ENERGY SECURITY of CHINA, INDIA, the E.U. And the U.S. And LONG-TERM SCENARIOS: RESULTS from SIX IAMs

Jessica Jewell, Aleh Cherp, Vadim Vinichenko, Nico Bauer, T. O.M. Kober, David McCollum, Detlef P. Van Vuuren, B. O.B. Van Der Zwaan

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Abstract

This paper assesses energy security in three long-term energy scenarios (business as usual development, a projection of Copenhagen commitments, and a 450 ppm stabilization scenario) as modeled in six integrated assessment models: GCAM, IMAGE, MESSAGE, ReMIND, TIAM-ECN and WITCH. We systematically evaluate long-term vulnerabilities of vital energy systems of four major economies: China, the European Union (E.U.), India and the U.S., as expressed by several characteristics of energy trade, resource extraction, and diversity of energy options. Our results show that climate policies are likely to lead to significantly lower global energy trade and reduce energy imports of major economies, decrease the rate of resource depletion, and increase the diversity of energy options. China, India and the E.U. would derive particularly strong benefits from climate policies, whereas the U.S. may forego some opportunities to export fossil fuels in the second half of the century.

Original languageEnglish
Article number1340011
JournalClimate Change Economics
Volume4
Issue number4
DOIs
StatePublished - Nov 1 2013
Externally publishedYes

Funding

The research leading to these results has received funding from the European Union Seventh Framework Programme FP7/2007-2013 under grant agreement No. 282846 (LIMITS).

FundersFunder number
European Union Seventh Framework Programme FP7/2007
Seventh Framework Programme282846
Seventh Framework Programme

    Keywords

    • Energy security
    • climate change
    • energy scenarios
    • major economies

    Fingerprint

    Dive into the research topics of 'ENERGY SECURITY of CHINA, INDIA, the E.U. And the U.S. And LONG-TERM SCENARIOS: RESULTS from SIX IAMs'. Together they form a unique fingerprint.

    Cite this