Skip to main content
. 2014 May 14;11(5):5224–5240. doi: 10.3390/ijerph110505224

Figure 3.

Figure 3

Steps in assessing vulnerability and adaptation (Source: Kovats et al., 2003 [20]).