrees of risk: Defining a risk management framework for climate security . London, UK: Third Generation Environmentalism (E3G).
  • Mach, K. J. , Kraan, C. M. , Adger, W. N. , Buhaug, H. , Burke, M. , Fearon, J. D. , . . . von Uexkull, N. (2019). Climate as a risk factor for armed conflict. Nature , 571 (7764), 193–197.
  • MacNeil, R. (2017). Neoliberalism and climate policy in the United States: From market fetishism to the developmental state . London, UK: Routledge.
  • Matejova, M. , Parker, S. , & Dauvergne, P. (2018). The politics of repressing environmentalists as agents of foreign influence. Australian Journal of International Affairs , 72 (2), 145–162.
  • Mayer, M. (2012). Chaotic climate change and security. International Political Sociology , 6 (2), 165–185.
  • McDonald, M. (2013). Discourses of climate security. Political Geography , 33 , 42–51.
  • McDonald, M. (2018). Climate change and security: Towards ecological security? International Theory , 10 (2), 153–180.
  • McGlade, C. , & Ekins, P. (2015). The geographical distribution of fossil fuels unused when limiting global warming to 2 o C. Nature , 517 (7533), 187–190.
  • McKibben, B. (2016, August 15). A world at war . New Republic .
  • McNeill, J. R. , & Engelke, P. (2016). The great acceleration: An environmental history of the Anthropocene since 1945 . Cambridge, MA: Harvard University Press.
  • Meierding, E. (2016a). Disconnecting climate change from conflict: A methodological proposal. In S. O’Lear & S. Dalby (Eds.), Climate change: Constructing ecological geopolitics (pp. 52–66). London, UK: Routledge.
  • Meierding, E. (2016b). Dismantling the oil wars myth Security Studies , 25 (2), 258–288.
  • Mitchell, T. (2011). Carbon democracy: Political power in the age of oil . London, UK: Verso.
  • Mobjork, M. , Smith, D. , & Ruttinger, L. (2016). Towards a global resilience agenda: Action on climate fragility risks . Clingendael: Netherlands Institute for International Relations.
  • Moran, A. , Busby, J. , Raleigh, C. , Smith, T. G. , Kishi, R. , Kirshnan, N. , & Charles Wight . (2018). The intersection of global fragility and climate risks . Washington, DC: USAID.
  • National Research Council . (2015). Climate intervention: Reflecting sunlight to cool earth . Washington, DC: National Academy of Sciences.
  • Null, S. , & Risi, L. H. (2016). Navigating complexity: Climate, migration, and conflict in a changing world . Washington, DC: USAID.
  • Nyman, J. (2018). The energy security paradox: Rethinking energy (in)security in the United States and China . Oxford, UK: Oxford University Press.
  • O’Brien, K. , Wolf, J. , Sygna. L. (Eds.). (2013). The changing environment for human security: Transformative approaches to research, policy, and action . London, UK: Earthscan.
  • O’Lear, S. (2018). Environmental geopolitics . Lanham, MD: Rowman & Littlefield.
  • O’Lear, S. (Ed.). (2020). A research agenda for environmental geopolitics . Cheltenham, UK: Edward Elgar.
  • O’Loughlin, J. , Witmer, F. D. W. , Linke, A. M. , Laing, A. Gettelman, A. , & Dudhia, J. (2012). Climate variability and conflict risk in East Africa 1990–2009. Proceedings of the National Academy of Sciences , 109 (45), 18344–18349.
  • Overland, I. (2019). The geopolitics of renewable energy: Debunking four emerging myths . Energy Research & Social Science , 49 , 36–40.
  • Parker, A. , Horton, J. B. , & Keith, D. (2018). Stopping solar geoengineering through technical means: A preliminary assessment of counter-geoengineering. Earth’s Future , 6 (8), 1058–1065.
  • Parker, G. (2013). Global crisis: War, climate change and catastrophe in the seventeenth century . New Haven, CT: Yale University Press.
  • Peluso, N. , & Watts, M. (Eds.). (2001). Violent environments . Ithaca, NY: Cornell University Press.
  • Pumphrey, C. (Ed.). (2008). Global climate change: National security implications . Carlisle, PA: US Army War College, Strategic Studies Institute.
  • Raleigh, C. , & Kniveton, D. (2012). Come rain or shine: An analysis of conflict and climate variability in East Africa. Journal of Peace Research , 49 (1), 51–64.
  • Ricke, K. , Drouet, L. , Caldeira, K. , & Tavoni, M. (2018). Country-level social cost of carbon. Nature Climate Change , 8 (10), 895–900.
  • Rigaud, K. , de Sherbinin, A. , Jones, B. , Bergmann, J. , Clement, V. , Ober, K. , . . . Midgley, A. (2018). Groundswell: Preparing for internal climate migration . Washington, DC: The World Bank.
  • Rockström, J. , Steffen, W. , Noone, K. , Persson, A. , Chapin, F. S. , Lambin, E. , . . . Foley, J. (2009). Planetary boundaries: Exploring the safe operating space for humanity . Ecology and Society , 14 (2).
  • Rothe, D. (2016). Securitizing global warming: A climate of complexity . London, UK: Routledge.
  • Rüttinger, L. (2017). Climate-fragility risks: The global perspective . Berlin, Germany: Adelphi.
  • Sagan, C. , & Turco, R. (1990). A path where no man thought: Nuclear winter and its implications . New York, NY: Vintage.
  • Scheffran, J. , Brzoska, M. , Brauch, H-G. , Link, P. , & Schilling, J. (Eds.). (2012). Climate change, human security and violent conflict: Challenges for societal stability . Berlin, Germany: Springer.
  • Scott, S. V. , & Ku, C. (Eds.). (2018). Climate security and the UN Security Council . Cheltenham, UK: Edward Elgar.
  • Selby, J. (2014). Positivist climate conflict research: A critique. Geopolitics , 19 (4), 829–856.
  • Selby, J. (2018). Climate change and the Syrian civil war, Part II: The Jazira’s agrarian crisis Geoforum , 101 , 260–274.
  • Selby, J. , Dahi, O. S. , Frolich, C. , & Hulme, M. (2017). Climate change and the Syrian Civil War revisited. Political Geography , 60 , 232–244.
  • Selby, J. , & Hoffman, C. (Eds.). (2015). Rethinking climate change, conflict, and security . London, UK: Routledge.
  • Smith, P. J. (2007). Climate change, mass migration and the military response. Orbis , 51 (4), 617–633.
  • Sovacool, B. K. , & Linner. B.-O. (2016). The political economy of climate change adaptation . London, UK: Palgrave Macmillan.
  • Spratt, D. , & Sutton, P. (2009). Climate code red: The case for emergency action . New York, NY: McGraw Hill.
  • Steffen, W. , Richardson, K. , Rockström, J. , Cornell, S. E. , Fetzer, I , Bennett, E. M., . . . Sörlin, S. (2015). Planetary boundaries: Guiding human development on a changing planet . Science , 637 (6223). 1259855.
  • Steffen, W. , & Rockstrom, J. (2018). Trajectories of the earth system in the Anthropocene. Proceedings of the National Academy of Sciences , 115 (33), 8252–8259.
  • Steffen, W. , Sanderson, A. , Tyson, D. , Jager, J. , Matson, A. , Moore, III, B. Oldfield, F. , . . . Wasson, R. J. (2004). Global change and the earth system: A planet under pressure . New York, NY: Springer.
  • Stiglitz, J. E. , & Kaldor, M. (Eds.). (2013). The quest for security: Protection without protectionism and the challenge of global governance . New York, NY: Columbia University Press.
  • Swain, A. , & Jägerskog. A. (2016). Emerging security threats in the Middle East: The impact of climate change and globalization . Lanham, MD: Rowman & Littlefield.
  • Swain, A. , & Öjendal, J. (Eds.). (2018). Routledge handbook of environmental conflict and peacebuilding . New York, NY: Routledge.
  • Swatuk, L. , & Wirkus, L. (Eds.). (2018). Water, climate change and the boomerang effect: Unintentional consequences for resource insecurity . New York, NY: Routledge.
  • Theisen, O.M. , Holtermann, H. & Buhaug, H. (2012). Climate wars? Assessing the claim that drought breeds conflict, International Security , 36 (3), 79–106.
  • van Baalen, S. , & Mobjörk, M. (2018). Climate change and violent conflict in East Africa: Integrating qualitative and quantitative research to probe the mechanisms. International Studies Review , 20 (4), 547–575.
  • Wallace-Wells, D. (2019). The uninhabitable earth: Life after warming . New York, NY: Duggan.
  • Watts, M. (2013). Silent violence: Food, famine and peasantry in northern Nigeria (2nd ed.). Athens, GA: University of Georgia Press
  • Werrel, C. , & Femia, F. (Eds.). (2017). Epicenters of climate and security: The new geostrategic landscape of the Anthropocene . Washington, DC: The Centre for Climate and Security.
  • Werrell, C. , Femia, F. , & Sternberg, T. (2015). Did we see it coming? State fragility, climate vulnerability, and the uprisings in Syria and Egypt. SAIS Review , 35 (1), 29–46.
  • White, R. (2014). Environmental insecurity and fortress mentality. International Affairs , 90 (4), 835–851.
  • World Commission on Environment and Development (WCED) . (1987). Our common future . Oxford, UK: Oxford University Press.
  • Yergin, D. (2011). The quest: Energy, security, and the remaking of the modern world . New York, NY: Penguin.
  • Zalasiewicz, J. , Williams, M. , Waters, C. N. , Barnosky, A. D. , Palmesino, J. , Rönnskog, A.-S. , . . . Wolfe, A. P. (2017). Scale and diversity of the physical technosphere: A geological perspective. The Anthropocene Review , 4 (1), 9–22.
  • Zografos, C. , Goulden, M. C. , & Kallis, G. (2014). Sources of human insecurity in the face of hydro-climatic change. Global Environmental Change , 29, 327–336.

Related Articles

  • Ecofeminism and Global Environmental Politics
  • Environment and Development
  • Environmental Activism
  • Teaching Global Environmental Politics

Printed from Oxford Research Encyclopedias, International Studies. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 31 May 2024

  • Cookie Policy
  • Privacy Policy
  • Legal Notice
  • Accessibility
  • [66.249.64.20|81.177.182.154]
  • 81.177.182.154

Character limit 500 /500

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • My Account Login
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Open access
  • Published: 11 April 2017

An evaluation of the ecological and environmental security on China’s terrestrial ecosystems

  • Hongqi Zhang 1 &
  • Erqi Xu 1  

Scientific Reports volume  7 , Article number:  811 ( 2017 ) Cite this article

6361 Accesses

38 Citations

Metrics details

  • Environmental sciences
  • Sustainability

With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

Similar content being viewed by others

case study on environmental security

Hybrid model for ecological vulnerability assessment in Benin

case study on environmental security

Incorporating ecosystem services into functional zoning and adaptive management of natural protected areas as case study of the Shennongjia region in China

case study on environmental security

Sustainable use zoning of land resources considering ecological and geological problems in Pearl River Delta Economic Zone, China

Introduction.

China is undergoing fast economic growth, industrialization, urbanization with huge environmental costs over a long period 1 . The excessive pursuit of gross domestic product (GDP) growth by over management and irrational development has heavily exploited natural resources and damaged environment conditions. This results in a series of serious ecological and environmental problems, such as water scarcity and contamination, air pollution, soil erosion, ecosystem degradation, and loss of biodiversity 2 , 3 , 4 . The ecosystem degradation and environmental pollution threaten and undermine the country’s economic and social growth, as well as domestic survival and development. Faced with the considerable ecological and environmental problems, is there an ecological and environmental security crisis, which indicated a hazardous situation causing the deleterious or potentially even disastrous consequences for humans 5 , 6 , 7 , in China’s terrestrial ecosystems? It calls for a systemic and comprehensive evaluation.

With different ecological and environmental problems in China, the evaluation of ecological and environmental security has progressively matured for the sustainable development and management of regional areas 8 , 9 , 10 . In particular, the evaluations were performed for water ecological security 11 , 12 , land ecological security 8 , 13 , 14 , and urban ecological security 15 , 16 . Thus far, limited studies have qualitatively or semi-quantitatively assessed the ecological and environmental security in China 2 , 3 , 4 , 17 . The quantitative evaluation and its spatial distribution of ecological and environmental security are insufficient, which leads to ambiguous policy formulation and confounds implementation on a national scale.

Because the ecological and environmental security involves various definitions and is still a polysemous category 9 , 18 , 19 , we defined it as the characterization of the health status of ecosystems and the ability of ecosystem service supplies for humans. Until now, there has been no uniform and well-recognized indicator system. Faced with the complex and considerable ecological and environmental problems in China, there is a great difficulty in the evaluation of the ecological and environmental security status because of the unavailability of data and models. Our evaluation framework focused on the resource scarcity, ecosystem degradation, and environmental pollution, which were seen as the major ecological and environmental problems in China 2 , 3 , 4 , 17 . Based on the different ecosystem elements, including four sub-ecosystems of hydrosphere, pedosphere, atmosphere and biosphere, this study identified the key indicators to build a comprehensive evaluation system, which was closely related to the ecological and environmental security status and above specific problems, and to assess the ecological and environmental security of China’s terrestrial system in around 2010.

Water security evaluation

The veto aggregation focusing on the most serious security deficits and the balanced aggregation methods coordinating all indicators were used to comprehensively evaluate the security status for six classes, from the highest security class (safety) to the lowest security class (crisis). Results of water security in China are shown in Fig.  1a and b . Either veto aggregation or the balanced aggregation methods presented an obviously serious water security status in northern China; however, a relatively good water security status was obtained for southern China. Almost all areas of the entire northern China are classified into class 4 , class 5 , or class 6 . Veto aggregation methods indicated that area proportions of class 1 to class 6 are 14.75%, 20.37%, 16.58%, 7.56%, 8.92%, and 31.82%, respectively (Table  1 ). Over 40% of the areas were up to the danger level (marginal crisis or crisis classes), implying that there is at least one water security indicator up to the danger level, which indicates a serious water security status in China. Areas belonging to the crisis class of water security evaluation are chiefly located in the North China Plain with serious water scarcity and contamination; the adjacent mountains in Yunnan-Guizhou Plateau in southwestern China, the Hulun Buir Grassland, the Great Khingan Mountains, and Sanjiang Plain in northeastern China were identified as facing serious water contamination, and northwestern China region is faced with serious water scarcity. The results of the balanced aggregation method showed that area proportions of class 1 to class 6 are 34.19%, 15.56%, 22.16%, 13.00%, 8.12%, and 6.97%, respectively (Table  1 ). With the scattered distribution of evaluation scores and using Jenks natural break optimization, the North China Plain and its surrounding region were still classified in the crisis class in the balanced aggregation evaluation. Areas of high water security are chiefly located in the Tibet Plateau, Hengduan Mountainous Region in southwestern China, and hills and mountainous in Fujian, Jiangxi, Guangdong, and Guangxi Province.

figure 1

Spatial distribution of veto aggregation result including ( a ) water security in 2010; ( c ) land security in 2010; ( e ) air security in around 2010; ( g ) biodiversity security in around 2010; and balanced aggregation result including ( b ) water security in 2010; ( d ) land security in 2010; ( f ) air security in around 2010; ( h ) biodiversity security in around 2010. Maps were generated by ArcGIS version 10.1.0 ( http://www.esri.com/software/arcgis ). Note: Non-evaluation areas were at the extreme of degradation and cannot support human survival and development.

Land security evaluation

Figure  1c and d show a similar spatial distribution between the results of veto aggregation and balanced aggregation methods. A relatively good land security was found in eastern China; however, a more serious land degradation and pollution threats were indicated in southwestern and northwestern China. Area proportions at the security level were the highest. Area proportions of safety to basic safety classes were 35.96% and 12.31% by the veto aggregation method, and 42.19% and 19.83% by the balanced aggregation method (Table  1 ). With the veto aggregation method, the area in the danger level of land security accounts for over 17% of the total evaluation area. It shows a diverse distribution of different land security evaluation indicators with significant geographical differentiation characteristics. Areas of serious land sandy desertification are mostly located on the edge of Gobi of the eastern Xinjiang Province, Taklimakan Desert, the Badain Jaran Desert, Tenggeli Desert in northwestern China, and the north of Tibet Plateau. Areas with the serious soil saline-alkali are mostly located on the edge of the Tarim Basin, the Qaidam Basin in northwestern China, the Hunshandake Sandy Area in northern China, the Songnen Plain in the northeastern China, and the north of Tibet Plateau. Although there are great improvements in the soil conservation in the Loess Plateau in western China, it still presents the most serious soil water erosion threat nationwide. The rocky karst desertification occurs in the southern karst areas, and areas of the most serious desertification are located in the adjacent mountains in Guizhou, Yunnan, and Guangxi Province. Areas of the serious heavy metal pollution are mostly in densely-populated cities and developed mining areas of the Hunan, Guizhou, Yunnan, and Guangxi Provinces. Areas with relatively good land security are mostly located in the eastern coastal areas, the Great Khingan and Changbai Mountains in northeastern China.

Air security evaluation

Air security evaluations are shown in Fig.  1e and f . The figures show a more serious air security situation in the developed areas within mid-eastern China based on the two aggregation methods. Veto aggregation method indicates an unoptimistic air security status in China, where areas at safety and basic safety classes only accounted for 2.87% and 20.96% in the total evaluation areas, respectively (Table  1 ). This is may be attributed to the relatively high PM 2.5 pollution in China, and even the PM 2.5 pollution in part of the regions of Xinjiang and Tibet Province were up to a level indicative of insecurity. In detail, areas at the danger level for four air security evaluations indicator are mostly located in mid-eastern China but with a certain heterogeneously spatial distribution, as follows: areas at the danger level of inorganic nitrogen wet deposition exist, as does the pH level in acid rain located in wide areas in the southern China region and Sichuan Basin in southwestern China. The most serious PM 2.5 pollution sites were mostly located in the North China Plain and the Middle and Lower Yangtze Plain in eastern China. Further, areas of the high carbon emission are located in the North China Plain and Lower Yangtze Plain in eastern China. The balanced aggregation method presented an obviously spatial distribution of a gradient increase from the west to east. Areas at the danger level of air security evaluation are mostly located in the Beijing-Tianjin-Hebei region in northern China, Middle and Lower Yangtze Plain in eastern China, and Sichuan Basin in southwestern China.

Biodiversity security evaluation

Similar spatial distributions of threatened plants and animals result in a similar spatial distribution between the veto aggregation and balanced aggregation methods (Fig.  1g and h ). Thus, the figures show a more serious biodiversity security problem in the south of China than that in the north of China. Almost all the wide areas in southern China are classified to the class 4 , class 5 , or class 6 . Except for the Great Khingan and Changbai Mountains in northeastern China, and the Altai Mountains in northwestern China; other regions in northern China are classified to class 1 or class 2 . Area proportions at the security level are the highest, with over 50% of areas classified by the safety or basic safety classes, with 52.83% by the veto aggregation and 71.75% by the balanced aggregation method (Table  1 ). Area proportions at the marginal crisis and crisis classes are 9.79% and 4.86% by the veto aggregation, compared to the 4.30% and 4.07% areas by the balanced aggregation method (Table  1 ). Areas at the danger level present a relatively scattered distribution, including the Hengduan Mountains in southwestern China, hills in southern Yunnan Province, adjacent Mountains of Chongqing Municipality and Hubei Province, adjacent Mountains of Zhejiang Province and Fujian Province, the Nanling Mountains in southeastern China.

Ecological and environmental security evaluation

Figure  2 shows the final ecological and environmental security evaluation in terrestrial ecosystems of China. With different strategies and emphases of two methods, different numerical values and spatial distribution of evaluation results are shown. The veto aggregation score yielded a mean value of 4.83 and a standard deviation of 1.13, ranging from 1.00 to 6.00. In contrast, the balanced aggregation score yielded a mean value of 2.19 and a standard deviation of 0.51, ranging from 1.00 to 4.03. Areas at the danger level are the highest, which accounted for 43.05% of the total evaluation area by the veto aggregation method. In contrast, areas at the insecurity level are the highest by indication of the balanced aggregation method, which accounted for 40.79% of the total evaluation area (Table  1 ). Moreover, the evaluation scores by the veto aggregation method which are larger than 4.00 and 5.00 accounted for 70.09% and 44.00% of the evaluation area, which means that at least one security evaluation indicator is up to the crisis and marginal crisis classes in 70.09% and 44.00% of the evaluation area, respectively. Only 16.03% and 30.08% by the veto aggregation and balanced aggregation methods of the evaluation areas were classified to the security level. Additionally, the insecure ecological and environmental areas, including the non-evaluation (extreme of degradation and cannot support human survival and development), insecurity level and danger level, account for 84.52% and 72.85% of the national territorial area by the veto aggregation method and the balanced aggregation method, respectively. Both of the two aggregation methods showed a relatively serious ecological and environmental security crisis in China.

figure 2

Spatial destitution of ecological and environmental security in China ( a ) veto aggregation method in around 2010; ( b ) balanced aggregation method in around 2010. Maps were generated by ArcGIS version 10.1.0 ( http://www.esri.com/software/arcgis ). Note: Non-evaluation areas, which were at the extreme of degradation and cannot support human survival and development, did not need to be evaluated and were labeled as the “crisis” class.

Integrating diverse spatial distribution of four aspects for the final ecological and environmental security evaluation, both the aggregation methods presented an obviously spatial variation of the security evaluation results (Fig.  2 ). The result showed that areas at the security level are mostly located in the Tibet Plateau, Tianshan Mountains and Altai Mountains in northwestern China, the Great Khingan Mountains in northeastern China, Hainan Island, and Taiwan Island. Areas at the insecurity and danger level are widely scattered in China. Figure  2 shows that areas of serious ecological and environmental security are located in either the developed eastern regions or the underdeveloped central and western regions in China. Overlaying Fig.  2a and b , the hotspot areas at the danger level, which were obtained by focusing on the limited security indicators by the veto method and integrating the compound security problems by the balanced aggregation method, were identified as follows: Gobi in Eastern Xinjiang, Taklimakan Desert, the Badain Jaran Desert, and Tenggeli Desert in northwestern China; Hunshandake Sandy Area, and North China Plain in Northern China; Lower Yangtze Plain in eastern China; adjacent hills and mountains in Yunnan-Guizhou Plateau, adjacent Mountains of Chongqing Municipality and Hubei Province in southwestern China; Pearl River Delta in southeastern China.

Joint spatial distribution of ecological and environmental security

Using the veto aggregation and balanced aggregation methods, this study conducted a spatial evaluation on the ecological and environmental security in terrestrial ecosystems of China based on 14 security indicators. The GIS maps visualized the spatial distribution and identified the hotspot areas of water, land, air, biodiversity, to determine the final ecological and environmental security. According to the joint spatial distribution of all security evaluation indicators, we found that four aspects of ecological and environmental security have obviously different spatial distributions but a relatively similar distribution for several security indicators (Fig.  1 ). The problems of environmental pollution, including water pollution, soil heavy metal pollution, and air pollution, are primarily located in the mid-eastern China, especially the coastal eastern regions. The problems of land degradation, including soil water erosion, land sandy desertification and karst rocky desertification, are primarily located in the western China. Moreover, the problem of water scarcity is primarily located in the northern China. In contrast, the problem of threat to biodiversity is primarily located in the southern China. All of these may be attributed to the regional distribution of the resource abundance, physical geography characteristics, and human disturbance in China 20 . Physical geographical conditions determine the geographical distribution of climate, water, land, and biological resources in China. For example, the spatial distribution of land desertification status in the northwest is controlled by climate change and geomorphological processes even though human impacts have undeniably exacerbated these effects 21 . The land rocky desertification almost occurs in southwestern regions with the karst landscape 22 . In contrast, environmental pollution mainly originates from the strong anthropogenic disturbance, which resulted in a more serious pollution status in the developed eastern region 23 , 24 .

Uncertainty and of security evaluation results

With the difficulty and time-lag in data collection, it should be noted that the timeframes of datasets would potentially limit our results with the possibility of changes in recent years, since data were collected in around 2010 (Table  2 ). China has implemented large-scale environmental management and ecological restoration projects 4 , 25 , 26 , and the security status of China improved locally compared to our results. However, the ecological and environmental security did not change dramatically at the national scale and was still not optimistic 27 . For example, the PM 2.5 pollution was still serious in 2016 with even a 7% increase of PM 2.5 concentration in November of 2016 Footnote 1 . Anyway, our results presented a spatially-explicit distribution to show the serious security issues (Fig.  2 ) and provided the effective information about the ecological and environmental security of China’s terrestrial ecosystems.

The results presented a certain degree of difference from the spatial distributions of the security evaluation results obtained using the two aggregation methods (Figs  1 and 2 ), which can help to explain different aspects of results 28 , 29 . The veto method focused on the most serious security evaluation indicator and can also identify the limited security evaluation indicator at each grid, which presented a more obviously spatial diversity. In contrast, the balanced aggregation method can comprehensively integrate all the indicators and give a relatively even evaluation. This method permitted compensation between indicators, that is, a deficit in one indicator could be offset by a surplus in another 28 , which presented a more scattered spatial distribution (Figs  1 and 2 ). It is worth noting that limitations of the two methods lead to some uncertainties. For example, the water pollution in the Great Khingan Mountains and Sanjiang Plain in northeastern China are serious, but other indicators are classified at the security level, which result in a higher class in the veto aggregation method but a lower class in the balanced aggregation method (Fig.  2 ). Similar differences can be found in the edges of deserts in Northwestern China region with serious land insecurity but relative security in other indicators; moreover, the hills in southern Yunnan Province show a danger level of biodiversity security but relatively secure classes in other indicators. In contrast, the Pearl River Delta was classified into relatively secure classes in the sole evaluation indicator by the veto aggregation method as opposed to the high security class obtained by the balanced aggregation method. This result indicated that various aspects of ecological and environmental security in the Pearl River Delta were not up to the crisis class; however, they remain at a relatively serious security class. Therefore, we call for a combined evaluation of the two methods to explore the ecological and environmental security crisis in China, to decrease the uncertainty originating from singular evaluation.

Scale was an important and inevitable issue in the evaluation processes 28 . A uniform grid of 10 km × 10 km, which was basically determined by the mean unit size of all indicators at different scales, was used to execute the data assimilation in our study. To examine the scale effects of the uniform grid on evaluation results, we used the grid of 5 km × 5 km and 20 km × 20 km to re-execute the evaluation process. It found the almost similar mean values and standard deviation values for two aggregation methods. For veto aggregation scores, the mean values of 5 km × 5 km, 10 km × 10 km, and 20 km × 20 km were 4.84, 4.83, and 4.83, respectively; and the standard deviations at three grid sizes were 1.15, 1.13, and 1.12, respectively. Similar results were found in the balanced method. Comparing results at the three grid sizes, the grid of 5 km × 5 km generated the most scattered spatially distribution of security evaluation result. Although a coarse grid size would result in a smooth result, using scaling transformations, the evaluation scores were transformed to the same frequency histogram from raw evaluation data. Therefore, no evidence for scale effects in determining the degree of ecological and environmental security results was found. We thought that the grid size of 10 km × 10 km provided a reasonable evaluation result at the national scale.

Causes of the ecological and environmental security deterioration

Either individual or comprehensive evaluation results indicated a relatively serious ecological and environmental security in China. These can be attributed to natural factors but also to anthropogenic factors, including the historical legacy, but also the irrational use and destruction over the past century. China, consisting of three topography steps with a high proportion of mountains, are majorly located in the eastern Asian monsoon climate zone 20 . This resulted in the wide distribution of ecologically fragile regions, including the arid desert, the alpine region, the Loess Plateau region, karst regions and agro-pastoral zone 21 , 30 , 31 . The basically natural factors and physical geographical characteristics caused the resource deficiencies and ecosystems fragility. With the population pressure, economic development, and rapid urbanization, the predatory management and excessive pursuit of the GDP target accelerated resource waste, land desertification, and environmental pollution 32 . Moreover, the science and technology of ecological restoration and environmental protection is lagging, which increases the difficulty in helping to solve important ecological problems and to provide effective knowledge and technology reserves for the state 27 .

Integrated regional development to improve ecological and environmental security

Faced with the current ecological and environmental security status in China, a solution calls for the spatially regional integration and development strategies to relieve the pressure on the environment and to implement ecological restoration and environmental governance for different ecological and environmental security problems. We suggest that eastern coastal areas should be committed to make efforts to govern the environmental pollution, including air, water, and soil pollution. In addition, a solution calls for a transformation of economic development and an acceleration of industrial restructuring and upgrading. Central regions have the advantage of linking the eastern coastal areas and western areas, as well as geographical advantages and the flat topography to develop modern agriculture. Further, we suggest that the central regions focus on the development of agricultural modernization, and also, on the ecological restoration and environmental governance concentrated on the comprehensive management of major rivers, remediation of soil metal heavy pollution, and soil conservation. For the western region, which has ecologically fragile areas, the protection of the ecological environment should be made prominent. Under this premise, we suggest an appropriate integration of ecological migrants, the economic development in key areas, and the development of natural resources, step-by-step. With the spatial development and integration of the resource-ecology-economy, we look forward to improve the ecological and environmental security and to promote the sustainable development of society in China.

In conclusion, our study assessed the spatial distribution, visualized different security aspects, and identified hotspots of ecological and environmental security in terrestrial ecosystems of China On the national scale. Based on 14 security evaluation indicators for the water, land, air, and biodiversity security, with area-weighted normalization and scaling transformation approaches, this study used the veto aggregation and balanced aggregation method to comprehensively assess the ecological and environmental security status of China’s terrestrial ecosystems. Both these methods indicated a relatively serious ecological and environmental security situation, but presented an obviously spatial variation of the six security evaluation classes. Areas of unsafe ecological and environmental security, including the non-evaluation, insecurity level and danger level, account for 84.52% by the veto aggregation method and 72.85% by the balanced aggregation method of the China’s territorial area. Areas of serious water security issues are mostly located in northern China, serious land security issues in mid-western China, serious air security issues in eastern China, serious biodiversity security issues in southern China. With the final security evaluation, areas at the healthy security level are mostly located in the Tibet Plateau, Tianshan Mountains, and Altai Mountains in western China, the Great Khingan Mountains in northeastern China, Hainan Island, and Taiwan Island. Areas at the danger level are widely scattered in China, and corresponding hotspots were identified. The integration of regional development was suggested to improve the ecological and environmental security deterioration in China.

Evaluation index system of ecological and environmental security

A framework for selecting indicators should take the goals defining, context understanding, and stakeholders identifying into consideration to develop criteria for indicator selection 33 . In consultation with other researchers and policy makers, this study built the ecological and environmental security framework of indicator selection, which comprehensively characterized the health status of ecosystems, the ability of ecosystem service supplies for humans, and the major current ecological and environmental problems in China 2 , 3 , 4 , 17 . Considering the system complexity and data availability at the national scale, our framework selected limited indicators from four basic sub-ecosystems (hydrosphere, pedosphere, atmosphere and biosphere).

Finally, we collected and classified the 14 indicators, such as water security, land security, air security, and biodiversity security in Table  2 , for the purpose of building the ecological and environmental security evaluation indicator system. Water security includes water scarcity and contamination 34 . Land security consists of different land degradation types (soil water erosion, land sandy desertification and karst rocky desertification in different regions) and soil heavy metal pollution 35 , 36 . Air security is heavily characterized by the nitrogen deposition, carbon emission, acid rain, and PM 2.5 pollution 37 , 38 . Biodiversity security is characterized by the status of threatened plant and threatened animal life 39 , 40 . Details of how all the security evaluation indicators were collected or calculated are shown in the Table  2 .

Different data were primarily evaluated into different categories based on the corresponding grading standard from the professional sectors and previous studies (Table  3 ). All of the grading standards were used to indicate different security states of the evaluation subsystem but with different descriptive ways, i.e. the poor, dangerous security for the low level; the unsafe, worsening, threating security for the medium level; the general, ideal, safe security for the high level 41 , 42 , 43 . To build a unified security evaluation system, the different numbers of indicators and grading obtained from different studies were grouped in three levels (A: security; B: insecurity; and C: danger) and six sequential classes (class 1 : safety; class 2 : basic safety; class 3 : early warning; class 4 : unsafety; class 5 : marginal crisis; class 6 : crisis). Reference to previous study 41 , 42 , 43 , meanings of six security classes were shown in Table  4 , which indicated the relative safeguard degree and expectation state of evaluation subsystem, and the reliability of prevent imperfect and threating event to happen based on professional sectors and document retrievals.

Here, the lowest security class is named as the “crisis”. As modern concept of “crisis” has a distinguished history, ably recalled by Jim O’Connor 44 and discussed by previous studies 6 , 45 . This study defined it as a hazardous situation causing the deleterious or potentially even disastrous consequences for humans 5 , 6 , 7 . Not all processes or subsystems have well-defined thresholds of “crisis” 7 , then we identified the “crisis” class as the extreme lack of resource scarcity, the most serious ecosystem degradation, or the most hazardous environment pollution. The grading thresholds of “crisis” class were quantitatively determined by the corresponding grading standard (Table  3 ). For example, the value of 150 (t/(hm 2  · a)), which indicated the most serious water soil erosion based on Standards for Grading of Soil Erosion (SL190-96) Footnote 2 , then was grouped as the crisis threshold of the water soil erosion.

It should be noted that all the indicators can be grouped as in the three levels, but only several indicators can be grouped in six classes. This is determined by the professional grading standard of the security evaluation indicator. Moreover, the evaluations in this study did not include the Gobi in Eastern Xinjiang, Taklimakan Desert, the Badain Jaran Desert, and Tenggeli Desert in northwestern China, areas which are at the extreme of degradation and cannot support human survival and development. These areas were labeled as non-evaluation areas, accounting for 9.72% of the national territorial area (Fig.  1 ). Thus, the area proportional to the evaluation area is 90.28% of China’s territorial area.

Comprehensive evaluation of ecological and environmental security

Diverse evaluation data were collected and quantified in different units and at different scales, for example, water scarcity was assessed at the Second-level of China’s Water Resources Zones, the soil erosion from water was characterized by the raster units of 1 km × 1 km, the karst rocky desertification data were collected at the raster units of 100 m × 100 m, and the PM 2.5 concentration data were collected at the municipal unit. To comprehensively assess the ecological and environmental security of the terrestrial ecosystems in China, we used a uniform grid of 10 km × 10 km to calculate the corresponding normalization scores for different security evaluation indicators. Finally, fourteen indicators from four aspects were aggregated by two aggregation methods to evaluate the ecological and environmental security at each uniform grid.

Area-weighted normalization score

We assigned evaluation scores of six security classes as 1, 2, 3, 4, 5, and 6 from class 1 to class 6 for each security evaluation indicator at the unit. If one certain level is not included in the class, the scores of two classes were assigned the mean value of two corresponding classes. For example, the level A was not included in the classes of safety and basic safety for the evaluation of nitrogen deposition, therefore, both A 1 and A 2 were assigned as 1.5. Then, we used the uniform grid to calculate the area-weighted evaluation normalization score 46 , 47 by the following equation:

where \({S}_{i}^{j}\) denotes the area-weighted evaluation sore at each uniform grid, i is the serial number of security evaluation indicators, and j is the serial number of the uniform grid; \({S}_{ik}^{j}\) denotes the score of class k of security evaluation for i indicator at j grid; k is the class of security evaluation indicators ranging from 1 to \({n}_{i}^{j}\) ; \({n}_{i}^{j}\) indicates the class number of i indicator; \({A}_{ik}^{j}\) denotes the area of the k class of i security evaluation indicator in the j grid. The range of \({S}_{i}^{j}\) is from 1.00 to 6.00. A higher \({S}_{i}^{j}\) implies a more serious status for the corresponding security evaluation indicator. If partial areas were not evaluated using a certain indicator because of data unavailability, the given areas were excluded in the calculation of the equation ( 1 ).

Scaling transformation method

With the area-weighted evaluation normalization, security evaluation indicator data at different resolutions were unified on the same grid. This, however, results in a statistical bias of scaling up or down. In particular, the evaluation scores of security evaluation indicators with fine resolutions would be smoothed when scaling up to a coarser resolution. Therefore, based on the idea of histogram transformation in image enhancement 48 , 49 , we used the frequency histogram equalization to re-calculate the normalization scores from the raw data. Taking the indicator including six classes as an example, the scaling transformation of normalization scores were realized by the following steps. First, the area proportions of six security evaluation classes using the raw data were calculated to generate a frequency histogram with six classes (scores of class 1 to class 6 for 1, 2, 3, 4, 5, and 6). Second, we calculated piecewise normalization scores \({S}_{i}^{j}\) of six interval ranges, of which area proportions were consistent with area proportions of six classes in the histogram from step 1, i.e. (X 1 , X 2 ], (X 2 , X 3 ], (X 3 , X 4 ], (X 4 , X 5 ], (X 5 , X 6 ]. Third, six interval ranges of normalization scores were transformed to the scaling interval ranges of 1, (1, 2], (2, 3], (3, 4], (4, 5], (5, 6], which are consistent with six interval ranges calculated from step 2. \({S}_{i}^{j}\) at the interval range of (X 1 , X 2 ] were assigned 1. Other normalization scores were calculated at every pair of interval ranges by the following equation:

where \({S}_{ik}^{j^{\prime} }\) is the scaling transformation score, i , j , and k are the same symbol in the equation ( 1 ); X max and X min mean the upper and lower limits of interval ranges from normalization scores in step 2; \({X}_{{\rm{\max }}}^{^{\prime} }\) and \({X}_{{\rm{\min }}}^{^{\prime} }\) denote the corresponding upper and lower limits of the scaling interval ranges, respectively. Taking the \({S}_{i}^{j}\) at the interval range of (X 3 , X 4 ] as an example, it can be calculated as follows:

Aggregation method

With the area-weighted normalization and scaling transformation, the scaling normalization score of 14 security evaluation indicators at every grid \({S}_{ik}^{j^{\prime} }\) was calculated. Two aggregation strategies, including the veto aggregation and the balanced aggregation methods 28 , 50 , were used to comprehensively integrate evaluation scores of multiple indicators. The veto aggregation method focuses on the most serious security deficits of all indicators, which could help find the limit factor of ecological and environmental security. The equation is as follows:

where \({V}_{i}^{j}\) is the score calculated by the veto aggregation method; n is the number of security evaluation indicators.

The balanced aggregation method coordinates all indicators and calculates the mean value of indicator scores by the following equation:

where \({G}_{i}^{j}\) is the score calculated by the balanced aggregation method; w i denotes the weight of security evaluation indicator, which is equal to 1/ n .

Using the veto aggregation and the balanced aggregation methods, we evaluated the scores of water security, land security, air security and biodiversity security. Then, the water, land, air, and biodiversity security scores were grouped into six classes (class 1 : safety; class 2 : basic safety; class 3 : endangered security; class 4 : insecurity; class 5 : marginal crisis; class 6 : crisis) in ArcGIS 10.1 (ESRI Inc., USA) by Jenks natural break optimization for the balanced aggregation scores and the uniform interval ranges of [1.0, 1.5], (1.5, 2], (2, 3], (3, 4], (4, 5], (5, 6] for the veto aggregation scores. The uniform classes of the veto aggregation method could be easily interpreted based on the indicator classified standard. For example, if the score of the security evaluation is larger than 5.00, it implies that there is at least one security evaluation indicator up to the crisis level, which indicates a serious security status.

The final goal of ecological and environmental security was evaluated by aggregating four aspects of securities including 14 indicators. The final security scores were calculated by two aggregation methods by using the following equations:

where \(E{V}_{i}^{j}\) and \(E{G}_{i}^{j}\) are the ecological and environmental security evaluation scores by the veto aggregation and balanced aggregation methods, respectively; \(W{V}_{i}^{j}\) , \(L{V}_{i}^{j}\) , \(A{V}_{i}^{j}\) , and \(B{V}_{i}^{j}\) are the water, land, air, and biodiversity security scores calculated using the veto aggregation method, respectively; \(W{G}_{i}^{j}\) , \(L{G}_{i}^{j}\) , \(A{G}_{i}^{j}\) , \(B{G}_{i}^{j}\) are the water, land, air, and biodiversity security scores calculated using the balanced aggregation method, respectively. Moreover, the non-evaluation areas were classified to the class of “crisis” in the final evaluation of the ecological and environmental security. The ecological and environmental security scores were grouped into six classes in ArcGIS 10.1 by Jenks natural break optimization. Spatial distributions were visualized in ArcGIS 10.1.

Report from Ministry of Environmental Protection of the People’s Republic of China, 2017 (in Chinese).

Ministry of Water Resources of the People’s Republic of China, 1997, SL190-96 Standards for Grading of Soil Erosion. (in Chinese).

Liu, J. G. & Diamond, J. China’s environment in a globalizing world. Nature 435 , 1179–1186 (2005).

Article   ADS   CAS   PubMed   Google Scholar  

Fu, B. J., Zhuang, X. L., Jiang, G. B., Shi, J. B. & Lu, Y. H. Feature: environmental problems and challenges in China. Environmental Science & Technology 41 , 7597–7602 (2007).

Article   ADS   CAS   Google Scholar  

Vennemo, H., Aunan, K., Lindhjem, H. & Seip, H. M. Environmental pollution in China: status and trends. Review of Environmental Economics and Policy , rep009 (2009).

He, G. Z., Lu, Y. L., Mol, A. P. & Beckers, T. Changes and challenges: China’s environmental management in transition. Environmental Development 3 , 25–38 (2012).

Article   CAS   Google Scholar  

Scheffer, M., Carpenter, S., Foley, J. A., Folke, C. & Walker, B. Catastrophic shifts in ecosystems. Nature 413 , 591–596 (2001).

Bundy, J., Pfarrer, M. D., Short, C. E. & Coombs, W. T. Crises and Crisis Management Integration, Interpretation, and Research Development. Journal of Management , doi: 10.1177/0149206316680030 (2016).

Rockström, J. et al . A safe operating space for humanity. Nature 461 , 472–475 (2009).

Article   ADS   PubMed   Google Scholar  

Su, S., Chen, X., DeGloria, S. D. & Wu, J. Integrative fuzzy set pair model for land ecological security assessment: a case study of Xiaolangdi Reservoir Region, China. Stochastic Environmental Research and Risk Assessment 24 , 639–647 (2010).

Article   Google Scholar  

Zhao, Y.-Z. et al . Assessing the ecological security of the Tibetan plateau: Methodology and a case study for Lhaze County. Journal of Environmental Management 80 , 120–131 (2006).

Article   PubMed   Google Scholar  

Lu, X.-c., Zhang, J.-q. & Li, X.-z. Geographical information system-based assessment of ecological security in Changbai Mountain region. Journal of Mountain Science 11 , 86–97 (2014).

Wang, Z., Zhou, J., Loaiciga, H., Guo, H. & Hong, S. A DPSIR Model for Ecological Security Assessment through Indicator Screening: A Case Study at Dianchi Lake in China. PloS one 10 , e0131732 (2015).

Article   PubMed   PubMed Central   Google Scholar  

Wang, S.-r. et al . Ecological security problems of the major key lakes in China. Environmental Earth Sciences 74 , 3825–3837 (2015).

Su, S. et al . Assessing land ecological security in Shanghai (China) based on catastrophe theory. Stochastic Environmental Research and Risk Assessment 25 , 737–746 (2011).

Ye, H., Ma, Y. & Dong, L. M. Land ecological security assessment for Bai autonomous prefecture of Dali based using PSR model–with data in 2009 as case. Energy Procedia 5 , 2172–2177 (2011).

Gong, J. Z., Liu, Y. S., Xia, B. C. & Zhao, G. W. Urban ecological security assessment and forecasting, based on a cellular automata model: A case study of Guangzhou, China. Ecological Modelling 220 , 3612–3620 (2009).

Lin, Q., Mao, J., Wu, J., Li, W. & Yang, J. Ecological Security Pattern Analysis Based on InVEST and Least-Cost Path Model: A Case Study of Dongguan Water Village. Sustainability 8 , 172 (2016).

Grumbine, R. E. Assessing environmental security in China. Frontiers in Ecology and the Environment 12 , 403–411 (2014).

Floyd, R. & Matthew, R. Environmental security: approaches and issues . (Routledge, 2013).

Allenby, B. R. Environmental security: Concept and implementation. International Political Science Review 21 , 5–21 (2000).

Zhao, S. Physical geography of China . (Science Press, 1986).

Wang, X. M., Chen, F., Hasi, E. & Li, J. C. Desertification in China: An assessment. Earth-Sci. Rev. 88 , 188–206 (2008).

Article   ADS   Google Scholar  

Xu, E. Q. & Zhang, H. Q. Characterization and interaction of driving factors in karst rocky desertification: a case study from Changshun, China. Solid Earth 5 , 1329–1340 (2014).

Niu, L. L., Yang, F. X., Xu, C., Yang, H. Y. & Liu, W. P. Status of metal accumulation in farmland soils across China: From distribution to risk assessment. Environmental Pollution 176 , 55–62, doi: 10.1016/j.envpol.2013.01.019 (2013).

Article   CAS   PubMed   Google Scholar  

Wang, S. et al . Spatial distribution, seasonal variation and regionalization of PM2.5 concentrations in China. Science China-Chemistry 58 , 1435–1443 (2015).

Ma, H., Lv, Y. & Li, H. Complexity of ecological restoration in China. Ecological Engineering 52 , 75–78 (2013).

Carter, N. & Mol, A. P. Environmental governance in China . (Routledge, 2013).

Shi, Y. L. et al . Assessment of China’s ecological environment and strategic thinking. Resources Science 37, 1305–1313 (In Chinese) (2015).

Liu, F. & Zhang, H. Q. Novel methods to assess environmental, economic, and social sustainability of main agricultural regions in China. Agronomy for Sustainable Development 33 , 621–633 (2013).

Apparicio, P., Abdelmajid, M., Riva, M. & Shearmur, R. Comparing alternative approaches to measuring the geographical accessibility of urban health services: Distance types and aggregation-error issues. International Journal of Health Geographics 7 , 7 (2008).

Xu, E. Q. & Zhang, H. Q. Research on the evaluation of land use sustainability in ecologically fragile region in China. Chinese Journal of Agricultural Resources and Regional Planning 33 , 1–6 (in Chinese) (2012).

Wang, S. J., Liu, Q. M. & Zhang, D. F. Karst rocky desertification in southwestern China: geomorphology, landuse, impact and rehabilitation. Land degradation & development 15 , 115–121 (2004).

Li, V. & Lang, G. China’s oGreen GDPo Experiment and the Struggle for Ecological Modernisation. Journal of Contemporary Asia 40 , 44–62, doi: 10.1080/00472330903270346 (2010).

Dale, V. H., Efroymson, R. A., Kline, K. L. & Davitt, M. S. A framework for selecting indicators of bioenergy sustainability. Biofuels, Bioproducts and Biorefining 9 , 435–446 (2015).

Jiang, Y. China’s water scarcity. Journal of Environmental Management 90 , 3185–3196 (2009).

Chen, H., Teng, Y., Lu, S., Wang, Y. & Wang, J. Contamination features and health risk of soil heavy metals in China. Science of the Total Environment 512–513 , 143–153 (2015).

Yang, Z. et al . Geochemical evaluation of land quality in China and its applications. Journal of Geochemical Exploration 139 , 122–135 (2014).

Zhao, Y. et al . Soil acidification in China: is controlling SO2 emissions enough? Environmental Science & Technology 43 , 8021–8026 (2009).

Li, M. & Zhang, L. Haze in China: Current and future challenges. Environmental Pollution 189 , 85–86 (2014).

Zhang, Y. B. & Ma, K. P. Geographic distribution patterns and status assessment of threatened plants in China. Biodiversity and Conservation 17 , 1783–1798 (2008).

Zhang, C. Y. et al . Spatial-Temporal Dynamics of China’s Terrestrial Biodiversity: A Dynamic Habitat Index Diagnostic. Remote Sensing 8 , 227 (2016).

Tian, J. & Gang, G. Research on regional ecological security assessment. Energy Procedia 16 , 1180–1186 (2012).

Du, P., Xia, J., Du, Q., Luo, Y. & Tan, K. Evaluation of the spatio-temporal pattern of urban ecological security using remote sensing and GIS. International journal of remote sensing 34 , 848–863 (2013).

Huang, Q., Wang, R., Ren, Z., Li, J. & Zhang, H. Regional ecological security assessment based on long periods of ecological footprint analysis. Resources, Conservation and Recycling 51 , 24–41 (2007).

O’Connor, J. The meaning of crisis. International Journal of Urban and Regional Research 5 , 301–329 (1981).

Shrivastava, P. Crisis theory/practice: Towards a sustainable future. Organization & environment 7 , 23–42 (1993).

Fisher, P. F. & Langford, M. Modeling sensitivity to accuracy in classified imagery: A study of areal interpolation by dasymetric mapping ∗ . The Professional Geographer 48 , 299–309 (1996).

Marcott, S. A., Shakun, J. D., Clark, P. U. & Mix, A. C. A reconstruction of regional and global temperature for the past 11,300 years. Science 339 , 1198–1201 (2013).

Chavez, P. S. & MacKinnon, D. J. Automatic detection of vegetation changes in the southwestern United States using remotely sensed images. Photogrammetric engineering and remote sensing 60 , 1285–1294 (1994).

Google Scholar  

Agaian, S. S., Silver, B. & Panetta, K. A. Transform coefficient histogram-based image enhancement algorithms using contrast entropy. IEEE transactions on image processing 16 , 741–758 (2007).

Article   ADS   MathSciNet   PubMed   Google Scholar  

Hiddink, J. & Kaiser, M. Implications of Liebig’s law of the minimum for the use of ecological indicators based on abundance. Ecography 28 , 264–271 (2005).

Wischmeier, W. H. & Smith, D. D. Predicting Rainfall Erosion Losses: A Guide to Conservation Planning (1978).

Liu, B. T. et al . Temporal and spatial variations of rainfall erosivity in China during 1960 to 2009. Geographical Research 32, 245–256 (in Chinese) (2013).

Williams, J. & Arnold, J. A system of erosion—sediment yield models. Soil technology 11 , 43–55 (1997).

McCool, D., Foster, G., Mutchler, C. & Meyer, L. Revised slope length factor for the Universal Soil Loss Equation. Transactions of the ASAE (1989).

Liu, B., Nearing, M. & Risse, L. Slope gradient effects on soil loss for steep slopes. Transactions of the ASAE 37 , 1835–1840 (1994).

Van Remortel, R. D., Hamilton, M. E. & Hickey, R. J. Estimating the LS factor for RUSLE through iterative slope length processing of digital elevation data within Arclnfo grid. Cartography 30 , 27–35 (2001).

Rao, E. M., Ouyang, Z. Y., Yu, X. X. & Xiao, Y. Spatial patterns and impacts of soil conservation service in China. Geomorphology 207 , 64–70 (2014).

Yang, Z. F. et al . Geochemical evaluation of land quality in China and its applications. Journal of Geochemical Exploration 139 , 122–135 (2014).

Jia, Y. et al . Spatial and decadal variations in inorganic nitrogen wet deposition in China induced by human activity. Scientific Reports 4 , 3763, doi: 10.1038/srep03763 (2014).

ADS   PubMed   PubMed Central   Google Scholar  

Yue, C. et al . Provincial Carbon Emissions and Carbon Intensity in China from 1995 to 2007 (Carbon Emissions and Social Development, III). Acta Scientiarum Naturalium Universitatis Pekinensis 46, 510–516 (in Chinese) (2010).

Gong, J. G., Tang, K. W. & Wang, H. Zone-division of water crisis and corresponding strategies in China. Resources Science 37, 1314–1321 (in Chinese) (2015).

Xue, Z. J., Qin, Z. D., Li, H. J., Ding, G. W. & Meng, X. W. Evaluation of aeolian desertification from 1975 to 2010 and its causes in northwest Shanxi Province, China. Global and Planetary Change 107 , 102–108 (2013).

Li, F. et al . Sandy desertification change and its driving forces in western Jilin Province, North China. Environmental Monitoring and Assessment 136 , 379–390 (2008).

Yang, J. C. et al . Dynamics of Saline-alkali Land and Its Ecological Regionalization in Western Songnen Plain, China. Chinese Geographical Science 20 , 159–166 (2010).

Xie, S. Y., Wang, R. B. & Zheng, H. H. Analysis on the Acid Rain from 2005 to 2011 in China. Environmental Monitoring and Forewarning 4 , 33–37 (in Chinese) (2012).

Download references

Acknowledgements

This work was financially by National Natural Science Foundation of China (Grant No. 41601095) and the consulting project sponsored by the Chinese Academy of Engineering. We are most grateful for the provision of part data by Yu Guirui, and Tang Kewang.

Author information

Authors and affiliations.

Key Laboratory of Land Surface Pattern and Simulation, Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing, 100101, P.R. China

Hongqi Zhang & Erqi Xu

You can also search for this author in PubMed   Google Scholar

Contributions

All authors read and approved the final manuscript. Hongqi Zhang and Erqi Xu collected data. Hongqi Zhang analyzed the data and prepared all figures. Hongqi Zhang and Erqi Xu wrote the main manuscript text.

Corresponding author

Correspondence to Erqi Xu .

Ethics declarations

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Zhang, H., Xu, E. An evaluation of the ecological and environmental security on China’s terrestrial ecosystems. Sci Rep 7 , 811 (2017). https://doi.org/10.1038/s41598-017-00899-x

Download citation

Received : 02 December 2016

Accepted : 16 March 2017

Published : 11 April 2017

DOI : https://doi.org/10.1038/s41598-017-00899-x

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

This article is cited by

Coordination analysis of flood-sediment transportation, eco-environment, and socio-economy coupling in the governance of the yellow river basin system.

  • Gaolei Zhao
  • Shimin Tian

Scientific Reports (2024)

Spatial-temporal pattern of change in production-living-ecological space of Nanchong City from 2000 to 2020 and underlying factors

  • Mou Leong Tan

Environmental Monitoring and Assessment (2024)

Navigating ecological security research over the last 30 years: a scoping review

  • Shizuka Hashimoto
  • Samuel A. Cushman

Sustainability Science (2023)

An Improved Model for Evaluating Ecosystem Service Values Using Land Use/Cover and Vegetation Parameters

  • Fang-Cheng Zhou
  • Xiuzhen Han

Journal of Meteorological Research (2021)

Examining the spatiotemporal change of forest resource carrying capacity of the Yangtze River Economic Belt in China

  • Xingliang Guan
  • Dahong Zhang

Environmental Science and Pollution Research (2020)

By submitting a comment you agree to abide by our Terms and Community Guidelines . If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

case study on environmental security

Pacific Institute

Environmental Security: A Case Study of Climate Change

Published: August 2002

Authors: Elizabeth Chalecki

Text / Environmental security: a case study of climate change

Environmental security: a case study of climate change

Get Citation

We recommend you include the following information in your citation. Look below the item for additional data you may want to include.

Contact Owning Institution

All fields are required.

RE: Calisphere: Request high-resolution copy of item for Environmental security: a case study of climate change

Download Item

Please use this item responsibly. Check the rights information for this item to see if it has copyright restrictions. Note that even if the item is protected by copyright, you may be able to use it for educational, research, or other purposes. To learn more, read Calisphere's terms of use.

Do you need a bigger file? To obtain an alternate file type or higher resolution copy, please contact the owning institution.

Item information.

About the collections in calisphere.

Learn more about the collections in Calisphere. View our statement on digital primary resources .

Copyright, permissions, and use

If you're wondering about permissions and what you can do with this item, a good starting point is the "rights information" on this page. See our terms of use for more tips.

Share your story

Has Calisphere helped you advance your research, complete a project, or find something meaningful? We'd love to hear about it; please send us a message .

Explore related content on Calisphere:

Coastal Conservancy and related aquatic resources documentation

Institution: UC Riverside, Library, Water Resources Collections and Archives

Institute for Energy and Environmental Research For a safer, healthier environment and the democratization of science

  • Our Commitment
  • Staff and Board
  • Publications
  • Newsletters
  • Audio/Video
  • Subject Index
  • Archives (by date)
  • Links to Other Sites
  • Carbon-Free, Nuclear-Free
  • The Renewable Maryland Project
  • Healthy from the Start
  • Disarmament and Nonproliferation

You are here: Home » Climate Change » Two Case Studies of Environmental-Security Connections

Two Case Studies of Environmental-Security Connections

A presentation at the environmental grantmakers association meeting panel:, “overlooked at our peril: why military/security policy is ega’s business”.

Brainerd, Minnesota Arjun Makhijani 15 October 2001

My presentation will consist of two case studies that show the intimate connection between environmental problems and military/security questions.

  • Oil, environment, and security
  • Nuclear weapons, proliferation, and environmental contamination.

1. Oil, environment and security

At first sight the acts of terror committed on September 11, 2001 do not appear to be linked to oil. But they are. The link arises from the historical accident that the largest resources of oil on the planet are in Saudi Arabia, which is also the land with the two most holy sites of Islam. U.S. troops have been based there, uneasily, since the 1991 Gulf War. That has been the source of much anger in the region. It appears that many or most of the hijackers were from there, as is the person who seems to have financed and inspired them.

A great deal of violence has historically been associated with oil. Much of World War II was about oil. For instance, the Japanese attack on Pearl Harbor came after the U.S. imposed an oil embargo to prevent Japan from getting access to and eventual control of Indonesian oil, which belonged neither to Japan, nor to the United States, nor to the Dutch colonialists who then ruled Indonesia. As another example, the CIA-supported overthrow of an elected government in Iran in 1953 (in reaction to nationalization of the Iranian oil industry) and its replacement by the Shah of Iran led to two and a half decades of repression in which substantial dissent was only possible in the mosques. The process was central to the dynamic that led up to the 1979 Islamic revolution in Iran.

Several past military crises, with nuclear implications have been around the question of oil: Iran right after World War II, Lebanon-Iraq in 1958, the Israel-Egypt war and the associated Arab oil embargo in 1973, and the 1991 Gulf War. There has been much great power rivalry in the region, dating back to Victorian and Czarist times. One British and U.S. goal in modern times, for instance, was to prevent the Soviet Union from gaining access to an Indian Ocean warm water port in a region or a strong political foothold so close to the world’s largest oil reserves. Much of the mess in the region, including some of the motivation for the U.S. support of the Islamic opposition to the Soviet intervention in Afghanistan at the end of 1979, had that as a motive.

In the present crisis, the politics of Central Asia, the Caspian region, the Caucasian region, and the Middle East, are becoming ever more tangled with the politics of terrorism and with the nuclear politics of Pakistan and India. Of course, this is in addition to the old-time nuclear powers, the United States, Russia, and China, who are present in the region. U.S. policy in Central Asia, like that of the other major powers, is closely tied to the immense oil and gas resources in the region. Now the U.S. has troops in that region. (For a fine, recent analysis of Central Asian oil resources and U.S. policy see Michael Klare, Resource Wars: The New Landscape of Global Conflict. New York: Metropolitan Books, 2001). The U.S. military presence in Central Asia is already showing signs of becoming prolonged, in the same manner as that in Saudi Arabia after the Gulf War. According to recent news reports, the United States has made a long-term security agreement with the government of Uzbekistan, which is, by all accounts, a repressive one that has violated human rights. This could become a bone of contention between Russia and the United States, adding to the danger and complexity of the present crisis in the region.

Oil, of course, is also at the center of the global warming problem. Roughly half the emissions of carbon dioxide emissions from fossil fuels are attributable to oil. Most urban air pollution comes from motor vehicles. Much of the pollution of the oceans comes from oil spills, both routine and accidental.

Are we condemned to these severe security and environmental problems unless we eliminate oil consumption and replace it by efficiency and renewables? I don’t think so. The security goal as regards oil is actually somewhat easier than addressing the greenhouse gas problem in its entirety. Reducing world oil consumption by 20 percent, which would amount to about 15 million barrels a day, through mileage standards and the like, would eliminate the political leverage of the Persian Gulf without eliminating the revenues of the countries in the region. This can be done in a decade, if pursued with the determination, on a worldwide basis, and probably with less resources than are now being devoted to war. And it would save a lot of lives – from reduced lung disease to reduced casualties, civilian and military, in the battlefield.

Were the security arguments for reducing oil consumption to prevail – and they are currently the most powerful ones – the benefits for the environment would, of use be immense. In fact, if the West and Japan were to reduce their petroleum consumption by 20 percent in ten years, it would approximately correspond to the fulfillment of their Kyoto Protocol targets. With security as the leading edge, there is now a better prospect for energy policies that would achieve other environmental goals as well, notably the creation of distributed electricity grids. My next case study shows that benefits can also flow from environmental work to the security arena.

2. Nuclear weapons, proliferation, and environmental contamination

I’ll use two examples to illustrate the connections between these issues. The first deals with water contamination and regulatory questions related to nuclear weapons production and nuclear waste management. The second deals with plutonium processing.

A. Water contamination

(i) Plutonium in the water: More than a ton (literally) of plutonium, enough to make 200 bombs, and other radioactive materials were packed in cardboard boxes, drums, and wooden boxes and dumped in unlined trenches over the in the Snake River Plain aquifer, the largest aquifer in the Northwest. Some of the water on site is already contaminated well above drinking water standards. The U.S. Department of Energy (DOE) is not remediating the dumps, but spending over $5 billion a year on new weapons design, laboratory testing of nuclear weapons, and plutonium component testing (without nuclear explosions) underground in Nevada.

(ii) Tritium in the water: Tritium (T) is a radioactive isotope of hydrogen. Being chemically identical to hydrogen, it can replace one of the regular non-radioactive hydrogen atoms in water, H2O, making the water radioactive, HTO, or tritiated water. This water behaves like ordinary water in the human body and in ecosystems and hence becomes part of human cells, food, DNA….Tritiated water, HTO, like H2O, can cross the placenta and irradiate the developing fetus. It is a widespread pollutant resulting from nuclear weapons production (and also from nuclear power, especially from the Canadian heavy water reactor design). For instance, the Savannah River has tritium contamination from the Savannah River Site, in South Carolina. Remedial action is weak, in large measure because it is difficult. While the water is well within the allowable contaminant limit for drinking water, it is important to note that tritium standards are set not for developing fetuses or pregnant women, but for “standard man” – literally a 154-pound male. Like other radioactive materials, the maximum contaminant limit goal is zero, since the best evidence indicates that every increment of radiation produces additional cancer risk. With some radioactive materials the dangers are, I believe, considerably greater than reflected in present day regulations. Several radioactive materials — tritiated water, radioactive cesium isotopes, radioactive iodine isotopes, strontium-90, and carbon-14 — mimic non-radioactive materials the body needs. They all cross the placenta easily. Moreover, the synergistic effects of substances like tritiated water with non-radioactive toxics are essentially unknown. The Department of Energy now proposes to produce tritium for use in nuclear weapons in commercial nuclear reactors belonging to the Tennessee Valley Authority. It has proved very difficult to address this very serious breach of non-proliferation norms – the use of commercial reactors to make weapons materials – and I believe that the environmental and health arguments have been more persuasive. So far, the production plans have not been put into effect and are being maintained only as a contingency.

(iii) Relaxation of Safe Drinking Water Standards: The process for licensing the proposed Yucca Mountain nuclear waste repository in Nevada has become the vehicle for a massive relaxation of Safe Drinking Water standards. Because it seemed unlikely even to the Department of Energy that the repository could meet the Safe Drinking Water Standards at the repository boundary, the DOE successfully put heavy pressure on the EPA to exclude under federal land around the proposed site from these standards, despite a great deal of hard work by many environmental groups. It wasn’t enough because burying nuclear power plant spent fuel and vitrified plutonium is seen as a goal that is desirable from a non-proliferation perspective. If the exclusion remains in place (it is under litigation both by environmental groups an industry, which thinks that Safe Drinking Water Standards should not apply at all), it will set a precedent that could harm water supplies throughout the country. This would be especially harmful in the West where water is scarce and a lot of land is federally owned. Both military and commercial radioactive waste would be disposed of at Yucca Mountain, should it be licensed. The repository threatens the only local source of water in the region, currently used for irrigation only twenty miles away from the proposed site.

Environmental work has been crucial to progress on nuclear disarmament. In one of the least remarked victories, work on health, environmental and safety issues led to the closure of most of the large nuclear weapons plants in the United States, such as plutonium and tritium production reactors in South Carolina and a large-scale plutonium pit manufacturing facility in Colorado, as the Cold War was winding down. There were no treaties requiring their closure. But they will not be reopened. Of course, the job is not done because some nuclear weapons plants remain open in the United States and in other countries and new ones have been proposed.

B. Plutonium processing and catastrophic accidents:

Plutonium processing creates liquid high level radioactive wastes stored in tanks. These tanks can explode under certain conditions. A 1957 explosion of such a tank in the Soviet Union at the Mayak site in the southern Urals contaminated about 6,000 square miles, and 30 towns and villages were permanently leveled. There was a near miss in 1980 in France. Two such plants are being operated at the Savannah River Site, where more than 30 million gallons of high-level waste are stored. There are 177 high-level waste tanks at Hanford Washington, near the Columbia River. Many of the tanks at Hanford and Savannah River Site are at some risk of fires due to build up hydrogen and/or other flammable chemicals.

Commercial plutonium reprocessing produces the same kind of highly radioactive waste as military plutonium reprocessing. It is being carried out in France Britain, Russia, Japan, and India. (The only U.S. commercial reprocessing plant was shut in 1972.) The French and British plants have contaminated marine life as far away as Norway. Several European governments have asked that these plants be shut – so far to no avail.

Commercial plutonium is uneconomical as a fuel, being five to 20 times more costly than uranium fuel. It can used to make nuclear weapons. The threat of loose nukes from diversion commercial plutonium is among the most serious proliferation problems in the world. There are 12,000 canisters of surplus plutonium stored in Russia alone (at the Mayak site). Just two of those canisters contain enough material to make a bomb.

Despite the fact that plutonium is uneconomical (there is no argument about this even within the nuclear establishment), the Russian nuclear ministry, Minatom, regards plutonium as a treasure. One day it will be economical, according to this reasoning. In the meantime? Well, it is a significant proliferation risk. Plutonium could also be used as a radiological terror weapon.

Much of this infrastructure of plutonium storage and production is vulnerable in varying degrees to terrorist attack or to diversion of materials from within. And global stocks of unused commercial plutonium have now grown to rival military stocks. They are now over 200 metric tons, or enough to make 30,000 nuclear bombs. Measurement and accounting errors in commercial as well as military plutonium production systems have often exceeded the amounts needed to make nuclear weapons.

It is noteworthy that the main opposition to commercial plutonium in Europe-France and Britain are the centers of the industry – comes from other European governments on environmental grounds. Sea life as far away as Norway has become contaminated due to the radioactivity discharges. Increases in childhood and juvenile cancer have been detected at both sites, though typically the nuclear establishments dismiss the findings, as though they knew with complete confidence they were not response. They are more used to saying mea culpa after a few decades.

The main local public opposition to commercial reprocessing has also been around environmental as well as economic issues. The security arguments have not taken hold, because governments have been too confident that they can actually control every contingency and that there will not be diversion. Perhaps that will change. But the security gains would be immense, were the environmental and economic arguments to succeed.

Some notes on process

Chris Wing suggested that I make some remarks on the process by which our work is done. None of the problems that I have discussed above can be solved solely within one country. Most of them affect the whole world. So we not only work with groups all over the United States, we work in the main countries where nuclear problems are severe. We rely on a few key advisors in each country where we do a lot of work to guide us. When we made the decision to work internationally some years ago, we also decided to publish in at least one of the principal languages of those countries. So the Institute for Energy and Environmental Research (IEER) publishes its newsletter in English, Russian, French, Chinese, and occasionally in other languages. Our web site is also multilingual – currently in English, French, Russian, and to a limited extent in Chinese, and Japanese. We hope to add Spanish this year, in a small way, and perhaps Arabic next year. Our staff also has exceptionally wide language capabilities, besides having strong scientific and communications abilities. We note only share our knowledge with groups in other countries, but benefit equally from their expertise. Our international work has led us to develop international media outreach and, to a lesser extent, outreach to policy-makers abroad.

In the process of our international work, we found one of the world’s foremost experts on the proposed Yucca Mountain repository site in Novosibirsk, Russia. We began to work closely with one of the founding members of the Green Party in France, who is the leading activist against the plutonium separation plant in France, the largest in the world. There is a Gandhian center in western India, run by a physicist-physician couple, who have done what is, in my opinion, the best single health survey near a nuclear power plant. And all of these colleagues have come to the United States, as part of our program, to share their work and expertise with activists, researchers, and journalists here, even as we have shared ours with them.

Every year we hold a five-day technical training workshop for U.S. community leaders and activists as part of our goal of democratizing science. The participants get to know each other quite well in the process of rather intense technical sessions because they work together to prepare their own projects and presentations, which are invariably the best part of every workshop, whether it’s on water resources or de-alerting nuclear weapons. The presentations range from the purely technical, to poetry to plays written during the workshop. We had our first techno-musical dramatic presentation this year, exploring the ideas of Einstein and nuclear energy.

We have become close to many of the people that we work with here and all over the world. Let me illustrate with a personal anecdote. Two of our friends are working to shut down the commercial plutonium reprocessing plant located in the beautiful Lake District in northwestern England where Wordsworth wrote his poetry and Beatrix Potter dreamed up Peter Rabbit. On their farm, they have a pair of pair of geese, an old couple, whom they have named after my wife (a fellow scientist at IEER) and me. The personal richness that comes out of the process is central to what sustains my colleagues and me in our work on what is, after all, a grim subject. Because of that I often think that process is our most important product.

Subject: Climate Change , Energy Issues , and Nuclear Weapons . Posted on October, 2001. Last modified September, 2012. Download this page as a PDF

Download this page as a PDF

Related content:

  • Statement on Tritium
  • Nuclear Waste threatens water resources
  • Plutonium End Game
  • Statement on Tritium before the House Committee on Intergovernmental Coordination, State of Georgia
  • Nuclear Dumps by the Riverside: Threats to the Savannah River from Radioactive Contamination at the Savannah River Site

Stay up to date with IEER

Institute for Energy and Environmental Research, © 2024

Back to Top • Home • Terms of Use

case study on environmental security

  • Engineering & Transportation
  • Engineering

Amazon prime logo

Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime Try Prime and start saving today with fast, free delivery

Amazon Prime includes:

Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.

  • Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
  • Unlimited Free Two-Day Delivery
  • Streaming of thousands of movies and TV shows with limited ads on Prime Video.
  • A Kindle book to borrow for free each month - with no due dates
  • Listen to over 2 million songs and hundreds of playlists
  • Unlimited photo storage with anywhere access

Important:  Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.

Return this item for free

Free returns are available for the shipping address you chose. You can return the item for any reason in new and unused condition: no shipping charges

  • Go to your orders and start the return
  • Select your preferred free shipping option
  • Drop off and leave!

Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required .

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Image Unavailable

Environmental Security: Concepts, Challenges, and Case Studies

  • To view this video download Flash Player

Environmental Security: Concepts, Challenges, and Case Studies First Edition

Purchase options and add-ons.

  • ISBN-10 194497041X
  • ISBN-13 978-1944970413
  • Edition First Edition
  • Publisher American Meteorological Society
  • Publication date December 20, 2019
  • Language English
  • Dimensions 8 x 0.7 x 10 inches
  • Print length 224 pages
  • See all details

Books with Buzz

Customers who bought this item also bought

Environmental Policy: New Directions for the Twenty-First Century

Editorial Reviews

About the author, product details.

  • Publisher ‏ : ‎ American Meteorological Society; First Edition (December 20, 2019)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 224 pages
  • ISBN-10 ‏ : ‎ 194497041X
  • ISBN-13 ‏ : ‎ 978-1944970413
  • Item Weight ‏ : ‎ 1.25 pounds
  • Dimensions ‏ : ‎ 8 x 0.7 x 10 inches
  • #1,015 in Business Development
  • #1,475 in Sustainable Business Development
  • #2,161 in Reference (Books)

Customer reviews

Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.

To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.

No customer reviews

  • Amazon Newsletter
  • About Amazon
  • Accessibility
  • Sustainability
  • Press Center
  • Investor Relations
  • Amazon Devices
  • Amazon Science
  • Sell on Amazon
  • Sell apps on Amazon
  • Supply to Amazon
  • Protect & Build Your Brand
  • Become an Affiliate
  • Become a Delivery Driver
  • Start a Package Delivery Business
  • Advertise Your Products
  • Self-Publish with Us
  • Become an Amazon Hub Partner
  • › See More Ways to Make Money
  • Amazon Visa
  • Amazon Store Card
  • Amazon Secured Card
  • Amazon Business Card
  • Shop with Points
  • Credit Card Marketplace
  • Reload Your Balance
  • Amazon Currency Converter
  • Your Account
  • Your Orders
  • Shipping Rates & Policies
  • Amazon Prime
  • Returns & Replacements
  • Manage Your Content and Devices
  • Recalls and Product Safety Alerts
  • Conditions of Use
  • Privacy Notice
  • Consumer Health Data Privacy Disclosure
  • Your Ads Privacy Choices
  • Nebraska Medicine
  • Give to GCHS

New study launches following the discovery of a second case of avian influenza spreading from cows to humans

  • Published May 29, 2024

Medical Express Vaccination remains the most effective strategy for avian influenza prevention and control in humans, despite varying vaccine efficacy across strains.

That’s according to the authors of a new review which delves into existing research into bird flu vaccines for humans.

Published in the journal  Human Vaccines & Immunotherapeutics , the results of the paper are particularly timely following news on 22 May that the bird flu strain H5N1 had once again, for a second time, jumped from cattle in America to a human—prompting fears of subsequent human-to-human infection, with possible critical consequences.Instances of the avian  influenza  were first recognized in US cattle in March. Since then, this strain has mainly spread from cow-to-cow and scientists have discovered very high levels of virus in raw milk (pasteurized milk is safe, having shown viral RNA but not infectious virus). To date, two people, however, are known to have contracted the bird flu virus. Both patients—US farmers—only reported eye symptoms and with treatment they made a full recovery.

Leave a comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

case study on environmental security

Musk Lawyer Alex Spiro Can Participate in Texas Defamation Case

By Ryan Autullo

Ryan Autullo

Elon Musk’s lawyer, Alex Spiro of Quinn Emanuel Urquhart & Sullivan LLP, can defend him against defamation claims in Texas, a state district court judge announced Wednesday.

Judge Maria Cantú Hexsel (D) of the 53rd Civil District Court in Travis County granted Spiro’s motion to participate as a non-Texas lawyer. Although such requests from out-of-state attorneys are typically granted without hesitation, Spiro’s was problematic.

Spiro, a partner based in Quinn Emanuel’s New York office, already worked on the case by preparing and signing a motion, and in defending Musk at a deposition. Opposing counsel alerted Hexsel that Spiro had engaged ...

Learn more about Bloomberg Law or Log In to keep reading:

Learn about bloomberg law.

AI-powered legal analytics, workflow tools and premium legal & business news.

Already a subscriber?

Log in to keep reading or access research tools.

Embargoed Country

Due to U.S. export compliance requirements, Spunk has blocked your access to Splunk web properties. If you believe that the action was made in error, please send an email to  [email protected]  with your name, complete address, your physical location at the time of seeking access, email, and phone number. Splunk will research the issue and respond.

Optimizing tourism ecological security: a study based on NCA and FsQCA methods

  • Published: 29 May 2024

Cite this article

case study on environmental security

  • Shuchen Lai   ORCID: orcid.org/0000-0002-1417-893X 1 ,
  • Meng Zhang   ORCID: orcid.org/0000-0003-0463-9031 2 &
  • Zhen Su   ORCID: orcid.org/0000-0001-7613-2630 3  

Tourism Ecological Security (TES) is crucial to sustainable tourism development. This study establishes a TES research framework grounded in the “technology-organization-environment” paradigm and employs a mixed-method approach, integrating fuzzy set Qualitative Comparative Analysis and Necessary Condition Analysis. To examine the factor configurations conducive to achieving high TES, the Yangtze River Delta region of China is selected as a case study. The findings indicate that: (1) from 2011 to 2019, the overall TES level showed an overall upward trend over time. and cities with relatively high TES levels have better policy and economic advantages. (2) Financial support from the government plays an indispensable role in achieving high TES. (3) Although the configuration for achieving high TES is gradually changing from a financial support-led strategy to an economic development-led strategy, financial support is still essential. Theoretical and practical implications derived from the findings are explored and elucidated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

case study on environmental security

Data availability

The original contributions presented in the study are included in the article/Supplementary material, further inquiries and other data can be directed to the corresponding author.

Akama, J. S., & Kieti, D. (2007). Tourism and socio-economic development in developing countries: A case study of mombasa resort in Kenya. Journal of Sustainable Tourism, 15 (6), 735–748.

Article   Google Scholar  

Barbier, E. B. (1987). The concept of sustainable economic development. Environmental Conservation, 14 (2), 101–110.

Borgman, H. P., Bahli, B., Heier, H., & Schewski, F. (2013). Cloudrise: Exploring cloud computing adoption and governance with the TOE framework . Paper presented at the.

Borji, M., Moghaddam Nia, A., Malekian, A., et al. (2018). Comprehensive evaluation of groundwater resources based on DPSIR conceptual framework. Arabian Journal of Geosciences , 11 , 158. https://doi.org/10.1007/s12517-018-3453-2 .

Caren, N., & Panofsky, A. (2005). TQCA: A technique for adding temporality to qualitative comparative analysis. Sociological Methods & Research, 34 (2), 147–172.

Chandrakumar, C., & McLaren, S. J. (2018). Towards a comprehensive absolute sustainability assessment method for effective earth system governance: Defining key environmental indicators using an enhanced-DPSIR framework. Ecological Indicators, 90 , 577–583.

Chen, S. (2015). Environmental pollution emissions, regional productivity growth and ecological economic development in China. China Economic Review, 35 , 171–182.

Article   CAS   Google Scholar  

Chen, Y., Tian, W., Zhou, Q., & Shi, T. (2021). Spatiotemporal and driving forces of Ecological Carrying Capacity for high-quality development of 286 cities in China. Journal of Cleaner Production, 293 , 126186.

Douglas, E. J., Shepherd, D. A., & Prentice, C. (2020). Using fuzzy-set qualitative comparative analysis for a finer-grained understanding of entrepreneurship. Journal of Business Venturing, 35 (1), 105970.

Du, Y. Z., Li, J. X., Liu, Q. C., Zhao, S. T., & Chen, K. W. (2021). Configurational theory and QCA method from a complex dynamic perspective: Research progress and future directions. Management World, 37 (03), 180–197.

Google Scholar  

Dul, J. (2016). Necessary condition analysis (NCA) logic and methodology of “necessary but not sufficient” causality. Organizational Research Methods, 19 (1), 10–52.

Dul, J., Van der Laan, E., & Kuik, R. (2020). A statistical significance test for necessary condition analysis. Organizational Research Methods, 23 (2), 385–395.

Fainshmidt, S., Witt, M. A., Aguilera, R. V., & Verbeke, A. (2020). The contributions of qualitative comparative analysis (QCA) to international business research. Journal of International Business Studies, 51 , 455–466.

Fan, Y., Jin, X., Gan, L., Jessup, L. H., Pijanowski, B. C., Lin, J., et al. (2022). Dynamics of spatial associations among multiple land use functions and their driving mechanisms: A case study of the Yangtze River Delta region. China. Environmental Impact Assessment Review, 97 , 106858.

Fischer, M., & Maggetti, M. (2017). Qualitative comparative analysis and the study of policy processes. Journal of Comparative Policy Analysis: Research and Practice, 19 (4), 345–361.

Fiss, P. C. (2007). A set-theoretic approach to organizational configurations. Academy of Management Review, 32 (4), 1180–1198.

Fiss, P. C. (2011). Building better causal theories: A fuzzy set approach to typologies in organization research. Academy of Management Journal, 54 (2), 393–420.

Frankiewicz, B., & Chamorro-Premuzic, T. (2020). Digital transformation is about talent, not technology. Harvard Business Review, 6 (3), 1–6.

Gao, J., Yu, Z., Wang, L., & Vejre, H. (2019). Suitability of regional development based on ecosystem service benefits and losses: A case study of the Yangtze River Delta urban agglomeration China. Ecological Indicatorscol, 107 , 105579.

Guo, Y., Xia, X., Zhang, S., & Zhang, D. (2018). Environmental regulation, government R&D funding and green technology innovation: Evidence from China provincial data. Sustainability-Basel, 10 (4), 940.

Haas, J., & Ban, Y. (2014). Urban growth and environmental impacts in Jing-Jin-Ji, the Yangtze, river delta and the pearl river delta. International Journal of Applied Earth Observation and Geoinformation, 30 , 42–55.

Hao, Z., Ye, D., Hui, W., Zenglin, H., & Hongye, W. (2022). An empirical analysis of tourism eco-efficiency in ecological protection priority areas based on the DPSIR-SBM model: A case study of the yellow River basin, China. Ecological Informatics, 70 , 101720.

Hedlund, T. (2011). The impact of values, environmental concern, and willingness to accept economic sacrifices to protect the environment on tourists’ intentions to buy ecologically sustainable tourism alternatives. Tourism and Hospitality Research, 11 (4), 278–288.

Hino, A. (2009). Time-series QCA: Studying temporal change through Boolean analysis. Sociological Theory and Methods, 24 (2), 247–265.

Hou, M., Li, L., Yu, H. R., & Zhu, W. (2024). Ecological security evaluation of wetlands in Changbai Mountain area based on DPSIRM model. Ecological Indicators, 160 , 111773.

Ibrahim, M. S., & Nizwan Zukhri, S. E. (2019). Between tourism and ecology: Review of political policy commitments on ecotourism development in bangka belitung . Paper presented at the.

Jalil, A., & Feridun, M. (2011). The impact of growth, energy and financial development on the environment in China: A cointegration analysis. Energy Economics, 33 (2), 284–291.

Jia, L., Jing, L., & Keke, A. (2022). The effects of tourism industry agglomeration on tourism environmental carrying capacity: Evidence from a panel threshold model. Journal of Resources and Ecology, 13 (6), 1037–1047.

Kazuva, E., Zhang, J., Tong, Z., Si, A., & Na, L. (2018). The DPSIR model for environmental risk assessment of municipal solid waste in Dar es Salaam city, Tanzania. International Journal of Environmental Research and Public Health , 15 (8), 1692.

Kihombo, S., Ahmed, Z., Chen, S., Adebayo, T. S., & Kirikkaleli, D. (2021). Linking financial development, economic growth, and ecological footprint: What is the role of technological innovation? Environmental Science and Pollution Research, 28 (43), 61235–61245.

Koo, C., Gretzel, U., Hunter, W. C., & Chung, N. (2015). The role of IT in tourism. Asia Pacific Journal of Information Systems, 25 (1), 99–102.

Lai, X., Yu, H., Liu, G., Zhang, X., Feng, Y., Ji, Y., Zhao, Q., Jiang, J., & Gu, X. (2023). Construction and analysis of ecological security patterns in the Southern Anhui Region of China from a circuit theory perspective. Remote Sensing, 15 (5), 1385.

Lee, C., Chen, M., & Wu, W. (2022). The criticality of tourism development, economic complexity, and country security on ecological footprint. Environmental Science and Pollution Research, 29 (24), 37004–37040.

Li, X. G., Wu, Q., & Zhou, Y. (2017). Spatio-temporal pattern and spatial effect of Chinese provincial tourism eco-security. Economic Geography, 37 (3), 210–217.

CAS   Google Scholar  

Liang, L., Wang, Z., & Li, J. (2019). The effect of urbanization on environmental pollution in rapidly developing urban agglomerations. Journal of Cleaner Production, 237 , 117649.

Lin, Y., Zhang, F., Cai, G. Y., Zhang, L., & Ge, Y. (2023). Spatio-temporal pattern and driving factors of tourism ecological security in Fujian Province. Ecological Indicators, 157 , 111255.

Maksimovic, M. (2018). Greening the future: Green Internet of Things (G-IoT) as a key technological enabler of sustainable development. In Internet of things and big data analytics toward next-generation intelligence (pp. 283–313).

Morteza, Z., Reza, F. M., Seddiq, M. M., Sharareh, P., & Jamal, G. (2016). Selection of the optimal tourism site using the ANP and fuzzy TOPSIS in the framework of Integrated Coastal Zone Management: A case of QESHM Island. Ocean & Coastal Management, 130 , 179–187.

Mu, X., Guo, X., Ming, Q., & Hu, C. (2022). Dynamic evolution characteristics and driving factors of tourism ecological security in the Yellow River basin. Acta Geographica Sinica, 77 , 714–735.

Nie, N., Wang, H., & Xiong, J. X. (2011). Research on tourism ecological security of Lake in Dongting Lake . Paper presented at the.

Pencarelli, T. (2020). The digital revolution in the travel and tourism industry. Information Technology & Tourism, 22 (3), 455–476.

Peng, H., Zhang, J., Lu, L., Tang, G., Yan, B., Xiao, X., et al. (2017). Eco-efficiency and its determinants at a tourism destination: A case study of Huangshan National Park China. Tourism Management, 60 , 201–211.

Pierson, P. (2000). Increasing returns, path dependence, and the study of politics. American Political Science Review, 94 (2), 251–267.

Purwanda, E., & Achmad, W. (2022). Environmental concerns in the framework of general sustainable development and tourism sustainability. Journal of Environmental Management & Tourism., 13 (7), 1911–1917.

Ragin, C. C. (2009). Redesigning social inquiry: Fuzzy sets and beyond . University of Chicago Press.

Ragin, C. C., & Strand, S. I. (2008). Using qualitative comparative analysis to study causal order: Comment on caren and Panofsky (2005). Sociological Methods & Research, 36 (4), 431–441.

Ruan, W., Li, Y., Zhang, S., & Liu, C. (2019). Evaluation and drive mechanism of tourism ecological security based on the DPSIR-DEA model. Tourism Management, 75 , 609–625.

Ruhanen, L. (2013). Local government: Facilitator or inhibitor of sustainable tourism development? Journal of Sustainable Tourism, 21 (1), 80–98.

Su, S., Zhang, Z., Xiao, R., Jiang, Z., Chen, T., Zhang, L., et al. (2012). Geospatial assessment of agroecosystem health: Development of an integrated index based on catastrophe theory. Stochastic Environmental Research and Risk Assessment, 26 , 321–334.

Tang, C., Wu, X., Zheng, Q., & Lyu, N. (2018). Ecological security evaluations of the tourism industry in Ecological Conservation Development Areas: A case study of Beijing’s ECDA. Journal of Cleaner Production, 197 , 999–1010.

Tornatzky, L. G., Fleischer, M., & Chakrabarti, A. K. (1990). processes of technological innovation . Lexington Books.

Vis, B., Woldendorp, J., & Keman, H. (2013). Examining variation in economic performance using fuzzy-sets. Quality & Quantity, 47 , 1971–1989.

Wang, D., Huang, Z., Wang, Y., & Mao, J. (2021). Ecological security of mineral resource-based cities in China: Multidimensional measurements, spatiotemporal evolution, and comparisons of classifications. Ecological Indicators, 132 , 108269.

Wang, Y., & Zhi, Q. (2016). The role of green finance in environmental protection: Two aspects of market mechanism and policies. Energy Procedia, 104 , 311–316.

Xiaobin, M., Biao, S., Guolin, H., Xing, Z., & Li, L. (2021). Evaluation and spatial effects of tourism ecological security in the Yangtze River Delta. Ecological Indicators, 131 , 108190.

Xie, X., & Wang, H. (2020). How can open innovation ecosystem modes push product innovation forward? An fsQCA analysis. Journal of Business Research, 108 , 29–41. https://doi.org/10.1016/j.jbusres.2019.10.011

Xu, M., Liu, C., Li, D., & Zhong, X. L. (2017). Tourism ecological security early warning of Zhangjiajie, China based on the improved TOPSIS method and the grey GM (1,.1) model. The Journal of Applied Ecology, 28 (11), 3731–3739.

Yang, L. J., & Cao, K. J. (2021). Spatiotemporal pattern and driving mechanism of tourism ecological security in 85 counties and cities of Xinjiang. Acta Ecologica Sinica, 41 (23), 9239–9252.

Yin, K., Wang, R., An, Q., Yao, L., & Liang, J. (2014). Using eco-efficiency as an indicator for sustainable urban development: A case study of Chinese provincial capital cities. Ecological Indicators, 36 , 665–671.

Ying, H., Chengcai, T., & Rui, Z. (2022). Review of tourism ecological security from the perspective of ecological civilization construction. Journal of Resources and Ecology, 13 (4), 734–745.

Ying, Z., & Yan, C. (2020). Assessment of Qinling Forest Park’s Ecological Security Based on PSR Model-A case study of forest parks in Baoji section of the Qinling Mountains . Paper presented at the.

Zahan, I., & Chuanmin, S. (2021). Towards a green economic policy framework in China: Role of green investment in fostering clean energy consumption and environmental sustainability. Environmental Science and Pollution Research, 28 , 43618–43628.

Zhang, Y., Mao, Y., Jiao, L., Shuai, C., & Zhang, H. (2021). Eco-efficiency, eco-technology innovation and eco-well-being performance to improve global sustainable development. Environmental Impact Assessment Review, 89 , 106580.

Zheng, X., Yang, Z., Zhang, X., Wang, T., Chen, X., & Wang, C. (2023). Spatiotemporal evolution and influencing factors of provincial tourism ecological security in China. Ecological Indicators, 148 , 110114.

Zhong, L., Deng, J., Song, Z., & Ding, P. (2011). Research on environmental impacts of tourism in China: Progress and prospect. Journal of Environmental Management, 92 (11), 2972–2983.

Zhou, B., Wang, L. T., Yu, H., & Wang, Y. X. (2023). Spatiotemporal evolution of tourism ecological security alerts: evaluation and trend prediction. Environment, Development and Sustainability , 22 (1), 1573–2975.

Download references

This research was supported by the National Natural Science Foundation (No. 72262002) and Innovation Project of Guangxi Graduate Education (No. YCSW2023054).

Author information

Authors and affiliations.

Department of Tourism Management, School of Business, Guangxi University, Nanning, China

Shuchen Lai

Key Laboratory of Interdisciplinary Science of Statistics and Management (Guangxi University), Nanning, China

Guangxi Development Strategy Institute, Nanning, China

You can also search for this author in PubMed   Google Scholar

Contributions

SL and MZ collected data and analyzed the data. SL conceived the framework and wrote the manuscript. ZS and SL oversaw the entire project, provided comments and reviewed the final manuscript. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Zhen Su .

Ethics declarations

Conflict of interest.

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Lai, S., Zhang, M. & Su, Z. Optimizing tourism ecological security: a study based on NCA and FsQCA methods. Environ Dev Sustain (2024). https://doi.org/10.1007/s10668-024-05065-8

Download citation

Received : 26 August 2023

Accepted : 18 May 2024

Published : 29 May 2024

DOI : https://doi.org/10.1007/s10668-024-05065-8

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Tourism ecological security
  • TOE framework
  • DPSIR model
  • Find a journal
  • Publish with us
  • Track your research

Case study: Cybersecurity, hybrid cloud spur St. Joseph’s Health data center upgrade

  • Share on Facebook
  • Share on LinkedIn

Time's almost up! There's only one week left to request an invite to The AI Impact Tour on June 5th. Don't miss out on this incredible opportunity to explore various methods for auditing AI models. Find out how you can attend here .

This article is part of a VB special issue. Read the full series here: The future of the data center: Handling greater and greater demands .

When Jesse Fasolo joined St. Joseph’s Health nine years ago, the Paterson, New Jersey-based medical institution was easily 10 to 20 years behind when it came to digital transformation. 

“In healthcare in general, budget is always a concern,” said the healthcare company’s information security officer and head of technology infrastructure and cybersecurity . “That led to the environment being so behind-the-times: the lack of implementation, lack of investment in new technologies.”

Eight years later, St. Joseph’s has gone through two full transformations, completely overhauling its data center and dramatically improving compute and storage capabilities (not to mention now leveraging AI and exploring a hybrid cloud future). 

June 5th: The AI Audit in NYC

Join us next week in NYC to engage with top executive leaders, delving into strategies for auditing AI models to ensure fairness, optimal performance, and ethical compliance across diverse organizations. Secure your attendance for this exclusive invite-only event.

“We had spinning discs, a large footprint, large power-hungry infrastructure that we have since consolidated,” said Fasolo. “Now I could put the data center in my dining room.”

A complex, cobbled-together data infrastructure environment

case study on environmental security

Tasked with bringing St. Joseph’s Health into the 21st century, Fasolo began by immediately analyzing all of its network technologies. 

The biggest issue, he said, was the complexity of the data infrastructure environment. There were multiple storage areas from multiple providers, some in support, some out of support. 

“Technology in general needs to be simple for people to manage it,” Fasolo said. 

Naturally, downtime is a big concern in healthcare, as it has a direct impact on patient care. In this regard, he likes to say that “minutes matter.”

Daily issues with system performance slowed down clinicians and IT staff, he explained, and it was almost impossible to leverage real-time data for patient care. Furthermore, Fasolo estimated that it would take 247 days to recover from a ransomware attack.

“We battled fires every day just to keep systems running,” he said. “Something as simple as a mass email with a PDF could cut into performance, keeping patients waiting to be admitted or doctors waiting for lab results.”

Flash-forward, active-active

After his initial assessment, Fasolo started examining tools that could increase uptime and provide flexibility while also being cost-conscious — because, as he put it, “How do you buy and acquire technology when you don’t have many funds?”

He ultimately settled on Pure Storage . The data storage hardware and software provider helped St. Joseph’s upgrade its storage and compute environments and eliminate all storage with spinning discs. “We are now a totally flash-forward, flash environment,” said Fasolo. 

The facility also did an “active-active” deployment five years ago. This data resiliency architecture distributes workloads across two or more nodes in a cluster to keep data safe and available in the event of an unexpected component failure. 

Additionally, St. Joseph’s is now able to use AI . In radiology, for instance, AI reads images, identifies anomalies and makes recommendations to specialists to help improve read accuracy and hasten treatment. At an operational level, the healthcare facility is able to query live data to track revenue trends, hospital utilization rates and patient status. 

Fasolo pointed out that the St. Joseph’s–Pure Storage partnership has enabled the healthcare facility to buy in smaller quantities and undertake deliberate, continual growth. St. Joseph’s typically performs a large annual expansion of data storage and capabilities based on trends. Currently, it is going through another iteration of compute and server upgrades.

A security-aware data center

When it comes to cybersecurity, “aware is a key word,” Fasolo said. 

It is critical to understand what could happen and plan accordingly, he said. Pure’s cybersecurity tools allow lock and two pin codes, and St. Joseph’s uses “MFA (multi-factor authentication) for everything we can.”

Should an attack occur, the healthcare facility can recover using immutable snapshots. The facility performs daily backups and snapshots every 15 minutes; the latter can be easily referenced if a bad actor attempts to do anything malicious.

“We have multiple layers of security defense,” said Fasolo.

Improving performance and reliability — and most importantly, patient care

Across the board, St. Joseph’s has seen improvements in performance and reliability for clinical applications. Interruptions to hospital operations and patient care have been minimized, and clinicians can access medical data in seconds to reduce wait times.

Email backups take two hours instead of four days, and users’ login times have been reduced from minutes to seconds.

Fasolo pointed out that “most clinicians and healthcare workers on the front line are not concerned with technology on the backend data center.” However, they are aware of significantly decreased outages and downtime, and they are “appreciative that technology is sustaining them and allowing them to work efficiently.”

Leveraging hybrid cloud

Looking ahead, Fasolo plans to move some workloads to the cloud, notably to archive data for compliance purposes. 

The trend in healthcare is toward “cloud-capable, cloud-hybrid” tools, he noted. Having hybrid storage and cloud block storage will allow St. Joseph’s to continue to use on-premise storage and compute while also having the option to go to the cloud to lower costs (compared to migrating all workloads to the cloud). Ultimately, this would provide another layer of recovery if the facility had an issue and needed to recover storage.

“Management and migration is something we’re after,” said Fasolo. “We need to have it as simple as can be, allow for automation where possible. When you put in something too advanced, you need more staff, more training and development, all of which will lead to burnout, failure, maintenance issues.”

Getting buy-in: Emphasizing business outcomes, not technologies

Healthcare is notoriously slow when it comes to digital transformation because of concerns around data privacy and compliance , among other factors. Getting buy-in from senior leadership is critical — but it must be approached the right way, said Fasolo. 

“Any leader in technology, infrastructure and security needs to align with the business, befriend senior leaders and explain in business terms what the investment will do for the entire company,” he said. 

A new data center tool can’t just be seen as a hardware or software product or explained in technical terms. Instead, IT leaders should lay out how technology can support strategic roles.

“When you start changing tone from a hardware IT purchase to enabling a company’s purpose, people start listening,” he said. 

From there, it’s important to show tangible performance, sustainability and improvements in efficiency to build trust. That can snowball into support for future initiatives. 

Fasolo also advised IT leaders to assess multiple vendors and go through proof-of-concept and implementation planning with vendors themselves — not resellers. The best partners provide not only technology tools but quick response and turnaround and remote and in-person support, he said. 

Ultimately, in healthcare, it all comes down to expanding patient care capabilities, Fasolo emphasized. That means improving time efficiencies, eliminating deficiencies and decreasing the time required to maintain IT environments.

“If I can make a physician or clinician’s capabilities faster, it obviously helps me sleep at night,” Fasolo said, “and it also allows me to help the facility maintain its mission.”

Stay in the know! Get the latest news in your inbox daily

By subscribing, you agree to VentureBeat's Terms of Service.

Thanks for subscribing. Check out more VB newsletters here .

An error occured.

IMAGES

  1. (PDF) Environmental Security is Homeland Security: Climate Disruption

    case study on environmental security

  2. (PDF) Environment and Security

    case study on environmental security

  3. Environmental Security: Approaches and Issues

    case study on environmental security

  4. Environmental security: a case study of climate change

    case study on environmental security

  5. (PDF) Environmental Security?

    case study on environmental security

  6. Environmental Security: Concept and Implementation

    case study on environmental security

VIDEO

  1. Sustainability Victoria

  2. Case Study Analysis ENVIRONMENTAL POLICY

  3. Environmental Case Study

  4. CASE STUDY : ENVIRONMENTAL POLLUTION AND CONTROLS

  5. ENVIRONMENTAL SECURITY AND PEACE CLIMATE CHANGE AND SECURITY

  6. case study environmental issue DJJ40132 polikk

COMMENTS

  1. Environmental Security and International Relations: The Case ...

    The case in point is global environmental change, which has been adopted as a social value in advance of any state identifying it as a matter of national interest.24 Even where a politico-military focus is intended, public. attitudes tend to force open the discussion to include environmental issues.25.

  2. Environmental Security and Climate Change

    Environmental Security and Sustainable Development. The contemporary formulation of environmental security was effectively put on the international policy agenda by the World Commission on Environment and Development (WCED) in its 1987 report, Our Common Future.While the report is best remembered for its advocacy of sustainable development and its catalyzing role in shaping the agenda that led ...

  3. Environmental Security and Conflict

    The 1994 Project on Environment, Population, and Security used varying case studies to determine the links existing between population growth, renewable resource scarcity, migration, and violent conflict (Homer-Dixon 1999). It found among other things, that in some cases, scarcity of renewable resources, such as water or forest, created ...

  4. Environmental security in developing countries: a case study of South

    Environmental security is delineated as a broader analytical integration of technical, economic, social, and environmental aspects of environmental challenges, and flattering its influence on nations to transform the traditional concept of national security. ... Case studies in co-benefits approaches to climate change mitigation and adaptation ...

  5. Environment Security: ongoing projects

    Case studies Horn of Africa - Regional approach to prevention Analysis Analysis on regional climate-related security risks, including transboundary water issues, land governance and conflict, migration and climate hotspots. Climate Security Advisor deployed to Office of the Special Envoy for the Horn of Africa, providing support on climate-related security and political risks.

  6. Navigating ecological security research over the last 30 years: a

    For example, "environmental security" was defined as "the state of human-environment dynamics that includes restoration of the environment damaged by human activities that could lead to social disorder and conflict" ... The case study approach was widely used for the evaluation of ecological security. Comparability is essential for ...

  7. PDF Environmental security: dimensions and priorities

    There are four dimensions of environmental security which are of particular relevance to the GEF. First, ecosystem goods and services fundamentally underpin human well-being and human security. Human beings depend on the earths ecosystems and the services they provide. The degradation of these services often causes significant harm to human ...

  8. Energy and Environmental Security in Developing Countries Case Studies

    This chapter therefore, discusses on the current scenario of energy in the light of climate change, sustainability in environment, energy security issues and economy in ASEAN + 6, barriers, possible solutions, and case studies of mitigation efforts as well as policies laid out and implemented with specific examples from Malaysia, Thailand ...

  9. An evaluation of the ecological and environmental security on China's

    Based on 14 security evaluation indicators for the water, land, air, and biodiversity security, with area-weighted normalization and scaling transformation approaches, this study used the veto ...

  10. Environmental Security: Concept and Implementation

    Abstract. Environmental security, a relatively new and still somewhat contentious concept, may be defined as the intersection of environmental and national security considerations at a national policy level. It may be understood as a result of several important trends. One, of course, is the breakdown of the bipolar geopolitical structure that ...

  11. PDF Environmental Security: A Case Study of Climate Change

    Environmental security (ecological security or a myriad of other terms) reflects the ability of a nation or a society to withstand environmental asset scarcity, environmental risks or adverse changes, or environment-related tensions or conflicts. The chart below illustrates the potential for economic activity to cause environmental changes that ...

  12. Climate change and security risks

    In recent years, the linkages between climate change and security have gained significant attention. As climate change accelerates, its impacts exacerbate existing social, economic, and environmental challenges in many contexts, which can contribute to insecurity at local levels, or even internationally. Security concerns linked to climate change include impacts on food, water and energy ...

  13. Environmental Security as a Case Study in Industrial Ecology

    Environmental security is the integration of environmental and national security considerations at a national policy level. It is a relatively new and still somewhat contentious concept, although in some countries, such as the United States, it is increasingly being embedded in traditional security and foreign policy institutions.

  14. Environmental Security: A Case Study of Climate Change

    Environmental Security: A Case Study of Climate Change. From increases in infectious diseases and uncertainty in food markets to more frequent and intense natural disasters, increased CO2 emissions have the potential to destabilize economies and spark global conflict. This interdisciplinary paper uses climate change to illustrate the ...

  15. Environmental Security

    Environmental Security, Land Restoration, and the Military: A Case Study of the Ecological Task Forces in India. Dhanasree Jayaram, in Land Restoration, 2016. ... have not received as much attention as they should in mainstream environmental security studies and policy discussions. This section attempts to fill this crucial gap by providing ...

  16. The Energy Security Gains from Strengthening Europe's Climate Action

    Following the 2022 energy crisis, this paper investigates whether Europe's ongoing efforts to cut greenhouse gas emissions can also enhance its energy security. The global computational general equilibrium model analysis finds that individual policy tools, including carbon pricing, energy efficiency standards, and accelerated permitting procedures for renewables, tend to improve energy security.

  17. Environmental Security: A Case Study of Climate Change

    Climate change poses a serious threat to rice production and soil quality in tropical monsoon areas where it is the lifeline of regional food security. In this study, the Environmental Policy ...

  18. Does the Regional Ecological Security Pattern Benefit Eco-Environmental

    In early RESP research, most studies focused on nature reserves and scenic areas, with biodiversity conservation as the major target [17,18].However, with the development of ecosystem service assessment methods and the recognition of the importance of socioeconomic issues for ecological security, RESP research has gradually shifted to analyzing natural, ecosystem-based, mutual synergistic ...

  19. The Story of Ecosystem-based Adaptation Through 5 Case Studies

    The UN Environment Programme has produced a series of case studies on the topic of ecosystem-based adaptation (EbA) to encapsulate the innovative approaches and lessons learned from its extensive portfolio of climate adaptation projects. Ecosystem-based adaptation harnesses nature-based solutions to address climate challenges, providing win-win outcomes that protect vulnerable communities from ...

  20. Environmental security

    Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human conflict and international relations on the environment, ... is a case study for environmental security. History

  21. Environmental Security

    Therefore, environmental security is a trending topic in the field of Security Studies, with many cross-sections with other fields, such as energy, climatology, and water sciences within the natural sciences; while in the human sciences, it connects with risk studies, sociology, environmental policy, and international relations.

  22. Environmental Security : A Case Study of Climate Change

    Title: Environmental Security: A Case Study of Climate Change: Author: Elizabeth L. Chalecki: Contributor: Pacific Institute for Studies in Development, Environment, and Security

  23. Environmental security: a case study of climate change

    Environmental security: a case study of climate change Creator Chalecki, Elizabeth L. Contributor Pacific Institute for Studies in Development, Environment, and Security Date Created and/or Issued 2002 Publication Information Pacific Institute for Studies in Development, Environment, and Security Contributing Institution

  24. Two Case Studies of Environmental-Security Connections

    A Presentation at the Environmental Grantmakers Association Meeting Panel: "Overlooked at Our Peril: Why Military/Security Policy Is EGA's Business" Brainerd, Minnesota Arjun Makhijani 15 October 2001 My presentation will consist of two case studies that show the intimate connection between environmental problems and military/security questions.

  25. Environmental Security: Concepts, Challenges, and Case Studies

    The concepts, challenges, and case studies in this text vitally extended such curricula, giving students a deeper appreciation for the critical role environmental security plays in overall state security, as well as for our nation, our way of life, and indeed for the human race at large.

  26. New study launches following the discovery of a second case of avian

    Medical Express Vaccination remains the most effective strategy for avian influenza prevention and control in humans, despite varying vaccine efficacy across strains.. That's according to the authors of a new review which delves into existing research into bird flu vaccines for humans. Published in the journal Human Vaccines & Immunotherapeutics, the results of the paper are particularly ...

  27. Musk Lawyer Alex Spiro Can Participate in Texas Defamation Case

    Elon Musk's lawyer, Alex Spiro of Quinn Emanuel Urquhart & Sullivan LLP, can defend him against defamation claims in Texas, a state district court judge announced Wednesday. Judge Maria Cantú Hexsel (D) of the 53rd Civil District Court in Travis County granted Spiro's motion to participate as a non-Texas lawyer. Although such requests from ...

  28. Staff Picks for Splunk Security Reading May 2024

    Staff Picks for Splunk Security Reading May 2024. By Audra Streetman. Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read. Check out our previous staff security picks, and we hope you enjoy.

  29. Optimizing tourism ecological security: a study based on NCA ...

    Tourism Ecological Security (TES) is crucial to sustainable tourism development. This study establishes a TES research framework grounded in the "technology-organization-environment" paradigm and employs a mixed-method approach, integrating fuzzy set Qualitative Comparative Analysis and Necessary Condition Analysis. To examine the factor configurations conducive to achieving high TES, the ...

  30. Case study: Cybersecurity, hybrid cloud spur St. Joseph's Health data

    A security-aware data center. When it comes to cybersecurity, "aware is a key word," Fasolo said. It is critical to understand what could happen and plan accordingly, he said. Pure's ...