WorldWideScience

Sample records for understanding individual vulnerability

  1. Individual Day-to-Day Process of Social Anxiety in Vulnerable College Students

    Science.gov (United States)

    Campbell, Cynthia G.; Bierman, Karen L.; Molenaar, Peter C. M.

    2016-01-01

    Transitions requiring the creation of new social networks may be challenging for individuals vulnerable to social anxiety, which may hinder successful adjustment. Using person-specific methodology, this study examined social anxiety in vulnerable university freshman away from home during their first semester of college to understand how day-to-day…

  2. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  3. [Children and adolescents in street situation: contributions to an understanding of vulnerability and disaffiliation].

    Science.gov (United States)

    Gontijo, Daniela; Medeiros, Marcelo

    2009-01-01

    The concept of vulnerability is being discussed in the public health area as a potential tool toward the transformation of the health practices for allowing an articulation individual-community. Understanding health as a process of subjectivation determined by social, cultural and historical contexts, this article aims to approach the question children and adolescents in street situation on the basis of the concept of civil vulnerability, using the theoretical background presented by Robert Castel. This author understands the social marginalization lived by different individuals and social groups in a dynamic form, determined by the association of work and social insertion. As refers to children and adolescents in street situation, we believe that they are reflecting a process of intensified vulnerability (culminating in disaffiliation) to which thousands of Brazilian families are subject due to the extreme social inequalities in our country. We hope that our theoretical discussion will be able to contribute to the development of a theoretical reference in public health and to the planning and implementation of health actions directed to this population.

  4. Vulnerabilidade do doente versus autonomia individual The vulnerability of the patient versus individual autonomy

    Directory of Open Access Journals (Sweden)

    Inês Motta de Morais

    2010-12-01

    Full Text Available A autonomia é um conceito ético e individual, ao passo que a vulnerabilidade pressupõe a existência de relações desiguais entre indivíduos ou grupos. Tal desigualdade pode estar relacionada a questões sócio-econômicas. Muitas vezes os desprivilegiados têm dificuldades ou, mesmo impossibilidade de decidir. Portanto, é importante o reconhecimento dessa vulnerabilidade para garantir o direito à autonomia e respeito à dignidade de indivíduos, principalmente quando se trata de pesquisas na área da saúde. Este estudo procura analisar a importância do conceito de vulnerabilidade e seu alcance na relação com a autonomia individual. O estudo conclui que a consciência de vulnerabilidade é importante para alimentar a razão crítica que fundamenta a autonomia. Não pretende de forma alguma propor mais uma definição de autonomia individual e vulnerabilidade do doente, e sim apresentar os resultados do levantamento bibliográfico sobre o tema demonstrando os pontos convergentes e divergentes de diversos expoentes literários.Autonomy is and ethical and individual concept, while vulnerability presupposes the existence of unequal relations between individuals or groups. Such inequality may be related to socio-economic issues. The underprivileged often have difficulty in making decisions or find it impossible to do so. It is, therefore, important to recognize this vulnerability in order to ensure the right to autonomy and respect for the dignity of the individual, especially in the case of health research. This study investigates the importance of the concept of vulnerability and the extent to which it is related to individual autonomy. The study concludes that awareness of vulnerability is important in fuelling the critical reason that is the foundation of autonomy. The intention here is certainly not to put forward yet another definition of individual autonomy and patient vulnerability, but rather to present the results of a

  5. Adolescent Anxiety : Development, Individual Vulnerability, and Social Relationships

    OpenAIRE

    Nelemans, S.

    2015-01-01

    The general aim of this dissertation was to extend current knowledge on the development of adolescent anxiety in the general population, by (1) examining developmental patterns of anxiety and individual differences in these patterns from childhood throughout adolescence, as well as concurrent associations with psychosocial functioning in several other domains, (2) exploring individual vulnerabilities that may be associated with the development of adolescent anxiety, and (3) examining how aspe...

  6. Between individual agency and structure in HIV prevention: understanding the middle ground of social practice.

    Science.gov (United States)

    Kippax, Susan; Stephenson, Niamh; Parker, Richard G; Aggleton, Peter

    2013-08-01

    When HIV prevention targets risk and vulnerability, it focuses on individual agency and social structures, ignoring the centrality of community in effective HIV prevention. The neoliberal concept of risk assumes individuals are rational agents who act on information provided to them regarding HIV transmission. This individualistic framework does not recognize the communities in which people act and connect. The concept of vulnerability on the other hand acknowledges the social world, but mainly as social barriers that make it difficult for individuals to act. Neither approach to HIV prevention offers understanding of community practices or collective agency, both central to success in HIV prevention to date. Drawing on examples of the social transformation achieved by community action in Australia and Brazil, this article focuses on this middle ground and its role in effective HIV prevention.

  7. Juridical-Criminal Paternalism, Autonomy and Vulnerability: Legitimation Criteria of Paternalistic Interventions on Individual Autonomy in Criminal Matters

    Directory of Open Access Journals (Sweden)

    Heráclito Mota Barreto Neto

    2015-12-01

    Full Text Available The following paper has as objective questioning the legitimacy of state's paternalistic interventions on individual autonomy by using institutional-criminal instruments. In this path, the paper aims to understand in which cases the State is allowed to interfere in private individual lives under the justification of being promoting a well or avoiding a harm and, as well, in which cases such interference is abusive of individuals self-determination. Into this analysis, the work will study the current concepts of paternalism, the theoretical classifications on paternalistic interventions which will be useful to demonstrate admissible and inadmissible species of paternalism and Joel Feinberg and Gerald Dworkin's anti- paternalistic theories. Following, this subject will be analyzed in association with the implications of juridical-criminal goods involved in conflicts between autonomy, human vulnerabilities and paternalism, specially regarding to the (unavailability of those goods. In the end, the work intends to define legitimation criteria for paternalistic interventions inserted in criminal laws, which superimpose themselves on the individual autonomy, in order to harmonize constitutional values of respect for autonomy, protection of vulnerable individuals and the Criminal Law functions of exclusive protection of juridical goods.

  8. Individualized performance prediction during total sleep deprivation: accounting for trait vulnerability to sleep loss.

    Science.gov (United States)

    Ramakrishnan, Sridhar; Laxminarayan, Srinivas; Thorsley, David; Wesensten, Nancy J; Balkin, Thomas J; Reifman, Jaques

    2012-01-01

    Individual differences in vulnerability to sleep loss can be considerable, and thus, recent efforts have focused on developing individualized models for predicting the effects of sleep loss on performance. Individualized models constructed using a Bayesian formulation, which combines an individual's available performance data with a priori performance predictions from a group-average model, typically need at least 40 h of individual data before showing significant improvement over the group-average model predictions. Here, we improve upon the basic Bayesian formulation for developing individualized models by observing that individuals may be classified into three sleep-loss phenotypes: resilient, average, and vulnerable. For each phenotype, we developed a phenotype-specific group-average model and used these models to identify each individual's phenotype. We then used the phenotype-specific models within the Bayesian formulation to make individualized predictions. Results on psychomotor vigilance test data from 48 individuals indicated that, on average, ∼85% of individual phenotypes were accurately identified within 30 h of wakefulness. The percentage improvement of the proposed approach in 10-h-ahead predictions was 16% for resilient subjects and 6% for vulnerable subjects. The trade-off for these improvements was a slight decrease in prediction accuracy for average subjects.

  9. The three-hit concept of vulnerability and resilience: toward understanding adaptation to early-life adversity outcome.

    Science.gov (United States)

    Daskalakis, Nikolaos P; Bagot, Rosemary C; Parker, Karen J; Vinkers, Christiaan H; de Kloet, E R

    2013-09-01

    Stressful experiences during early-life can modulate the genetic programming of specific brain circuits underlying emotional and cognitive aspects of behavioral adaptation to stressful experiences later in life. Although this programming effect exerted by experience-related factors is an important determinant of mental health, its outcome depends on cognitive inputs and hence the valence an individual assigns to a given environmental context. From this perspective we will highlight, with studies in rodents, non-human primates and humans, the three-hit concept of vulnerability and resilience to stress-related mental disorders, which is based on gene-environment interactions during critical phases of perinatal and juvenile brain development. The three-hit (i.e., hit-1: genetic predisposition, hit-2: early-life environment, and hit-3: later-life environment) concept accommodates the cumulative stress hypothesis stating that in a given context vulnerability is enhanced when failure to cope with adversity accumulates. Alternatively, the concept also points to the individual's predictive adaptive capacity, which underlies the stress inoculation and match/mismatch hypotheses. The latter hypotheses propose that the experience of relatively mild early-life adversity prepares for the future and promotes resilience to similar challenges in later-life; when a mismatch occurs between early and later-life experience, coping is compromised and vulnerability is enhanced. The three-hit concept is fundamental for understanding how individuals can either be prepared for coping with life to come and remain resilient or are unable to do so and succumb to a stress-related mental disorder, under seemingly identical circumstances. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Individual stress vulnerability is predicted by short-term memory and AMPA receptor subunit ratio in the hippocampus.

    Science.gov (United States)

    Schmidt, Mathias V; Trümbach, Dietrich; Weber, Peter; Wagner, Klaus; Scharf, Sebastian H; Liebl, Claudia; Datson, Nicole; Namendorf, Christian; Gerlach, Tamara; Kühne, Claudia; Uhr, Manfred; Deussing, Jan M; Wurst, Wolfgang; Binder, Elisabeth B; Holsboer, Florian; Müller, Marianne B

    2010-12-15

    Increased vulnerability to aversive experiences is one of the main risk factors for stress-related psychiatric disorders as major depression. However, the molecular bases of vulnerability, on the one hand, and stress resilience, on the other hand, are still not understood. Increasing clinical and preclinical evidence suggests a central involvement of the glutamatergic system in the pathogenesis of major depression. Using a mouse paradigm, modeling increased stress vulnerability and depression-like symptoms in a genetically diverse outbred strain, and we tested the hypothesis that differences in AMPA receptor function may be linked to individual variations in stress vulnerability. Vulnerable and resilient animals differed significantly in their dorsal hippocampal AMPA receptor expression and AMPA receptor binding. Treatment with an AMPA receptor potentiator during the stress exposure prevented the lasting effects of chronic social stress exposure on physiological, neuroendocrine, and behavioral parameters. In addition, spatial short-term memory, an AMPA receptor-dependent behavior, was found to be predictive of individual stress vulnerability and response to AMPA potentiator treatment. Finally, we provide evidence that genetic variations in the AMPA receptor subunit GluR1 are linked to the vulnerable phenotype. Therefore, we propose genetic variations in the AMPA receptor system to shape individual stress vulnerability. Those individual differences can be predicted by the assessment of short-term memory, thereby opening up the possibility for a specific treatment by enhancing AMPA receptor function.

  11. Macroeconomic Vulnerability in Developing Countries: Approaches and Issues

    OpenAIRE

    Anuradha Seth; Amr Ragab

    2012-01-01

    Economic vulnerability is approached from micro- and macroeconomic perspectives. While the microeconomic perspective is concerned with the impact of shocks on the well-being of individual households, the macroeconomic perspective focuses on the impact of these shocks on economic growth. This paper reviews the literature on macroeconomic vulnerability and finds that there is no single approach to understanding macroeconomic vulnerability in the context of financial and economic crises in devel...

  12. Enhanced conditioned eyeblink response acquisition and proactive interference in anxiety vulnerable individuals

    Directory of Open Access Journals (Sweden)

    Jacqueline L Holloway

    2012-11-01

    Full Text Available In classical conditioning, proactive interference may arise from experience with the conditioned stimulus (CS, the unconditional stimulus (US, or both, prior to their paired presentations. Interest in the application of proactive interference has extended to clinical populations as either a risk factor for disorders or as a secondary sign. Although the current literature is dense with comparisons of stimulus pre-exposure effects in animals, such comparisons are lacking in human subjects. As such, interpretation of proactive interference over studies as well as its generalization and utility in clinical research is limited. The present study was designed to assess eyeblink response acquisition after equal numbers of CS, US, and explicitly unpaired CS and US pre-exposures, as well as to evaluate how anxiety vulnerability might modulate proactive interference. In the current study, anxiety vulnerability was assessed using the State/Trait Anxiety Inventories as well as the adult and retrospective measures of behavioural inhibition (AMBI and RMBI, respectively. Participants were exposed to 1 of 4 possible pre-exposure contingencies: 30 CS, 30 US, 30 CS and 30 US explicitly unpaired pre-exposures, or context pre-exposure, immediately prior to standard delay training. Robust proactive interference was evident in all pre-exposure groups relative to context pre-exposure, independent of anxiety classification, with CR acquisition attenuated at similar rates. In addition, trait anxious individuals were found to have enhanced overall acquisition as well as greater proactive interference relative to non-vulnerable individuals. The findings suggest that anxiety vulnerable individuals learn implicit associations faster, an effect which persists after the introduction of new stimulus contingencies. This effect is not due to enhanced sensitivity to the US. Such differences would have implications for the development of anxiety psychopathology within a learning

  13. Enhanced conditioned eyeblink response acquisition and proactive interference in anxiety vulnerable individuals.

    Science.gov (United States)

    Holloway, Jacqueline L; Trivedi, Payal; Myers, Catherine E; Servatius, Richard J

    2012-01-01

    In classical conditioning, proactive interference may arise from experience with the conditioned stimulus (CS), the unconditional stimulus (US), or both, prior to their paired presentations. Interest in the application of proactive interference has extended to clinical populations as either a risk factor for disorders or as a secondary sign. Although the current literature is dense with comparisons of stimulus pre-exposure effects in animals, such comparisons are lacking in human subjects. As such, interpretation of proactive interference over studies as well as its generalization and utility in clinical research is limited. The present study was designed to assess eyeblink response acquisition after equal numbers of CS, US, and explicitly unpaired CS and US pre-exposures, as well as to evaluate how anxiety vulnerability might modulate proactive interference. In the current study, anxiety vulnerability was assessed using the State/Trait Anxiety Inventories as well as the adult and retrospective measures of behavioral inhibition (AMBI and RMBI, respectively). Participants were exposed to 1 of 4 possible pre-exposure contingencies: 30 CS, 30 US, 30 CS, and 30 US explicitly unpaired pre-exposures, or Context pre-exposure, immediately prior to standard delay training. Robust proactive interference was evident in all pre-exposure groups relative to Context pre-exposure, independent of anxiety classification, with CR acquisition attenuated at similar rates. In addition, trait anxious individuals were found to have enhanced overall acquisition as well as greater proactive interference relative to non-vulnerable individuals. The findings suggest that anxiety vulnerable individuals learn implicit associations faster, an effect which persists after the introduction of new stimulus contingencies. This effect is not due to enhanced sensitivity to the US. Such differences would have implications for the development of anxiety psychopathology within a learning framework.

  14. Developing an In-depth Understanding of Elderly Adult's Vulnerability to Climate Change.

    Science.gov (United States)

    Rhoades, Jason L; Gruber, James S; Horton, Bill

    2018-05-08

    Recent reports highlight the vulnerability of elderly adults to climate change, yet limited research has focused on this topic. To address this, the purpose of this study was to develop an in-depth understanding of elderly adult's vulnerability to climate change within the context of a specific community. A case study methodology utilizing a community-based action research approach was employed to engage elderly participants living in Bridgeport, CT, in exploring their vulnerability to current and predicted climate stressors with a focus on extreme heat, flooding and storms, and air pollution. This research identifies personal characteristics that interact with contextual factors to influence elderly adult's vulnerability to climate change. Personal characteristics include health, economic, and social considerations. Contextual factors include the adequacy of emergency preparedness measures, transportation resources, and coping and recovery resources. As a result of the interplay of these characteristics and factors, predicted climate changes could have serious consequences for Bridgeport's elderly adults. This research provides a contextualized and detailed illustration of how climate change could overwhelm elderly adult's adaptive capacity and highlights the need for support services to provide safeguards. The issues and concerns raised may bear similarities to other locations, especially urban settings facing similar climate stressors with similar socioeconomic conditions. The findings suggest a need for further research to improve our understanding and serve as the basis for collaborative adaptation planning that engages elderly communities with local governments and a broad coalition of partners to keep elders safe.

  15. Procedural and submittal guidance for the individual plant examination of external events (IPEEE) for severe accident vulnerabilities

    International Nuclear Information System (INIS)

    Chen, J.T.; Chokshi, N.C.; Kenneally, R.M.; Kelly, G.B.; Beckner, W.D.; McCracken, C.; Murphy, A.J.; Reiter, L.; Jeng, D.

    1991-06-01

    Based on a Policy statement on Severe Accidents, the licensee of each nuclear power plant is requested to perform an individual plant examination. The plant examination systematically looks for vulnerabilities to severe accidents and cost-effective safety improvements that reduce or eliminate the important vulnerabilities. This document presents guidance for performing and reporting the results of the individual plant examination of external events (IPEEE). The guidance for reporting the results of the individual plant examination of internal events (IPE) is presented in NUREG-1335. 53 refs., 1 figs., 2 tabs

  16. Individual differences and vulnerability to drug addiction: a focus on the endocannabinoid system.

    Science.gov (United States)

    Sagheddu, Claudia; Melis, Miriam

    2015-01-01

    Vulnerability to drug addiction depends upon the interactions between the biological makeup of the individual, the environment, and age. These interactions are complex and difficult to tease apart. Since dopamine is involved in the rewarding effects of drugs of abuse, it is postulated that innate differences in mesocorticolimbic pathway can influence the response to drug exposure. In particular, higher and lower expression of dopamine D2 receptors in the ventral striatum (i.e. a marker of dopamine function) has been considered a putative protective and a risk factor, respectively, that can influence one's susceptibility to continued drug abuse as well as the transition to addiction. This phenomenon, which is phylogenetically preserved, appears to be a compensatory change to increased impulse activity of midbrain dopamine neurons. Hence, dopamine neuronal excitability plays a fundamental role in the diverse stages of the drug addiction cycle. In this review, a framework for the evidence that modulation of dopamine neuronal activity plays in the context of vulnerability to drug addiction will be presented. Furthermore, since endogenous cannabinoids serve as retrograde messengers to shape afferent neuronal activity in a short- and long-lasting fashion, their role in individual differences and vulnerability to drug addiction will be discussed.

  17. Non-intrusive activity assessment of a vulnerable individual for real living environments

    International Nuclear Information System (INIS)

    Xu, Shaoqiu; Jones, Gordon R

    2008-01-01

    A system for addressing the scale of activity and detecting periods of immobility of a vulnerable individual is described. The system does not invade the privacy of the individual, is robust to ambient changes and is economic in terms of cost and the amount of data captured. The system is based upon the cross-correlation of changes in the chromatic signatures of a limited number of locations in an environment with the outputs from a triggerable infrared sensor. Results are presented to indicate the system performance

  18. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  19. Vulnerabilities in snakebites in Sao Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Maria Rita Bertolozzi

    2015-01-01

    Full Text Available ABSTRACTOBJECTIVE To describe elements of vulnerability of victims of snakebite.METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique.RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths.CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.

  20. Understanding factors influencing vulnerable older people keeping warm and well in winter: a qualitative study using social marketing techniques.

    Science.gov (United States)

    Tod, Angela Mary; Lusambili, Adelaide; Homer, Catherine; Abbott, Joanne; Cooke, Joanne Mary; Stocks, Amanda Jayne; McDaid, Kathleen Anne

    2012-01-01

    To understand the influences and decisions of vulnerable older people in relation to keeping warm in winter. A qualitative study incorporating in-depth, semi-structured individual and group interviews, framework analysis and social marketing segmentation techniques. Rotherham, South Yorkshire, UK. 50 older people (>55) and 25 health and social care staff underwent individual interview. The older people also had household temperature measurements. 24 older people and 19 health and social care staff participated in one of the six group interviews. Multiple complex factors emerged to explain whether vulnerable older people were able to keep warm. These influences combined in various ways that meant older people were not able to or preferred not to access help or change home heating behaviour. Factors influencing behaviours and decisions relating to use of heating, spending money, accessing cheaper tariffs, accessing benefits or asking for help fell into three main categories. These were situational and contextual factors, attitudes and values, and barriers. Barriers included poor knowledge and awareness, technology, disjointed systems and the invisibility of fuel and fuel payment. Findings formed the basis of a social marketing segmentation model used to develop six pen portraits that illustrated how factors that conspire against older people being able to keep warm. The findings illustrate how and why vulnerable older people may be at risk of a cold home. The pen portraits provide an accessible vehicle and reflective tool to raise the capacity of the NHS in responding to their needs in line with the Cold Weather Plan.

  1. [The Effects of a Health Mentoring Program in Community-dwelling Vulnerable Elderly Individuals with Diabetes].

    Science.gov (United States)

    Sung, Ki Wol; Kang, Hye Seung; Nam, Ji Ran; Park, Mi Kyung; Park, Ji Hyeon

    2018-04-01

    This study aimed to estimate the effects of a health mentoring program on fasting blood sugar, total cholesterol, triglyceride, physical activity, self care behavior and social support changes among community-dwelling vulnerable elderly individuals with diabetes. A non-equivalent control group pre-post-test design was used. Participants were 70 community-dwelling vulnerable elderly individuals with diabetes. They were assigned to the experimental (n=30) or comparative (n=30) or control group (n=28). The experimental group participated in the health mentoring program, while the comparative group participated in health education program, the control group did not participate in any program. Data analyses involved a chi-square test, Fisher's exact test, a generalized linear model, and the Bonferroni correction, using SPSS 23.0. Compared to the control group, the experimental and comparative groups showed a significant decrease in fasting blood sugar, total cholesterol, and triglyceride. Compared to the comparative and control groups, the experimental group showed significant improvement in self care behavior. However, there were no statistical differences in physical activity or social support among the three groups. These findings indicate that the health mentoring program is an effective intervention for community-dwelling vulnerable elderly individuals with diabetes. This program can be used as an efficient strategy for diabetes self-management within this population. © 2018 Korean Society of Nursing Science.

  2. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  3. Formative evaluation of the STAR intervention: improving teachers' ability to provide psychosocial support for vulnerable individuals in the school community.

    Science.gov (United States)

    Ferreira, Ronél; Ebersöhn, Liesel

    2011-04-01

    The article describes the pilot phase of a participatory reflection and action (PRA) study. The longitudinal investigation explores teachers' ability to provide psychosocial support within the context of HIV/AIDS following an asset-based intervention. The study ensued from our desire to understand and contribute to knowledge about the changed roles of teachers due to adversity in the community, specifically in relation to HIV/AIDS and education. The supportive teachers, assets and resilience (STAR) intervention was facilitated from November 2003 to October 2005 and consisted of the research team undertaking nine field visits and facilitating 20 intervention sessions (2-3 hours each), and 12 post-intervention research visits have been conducted to date. Ten female teachers were selected for participation through random purposeful sampling at a primary school in an informal settlement outside Port Elizabeth, South Africa. Data-generation included PRA activities, observation, informal interactive interviews, and focus group discussions. The data were analysed by means of inductive thematic analysis. We found that the teachers did not view vulnerability as being related to children or HIV/AIDS in isolation, but rather that their psychosocial support to children and the school community was inclusive across a spectrum of vulnerabilities and services. We argue that teachers who are inclined to provide such support will fulfil this role irrespective of understanding policy or receiving training. We contend that teachers are well-positioned to manage school-based psychosocial support in order to create relevant and caring spaces for vulnerable individuals in the school community.

  4. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  5. Understanding Resilience in a Vulnerable Industry: A Case of Retailing in a Mountain Resort Community

    OpenAIRE

    Wongkee, Sarah Lyndsay

    2016-01-01

    The retail landscape is continually subject to changing market trends and conditions. Increasingly researchers use resilience concepts to understand how retail systems adapt and respond to change, which can help communities and retailers better anticipate and prepare for the inevitable altering conditions. This project analyzes local stakeholder perceptions to understand aspects of resilience and vulnerability in the context of Whistler BC’s destination retail system. Through qualitative inte...

  6. Medical Students' Empathy for Vulnerable Groups: Results From a Survey and Reflective Writing Assignment.

    Science.gov (United States)

    Wellbery, Caroline; Saunders, Pamela A; Kureshi, Sarah; Visconti, Adam

    2017-12-01

    As medical education curricula increasingly acknowledge the contributions of the social determinants of health to individual health, new methods of engaging students in the care of vulnerable groups are needed. Empathy is one way to connect students with patients, but little is known about how to nurture students' empathy on behalf of populations. This study examined the relationship between individual and social empathy as groundwork for cultivating students' empathy for vulnerable groups. In 2014-2015, first-year medical students completed the Social Empathy Index at the start and end of a two-semester population health course, and they completed a reflective writing assignment exploring the challenges of caring for vulnerable patients. Pre- and posttest mean survey scores were compared, and reflective writing assignments were analyzed for themes concerning social empathy. Data from 130 students were analyzed. Scores for the contextual understanding of systemic barriers domain increased significantly. There was a trend toward increased cumulative social empathy scores that did not reach statistical significance. Students' essays revealed three themes relating to individual empathy as the foundation for social empathy; civic and moral obligations; and the role of institutional practices in caring for vulnerable groups. This study extends understanding of empathy beyond care for the individual to include care for vulnerable groups. Thus, social empathy may function as a valuable concept in developing curricula to support students' commitment to care for the underserved. Educators first need to address the many barriers students cited that impede both individual and social empathy.

  7. Patients’ perception regarding the influence of individual and social vulnerabilities on the adherence to tuberculosis treatment: a qualitative study

    Directory of Open Access Journals (Sweden)

    Rosiane Davina da Silva

    2017-09-01

    Full Text Available Abstract Background Tuberculosis remains an important disease which mainly affects the majority of vulnerable individuals in society, who are subjected to poor living conditions and difficulties to access the services of public health. Under these circumstances, the present study aims to understand patients’ perception in relation to the influence of individual and social vulnerabilities on the adherence to tuberculosis treatment. Methods A qualitative descriptive cross sectional study was conducted in one large municipality at the state of Paraíba, Northeast of Brazil. The study subjects, who were residents of the study site, covered all tuberculosis cases diagnosed between March and June 2015. The sample was defined by the criteria of response saturation. All interviews were audio recorded, and data analysis was developed through the hermeneutic dialectic method and the theory of Generative Route Sense. The project was approved by the Research Ethics Committee of the University of São Paulo (USP. Results A total of 13 individuals were interviewed and the responses were identified into two analytical categories: the difficulties they had and the enabling factors they could mention during their tuberculosis treatment. Patients brought up social exclusion as an obstacle to treatment adherence, which, along with stigmatization, weakened their link with family members and health professionals. Moreover, economic precariousness was a major hindrance to the maintenance of a proper diet and transportation access to health centers. However, social support and directly observed treatment helped to break down barriers of prejudice and to promote individual and family empowerment. Finally, patients also reported that their will to live and faith gave them the strength to continue with the treatment. Conclusions According to patients in this study, social support and the strengthening of links with family members and health professionals may reduce

  8. Patients' perception regarding the influence of individual and social vulnerabilities on the adherence to tuberculosis treatment: a qualitative study.

    Science.gov (United States)

    da Silva, Rosiane Davina; de Luna, Fernanda Darliane Tavares; de Araújo, Aguinaldo José; Camêlo, Edwirde Luiz Silva; Bertolozzi, Maria Rita; Hino, Paula; Lacerda, Sheylla Nadjane Batista; Fook, Sayonara Maria Lia; de Figueiredo, Tânia Maria Ribeiro Monteiro

    2017-09-19

    Tuberculosis remains an important disease which mainly affects the majority of vulnerable individuals in society, who are subjected to poor living conditions and difficulties to access the services of public health. Under these circumstances, the present study aims to understand patients' perception in relation to the influence of individual and social vulnerabilities on the adherence to tuberculosis treatment. A qualitative descriptive cross sectional study was conducted in one large municipality at the state of Paraíba, Northeast of Brazil. The study subjects, who were residents of the study site, covered all tuberculosis cases diagnosed between March and June 2015. The sample was defined by the criteria of response saturation. All interviews were audio recorded, and data analysis was developed through the hermeneutic dialectic method and the theory of Generative Route Sense. The project was approved by the Research Ethics Committee of the University of São Paulo (USP). A total of 13 individuals were interviewed and the responses were identified into two analytical categories: the difficulties they had and the enabling factors they could mention during their tuberculosis treatment. Patients brought up social exclusion as an obstacle to treatment adherence, which, along with stigmatization, weakened their link with family members and health professionals. Moreover, economic precariousness was a major hindrance to the maintenance of a proper diet and transportation access to health centers. However, social support and directly observed treatment helped to break down barriers of prejudice and to promote individual and family empowerment. Finally, patients also reported that their will to live and faith gave them the strength to continue with the treatment. According to patients in this study, social support and the strengthening of links with family members and health professionals may reduce social exclusion and other difficulties they face, thus encouraging them

  9. Workplace support after breast cancer treatment: recognition of vulnerability.

    Science.gov (United States)

    Tiedtke, Corine; Dierckx de Casterlé, Bernadette; Donceel, Peter; de Rijk, Angelique

    2015-01-01

    Support from the workplace seems to be a key element in addressing the poor return-to-work (RTW) rate of employees with breast cancer. We aim to acquire an in-depth understanding of how Flemish employees experience their RTW after breast cancer and the support from the workplace. Fourteen in-depth interviews of women who experienced breast cancer and returned to work (high school graduates, age range 42-55 years, mean age 48 at time of surgery) were analysed using the Qualitative Analysis Guide of Leuven (QUAGOL), based on a Grounded Theory approach. The key experiences were feeling vulnerable, feeling able to work and need for support. Although little diversity in RTW experiences was found, the background of the vulnerability varied. Women experienced support (which could be emotional or practical) only as adequate if it addressed their specific vulnerability. Employees felt particularly vulnerable. Vulnerability is not the same as low-work ability and as such it should be added as theoretical concept in RTW research. Adequate workplace support addresses the specific vulnerability of an individual woman. Our study offers a nuanced insight into the RTW process of breast cancer survivors. Upon actual return-to-work (RTW) after breast cancer treatment, women feel vulnerable but able to work and, hence, have a high need for workplace support. Support from the workplace during RTW after breast cancer treatment is experienced as adequate when it expresses genuine recognition of the individual woman's vulnerability.

  10. Amygdala Activity During Autobiographical Memory Recall in Depressed and Vulnerable Individuals: Association With Symptom Severity and Autobiographical Overgenerality.

    Science.gov (United States)

    Young, Kymberly D; Siegle, Greg J; Bodurka, Jerzy; Drevets, Wayne C

    2016-01-01

    In healthy individuals, autobiographical memory recall is biased toward positive and away from negative events, while the opposite is found in depressed individuals. This study examined amygdala activity during autobiographical memory recall as a putative mechanism underlying biased memory recall and depressive symptoms in currently depressed adults and two vulnerable populations: individuals remitted from depression and otherwise healthy individuals at high familial risk of developing depression. Identification of such vulnerability factors could enable interception strategies that prevent depression onset. Sixty healthy control subjects, 45 unmedicated currently depressed individuals, 25 unmedicated remitted depressed individuals, and 30 individuals at high familial risk of developing depression underwent functional MRI while recalling autobiographical memories in response to emotionally valenced cue words. Amygdala reactivity and connectivity with anatomically defined amygdala regions were examined. During positive recall, depressed participants exhibited significantly decreased left amygdala activity and decreased connectivity with regions of the salience network compared with the other groups. During negative recall, control subjects had significantly decreased left amygdala activity compared with the other groups, while depressed participants exhibited increased amygdala connectivity with the salience network. In depressed participants, left amygdala activity during positive recall correlated significantly with depression severity (r values >-0.38) and percent of positive specific memories recalled (r values >0.59). The results suggest that left amygdala hyperactivity during negative autobiographical recall is a trait-like marker of depression, as both vulnerable groups showed activity similar to the depressed group, while amygdala hypoactivity during positive autobiographical recall is a state marker of depression manifesting in active disease. Treatments

  11. Individual differences in discriminatory fear learning under conditions of ambiguity: a vulnerability factor for anxiety disorders?

    NARCIS (Netherlands)

    Arnaudova, I.; Krypotos, A.M.; Effting, M.; Boddez, Y.; Kindt, M.; Beckers, T.

    2013-01-01

    Complex fear learning procedures might be better suited than the common differential fear-conditioning paradigm for detecting individual differences related to vulnerability for anxiety disorders. Two such procedures are the blocking procedure and the protection-from-overshadowing procedure. Their

  12. Social Vulnerability to Climate Change and the Architecture of Entitlements

    International Nuclear Information System (INIS)

    Adger, W.N.; Kelly, P.M.

    1999-01-01

    The objective of this paper is to outline a conceptual model of vulnerability to climate change as the first step in appraising and understanding the social and economic processes which facilitate and constrain adaptation. Vulnerability as defined here pertains to individuals and social groups. It is the state of individuals, of groups, of communities defined in terms of their ability to cope with and adapt to any external stress placed on their livelihoods and well-being. This proposed approach puts the social and economic well-being of society at the centre of the analysis, thereby reversing the central focus of approaches to climate impact assessment based on impacts on and the adaptability of natural resources or ecosystems and which only subsequently address consequences for human well-being. The vulnerability or security of any group is determined by the availability of resources and, crucially, by the entitlement of individuals and groups to call on these resources. This perspective extends the concept of entitlements developed within neoclassical and institutional economics. Within this conceptual framework, vulnerability can be seen as a socially-constructed phenomenon influenced by institutional and economic dynamics. The study develops proxy indicators of vulnerability related to the structure of economic relations and the entitlements which govern them, and shows how these can be applied to a District in coastal lowland Vietnam. This paper outlines the lessons of such an approach to social vulnerability for the assessment of climate change at the global scale. We argue that the socio-economic and biophysical processes that determine vulnerability are manifest at the local, national, regional and global level but the state of vulnerability itself is associated with a specific population. Aggregation one level to another is therefore not appropriate and global-scale analysis is meaningful only in so far as it deals with the vulnerability of the global

  13. Understanding animal fears: a comparison of the cognitive vulnerability and harm-looming models

    Directory of Open Access Journals (Sweden)

    Armfield Jason M

    2007-12-01

    Full Text Available Abstract Background The Cognitive Vulnerability Model holds that both clinical and sub-clinical manifestations of animal fears are a result of how an animal is perceived, and can be used to explain both individual differences in fear acquisition and the uneven distribution of fears in the population. This study looked at the association between fear of a number of animals and perceptions of the animals as uncontrollable, unpredictable, dangerous and disgusting. Also assessed were the perceived loomingness, prior familiarity, and negative evaluation of the animals as well as possible conditioning experiences. Methods 162 first-year University students rated their fear and perceptions of four high-fear and four low-fear animals. Results Perceptions of the animals as dangerous, disgusting and uncontrollable were significantly associated with fear of both high- and low-fear animals while perceptions of unpredictability were significantly associated with fear of high-fear animals. Conditioning experiences were unrelated to fear of any animals. In multiple regression analyses, loomingness did not account for a significant amount of the variance in fear beyond that accounted for by the cognitive vulnerability variables. However, the vulnerability variables accounted for between 20% and 51% of the variance in all animals fears beyond that accounted for by perceptions of the animals as looming. Perceptions of dangerousness, uncontrollability and unpredictability were highly predictive of the uneven distribution of animal fears. Conclusion This study provides support for the Cognitive Vulnerability Model of the etiology of specific fears and phobias and brings into question the utility of the harm-looming model in explaining animal fear.

  14. Where Lies the Risk? An Ecological Approach to Understanding Child Mental Health Risk and Vulnerabilities in Sub-Saharan Africa

    OpenAIRE

    Atilola, Olayinka

    2014-01-01

    Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa...

  15. Drought, Agriculture, and Labor: Understanding Drought Impacts and Vulnerability in California

    Science.gov (United States)

    Greene, C.

    2015-12-01

    Hazardous drought impacts are a product of not only the physical intensity of drought, but also the economic, social, and environmental characteristics of the region exposed to drought. Drought risk management requires understanding the complex links between the physical and human dimensions of drought. Yet, there is a research gap in identifying and explaining the socio-economic complexities of drought in the context of the first world, especially for economic and socially marginal groups who rely on seasonal and temporary jobs. This research uses the current drought in California as a case study to identify the socioeconomic impacts of drought on farmworker communities in California's San Joaquin Valley, with a specific focus on the relationship between drought and agricultural labor. Through both a narrative analysis of drought coverage in newspaper media, drought policy documents, and interviews with farmworkers, farmers, community based organizations, and government officials in the San Joaquin Valley, this research aims to highlight the different understandings and experiences of the human impacts of drought and drought vulnerability in order to better inform drought risk planning and policy.

  16. Using syndemic theory to understand vulnerability to HIV infection among Black and Latino men in New York City.

    Science.gov (United States)

    Wilson, Patrick A; Nanin, Jose; Amesty, Silvia; Wallace, Scyatta; Cherenack, Emily M; Fullilove, Robert

    2014-10-01

    HIV is a public health crisis that disproportionately affects Black and Latino men. To understand this crisis, syndemic theory, which takes into account multiple interrelated epidemics, should be used. A syndemic is "two or more afflictions, interacting synergistically, contributing to excess burden of disease in a population." Vulnerability to HIV among Black and Latino men is increased as structural, social, and biological factors interact in the context of social marginalization. In New York City, Black and Latino men experience a syndemic of HIV/AIDS, substance abuse, trauma, incarceration, and poverty; however, current research has yet to fully identify the mechanisms of resilience that may reduce the negative impact of a syndemic or explore the potential adaptive functions of individual-level risk behaviors. To understand HIV risk as part of a syndemic and address HIV prevention in Black and Latino men, we propose the following: (1) the use of complex systems analysis, ethnography, and other mixed-methods approaches to observe changes in relations among social conditions and disease; (2) multidisciplinary and inter-institution collaboration; and (3) involvement of public health practitioners and researchers from diverse and underrepresented backgrounds.

  17. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  18. Time-on-task decrement in vigilance is modulated by inter-individual vulnerability to homeostatic sleep pressure manipulation

    Directory of Open Access Journals (Sweden)

    Micheline eMaire

    2014-03-01

    Full Text Available Under sleep loss, vigilance is reduced and attentional failures emerge progressively. It becomes difficult to maintain stable performance over time, leading to growing performance variability (i.e. state instability in an individual and among subjects. Task duration plays a major role in the maintenance of stable vigilance levels, such that the longer the task, the more likely state instability will be observed. Vulnerability to sleep-loss-dependent performance decrements is highly individual and is also modulated by a polymorphism in the human clock gene PERIOD3 (PER3. By combining two different protocols, we manipulated sleep-wake history by once extending wakefulness for 40 h (high sleep pressure condition and once by imposing a short sleep-wake cycle by alternating 160 min of wakefulness and 80 min naps (low sleep pressure condition in a within-subject design. We observed that homozygous carriers of the long repeat allele of PER3 (PER35/5 experienced a greater time-on-task dependent performance decrement (i.e., a steeper increase in the number of lapses in the Psychomotor Vigilance Task compared to the carriers of the short repeat allele (PER34/4. These genotype-dependent effects disappeared under low sleep pressure conditions, and neither motivation, nor perceived effort accounted for these differences. Our data thus suggest that greater sleep-loss related attentional vulnerability based on the PER3 polymorphism is mirrored by a greater state instability under extended wakefulness in the short compared to the long allele carriers. Our results undermine the importance of time-on-task related aspects when investigating inter-individual differences in sleep loss-induced behavioural vulnerability.

  19. Individual differences in children's emotion understanding: Effects of age and language

    DEFF Research Database (Denmark)

    Pons, Francisco; Lawson, J.: Harris, P.; Rosnay, M. de

    2003-01-01

    Over the last two decades, it has been established that children's emotion understanding changes as they develop. Recent studies have also begun to address individual differences in children's emotion understanding. The first goal of this study was to examine the development of these individual...... differences across a wide age range with a test assessing nine different components of emotion understanding. The second goal was to examine the relation between language ability and individual differences in emotion understanding. Eighty children ranging in age from 4 to 11 years were tested. Children...... displayed a clear improvement with age in both their emotion understanding and language ability. In each age group, there were clear individual differences in emotion understanding and language ability. Age and language ability together explained 72% of emotion understanding variance; 20% of this variance...

  20. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  1. Overactive bladder in the vulnerable elderly

    Directory of Open Access Journals (Sweden)

    Wolff GF

    2014-10-01

    Full Text Available Gillian F Wolff,1 George A Kuchel,2 Phillip P Smith1,21Division of Urology, Department of Surgery, 2UConn Center on Aging, University of Connecticut Health Center, Farmington, CT, USAAbstract: Overactive bladder (OAB is a common problem that may occur in individuals of all ages. It has a considerable impact on patient quality of life, and although moderately effective management strategies do exist, this condition often remains undiagnosed and untreated. OAB needs to be viewed as a symptom complex. Its presentation and management are complicated in the vulnerable elderly by the presence of baseline frailty and multiple coexisting chronic conditions. Furthermore, and beyond a simple understanding of symptomatology, providers must address patient goals and motivations as well as the expectations of caretakers. These multiple levels of perception, function, expectations, and treatment efficacy/risks must be tailored to the individual patient. While the vulnerable elderly patient may often have evidence of urinary tract dysfunction, OAB and urge urinary incontinence in this population must be understood as a multifactorial geriatric syndrome and viewed in the context of medical and functional baseline and precipitating risk factors. Expectations and goals must be tailored to the resources of vulnerable elderly patients and their caregivers, and care must be coordinated with other medical care providers. The management of OAB in the vulnerable elderly often poses significant management challenges. Nonetheless, with a thoughtful approach and an aim towards future research specifically for this population, significant reductions in morbidity and mortality long with enhancement in health-related quality of life are possible.Keywords: urinary incontinence, urgency, antispasmodics, aging, frailty

  2. Vulnerability-specific stress generation: An examination of negative cognitive and interpersonal styles

    Science.gov (United States)

    Liu, Richard T.; Alloy, Lauren B.; Mastin, Becky M.; Choi, Jimmy Y.; Boland, Elaine M.; Jenkins, Abby L.

    2014-01-01

    Although there is substantial evidence documenting the stress generation effect in depression (i.e., the tendency for depression-prone individuals to experience higher rates of life stress to which they contribute), additional research is required to advance current understanding of the specific types of dependent stress (i.e., events influenced by characteristics and attendant behaviors of the individual) relevant to this effect. The present study tested an extension of the stress generation hypothesis, in which the content of dependent stress that is produced by depression-prone individuals is contingent upon, and matches, the nature of their particular vulnerabilities. This extension was tested within the context of two cognitive models (i.e., hopelessness theory [Abramson, Metalsky, & Alloy, 1989] and Cole’s [1990, 1991] competency-based model) and two interpersonal models (i.e., Swann’s [1987] self-verification theory and Coyne’s [1976] interpersonal theory) of depression. Overall, support was obtained for vulnerability-specific stress generation. Specifically, in analyses across vulnerability domains, evidence of stress-generation specificity was found for all domain-specific cognitive vulnerabilities except self-perceived social competence. The within-domain analyses for cognitive vulnerabilities produced more mixed results, but were largely supportive. Additionally, excessive reassurance-seeking was specifically predictive of dependent stress in the social domain, and moderated, but did not mediate, the relation between negative inferential styles overall and in the interpersonal domain and their corresponding generated stress. Finally, no evidence was found for a stress generation effect with negative feedback-seeking. PMID:24679143

  3. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.

  4. Understanding Resilience in a Vulnerable Industry: the Case of Reef Tourism in Australia

    Directory of Open Access Journals (Sweden)

    Duan Biggs

    2011-03-01

    Full Text Available Understanding the resilience of vulnerable sectors of social-ecological systems is critical in an era of escalating global change. The coral reef tourism sector is highly vulnerable not only to ecological effects of climate change and other anthropogenic disturbances on reefs, but also to shocks such as economic recession and energy price escalation. Commercial tourism enterprises are key players in reef tourism in Australia and elsewhere. However, the factors that confer resilience to reef-based tourism enterprises, or the reef tourism sector more broadly, in the face of large disturbances have not been investigated to date. This paper empirically examines the perceived resilience of reef tourism enterprises on Australia's Great Barrier Reef to large disturbances or shocks. Binary logistic regression analysis of two measures of enterprise resilience demonstrates the importance of human capital in strengthening enterprise resilience. Lifestyle identity, measured as the extent to which owners and senior managers are active in reef tourism as a lifestyle choice, is positively related to enterprise resilience. Finally, reef tourism enterprises indicate that financial and marketing support are the most important actions that government can take to support enterprises in the face of a large shock.

  5. Understanding individual routing behaviour.

    Science.gov (United States)

    Lima, Antonio; Stanojevic, Rade; Papagiannaki, Dina; Rodriguez, Pablo; González, Marta C

    2016-03-01

    Knowing how individuals move between places is fundamental to advance our understanding of human mobility (González et al. 2008 Nature 453, 779-782. (doi:10.1038/nature06958)), improve our urban infrastructure (Prato 2009 J. Choice Model. 2, 65-100. (doi:10.1016/S1755-5345(13)70005-8)) and drive the development of transportation systems. Current route-choice models that are used in transportation planning are based on the widely accepted assumption that people follow the minimum cost path (Wardrop 1952 Proc. Inst. Civ. Eng. 1, 325-362. (doi:10.1680/ipeds.1952.11362)), despite little empirical support. Fine-grained location traces collected by smart devices give us today an unprecedented opportunity to learn how citizens organize their travel plans into a set of routes, and how similar behaviour patterns emerge among distinct individual choices. Here we study 92 419 anonymized GPS trajectories describing the movement of personal cars over an 18-month period. We group user trips by origin-destination and we find that most drivers use a small number of routes for their routine journeys, and tend to have a preferred route for frequent trips. In contrast to the cost minimization assumption, we also find that a significant fraction of drivers' routes are not optimal. We present a spatial probability distribution that bounds the route selection space within an ellipse, having the origin and the destination as focal points, characterized by high eccentricity independent of the scale. While individual routing choices are not captured by path optimization, their spatial bounds are similar, even for trips performed by distinct individuals and at various scales. These basic discoveries can inform realistic route-choice models that are not based on optimization, having an impact on several applications, such as infrastructure planning, routing recommendation systems and new mobility solutions. © 2016 The Author(s).

  6. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    Science.gov (United States)

    Krishna, R.; Iqbal, J.; Gorai, A. K.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D), net recharge ( R), aquifer media ( A), soil media ( S), topography or slope ( T), impact of vadose zone ( I) and hydraulic Conductivity( C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  7. Groundwater vulnerability to pollution mapping of Ranchi district using GIS.

    Science.gov (United States)

    Krishna, R; Iqbal, J; Gorai, A K; Pathak, G; Tuluri, F; Tchounwou, P B

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D ), net recharge ( R ), aquifer media ( A ), soil media ( S ), topography or slope ( T ), impact of vadose zone ( I ) and hydraulic Conductivity( C )] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  8. Understanding vulnerability to self-harm in times of economic hardship and austerity: a qualitative study.

    Science.gov (United States)

    Barnes, M C; Gunnell, D; Davies, R; Hawton, K; Kapur, N; Potokar, J; Donovan, J L

    2016-02-17

    Self-harm and suicide increase in times of economic recession, but little is known about why people self-harm when in financial difficulty, and in what circumstances self-harm occurs. This study aimed to understand events and experiences leading to the episode of self-harm and to identify opportunities for prevention or mitigation of distress. Participants' homes or university rooms. 19 people who had attended hospital following self-harm in two UK cities and who specifically cited job loss, economic hardship or the impact of austerity measures as a causal or contributory factor. Semistructured, in-depth interviews. Interviews were audio recorded, transcribed and analysed cross-sectionally and as case studies. Study participants described experiences of severe economic hardship; being unable to find employment or losing jobs, debt, housing problems and benefit sanctions. In many cases problems accumulated and felt unresolvable. For others an event, such as a call from a debt collector or benefit change triggered the self-harm. Participants also reported other current or past difficulties, including abuse, neglect, bullying, domestic violence, mental health problems, relationship difficulties, bereavements and low self-esteem. These contributed to their sense of despair and worthlessness and increased their vulnerability to self-harm. Participants struggled to gain the practical help they felt they needed for their economic difficulties or therapeutic support that might have helped with their other co-existing or historically damaging experiences. Economic hardships resulting from the recession and austerity measures accumulated or acted as a 'final straw' to trigger self-harm, often in the context of co-existing or historically damaging life-experiences. Interventions to mitigate these effects should include providing practical advice about economic issues before difficulties become insurmountable and providing appropriate psychosocial support for vulnerable

  9. Identificação de indivíduos vulneráveis no entorno de um hospital universitário: conectando vulnerabilidade, solidariedade e saúde Identification of vulnerable individuals in the area surrounding a university hospital: connecting vulnerability, solidarity and healthcare

    Directory of Open Access Journals (Sweden)

    Hellen Cristina Sthal

    2011-07-01

    Full Text Available No entorno de um hospital universitário do interior do estado de São Paulo há pessoas dormindo, se alimentando ou descansando nos gramados e arredores, permanecendo nestes locais durante horas. Este estudo objetivou identificar e caracterizar indivíduos vulneráveis em área externa deste hospital, oferecendo ajuda. A coleta dos dados foi realizada no período de novembro de 2007 a outubro de 2008, semanalmente, em dias e horários sorteados. Identificaram-se pessoas que permaneciam nesses locais, sendo entrevistados 52 sujeitos. Esses indivíduos são, predominantemente, do sexo feminino (67,3%, brancos (51,9%, casados (59,6%, com escolaridade de até quatro anos de estudo (44,2% e sem profissão definida (84,6%. A maioria aguardava o horário do ônibus da prefeitura de seu município de origem; o tempo médio de espera foi de aproximadamente 90 minutos e grande parte dos sujeitos apresentou necessidades durante os períodos de espera. Foi oferecida ajuda a 15 pessoas que referiram necessidades no momento da entrevista. Concluiu-se que esses indivíduos se encontram em situação de vulnerabilidade individual, social e programática, destacando-se a vulnerabilidade sócio-econômica, apresentam capacidade de autodeterminação reduzida, submetendo-se a condições desfavoráveis por dependerem dos serviços públicos.In the area around a university hospital in the interior of São Paulo state people are found sleeping, eating or resting on the lawns and surrounding areas, and they linger in such sites for hours. This study sought to identify and characterize vulnerable individuals in the area around the hospital by offering help. Data were collected from November 2007 to October 2008, on a weekly basis and on randomly selected days and times. The people found in these places were identified, and 52 subjects were interviewed. The individuals were, predominantly, females (67.3%, white (51.9%, married (59.6%, had attended school for up to

  10. Where Lies the Risk? An Ecological Approach to Understanding Child Mental Health Risk and Vulnerabilities in Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Olayinka Atilola

    2014-01-01

    Full Text Available Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood.

  11. Where lies the risk? An ecological approach to understanding child mental health risk and vulnerabilities in sub-saharan Africa.

    Science.gov (United States)

    Atilola, Olayinka

    2014-01-01

    Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood.

  12. Where Lies the Risk? An Ecological Approach to Understanding Child Mental Health Risk and Vulnerabilities in Sub-Saharan Africa

    Science.gov (United States)

    Atilola, Olayinka

    2014-01-01

    Efforts at improving child-health and development initiatives in sub-Saharan Africa had focused on the physical health of children due to the neglect of child and adolescent mental health (CAMH) policy initiatives. A thorough and broad-based understanding of the prevalent child mental-health risk and vulnerability factors is needed to successfully articulate CAMH policies. In this discourse, we present a narrative on the child mental-health risk and vulnerability factors in sub-Saharan Africa. Through an ecological point of view, we identified widespread family poverty, poor availability and uptake of childcare resources, inadequate community and institutional childcare systems, and inadequate framework for social protection for vulnerable children as among the risk and vulnerability factors for CAMH in the region. Others are poor workplace policy/practice that does not support work-family life balance, poor legislative framework for child protection, and some harmful traditional practices. We conclude that an ecological approach shows that child mental-health risks are diverse and cut across different layers of the care environment. The approach also provides a broad and holistic template from which appropriate CAMH policy direction in sub-Saharan Africa can be understood. PMID:24834431

  13. A community-based qualitative study on the experience and understandings of intimate partner violence and HIV vulnerability from the perspectives of female sex workers and male intimate partners in North Karnataka state, India.

    Science.gov (United States)

    Blanchard, Andrea K; Nair, Sapna G; Bruce, Sharon G; Ramanaik, Satyanarayana; Thalinja, Raghavendra; Murthy, Srikanta; Javalkar, Prakash; Pillai, Priya; Collumbien, Martine; Heise, Lori; Isac, Shajy; Bhattacharjee, Parinita

    2018-05-11

    Research has increasingly documented the important role that violence by clients and the police play in exacerbating HIV vulnerability for women in sex work. However few studies have examined violence in the intimate relationships of women in sex work, or drawn on community partnerships to explore the social dynamics involved. A community-based participatory research study was undertaken by community and academic partners leading intimate partner violence (IPV) and HIV prevention programs in Bagalkot district, Karnataka state, India. The purpose was to explore the experience and understandings of intimate partner violence and HIV/AIDS among women in sex work and their intimate partners in Bagalkot that would inform both theory and practice. A community-based, interpretive qualitative methodology was used. Data was collected between July and October 2014 through in-depth interviews with 38 participants, including 10 couples, 13 individual female sex workers, and 5 individual male intimate partners. Purposive sampling was done to maximize variation on socio-demographic characteristics. Thematic content analysis was conducted through coding and categorization for each interview question in NVivo 10.0, followed by collaborative analysis to answer the research questions. The results showed that an array of interrelated, multi-level factors underlay the widespread acceptance and perpetuation of violence and lack of condom use in participants' intimate relationships. These included individual expectations that justified violence and reflected societal gender norms, compounded by stigma, legal and economic constraints relating to sex work. The results demonstrate that structural vulnerability to IPV and HIV must be addressed not only on the individual and relationship levels to resolve relevant triggers of violence and lack of condom use, but also the societal-level to address gender norms and socio-economic constraints among women in sex work and their partners. The study

  14. Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis

    Science.gov (United States)

    Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter

    2013-04-01

    Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at

  15. Vulnerability and risk perception in the management of HIV/AIDS: Public priorities in a global pandemic

    Directory of Open Access Journals (Sweden)

    Peter Tsasis

    2008-11-01

    Full Text Available Peter Tsasis1,2, N. Nirupama21School of Health Policy and Management, 2School of Administrative Studies, York University, Toronto, Ontario, CanadaAbstract: Understanding the way perception of risk is shaped and constructed is crucial in understanding why it has been so difficult to mitigate the spread of HIV/AIDS. This paper uses the Pressure and Release (PAR model, used to predict the onset of natural disasters as the conceptual framework. It substitutes vulnerability and risk perception as the trigger factors in the model, in making the case that HIV/AIDS can be characterized as a slow onset disaster. The implications are that vulnerability must be managed and reduced by addressing root causes, dynamic pressures, and unsafe conditions that contribute to the HIV/AIDS pandemic. HIV/AIDS programs must be culturally appropriate and work toward influencing risk perception, while addressing social norms and values that negatively impact vulnerable populations. By impacting cultural and social expectations, individuals will be able to more readily adopt safer sex behaviors. The development of policies and programs addressing the issues in context, as opposed to individual behaviors alone, allows for effective public health intervention. This may have implications for public health measures implemented for combating the spread of HIV/AIDS.Keywords: vulnerability, risk perception, HIV/AIDS, public health intervention

  16. Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities

    Science.gov (United States)

    Brooks, Tyson T.

    2013-01-01

    This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…

  17. Vulnerabilities of national parks in the American Midwest to climate and land use changes

    Science.gov (United States)

    Stroh, Esther D.; Struckhoff, Matthew A.; Shaver, David; Karstensen, Krista A.

    2016-06-08

    Many national parks in the American Midwest are surrounded by agricultural or urban areas or are in highly fragmented or rapidly changing landscapes. An environmental stressor is a physical, chemical, or biological condition that affects the functioning or productivity of species or ecosystems. Climate change is just one of many stressors on park natural resources; others include urbanization, land use change, air and water pollution, and so on. Understanding and comparing the relative vulnerability of a suite of parks to projected climate and land use changes is important for region-wide planning. A vulnerability assessment of 60 units in the 13-state U.S. National Park Service Midwestern administrative region to climate and land use change used existing data from multiple sources. Assessment included three components: individual park exposure (5 metrics), sensitivity (5 metrics), and constraints to adaptive capacity (8 metrics) under 2 future climate scenarios. The three components were combined into an overall vulnerability score. Metrics were measures of existing or projected conditions within park boundaries, within 10-kilometer buffers surrounding parks, and within ecoregions that contain or intersect them. Data were normalized within the range of values for all assessed parks, resulting in high, medium, and low relative rankings for exposure, sensitivity, constraints to adaptive capacity, and overall vulnerability. Results are consistent with assessments regarding patterns and rates of climate change nationwide but provide greater detail and relative risk for Midwestern parks. Park overall relative vulnerability did not differ between climate scenarios. Rankings for exposure, sensitivity, and constraints to adaptive capacity varied geographically and indicate regional conservation planning opportunities. The most important stressors for the most vulnerable Midwestern parks are those related to sensitivity (intrinsic characteristics of the park) and

  18. Selective vulnerabilities and biomarkers in neurocognitive aging [version 1; referees: 4 approved

    Directory of Open Access Journals (Sweden)

    Zachariah Reagh

    2017-04-01

    Full Text Available As the world’s population continues to age, an understanding of the aging brain becomes increasingly crucial. This review focuses on several recent ideas and findings in the study of neurocognitive aging, specifically focusing on episodic memory, and discusses how they can be considered and used to guide us moving forward. Topics include dysfunction in neural circuits, the roles of neurogenesis and inhibitory signaling, vulnerability in the entorhinal cortex, individual differences, and comorbidities. These avenues of study provide a brief overview of promising themes in the field and together provide a snapshot of what we believe will be important emerging topics in selective vulnerabilities in the aging brain.

  19. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  20. Declining vulnerability to river floods and the global benefits of adaptation.

    Science.gov (United States)

    Jongman, Brenden; Winsemius, Hessel C; Aerts, Jeroen C J H; Coughlan de Perez, Erin; van Aalst, Maarten K; Kron, Wolfgang; Ward, Philip J

    2015-05-05

    The global impacts of river floods are substantial and rising. Effective adaptation to the increasing risks requires an in-depth understanding of the physical and socioeconomic drivers of risk. Whereas the modeling of flood hazard and exposure has improved greatly, compelling evidence on spatiotemporal patterns in vulnerability of societies around the world is still lacking. Due to this knowledge gap, the effects of vulnerability on global flood risk are not fully understood, and future projections of fatalities and losses available today are based on simplistic assumptions or do not include vulnerability. We show for the first time (to our knowledge) that trends and fluctuations in vulnerability to river floods around the world can be estimated by dynamic high-resolution modeling of flood hazard and exposure. We find that rising per-capita income coincided with a global decline in vulnerability between 1980 and 2010, which is reflected in decreasing mortality and losses as a share of the people and gross domestic product exposed to inundation. The results also demonstrate that vulnerability levels in low- and high-income countries have been converging, due to a relatively strong trend of vulnerability reduction in developing countries. Finally, we present projections of flood losses and fatalities under 100 individual scenario and model combinations, and three possible global vulnerability scenarios. The projections emphasize that materialized flood risk largely results from human behavior and that future risk increases can be largely contained using effective disaster risk reduction strategies.

  1. Shaping vulnerability to addiction - the contribution of behavior, neural circuits and molecular mechanisms.

    Science.gov (United States)

    Egervari, Gabor; Ciccocioppo, Roberto; Jentsch, J David; Hurd, Yasmin L

    2018-02-01

    Substance use disorders continue to impose increasing medical, financial and emotional burdens on society in the form of morbidity and overdose, family disintegration, loss of employment and crime, while advances in prevention and treatment options remain limited. Importantly, not all individuals exposed to abused substances effectively develop the disease. Genetic factors play a significant role in determining addiction vulnerability and interactions between innate predisposition, environmental factors and personal experiences are also critical. Thus, understanding individual differences that contribute to the initiation of substance use as well as on long-term maladaptations driving compulsive drug use and relapse propensity is of critical importance to reduce this devastating disorder. In this paper, we discuss current topics in the field of addiction regarding individual vulnerability related to behavioral endophenotypes, neural circuits, as well as genetics and epigenetic mechanisms. Expanded knowledge of these factors is of importance to improve and personalize prevention and treatment interventions in the future. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Oil vulnerability index of oil-importing countries

    International Nuclear Information System (INIS)

    Gupta, Eshita

    2008-01-01

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  3. Oil vulnerability index of oil-importing countries

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)

    2008-03-15

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  4. HIV/AIDS in mid-sized cities in Senegal: From individual to place-based vulnerability.

    Science.gov (United States)

    Drame, Fatou Maria; Foley, Ellen E

    2015-05-01

    In Senegal, recent data indicates that the HIV epidemic is increasingly driven by concurrent sexual partners among men and women in stable relationships. In order to respond to this changing epidemiological profile in Senegal, multi-lateral and national AIDS actors require information about these emerging trends in unstudied populations. To that end, this study has several objectives, first, to assess local dynamics of sexual behaviors among individuals at popular socializing venues in areas at increased risk of HIV transmission; and then to examine how particular venues may influence risks of HIV transmission. In 2013 we collected data at 314 venues in 10 cities in Senegal using PLACE methodology. These venues were listed with collaboration of 374 community informants. They are places where commercial sex workers, MSM, and individuals who are not part of any identified risk group socialize and meet new sexual partners. We conducted 2600 interviews at the 96 most popular venues. A significant portion of the sample reports buying or selling sex and the majority engaged in behavior considered high-risk for transmitting sexual infections. Almost a quarter of patrons interviewed in venues were young people aged 15-24 years. Types of venues described were very diverse. Half of them were venues (n = 156) where sex workers could be solicited and almost a third were venues where MSM could meet male partners (n = 90). The study showed existing pockets of vulnerability to HIV in Thies, Bignona or Saly that are not evident from aggregate HIV data. These early findings suggest links between risky behaviors and type of venue on the one hand and type of city on the other hand. Finally, these findings offer complementary insight to existing studies of HIV vulnerability in Senegal and support a case for venue-based interventions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  6. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  7. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    flood. In the case of farm activities, vulnerability mitigation consists in implementing measures which can be: physical (equipment or electric power system elevation), organizational (emergency or recovery plan) or financial (insurance). These measures aim at decreasing the total damage incurred by farmers in case of flooding. For instance, if equipment is elevated, it will not suffer direct damage such as degradation. As a consequence, equipment will be available to continue production or recovery tasks, thus, avoiding indirect damage such as delays, indebtedness… The effects of these policies on farms, in particular vulnerability mitigation cannot be appraised using current methodologies mainly because they do not consider farm as a whole and focus on direct damage at the land plot scale (loss of yield). Moreover, since vulnerability mitigation policies are quite recent, few examples of implementation exist and no feedback experience can be processed. Meanwhile, decision makers and financial actors require more justification of the efficiency of public fund by economic appraisal of the projects. On the Rhône River, decision makers asked for an economic evaluation of the program of farm vulnerability mitigation they plan to implement. This implies to identify the effects of the measures to mitigate farm vulnerability, and to classify them by comparing their efficacy (avoided damage) and their cost of implementation. In this presentation, we propose and discuss a conceptual model of vulnerability at the farm scale. The modelling, in Unified Modelling Language, enabled to represent the ties between spatial, organizational and temporal dimensions, which are central to understanding of farm vulnerability and resilience to flooding. Through this modelling, we encompass three goals: To improve the comprehension of farm vulnerability and create a framework that allow discussion with experts of different disciplines as well as with local farmers; To identify data which

  8. Social defeat protocol and relevant biomarkers, implications for stress response physiology, drug abuse, mood disorders and individual stress vulnerability: a systematic review of the last decade.

    Science.gov (United States)

    Vasconcelos, Mailton; Stein, Dirson João; de Almeida, Rosa Maria M

    2015-01-01

    Social defeat (SD) in rats, which results from male intraspecific confrontations, is ethologically relevant and useful to understand stress effects on physiology and behavior. A systematic review of studies about biomarkers induced by the SD protocol and published from 2002 to 2013 was carried out in the electronic databases PubMed, Web of Knowledge and ScienceDirect. The search terms were: social defeat, rat, neurotrophins, neuroinflammatory markers, and transcriptional factors. Classical and recently discovered biomarkers were found to be relevant in stress-induced states. Findings were summarized in accordance to the length of exposure to stress: single, repeated, intermittent and continuous SD. This review found that the brain-derived neurotrophic factor (BDNF) is a distinct marker of stress adaptation. Along with glucocorticoids and catecholamines, BDNF seems to be important in understanding stress physiology. The SD model provides a relevant tool to study stress response features, development of addictive behaviors, clinic depression and anxiety, as well as individual differences in vulnerability and resilience to stress.

  9. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  10. Developmental and Individual Differences in Understanding of Fractions

    Science.gov (United States)

    Siegler, Robert S.; Pyke, Aryn A.

    2013-01-01

    We examined developmental and individual differences in 6th and 8th graders' fraction arithmetic and overall mathematics achievement and related them to differences in understanding of fraction magnitudes, whole number division, executive functioning, and metacognitive judgments within a crosssectional design. Results indicated that the difference…

  11. Integrating Social impacts on Health and Health-Care Systems in Systemic Seismic Vulnerability Analysis

    Science.gov (United States)

    Kunz-Plapp, T.; Khazai, B.; Daniell, J. E.

    2012-04-01

    This paper presents a new method for modeling health impacts caused by earthquake damage which allows for integrating key social impacts on individual health and health-care systems and for implementing these impacts in quantitative systemic seismic vulnerability analysis. In current earthquake casualty estimation models, demand on health-care systems is estimated by quantifying the number of fatalities and severity of injuries based on empirical data correlating building damage with casualties. The expected number of injured people (sorted by priorities of emergency treatment) is combined together with post-earthquake reduction of functionality of health-care facilities such as hospitals to estimate the impact on healthcare systems. The aim here is to extend these models by developing a combined engineering and social science approach. Although social vulnerability is recognized as a key component for the consequences of disasters, social vulnerability as such, is seldom linked to common formal and quantitative seismic loss estimates of injured people which provide direct impact on emergency health care services. Yet, there is a consensus that factors which affect vulnerability and post-earthquake health of at-risk populations include demographic characteristics such as age, education, occupation and employment and that these factors can aggravate health impacts further. Similarly, there are different social influences on the performance of health care systems after an earthquake both on an individual as well as on an institutional level. To link social impacts of health and health-care services to a systemic seismic vulnerability analysis, a conceptual model of social impacts of earthquakes on health and the health care systems has been developed. We identified and tested appropriate social indicators for individual health impacts and for health care impacts based on literature research, using available European statistical data. The results will be used to

  12. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    Science.gov (United States)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation

  13. Vulnerabilidade social, individual e programática em idosos da comunidade: dados do estudo FIBRA, Campinas, SP, Brasil Social, individual and programmatic vulnerability among the elderly in the community: data from the FIBRA Study conducted in Campinas, São Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Natália Oliveira Rodrigues

    2012-08-01

    Full Text Available Condições socioculturais e econômicas interagem com os processos biológicos ao longo da vida, determinando vulnerabilidade ou resiliência na velhice. O objetivo foi investigar relações entre vulnerabilidade social (gênero, idade e renda; individual (comorbidades, sinais e sintomas, incapacidade funcional, suporte social percebido e saúde percebida e programática (índices de SUS-dependência e de vulnerabilidade social e acesso aos serviços de saúde em amostra de indivíduos com 65 anos e mais. Participaram 688 idosos recrutados em domicílio, em 88 setores censitários urbanos sorteados, em Campinas, SP. Os dados (de autorrelato foram obtidos em sessão única de coleta. Dos entrevistados, 470 eram mulheres, com mais comorbidades e sinais e sintomas, mas mais envolvidas em atividades avançadas de vida diária (AAVD e atividades instrumentais de vida diária (AIVD do que os homens. A média de idade foi 72,28 ± 5,41 anos e a de renda familiar 4,72 ± 5,28 salários mínimos. As variáveis que melhor explicaram a variabilidade dos dados foram acesso e uso de serviços de saúde, índices de SUS-dependência e de vulnerabilidade social e renda familiar. Condições sociais e renda familiar covariam com vulnerabilidade individual na velhice.Sociocultural and economic conditions interact with biological processes throughout the course of life determining vulnerability or resilience in old age. The scope of this study was to investigate relationships between social vulnerability (gender, age and income; individual vulnerability (comorbidities, signs and symptoms, functional ability, perceived social support and perceived health, and programmatic vulnerability (indices of dependence on the public health system, social vulnerability and access to health services in a sample of individuals aged 65 and more. 688 elderly people were interviewed in a single data gathering session in their homes in 88 selected urban census sectors in Campinas

  14. Abused women's vulnerability in daily life and in contact with psychiatric care: In the light of a caring science perspective.

    Science.gov (United States)

    Örmon, Karin; Hörberg, Ulrica

    2017-08-01

    The aim of the study is to deepen the understanding of abused women's vulnerability in relation to how the abuse and encounters with health care professionals affect life. A further aim is to highlight abused women's vulnerability with a caring science perspective. Experience of abuse has consequences for the mental health of women and girls. Abused women may experience health care as unsupportive, and as a result, often chose not to disclose their experiences of abuse. The results of two qualitative empirical studies were analysed along with a phenomenological meaning analysis in accordance with the methodological principles of Reflective Lifeworld Research. Living one's life with experiences of abuse implies vulnerability, which can prevent abused women from achieving good health. This vulnerability results from insecurity regarding identity, along with the sense that one could have been a different individual if it were not for the abuse and thereby have a more fair chance in life. Being cared for within general psychiatric care could further increase this vulnerability. The healthcare professional's ability to care for the women who have experienced abuse leads to either an encounter of trust or else further suffering for the women. A lifeworld-oriented caring science perspective as a foundation for care can contribute to care for abused women which reaches the existential dimensions of their vulnerability and vulnerable life situation. It is evident that healthcare professionals should deepen their understanding of how abused women live, within a general psychiatric context. This study enables a deeper understanding of abused women's vulnerability in relation to how the abuse and encounters with healthcare professionals affect life. © 2016 John Wiley & Sons Ltd.

  15. Reducing vulnerability among pastoralists in Northern Kenya

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    vulnerability among pastoralist communities in Mandera and Turkana in Northern Kenya, led by the Kenyan NGO ... to understand how people have experienced droughts and other ... norms and gender roles may make them more or less vulnerable, ... and see direct impacts on the resources they depend on for their.

  16. Towards a mechanistic understanding of vulnerability to hook-and-line fishing: Boldness as the basic target of angling-induced selection

    DEFF Research Database (Denmark)

    Klefoth, Thomas; Skov, Christian; Kuparinen, Anna

    2017-01-01

    by juvenile growth rate, while morphological traits were only weakly related to angling vulnerability. In addition, we found juvenile growth rate to be moderately correlated with boldness. Hence, direct selection on boldness will also induce indirect selection on juvenile growth and vice versa, but given......In passively operated fishing gear, boldness-related behaviors should fundamentally affect the vulnerability of individual fish and thus be under fisheries selection. To test this hypothesis, we used juvenile common-garden reared carp (Cyprinus carpio) within a narrow size range to investigate...... the mechanistic basis of behavioral selection caused by angling. We focused on one key personality trait (i.e., boldness), measured in groups within ponds, two morphological traits (body shape and head shape), and one life-history trait (juvenile growth capacity) and studied mean standardized selection gradients...

  17. Social risk, stigma and space: key concepts for understanding HIV vulnerability among black men who have sex with men in New York City.

    Science.gov (United States)

    Parker, Caroline M; Garcia, Jonathan; Philbin, Morgan M; Wilson, Patrick A; Parker, Richard G; Hirsch, Jennifer S

    2017-03-01

    Black men who have sex with men in the USA face disproportionate incidence rates of HIV. This paper presents findings from an ethnographic study conducted in New York City that explored the structural and socio-cultural factors shaping men's sexual relationships with the goal of furthering understandings of their HIV-related vulnerability. Methods included participant observation and in-depth interviews with 31 Black men who have sex with men (three times each) and 17 key informants. We found that HIV vulnerability is perceived as produced through structural inequalities including economic insecurity, housing instability, and stigma and discrimination. The theoretical concepts of social risk, intersectional stigma, and the social production of space are offered as lenses through which to analyse how structural inequalities shape HIV vulnerability. We found that social risk shaped HIV vulnerability by influencing men's decisions in four domains: 1) where to find sexual partners, 2) where to engage in sexual relationships, 3) what kinds of relationships to seek, and 4) whether to carry and to use condoms. Advancing conceptualisations of social risk, we show that intersectional stigma and the social production of space are key processes through which social risk generates HIV vulnerability among Black men who have sex with men.

  18. Individual differences in discriminatory fear learning under conditions of ambiguity: A vulnerability factor for anxiety disorders?

    Directory of Open Access Journals (Sweden)

    Inna eArnaudova

    2013-05-01

    Full Text Available Complex fear learning procedures might be better suited than the common differential fear conditioning paradigm for detecting individual differences related to vulnerability for anxiety disorders. Two such procedures are the blocking procedure and the protection-from-overshadowing procedure. Their comparison allows for the examination of discriminatory fear learning under conditions of ambiguity. The present study examined the role of individual differences in such discriminatory fear learning. We hypothesized that heightened trait anxiety would be related to a deficit in discriminatory fear learning. Participants gave US-expectancy ratings as an index for the threat value of individual CSs following blocking and protection-from-overshadowing training. The difference in threat value at test between the protected-from-overshadowing CS and the blocked CS was negatively correlated with scores on a self-report tension-stress scale that approximates facets of generalized anxiety disorder (DASS-S, but not with other individual difference variables. In addition, a behavioral test showed that only participants scoring high on the DASS-S avoided the protected-from-overshadowing CS. This observed deficit in discriminatory fear learning for participants with high levels of tension-stress might be an underlying mechanism for fear overgeneralization in diffuse anxiety disorders such as generalized anxiety disorder.

  19. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  20. Cost-effectiveness analysis of HPV vaccination: comparing the general population with socially vulnerable individuals.

    Science.gov (United States)

    Han, Kyu-Tae; Kim, Sun Jung; Lee, Seo Yoon; Park, Eun-Cheol

    2014-01-01

    After the WHO recommended HPV vaccination of the general population in 2009, government support of HPV vaccination programs was increased in many countries. However, this policy was not implemented in Korea due to perceived low cost-effectiveness. Thus, the aim of this study was to analyze the cost-utility of HPV vaccination programs targeted to high risk populations as compared to vaccination programs for the general population. Each study population was set to 100,000 people in a simulation study to determine the incremental cost-utility ratio (ICUR), then standard prevalence rates, cost, vaccination rates, vaccine efficacy, and the Quality-Adjusted Life-Years (QALYs) were applied to the analysis. In addition, sensitivity analysis was performed by assuming discounted vaccination cost. In the socially vulnerable population, QALYs gained through HPV vaccination were higher than that of the general population (General population: 1,019, Socially vulnerable population: 5,582). The results of ICUR showed that the cost of HPV vaccination was higher for the general population than the socially vulnerable population. (General population: 52,279,255 KRW, Socially vulnerable population: 9,547,347 KRW). Compared with 24 million KRW/QALYs as the social threshold, vaccination of the general population was not cost-effective. In contrast, vaccination of the socially vulnerable population was strongly cost-effective. The results suggest the importance and necessity of government support of HPV vaccination programs targeted to socially vulnerable populations because a targeted approach is much more cost-effective. The implementation of government support for such vaccination programs is a critical strategy for decreasing the burden of HPV infection in Korea.

  1. Vulnerability maps for Druzba crude oil pipeline

    International Nuclear Information System (INIS)

    Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.

    2012-01-01

    Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

  2. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  3. Intensifying Insecurities: The impact of climate change on vulnerability to human trafficking in the Indian Sundarbans

    Directory of Open Access Journals (Sweden)

    Nicole Molinari

    2017-04-01

    Full Text Available Despite an enormous amount of attention paid to the factors that shape vulnerability to human trafficking, such as poverty and a lack of economic opportunity, the debate of evidence for what enables these factors to exist in the first place is relatively less explored. Presently, discussions of the relationship between climate change and human insecurity have been marginal to broader debates about vulnerability to trafficking. This paper argues that this signifies a gap in our understanding of the underlying drivers that push individuals and communities into situations where vulnerability to trafficking amplifies, but also that increase the pull of risky migration pathways and exploitative work situations. This paper proceeds by examining and problematising dominant conceptualisations of vulnerability in human trafficking and climate change discourses. Next, it presents a case study of the Sundarbans region of India to highlight how climate change impacts compound and exacerbate the same factors that shape vulnerability to human trafficking—including environmental degradation, loss of livelihood, destitution, and forced migration. Lastly, it argues for enhanced attention to climate change-related insecurity as evidence of vulnerability to trafficking and outlines what such insights can bring to anti-trafficking efforts.

  4. Agency and Vulnerability: Reconfiguring the Female Characters in ...

    African Journals Online (AJOL)

    This article recognizes the pressures on an individual's agency and vulnerability to societal containment as constant interplay that accounts for creative dimensions and responses intensified within a love relationship. It locates agency and vulnerability as mutually inclusive within the philosophical nexus of self-actualization ...

  5. Vulnerability of Smallholder Farmers to Climate Change in the ...

    African Journals Online (AJOL)

    Yitayal A.

    adopted Vulnerability as expected poverty (VEP)approach was where an individual's vulnerability is the .... cropping seasons. About 21% of the respondents are below the food poverty line of ..... Cambridge, UK: University Press. Stige, L., J.

  6. Social defeat protocol and relevant biomarkers, implications for stress response physiology, drug abuse, mood disorders and individual stress vulnerability: a systematic review of the last decade

    Directory of Open Access Journals (Sweden)

    Mailton Vasconcelos

    2015-06-01

    Full Text Available Introduction: Social defeat (SD in rats, which results from male intraspecific confrontations, is ethologically relevant and useful to understand stress effects on physiology and behavior.Methods: A systematic review of studies about biomarkers induced by the SD protocol and published from 2002 to 2013 was carried out in the electronic databases PubMed, Web of Knowledge and ScienceDirect. The search terms were: social defeat, rat, neurotrophins, neuroinflammatory markers, and transcriptional factors.Results: Classical and recently discovered biomarkers were found to be relevant in stress-induced states. Findings were summarized in accordance to the length of exposure to stress: single, repeated, intermittent and continuous SD. This review found that the brain-derived neurotrophic factor (BDNF is a distinct marker of stress adaptation. Along with glucocorticoids and catecholamines, BDNF seems to be important in understanding stress physiology.Conclusion: The SD model provides a relevant tool to study stress response features, development of addictive behaviors, clinic depression and anxiety, as well as individual differences in vulnerability and resilience to stress.

  7. Ecosystems Vulnerability Challenge and Prize Competition

    Science.gov (United States)

    Smith, J. H.; Frame, M. T.; Ferriter, O.; Recker, J.

    2014-12-01

    Stimulating innovation and private sector entrepreneurship is an important way to advance the preparedness of communities, businesses and individuals for the impacts of climate change on certain aspects of ecosystems, such as: fire regimes; water availability; carbon sequestration; biodiversity conservation; weather-related hazards, and the spread of invasive species. The creation of tools is critical to help communities and natural resource managers better understand the impacts of climate change on ecosystems and the potential resulting implications for ecosystem services and conservation efforts. The Department of the Interior is leading an interagency effort to develop the Ecosystems Vulnerability theme as part of the President's Climate Action Plan. This effort will provide seamless access to relevant datasets that can help address such issues as: risk of wildfires to local communities and federal lands; water sensitivity to climate change; and understanding the role of ecosystems in a changing climate. This session will provide an overview of the proposed Ecosystem Vulnerability Challenge and Prize Competition, outlining the intended audience, scope, goals, and overall timeline. The session will provide an opportunity for participants to offer new ideas. Through the Challenge, access will be made available to critical datasets for software developers, engineers, scientists, students, and researchers to develop and submit applications addressing critical science issues facing our Nation today. Application submission criteria and guidelines will also be discussed. The Challenge will be open to all sectors and organizations (i.e. federal, non-federal, private sector, non-profits, and universities) within the United States. It is anticipated the Challenge will run from early January 2015 until spring of 2015.

  8. Sources of Individual Differences in Children's Understanding of Fractions

    Science.gov (United States)

    Vukovic, Rose K.; Fuchs, Lynn S.; Geary, David C.; Jordan, Nancy C.; Gersten, Russell; Siegler, Robert S.

    2014-01-01

    Longitudinal associations of domain-general and numerical competencies with individual differences in children's understanding of fractions were investigated. Children (n = 163) were assessed at 6 years of age on domain-general (nonverbal reasoning, language, attentive behavior, executive control, visual-spatial memory) and numerical (number…

  9. Calculation of Individual Tree Water Use in a Bornean Tropical Rain Forest Using Individual-Based Dynamic Vegetation Model SEIB-DGVM

    Science.gov (United States)

    Nakai, T.; Kumagai, T.; Saito, T.; Matsumoto, K.; Kume, T.; Nakagawa, M.; Sato, H.

    2015-12-01

    Bornean tropical rain forests are among the moistest biomes of the world with abundant rainfall throughout the year, and considered to be vulnerable to a change in the rainfall regime; e.g., high tree mortality was reported in such forests induced by a severe drought associated with the ENSO event in 1997-1998. In order to assess the effect (risk) of future climate change on eco-hydrology in such tropical rain forests, it is important to understand the water use of trees individually, because the vulnerability or mortality of trees against climate change can depend on the size of trees. Therefore, we refined the Spatially Explicit Individual-Based Dynamic Global Vegetation Model (SEIB-DGVM) so that the transpiration and its control by stomata are calculated for each individual tree. By using this model, we simulated the transpiration of each tree and its DBH-size dependency, and successfully reproduced the measured data of sap flow of trees and eddy covariance flux data obtained in a Bornean lowland tropical rain forest in Lambir Hills National Park, Sarawak, Malaysia.

  10. Assessing local vulnerability to climate change in Ecuador

    OpenAIRE

    Fernandez, Mario Andres; Bucaram, Santiago J.; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a c...

  11. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  12. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  13. Not the usual suspects: addressing layers of vulnerability.

    Science.gov (United States)

    Luna, Florencia; Vanderpoel, Sheryl

    2013-07-01

    This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.

  14. Combining demographic and genetic factors to assess population vulnerability in stream species

    Science.gov (United States)

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss

  15. Individual shareholders’ understanding of the content of interim reports of South African listed retail companies

    Directory of Open Access Journals (Sweden)

    Johan GI Oberholster

    2015-05-01

    Full Text Available A number of studies conducted, and reports published, by international and local accounting bodies have found that the proliferation of disclosures in financial reports has hampered users’ understanding of these reports. The reports by accounting bodies also indicate that these users prefer more concise financial reports. These findings, in conjunction with a dearth of recent questionnaire-based research on whether individual shareholders understand the content of financial reports, resulted in this study on whether individual shareholders understand the content of interim reports. The study provides empirical proof that a sound knowledge of business, accounting and economic matters is a prerequisite for understanding interim reports in the case of individual shareholders. The results of the study indicate that individual shareholders have a limited understanding of the content of interim reports as a whole, and that a good knowledge of business and economic matters and of accounting results in an improved understanding of the content of interim reports. In particular, specialisation in accounting in undergraduate and postgraduate degrees, professional qualifications, and work experience in the financial field improve the understanding of individual shareholders.

  16. Are individual based models a suitable approach to estimate population vulnerability? - a case study

    Directory of Open Access Journals (Sweden)

    Eva Maria Griebeler

    2011-04-01

    Full Text Available European populations of the Large Blue Butterfly Maculinea arion have experienced severe declines in the last decades, especially in the northern part of the species range. This endangered lycaenid butterfly needs two resources for development: flower buds of specific plants (Thymus spp., Origanum vulgare, on which young caterpillars briefly feed, and red ants of the genus Myrmica, whose nests support caterpillars during a prolonged final instar. I present an analytically solvable deterministic model to estimate the vulnerability of populations of M. arion. Results obtained from the sensitivity analysis of this mathematical model (MM are contrasted to the respective results that had been derived from a spatially explicit individual based model (IBM for this butterfly. I demonstrate that details in landscape configuration which are neglected by the MM but are easily taken into consideration by the IBM result in a different degree of intraspecific competition of caterpillars on flower buds and within host ant nests. The resulting differences in mortalities of caterpillars lead to erroneous estimates of the extinction risk of a butterfly population living in habitat with low food plant coverage and low abundance in host ant nests. This observation favors the use of an individual based modeling approach over the deterministic approach at least for the management of this threatened butterfly.

  17. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  18. Predicting risk in space: Genetic markers for differential vulnerability to sleep restriction

    Science.gov (United States)

    Goel, Namni; Dinges, David F.

    2012-08-01

    Several laboratories have found large, highly reliable individual differences in the magnitude of cognitive performance, fatigue and sleepiness, and sleep homeostatic vulnerability to acute total sleep deprivation and to chronic sleep restriction in healthy adults. Such individual differences in neurobehavioral performance are also observed in space flight as a result of sleep loss. The reasons for these stable phenotypic differential vulnerabilities are unknown: such differences are not yet accounted for by demographic factors, IQ or sleep need, and moreover, psychometric scales do not predict those individuals cognitively vulnerable to sleep loss. The stable, trait-like (phenotypic) inter-individual differences observed in response to sleep loss—with intraclass correlation coefficients accounting for 58-92% of the variance in neurobehavioral measures—point to an underlying genetic component. To this end, we utilized multi-day highly controlled laboratory studies to investigate the role of various common candidate gene variants—each independently—in relation to cumulative neurobehavioral and sleep homeostatic responses to sleep restriction. These data suggest that common genetic variations (polymorphisms) involved in sleep-wake, circadian, and cognitive regulation may serve as markers for prediction of inter-individual differences in sleep homeostatic and neurobehavioral vulnerability to sleep restriction in healthy adults. Identification of genetic predictors of differential vulnerability to sleep restriction—as determined from candidate gene studies—will help identify astronauts most in need of fatigue countermeasures in space flight and inform medical standards for obtaining adequate sleep in space. This review summarizes individual differences in neurobehavioral vulnerability to sleep deprivation and ongoing genetic efforts to identify markers of such differences.

  19. A flood vulnerability index for coastal cities and its use in assessing climate change impacts

    NARCIS (Netherlands)

    Balica, S.F.; Wright, N.G.; Van der Meulen, F.

    2012-01-01

    Worldwide, there is a need to enhance our understanding of vulnerability and to develop methodologies and tools to assess vulnerability. One of the most important goals of assessing coastal flood vulnerability, in particular, is to create a readily understandable link between the theoretical

  20. A knowledge integration approach to flood vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven

    2014-05-01

    Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.

  1. Vulnerability to air pollution: To intervene or not to intervene

    CSIR Research Space (South Africa)

    John, J

    2008-11-01

    Full Text Available The Environmental Health Research Group has, amongst other interests, a specific focus on understanding and addressing vulnerability of communities to environmental pollution. No appropriate tools to determine vulnerability to environmental...

  2. Vulnerability assessments, identity and spatial scale challenges in disaster-risk reduction

    Directory of Open Access Journals (Sweden)

    Edward R. Carr

    2015-11-01

    Full Text Available Current approaches to vulnerability assessment for disaster-risk reduction (DRR commonly apply generalised, a priori determinants of vulnerability to particular hazards in particular places. Although they may allow for policy-level legibility at high levels of spatial scale, these approaches suffer from attribution problems that become more acute as the level of analysis is localised and the population under investigation experiences greater vulnerability. In this article, we locate the source of this problem in a spatial scale mismatch between the essentialist framings of identity behind these generalised determinants of vulnerability and the intersectional, situational character of identity in the places where DRR interventions are designed and implemented. Using the Livelihoods as Intimate Government (LIG approach to identify and understand different vulnerabilities to flooding in a community in southern Zambia, we empirically demonstrate how essentialist framings of identity produce this mismatch. Further, we illustrate a means of operationalising intersectional, situational framings of identity to achieve greater and more productive understandings of hazard vulnerability than available through the application of general determinants of vulnerability to specific places and cases.

  3. Socially Vulnerable Youth and Volunteering in Sports: Analyzing a Brussels Training Program for Young Soccer Coaches

    Directory of Open Access Journals (Sweden)

    Evi Buelens

    2015-06-01

    Full Text Available A considerable number of young Europeans live or risk ending up in socially vulnerable situations. Different social channels (e.g., education, on the job training, leisure exist through which youths can enhance their chances to improve their social position. There is a growing belief that sports in particular can help personal and social development of socially vulnerable youths. Nevertheless, there is little understanding of the mechanisms through which sports can foster development. In addition to participating in sports, volunteering in sports is also regarded as providing developmental opportunities for socially vulnerable youths. Today, however, there is an underrepresentation of socially vulnerable youths in volunteering and volunteer training programs. A case study in Brussels was set up within a volunteer soccer training program focused on socially vulnerable youths. A qualitative research design was used to analyze developmental experiences of participants (n = 11 and program organizers (n = 3. The study also aimed to gain more insight into the mechanisms underlying the program. Participating youths indicated development in both technical and key competences. It is concluded that a systematic approach of the volunteer training program can play an important role in the development of competences of socially vulnerable youths both as a volunteer and an individual.

  4. Relationship between Community Collectivization and Financial Vulnerability of Female Sex Workers in Southern India.

    Directory of Open Access Journals (Sweden)

    Sangram Kishor Patel

    Full Text Available Studies exploring the linkages between financial vulnerabilities and community collectivization of female sex workers (FSWs are scarce in India despite having potential policy implications. To fill this gap in the literature, this study attempts to understand the financial vulnerabilities among FSWs and assess the relationship between community collectivization and financial vulnerabilities in southern India.Data were drawn from a cross-sectional, behavioral tracking survey (BTS-2014, conducted among FSWs (N = 2400 in Andhra Pradesh, a southern state of India under the Avahan-India AIDS initiative program. Adjusted odds ratios (AOR and their 95% confidence intervals (CI were estimated through multivariate logistic regression, to assess the independent relationships of the degree of community collectivization indicators with financial vulnerability indicators, adjusting for socio-demographic characteristics.Most FSWs (87% reported having either one or more financial vulnerability and nearly one-fifth had a high financial vulnerability. The risk of facing financial vulnerability was significantly lower among FSWs with a high degree of perceived collective efficacy (15% vs 31%; AOR: 0.4; 95% CI: 0.3-0.5 and collective agency (4% vs 21%; AOR: 0.2; 95% CI: 0.1-0.3 as compared to their respective counterparts, after controlling for their individual socio-demographic characteristics. FSWs with a high degree of collective efficacy are also less likely to report different components of financial vulnerability (e.g. income, saving, expenditure, and debt.This study finding suggests that community-led interventions such as improving collectivization are promising strategies to address financial vulnerabilities and a path to a sustainable reduction of HIV risk. This study calls for further evidence-based research and measurement of the effects of community-led approaches in addressing the financial vulnerabilities of the key population at risk for HIV.

  5. Relationship between Community Collectivization and Financial Vulnerability of Female Sex Workers in Southern India.

    Science.gov (United States)

    Patel, Sangram Kishor; Prabhakar, Parimi; Jain, Anrudh Kumar; Saggurti, Niranjan; Adhikary, Rajatashuvra

    2016-01-01

    Studies exploring the linkages between financial vulnerabilities and community collectivization of female sex workers (FSWs) are scarce in India despite having potential policy implications. To fill this gap in the literature, this study attempts to understand the financial vulnerabilities among FSWs and assess the relationship between community collectivization and financial vulnerabilities in southern India. Data were drawn from a cross-sectional, behavioral tracking survey (BTS)-2014, conducted among FSWs (N = 2400) in Andhra Pradesh, a southern state of India under the Avahan-India AIDS initiative program. Adjusted odds ratios (AOR) and their 95% confidence intervals (CI) were estimated through multivariate logistic regression, to assess the independent relationships of the degree of community collectivization indicators with financial vulnerability indicators, adjusting for socio-demographic characteristics. Most FSWs (87%) reported having either one or more financial vulnerability and nearly one-fifth had a high financial vulnerability. The risk of facing financial vulnerability was significantly lower among FSWs with a high degree of perceived collective efficacy (15% vs 31%; AOR: 0.4; 95% CI: 0.3-0.5) and collective agency (4% vs 21%; AOR: 0.2; 95% CI: 0.1-0.3) as compared to their respective counterparts, after controlling for their individual socio-demographic characteristics. FSWs with a high degree of collective efficacy are also less likely to report different components of financial vulnerability (e.g. income, saving, expenditure, and debt). This study finding suggests that community-led interventions such as improving collectivization are promising strategies to address financial vulnerabilities and a path to a sustainable reduction of HIV risk. This study calls for further evidence-based research and measurement of the effects of community-led approaches in addressing the financial vulnerabilities of the key population at risk for HIV.

  6. Modelling self-assessed vulnerability to HIV and its associated ...

    African Journals Online (AJOL)

    Background: Globally, individuals' self-assessment of vulnerability to HIV infection is important to maintain safer sexual behaviour and reduce risky behaviours. However, determinants of self-perceived risk of HIV infection are not well documented and differ. We assessed the level of self-perceived vulnerability to HIV ...

  7. POLITICS, JUSTICE AND THE VULNERABLE SUBJECT: THE CONTRIBUTION OF FEMINIST THOUGHT

    OpenAIRE

    Casalini, Brunella

    2016-01-01

    The present article argues that the main contribution of contemporary feminist theory on vulnerability stems from the distinction of two possible kinds of vulnerability: an ontological vulnerability and a vulnerability linked to various processes (social, cultural, economic and juridical) of vulnerabilisation. This contribution is not limited to the critical and deconstructive level. As a positive proposal, it advances in the direction of an individual which, recovering its own relational, em...

  8. Maintaining dignity in vulnerability

    DEFF Research Database (Denmark)

    Høy, Bente

    2016-01-01

    to understand the meaning of the narrated text. Results. The meaning of maintaining dignity was constituted in a sense of vulnerability to the self, and elucidated in three major interrelated themes: Being involved as a human being, being involved as the person one is and strives to become, and being involved...

  9. Social rank-associated stress vulnerability predisposes individuals to cocaine attraction.

    Science.gov (United States)

    Yanovich, Chen; Kirby, Michael L; Michaelevski, Izhak; Yadid, Gal; Pinhasov, Albert

    2018-01-29

    Studies of personality have suggested that dissimilarities in ability to cope with stressful situations results in differing tendency to develop addictive behaviors. The present study used selectively bred stress-resilient, socially-dominant (Dom) and stress-vulnerable, socially-submissive (Sub) mice to investigate the interaction between environmental stress and inbred predisposition to develop addictive behavior to cocaine. In a Conditioned Place Preference (CPP) paradigm using cocaine, Sub mice displayed an aversion to drug, whereas Dom mice displayed drug attraction. Following a 4-week regimen of Chronic Mild Stress (CMS), Sub mice in CPP displayed a marked increase (>400%) in cocaine attraction, whereas Dom mice did not differ in attraction from their non-stressed state. Examination of hippocampal gene expression revealed in Sub mice, exposure to external stimuli, stress or cocaine, increased CRH expression (>100%), which was evoked in Dom mice only by cocaine exposure. Further, stress-induced decreases in DRD1 (>60%) and DRD2 (>50%) expression in Sub mice differed markedly from a complete lack of change in Dom mice. From our findings, we propose that social stratification dictates vulnerability to stress-induced attraction that may lead to addiction via differential regulation of hippocampal response to dopaminergic input, which in turn may influence differing tendency to develop addictive behaviors.

  10. [Vulnerability to depression in children and adolescents: update and perspectives].

    Science.gov (United States)

    Purper-Ouakil, D; Michel, G; Mouren-Siméoni, M-C

    2002-01-01

    their predictive value for the onset of clinical depressive episodes needs further investigation. Familial and individual vulnerability is likely to heighten the depressogenic impact of life events and psycho-social adversity. Prevention interventions have been developed in the United States for children and adolescents at-risk for depression. In France, clinicians witness growing demands from families with affective illness concerned with risk of parent-child transmission of depressive vulnerability, prevention and early identification of symptoms. To meet this kind of emerging needs and to prevent family dysfunction, a preventive program targets offspring of depressed parents and uses clinician-based family approaches. Family and individual sessions aim a better understanding of illness experience and encourage the parents to identify and foster resilience in their children. Another type of preventive intervention focuses on children and adolescents with subclinical depressive symptoms, eventually associated with behavioral problems ou high level of parental conflict, recruited in school settings. These school-based interventions combine cognitive and social problem-solving techniques. Both familial and school-based preventive interventions have proven applicable and promising in high-risk children and adolescents. Perspectives are more systematic identification of risk groups, including youngsters with past or current non affective symptoms who might benefit from depression prevention, long-term evaluation and cross-cultural applications of prevention programs.

  11. Old age and vulnerability between first, second and third person perspectives. Ethnographic explorations of aging in contemporary Denmark.

    Science.gov (United States)

    Grøn, Lone

    2016-12-01

    This paper is based on an ethnographic fieldwork aimed at exploring ethnographically how vulnerability in old age is perceived and experienced in contemporary Denmark. The fieldwork showed remarkable differences between two phases of the fieldwork: the first addressing vulnerability from the "outside" through group interviews with professionals, leaders and older people who were not (yet) vulnerable; and the second from the "inside" through more in depth fieldwork with older people who in diverse ways could be seen as vulnerable. After a short introduction to anthropological and social gerontological literature on characteristics of "Western" aging: medicalization, successful, healthy and active aging, I present findings from both phases of this ethnographic fieldwork arguing that the ethnographic approach reveals the composite and complex nature of vulnerability in old age and the constant interactions between first, second and third person perspectives. Through these methodological and analytical moves a complex and empirically tenable understanding of vulnerability in old age has emerged which 1. moves beyond rigid dichotomies that have characterized the study of old age, 2. integrates individual experience, social interaction and the structural and discursive context into the analysis, and 3. reveals the complex interplay between vulnerability and agency in diverse situations and settings of old age. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  13. The Vulnerable Subject of Negligence Law

    OpenAIRE

    Stychin, C.

    2012-01-01

    The approach taken by English courts to the duty of care question in negligence has been subject to harsh criticism in recent years. This article examines this fundamental issue in tort law, drawing upon Canadian and Australian jurisprudence by way of comparison. From this analysis, the concept of vulnerability is developed as a productive means of understanding the duty of care. Vulnerability is of increasing interest in legal and political theory and it is of particular relevance to the law...

  14. Finding behavioral and network indicators of brain vulnerability

    Directory of Open Access Journals (Sweden)

    Nava eLevit Binnun

    2012-02-01

    Full Text Available Resilience research has usually focused on identifying protective factors associated with specific stress conditions (e.g., war, trauma or psychopathologies (e.g., post-traumatic stress disorder. Implicit in this research is the concept that resilience is a global construct, invariant to the unfavorable circumstances or the psychopathologies that may develop (i.e., the mechanisms underlying the resilience of an individual in all cases are expected to be similar. Here we contribute to the understanding of resilience—and its counterpart, vulnerability—by employing an approach that makes use of this invariant quality. We outline two main characteristics that we would expect from indicators of a vulnerable state: that they should appear across disorders regardless of specific circumstances, and that they should appear much before the disorder is evident. Next, we identify two sets of factors that exhibit this pattern of association with psychopathological states. The first was a set of low-level sensory, motor and regulatory irregularities that have been reported across the clinical literature; we suggest that these can serve as behavioral indicators of a vulnerable state. The second was the set of aberrations in network metrics that have been reported in the field of systems neuroscience; we suggest that these can serve as network indicators of a vulnerable state. Finally, we explore how behavioral indicators may be related to network indicators and discuss the clinical and research-related implications of our work.

  15. Culture, but more than culture: an exploratory study of the HIV vulnerability of Indian immigrants in Canada.

    Science.gov (United States)

    Zhou, Yanqiu Rachel; Majumdar, Basanti; Vattikonda, Natasha

    2016-09-01

    Explanations of immigrant health that ascribe to culture a fundamental causal role neglect the broader structural and contextual factors with which culture intersects. Based on a qualitative study of Indian immigrants' vulnerability to HIV in Canada, this paper presents a contextualised understanding of these individuals' understanding of, perceptions about, and responses to the HIV risk in their post-immigration lives. The study reveals that although culture - both traditional values and the norms of the diaspora community - appears to have constrained Indian immigrants' capacities to respond to the risk, this effect can be properly understood only by situating such constraint in the context of the settlement process that has shaped participants' living conditions, including their relationship with the diasporic community in Canada. We argue that HIV vulnerability should be conceptualised as a health inequality associated with broader systems of power relations (eg socio-economic marginalisation, gender inequality, discrimination, and racism). This more holistic conceptualisation of the intersection of culture, integration, and HIV vulnerability will facilitate exploration of HIV prevention strategies, through which interconnected inequalities of gender, race, and access to knowledge and resources can be challenged.

  16. Vulnerability and agency: beyond an irreconcilable dichotomy for social service providers working with young refugees in the UK.

    Science.gov (United States)

    O'Higgins, Aoife

    2012-01-01

    Many young refugees face significant difficulties in securing support from social services providers. This study invited 21 young refugees aged 16 to 21 to take part in focus groups and follow-up interviews about their experiences of accessing this support. The findings reveal that young refugees may deliberately conform to expectations about their vulnerability in order to benefit from greater support from service providers. Social workers may fail to consider young refugees' abilities and understand the ways in which each individual is vulnerable. The study suggests that group work may be an effective way to engage young refugees to overcome this. Copyright © 2012 Wiley Periodicals, Inc., A Wiley Company.

  17. Assessing the Agricultural Vulnerability for India under Changing Climate

    Science.gov (United States)

    Sharma, Tarul; Vardhan Murari, Harsha; Karmakar, Subhankar; Ghosh, Subimal; Singh, Jitendra

    2016-04-01

    Global climate change has proven to show majorly negative impacts for the far future. These negative impacts adversely affect almost all the fields including agriculture, water resources, tourism, and marine ecosystem. Among these, the effects on agriculture are considered to be of prime importance since its regional impacts can directly affect the global food security. Under such lines, it becomes essential to understand how climate change directs agricultural production for a region along with its vulnerability. In India, rice and wheat are considered as major staple diet and hence understanding its production loss/gain due to regional vulnerability to climate change becomes necessary. Here, an attempt has been made to understand the agricultural vulnerability for rice and wheat, considering yield as a function of temperature and precipitation during growing period. In order to accomplish this objective, the ratio of actual to potential evapo-transpiration has been considered which serves as a reliable indicator; with more this ratio towards unity, less vulnerable will be the region. The current objective needs an integration of climatic, hydrological and agricultural parameters; that can be achieved by simulating a climate data driven hydrologic (Variable Infiltration Capacity, VIC) model and a crop (Decision Support System for Agrotechnology Transfer, DSSAT) model. The proposed framework is an attempt to derive a crop vulnerability map that can facilitate in strategizing adaption practices which can reduce the adverse impacts of climate change in future.

  18. Economic development and declining vulnerability to climate-related disasters in China

    Science.gov (United States)

    Wu, Jidong; Han, Guoyi; Zhou, Hongjian; Li, Ning

    2018-03-01

    Exposure and vulnerability are the main contributing factors of growing impact from climate-related disasters globally. Understanding the spatiotemporal dynamic patterns of vulnerability is important for designing effective disaster risk mitigation and adaptation measures. At national scale, most cross-country studies have suggested that economic vulnerability to disasters decreases as income increases, especially for developing countries. Research covering sub-national climate-related natural disasters is indispensable to obtaining a comprehensive understanding of the effect of regional economic growth on vulnerability reduction. Taking China as a case, this subnational scale study shows that economic development is correlated with the significant reduction in human fatalities but increase in direct economic losses (DELs) from climate-related disasters since 1949. The long-term trend in climate-related disaster vulnerability, reflected by mortality (1978-2015) and DELs (1990-2015) as a share of the total population and Gross Domestic Product, has seen significant decline among all economic regions in China. While notable differences remain among its West, Central and East economic regions, the temporal vulnerability change has been converging. The study further demonstrated that economic development level is correlated with human and economic vulnerability to climate-related disasters, and this vulnerability decreased with the increase of per-capita income. This study suggested that economic development can have nuanced effects on overall human and economic vulnerability to climate-related disasters. We argue that climate change science needs to acknowledge and examine the different pathways of vulnerability effects related to economic development.

  19. Áreas vulnerables en el centro de Madrid

    Directory of Open Access Journals (Sweden)

    Agustín Hernández Aja

    2007-07-01

    This document shows an vulnerability analysis of the central area of Madrid taken it as the field of APE-00.01. Its objective is to delimit “vulnerable areas” so there can be evaluated the opportunities for interve trough them and then define the best tools in detriment of their vulnerability reasons. To determinate those areas we have developed a sociodemographic analysis where we have found those units of population with vulnerable values. Once determinated, we have synthetize them to define them as easy drafts that makes understandable the work area for later on establish a vulnerable areas catalogue with spatial homogeneity and significant size. The basic nucleus of the análisis has been the sociodemographic fact, based on homogeneus data sources for all the area so they could be referenced to specific spacial areas. In each case has been advised other possible indicators of vulnerability including a signifier selection of thrm on the fifth chapter.

  20. Global analysis of urban surface water supply vulnerability

    International Nuclear Information System (INIS)

    Padowski, Julie C; Gorelick, Steven M

    2014-01-01

    This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)

  1. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  2. Human Rights and Vulnerability. Examples of Sexism and Ageism

    Directory of Open Access Journals (Sweden)

    Mª DEL CARMEN BARRANCO AVILÉS

    2015-12-01

    Full Text Available A human rights based approach applied to the idea of ‘vulnerable group’ connects vulnerability and structural discrimination. The Convention on the Rights of Persons with Disability provides some elements that allow to state that we are facing a new paradigm in the International Human Rights Law. One of the keys for the understanding of this new framework is the assumption of the disadvantage related to vulnerability as, at least in a part, socially built and ideologically justified. Sexism and ageism are examples of how ideologies reinforce vulnerability of women, children and aged persons transforming them in groups which members are in risk of discrimination.

  3. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

  4. The changing climate and human vulnerability in north-central Namibia

    Directory of Open Access Journals (Sweden)

    Margaret N. Angula

    2016-01-01

    Full Text Available North-central Namibia is more vulnerable to effects of climate change and variability. Combined effects of environmental degradation, social vulnerability to poverty and a changing climate will compromise subsistence farming in north-central Namibia (NCN. This will make subsistence and small-scale farmers in the region more vulnerable to projected changes in the climate system. Thus, the aim of this article was to examine factors contributing to subsistence farmers’ vulnerability to impacts of climate change. The article further discusses different aspects of human vulnerability and existing adaptation strategies in response to impacts of climate related disasters experienced over the past three to four decades in NCN. Qualitative and quantitative research approaches and methodology were employed to obtain information from subsistence farmers in north-central Namibia. The sociodemographic characteristics of Ohangwena, Oshana and Omusati Region reveals high levels of unemployment, high adult and elderly population and high dependency on agricultural livelihood system. These indicators help understand levels of household vulnerability. The study concludes that households interviewed revealed low levels of adaptive capacity due to exposure to climate risks and combined effects of social, political and cultural factors. This article provided an understanding that is required to inform the adaptation pathways relevant for NCN.

  5. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  6. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  7. Air pollution and vulnerability of exposed individuals: the case of downtown Medellín

    Directory of Open Access Journals (Sweden)

    Gabriel J. González

    2012-02-01

    Full Text Available The presence of respiratory problems in high level pollution areas is linked to factors such as exposure, susceptibility, and social coping. Objective: To present statistical evidence regarding the relationship between the probability of experiencing symptoms or contracting a respiratory disease and factors such as exposure to pollution, susceptibility, and social coping among people inhabiting areas with particulate matter pollution. Methodology: The study used unique information collected from a survey conducted on 1000 people in downtown Medellin who were exposed to this problem. This information was used to perform a descriptive statistic analysis and to build 27 probit models. The dependent variables were: the patient has a symptom or disease –emf-, the patient has a symptom –leve-, and the patient has a respiratory disease –grave-. Results: The results evidence that exposure is a key variable affecting the presence of respiratory symptoms or diseases (vulnerability; however, exposed individuals may also experience health problems not only due to air pollution per se, but also to implicit personal and social conditions.

  8. Individual Differences and Social Influences on the Neurobehavioral Pharmacology of Abused Drugs

    Science.gov (United States)

    Neisewander, J. L.; Kelly, T. H.

    2013-01-01

    The interaction of drugs with biologic targets is a critical area of research, particularly for the development of medications to treat substance use disorders. In addition to understanding these drug-target interactions, however, there is a need to understand more fully the psychosocial influences that moderate these interactions. The first section of this review introduces some examples from human behavioral pharmacology that illustrate the clinical importance of this research. The second section covers preclinical evidence to characterize some of the key individual differences that alter drug sensitivity and abuse vulnerability, related primarily to differences in response to novelty and impulsivity. Evidence is presented to indicate that critical neuropharmacological mechanisms associated with these individual differences involve integrated neurocircuits underlying stress, reward, and behavioral inhibitory processes. The third section covers social influences on drug abuse vulnerability, including effects experienced during infancy, adolescence, and young adulthood, such as maternal separation, housing conditions, and social interactions (defeat, play, and social rank). Some of the same neurocircuits involved in individual differences also are altered by social influences, although the precise neurochemical and cellular mechanisms involved remain to be elucidated fully. Finally, some speculation is offered about the implications of this research for the prevention and treatment of substance abuse. PMID:23343975

  9. Landslides in everyday life: An interdisciplinary approach to understanding vulnerability in the Himalayas

    Science.gov (United States)

    Sudmeier-Rieux, K.; Breguet, A.; Dubois, J.; Jaboyedoff, M.

    2009-04-01

    Several thousand landslides were triggered by the Kashmir earthquake, scarring the hillside with cracks. Monsoon rains continue to trigger landslides, which have increased the exposure of populations because of lost agricultural lands, blocked roads and annual fatalities due to landslides. The great majority of these landslides are shallow and relatively small but greatly impacting the population. In this region, landslides were a factor before the earthquake, mainly due to road construction and gravel excavation, but the several thousand landslides triggered by the earthquake have completely overwhelmed the local population and authorities. In Eastern Nepal, the last large earthquake to hit this region occurred in 1988, also triggering numerous landslides and cracks. Here, landslides can be considered a more common phenomenon, yet coping capacities amount to local observations of landslide movement, subsequent abandonment of houses and land as they become too dangerous. We present a comparative case study from Kashmir, Pakistan and Eastern Nepal, highlighting an interdisciplinary approach to understanding the complex interactions between land use, landslides and vulnerability. Our approach sets out to understand underlying causes of the massive landslides triggered by the 2005 earthquake in Kashmir, Pakistan, and also the increasing number of landslides in Nepal. By approaching the issue of landslides from multiple angles (risk perceptions, land use, local coping capacities, geological assessment, risk mapping) and multiple research techniques (remote sensing, GIS, geological assessment, participatory mapping, focus groups) we are better able to create a more complete picture of the "hazardscape". We find that by combining participatory social science research with hazard mapping, we obtain a more complete understanding of underlying causes, coping strategies and possible mitigation options, placing natural hazards in the context of everyday life. This method is

  10. The role of stable housing as a determinant of poverty-related quality of life in vulnerable individuals.

    Science.gov (United States)

    Baumstarck, Karine; Boyer, Laurent; Auquier, Pascal

    2015-10-01

    The aim of this study was to identify potential socio-demographic and socio-economic determinants associated with quality of life (QoL) in impoverished individuals admitted in emergency departments (EDs) using a self-administered multidimensional poverty-related QoL questionnaire (PQoL) and a generic QoL questionnaire (Duke). cross-sectional study. Ten EDs in France. All participants included in this study lived in impoverished conditions. We collected socio-demographic information, economic data, and data related to the ED visit. Multiple linear regressions were performed to determine which variables were linked to QoL scores. Three-hundred and eighty-seven individuals were enrolled, and 378 (98%) responded to the QoL questionnaires. PQoL was significantly lower for single individuals (β from -0.15 to -0.23), without a stable home (β from -0.17 to -0.34) and individuals without general health coverage (β = 0.20). Compared with men, women reported lower scores in the psychological well-being dimension (β = -0.19) and higher scores in the relationships with friends dimension (β = 0.17). Not having stable housing was the most important factor associated with low QoL in impoverished people. This finding demonstrates the need for support from policymakers at the national and local levels for these vulnerable populations. © The Author 2015. Published by Oxford University Press in association with the International Society for Quality in Health Care; all rights reserved.

  11. An Extreme-Value Approach to Anomaly Vulnerability Identification

    Science.gov (United States)

    Everett, Chris; Maggio, Gaspare; Groen, Frank

    2010-01-01

    The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

  12. Spatially Representing Vulnerability to Extreme Rain Events Using Midwestern Farmers' Objective and Perceived Attributes of Adaptive Capacity.

    Science.gov (United States)

    Gardezi, Maaz; Arbuckle, J Gordon

    2017-11-29

    Potential climate-change-related impacts to agriculture in the upper Midwest pose serious economic and ecological risks to the U.S. and the global economy. On a local level, farmers are at the forefront of responding to the impacts of climate change. Hence, it is important to understand how farmers and their farm operations may be more or less vulnerable to changes in the climate. A vulnerability index is a tool commonly used by researchers and practitioners to represent the geographical distribution of vulnerability in response to global change. Most vulnerability assessments measure objective adaptive capacity using secondary data collected by governmental agencies. However, other scholarship on human behavior has noted that sociocultural and cognitive factors, such as risk perceptions and perceived capacity, are consequential for modulating people's actual vulnerability. Thus, traditional assessments can potentially overlook people's subjective perceptions of changes in climate and extreme weather events and the extent to which people feel prepared to take necessary steps to cope with and respond to the negative effects of climate change. This article addresses this knowledge gap by: (1) incorporating perceived adaptive capacity into a vulnerability assessment; (2) using spatial smoothing to aggregate individual-level vulnerabilities to the county level; and (3) evaluating the relationships among different dimensions of adaptive capacity to examine whether perceived capacity should be integrated into vulnerability assessments. The result suggests that vulnerability assessments that rely only on objective measures might miss important sociocognitive dimensions of capacity. Vulnerability indices and maps presented in this article can inform engagement strategies for improving environmental sustainability in the region. © 2017 Society for Risk Analysis.

  13. How to simulate pedestrian behaviors in seismic evacuation for vulnerability reduction of existing buildings

    Science.gov (United States)

    Quagliarini, Enrico; Bernardini, Gabriele; D'Orazio, Marco

    2017-07-01

    Understanding and representing how individuals behave in earthquake emergencies would be essentially to assess the impact of vulnerability reduction strategies on existing buildings in seismic areas. In fact, interactions between individuals and the scenario (modified by the earthquake occurrence) are really important in order to understand the possible additional risks for people, especially during the evacuation phase. The current approach is based on "qualitative" aspects, in order to define best practice guidelines for Civil Protection and populations. On the contrary, a "quantitative" description of human response and evacuation motion in similar conditions is urgently needed. Hence, this work defines the rules for pedestrians' earthquake evacuation in urban scenarios, by taking advantages of previous results of real-world evacuation analyses. In particular, motion laws for pedestrians is defined by modifying the Social Force model equation. The proposed model could be used for evaluating individuals' evacuation process and so for defining operative strategies for interferences reduction in critical urban fabric parts (e.g.: interventions on particular buildings, evacuation strategies definition, city parts projects).

  14. Variations in population vulnerability to tectonic and landslide-related tsunami hazards in Alaska

    Science.gov (United States)

    Wood, Nathan J.; Peters, Jeff

    2015-01-01

    Effective tsunami risk reduction requires an understanding of how at-risk populations are specifically vulnerable to tsunami threats. Vulnerability assessments primarily have been based on single hazard zones, even though a coastal community may be threatened by multiple tsunami sources that vary locally in terms of inundation extents and wave arrival times. We use the Alaskan coastal communities of Cordova, Kodiak, Seward, Valdez, and Whittier (USA), as a case study to explore population vulnerability to multiple tsunami threats. We use anisotropic pedestrian evacuation models to assess variations in population exposure as a function of travel time out of hazard zones associated with tectonic and landslide-related tsunamis (based on scenarios similar to the 1964 M w9.2 Good Friday earthquake and tsunami disaster). Results demonstrate that there are thousands of residents, employees, and business customers in tsunami hazard zones associated with tectonically generated waves, but that at-risk individuals will likely have sufficient time to evacuate to high ground before waves are estimated to arrive 30–60 min after generation. Tsunami hazard zones associated with submarine landslides initiated by a subduction zone earthquake are smaller and contain fewer people, but many at-risk individuals may not have enough time to evacuate as waves are estimated to arrive in 1–2 min and evacuations may need to occur during earthquake ground shaking. For all hazard zones, employees and customers at businesses far outnumber residents at their homes and evacuation travel times are highest on docks and along waterfronts. Results suggest that population vulnerability studies related to tsunami hazards should recognize non-residential populations and differences in wave arrival times if emergency managers are to develop realistic preparedness and outreach efforts.

  15. Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches

    Science.gov (United States)

    Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea

    2017-04-01

    Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial

  16. Respect for Human Vulnerability: The Emergence of a New Principle in Bioethics.

    Science.gov (United States)

    ten Have, Henk

    2015-09-01

    Vulnerability has become a popular though controversial topic in bioethics, notably since 2000. As a result, a common body of knowledge has emerged (1) distinguishing between different types of vulnerability, (2) criticizing the categorization of populations as vulnerable, and (3) questioning the practical implications. It is argued that two perspectives on vulnerability, i.e., the philosophical and political, pose challenges to contemporary bioethics discourse: they re-examine the significance of human agency, the primacy of the individual person, and the negativity of vulnerability. As a phenomenon of globalization, vulnerability can only be properly addressed in a global bioethics that takes the social dimension of human existence seriously.

  17. Lack of Knowledge Sharing Amongst Institutions in Denmark Responsible for Vulnerable Groups

    DEFF Research Database (Denmark)

    Bojsen, Ann Kristina Mikkelsen

    they share their knowledge about risk and policy management. In order to protect vulnerable groups such as children, disabled, sick and elderly people, we need to learn more about the general risk understanding and sharing of such according to region, responsibility, common events and hazards....... This information is needed to protect against future unintentional and intentional hazards and compare those with the institutional responsibilities. Risk understanding and knowledge sharing among professionals with responsibility for vulnerable groups can be a crucial tool for handling everyday threats as well......Lack of Knowledge Sharing Amongst Institutions in Denmark Responsible for Vulnerable Groups Ann Bojsen, Senior Lecturer Emergency and Risk Management Department, Metropolitan University College, Copenhagen, Denmark Even though understanding risk and how it is enacted is regarded as a crucial step...

  18. Assessing intrinsic and specific vulnerability models ability to indicate groundwater vulnerability to groups of similar pesticides: A comparative study

    Science.gov (United States)

    Douglas, Steven; Dixon, Barnali; Griffin, Dale W.

    2018-01-01

    With continued population growth and increasing use of fresh groundwater resources, protection of this valuable resource is critical. A cost effective means to assess risk of groundwater contamination potential will provide a useful tool to protect these resources. Integrating geospatial methods offers a means to quantify the risk of contaminant potential in cost effective and spatially explicit ways. This research was designed to compare the ability of intrinsic (DRASTIC) and specific (Attenuation Factor; AF) vulnerability models to indicate groundwater vulnerability areas by comparing model results to the presence of pesticides from groundwater sample datasets. A logistic regression was used to assess the relationship between the environmental variables and the presence or absence of pesticides within regions of varying vulnerability. According to the DRASTIC model, more than 20% of the study area is very highly vulnerable. Approximately 30% is very highly vulnerable according to the AF model. When groundwater concentrations of individual pesticides were compared to model predictions, the results were mixed. Model predictability improved when concentrations of the group of similar pesticides were compared to model results. Compared to the DRASTIC model, the AF model more accurately predicts the distribution of the number of contaminated wells within each vulnerability class.

  19. Individual vulnerability to insomnia, excessive sleepiness and shift work disorder amongst healthcare shift workers. A systematic review.

    Science.gov (United States)

    Booker, Lauren A; Magee, Michelle; Rajaratnam, Shantha M W; Sletten, Tracey L; Howard, Mark E

    2018-03-27

    Shift workers often experience reduced sleep quality, duration and/or excessive sleepiness due to the imposed conflict between work and their circadian system. About 20-30% of shift workers experience prominent insomnia symptoms and excessive daytime sleepiness consistent with the circadian rhythm sleep disorder known as shift work disorder. Individual factors may influence this vulnerability to shift work disorder or sleep-related impairment associated with shift work. This paper was registered with Prospero and was conducted using recommended standards for systematic reviews and meta-analyses. Published literature that measured sleep-related impairment associated with shift work including reduced sleep quality and duration and increased daytime sleepiness amongst healthcare shift workers and explored characteristics associated with individual variability were reviewed. Fifty-eight studies were included. Older age, morning-type, circadian flexibility, being married or having children, increased caffeine intake, higher scores on neuroticism and lower on hardiness were related to a higher risk of sleep-related impairment in response to shift work, whereas physical activity was a protective factor. The review highlights the diverse range of measurement tools used to evaluate the impact of shift work on sleep. Use of standardised and validated tools would enable cross-study comparisons. Longitudinal studies are required to establish causal relationships between individual factors and the development of shift work disorder. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Recognizing Risk and Vulnerability in Research Ethics: Imagining the "What Ifs?"

    Science.gov (United States)

    Peter, Elizabeth; Friedland, Judith

    2017-04-01

    Research ethics committees (RECs) may misunderstand the vulnerability of participants, given their distance from the field. What RECs identify as the vulnerabilities that were not adequately recognized in protocols and how they attempt to protect the perceived vulnerability of participants and mitigate risks were examined using the response letters sent to researchers by three university-based RECs. Using a critical qualitative method informed by feminist ethics, we identified an overarching theme of recognizing and responding to cascading vulnerabilities and four subthemes: identifying vulnerable groups, recognizing potentially risky research, imagining the "what ifs," and mitigating perceived risks. An ethics approach that is up-close, as opposed to distant, is needed to foster closer relationships among participants, researchers, and RECs and to understand participant vulnerability and strength better.

  1. Perspectives on plant vulnerabilities ampersand other plant and containment improvements

    International Nuclear Information System (INIS)

    LaChance, J.; Kolaczkowski, A.; Kahn, J.

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed

  2. Inflammation and vascular remodeling in the ventral hippocampus contributes to vulnerability to stress.

    Science.gov (United States)

    Pearson-Leary, J; Eacret, D; Chen, R; Takano, H; Nicholas, B; Bhatnagar, S

    2017-06-27

    During exposure to chronic stress, some individuals engage in active coping behaviors that promote resiliency to stress. Other individuals engage in passive coping that is associated with vulnerability to stress and with anxiety and depression. In an effort to identify novel molecular mechanisms that underlie vulnerability or resilience to stress, we used nonbiased analyses of microRNAs in the ventral hippocampus (vHPC) to identify those miRNAs differentially expressed in active (long-latency (LL)/resilient) or passive (short-latency (SL)/vulnerable) rats following chronic social defeat. In the vHPC of active coping rats, miR-455-3p level was increased, while miR-30e-3p level was increased in the vHPC of passive coping rats. Pathway analyses identified inflammatory and vascular remodeling pathways as enriched by genes targeted by these microRNAs. Utilizing several independent markers for blood vessels, inflammatory processes and neural activity in the vHPC, we found that SL/vulnerable rats exhibit increased neural activity, vascular remodeling and inflammatory processes that include both increased blood-brain barrier permeability and increased number of microglia in the vHPC relative to control and resilient rats. To test the relevance of these changes for the development of the vulnerable phenotype, we used pharmacological approaches to determine the contribution of inflammatory processes in mediating vulnerability and resiliency. Administration of the pro-inflammatory cytokine vascular endothelial growth factor-164 increased vulnerability to stress, while the non-steroidal anti-inflammatory drug meloxicam attenuated vulnerability. Collectively, these results show that vulnerability to stress is determined by a re-designed neurovascular unit characterized by increased neural activity, vascular remodeling and pro-inflammatory mechanisms in the vHPC. These results suggest that dampening inflammatory processes by administering anti-inflammatory agents reduces

  3. When he is "tied": power, vulnerability, and embodied masculinity in Egypt.

    Science.gov (United States)

    Ghannam, Farha

    2017-10-01

    This paper looks at the notion of rabt [tying], the inability of the groom to engage in penetrative intercourse on the wedding night, to explore the relationship between masculinity, embodiment, and sexual performance. Drawing on ethnographic fieldwork in Egypt between 1993 and 2015, this paper explores the notion of groom rabt, how it is socially defined and managed. After presenting my conceptual framework for the study of sexuality and embodiment, the paper moves to discuss the meaning of the wedding night; the social clues people draw on when they identify rabt; how these clues relate different events to the (in)abilities of the groom; and how women, particularly mothers, work to protect and heal their male relatives from this affliction. To understand moments when individuals are unable, or "fail," to produce desirable physical and social effects, it is important that we do not exclusively consider the individual sexed body - the body that is clearly defined, bounded, and invested with unique desires and feelings. We must also consider the broader configurations that connect different bodies, endow them with certain meanings, and produce their materiality. My discussion shows that our understanding of sexuality and reproductive health will continue to be limited if we consider only men or women as separate individuals or as autonomous couples. Exploring moments of biological-social vulnerability, such as rabt, and how they relate to broader projects of gendering helps us understand issues linked to reproductive health and sexual rights in a deeper sense.

  4. Humor Style and Motor Skills: Understanding Vulnerability to Bullying

    Directory of Open Access Journals (Sweden)

    Stephanie Plenty

    2014-08-01

    Full Text Available The purpose of this study was to examine the role of humor style and motor skills in vulnerability to bullying. 729 adults responded to the Humor Style Questionnaire (HSQ and items retrospectively addressing their motor skills and bullying experiences during childhood. Consistent with recent research, poorer motor skills were associated with a greater extent of having been bullied. An association between stronger motor skills and affiliative humor was found, lending support to a shared biological basis theory underlying social and motor competency processes. Most importantly, being bullied was associated with higher self-defeating humor and lower affiliative humor. This supports earlier theoretical work by Klein and Kuiper (2006 and highlights the role that humor styles play in social interactions that can promote positive peer acceptance and wellbeing.

  5. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore

    Science.gov (United States)

    Rayl, Nathaniel; Bastille-Rousseau, Guillaume; Organ, John F.; Mumma, Matthew; Mahoney, Shane P.; Soulliere, Colleen; Lewis, Keith; Otto, Robert; Murray, Dennis; Waits, Lisette; Fuller, Todd

    2018-01-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator–prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves).During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined.As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per‐capita rate at which bears killed calves followed a type‐I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves.Our results reveal that

  6. Comparison and Evaluation of Global Scale Studies of Vulnerability and Risks to Climate Change

    Science.gov (United States)

    Muccione, Veruska; Allen, Simon K.; Huggel, Christian; Birkmann, Joern

    2015-04-01

    Understanding the present and future distribution of different climate change impacts and vulnerability to climate change is a central subject in the context of climate justice and international climate policy. Commonly, it is claimed that poor countries that contributed little to anthropogenic climate change are those most affected and most vulnerable to climate change. Such statements are backed by a number of global-scale vulnerability studies, which identified poor countries as most vulnerable. However, some studies have challenged this view, likewise highlighting the high vulnerability of richer countries. Overall, no consensus has been reached so far about which concept of vulnerability should be applied and what type of indicators should be considered. Furthermore, there is little agreement which specific countries are most vulnerable. This is a major concern in view of the need to inform international climate policy, all the more if such assessments should contribute to allocate climate adaptation funds as was invoked at some instances. We argue that next to the analysis of who is most vulnerable, it is also important to better understand and compare different vulnerability profiles assessed in present global studies. We perform a systematic literature review of global vulnerability assessments with the scope to highlight vulnerability distribution patterns. We then compare these distributions with global risk distributions in line with revised and adopted concepts by most recent IPCC reports. It emerges that improved differentiation of key drivers of risk and the understanding of different vulnerability profiles are important contributions, which can inform future adaptation policies at the regional and national level. This can change the perspective on, and basis for distributional issues in view of climate burden share, and therefore can have implications for UNFCCC financing instruments (e.g. Green Climate Fund). However, in order to better compare

  7. A Temporal Assessment of Barrier Island Vulnerability to Extreme Wave Events, Virginia Coast Reserve

    Science.gov (United States)

    Oster, D. J.; Moore, L. J.; Doran, K. J.; Stockdon, H. F.

    2010-12-01

    last 10 years. Potentially evolving long-term trends in island vulnerability appear to be difficult to detect, likely due to the short time window of analysis and the preferential capture of short-term variations as two out of the four lidar data sets were collected immediately following a storm event. Further statistical analysis of changes in frontal dune height (DHIGH) and the distance between the dune toe (DLOW) and shoreline will provide insight into short-term responses to individual storms as well as the potential for future long-term changes in barrier island vulnerability, contributing to a better understanding of barrier island response to rising seas and severe storms.

  8. Understanding spatial connectivity of individuals with non-uniform population density.

    Science.gov (United States)

    Wang, Pu; González, Marta C

    2009-08-28

    We construct a two-dimensional geometric graph connecting individuals placed in space within a given contact distance. The individuals are distributed using a measured country's density of population. We observe that while large clusters (group of individuals connected) emerge within some regions, they are trapped in detached urban areas owing to the low population density of the regions bordering them. To understand the emergence of a giant cluster that connects the entire population, we compare the empirical geometric graph with the one generated by placing the same number of individuals randomly in space. We find that, for small contact distances, the empirical distribution of population dominates the growth of connected components, but no critical percolation transition is observed in contrast to the graph generated by a random distribution of population. Our results show that contact distances from real-world situations as for WIFI and Bluetooth connections drop in a zone where a fully connected cluster is not observed, hinting that human mobility must play a crucial role in contact-based diseases and wireless viruses' large-scale spreading.

  9. Sea-level rise: towards understanding local vulnerability

    Science.gov (United States)

    Rahmstorf, Stefan

    2012-06-01

    , experts are increasingly looking at its potential impacts on coasts to facilitate local adaptation planning. This is a more complex issue than one might think, because different stretches of coast can be affected in very different ways. First of all, the sea-level response to global warming will not be globally uniform, since factors like changes in ocean currents (Levermann et al 2005) and the changing gravitational pull of continental ice (Mitrovica et al 2001) affect the local rise. Secondly, superimposed on the climatic trend is natural variability in sea level, which regionally can be as large as the climatic signal on multi-decadal timescales. Over the past decades, sea level has dropped in sizable parts of the world ocean, although it has of course risen in global mean (IPCC 2007). Thirdly, local land uplift or subsidence affects the local sea-level change relative to the coast, both for natural reasons (post-glacial isostatic adjustment centred on regions that were covered by ice sheets during the last ice age) and artificial ones (e.g., extraction of water or oil as in the Gulf of Mexico). Finally, local vulnerability to sea-level rise depends on many factors. Two interesting new studies in this journal (Tebaldi et al 2012, Strauss et al 2012) make important steps towards understanding sea-level vulnerability along the coasts of the United States, with methods that could also be applied elsewhere. The first, by Strauss and colleagues, merges high-resolution topographic data and a newly available tidal model together with population and housing data in order to estimate what land area and population would be at risk given certain increments in sea level. The results are mapped and tabulated at county and city level. They reveal the 'hot spots' along the US coast where sea-level rise is of the highest concern because of large populations living near the high-tide line: New York City and Long Island; the New Jersey shore; the Norfolk, Virginia, area; near Charleston

  10. Career Development Practitioners as Advocates for Transgender Individuals: Understanding Gender Transition

    Science.gov (United States)

    Sangganjanavanich, Varunee Faii

    2009-01-01

    Assisting transgender individuals is a concern for career development practitioners because there is a lack of knowledge on this topic. The complexity of gender reassignment surgery brings challenges and unique needs to this population, throughout gender transition, and requires career development practitioners to understand these challenges and…

  11. Individual differences in learning predict the return of fear.

    Science.gov (United States)

    Gershman, Samuel J; Hartley, Catherine A

    2015-09-01

    Using a laboratory analogue of learned fear (Pavlovian fear conditioning), we show that there is substantial heterogeneity across individuals in spontaneous recovery of fear following extinction training. We propose that this heterogeneity might stem from qualitative individual differences in the nature of extinction learning. Whereas some individuals tend to form a new memory during extinction, leaving their fear memory intact, others update the original threat association with new safety information, effectively unlearning the fear memory. We formalize this account in a computational model of fear learning and show that individuals who, according to the model, are more likely to form new extinction memories tend to show greater spontaneous recovery compared to individuals who appear to only update a single memory. This qualitative variation in fear and extinction learning may have important implications for understanding vulnerability and resilience to fear-related psychiatric disorders.

  12. Individual variation in resisting temptation: implications for addiction

    Science.gov (United States)

    Saunders, Benjamin T.; Robinson, Terry E.

    2013-01-01

    When exposed to the sights, sounds, smells and/or places that have been associated with rewards, such as food or drugs, some individuals have difficulty resisting the temptation to seek out and consume them. Others have less difficulty restraining themselves. Thus, Pavlovian reward cues may motivate maladaptive patterns of behavior to a greater extent in some individuals than in others. We are just beginning to understand the factors underlying individual differences in the extent to which reward cues acquire powerful motivational properties, and therefore, the ability to act as incentive stimuli. Here we review converging evidence from studies in both human and non-human animals suggesting that a subset of individuals are more “cue reactive”, in that certain reward cues are more likely to attract these individuals to them and motivate actions to get them. We suggest that those individuals for whom Pavlovian reward cues become especially powerful incentives may be more vulnerable to impulse control disorders, such as binge eating and addiction. PMID:23438893

  13. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  14. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  15. Using Bayesian networks to assess the vulnerability of Hawaiian terrestrial biota to climate change

    Science.gov (United States)

    Fortini, L.; Jacobi, J.; Price, J.; Vorsino, A.; Paxton, E.; Amidon, F.; 'Ohukani'ohi'a Gon, S., III; Koob, G.; Brink, K.; Burgett, J.; Miller, S.

    2012-12-01

    As the effects of climate change on individual species become increasingly apparent, there is a clear need for effective adaptation planning to prevent an increase in species extinctions worldwide. Given the limited understanding of species responses to climate change, vulnerability assessments and species distribution models (SDMs) have been two common tools used to jump-start climate change adaptation efforts. However, although these two approaches generally serve the same purpose of understanding species future responses to climate change, they have rarely mixed. In collaboration with research and management partners from federal, state and non-profit organizations, we are conducting a climate change vulnerability assessment for hundreds of plant and forest bird species of the Main Hawaiian Islands. This assessment is the first to comprehensively consider the potential threats of climate change to a significant portion of Hawaii's fauna and flora (over one thousand species considered) and thus fills a critical gap defined by natural resource scientists and managers in the region. We have devised a flexible approach that effectively integrates species distribution models into a vulnerability assessment framework that can be easily updated with improved models and data. This tailors our assessment approach to the Pacific Island reality of often limited and fragmented information on species and large future climate uncertainties, This vulnerability assessment is based on a Bayesian network-based approach that integrates multiple landscape (e.g., topographic diversity, dispersal barriers), species trait (e.g., generation length, fecundity) and expert-knowledge based information (e.g., capacity to colonize restored habitat) relevant to long-term persistence of species under climate change. Our presentation will highlight some of the results from our assessment but will mainly focus on the utility of the flexible approach we have developed and its potential

  16. Understanding physical activity in individuals with prediabetes: an application of social cognitive theory.

    Science.gov (United States)

    Taylor, Lorian M; Raine, Kim D; Plotnikoff, Ronald C; Vallance, Jeff K; Sharma, Arya M; Spence, John C

    2016-01-01

    Despite well-documented evidence implicating physical activity (PA) in the prevention of type 2 diabetes, the overwhelming majority of individuals with prediabetes are not physically active enough. The purpose of this study was to investigate the applicability of the social cognitive theory (SCT) in understanding PA behaviour in individuals with prediabetes. Individuals with prediabetes (N = 232) completed a mailed questionnaire assessing demographics, self-reported PA (MET.min/wk) and SCT constructs for PA MET.min/wk. For PA MET.min/wk, scheduling and task efficacy both had significant effects on PA (β = .30 and .22, respectively). Goal formation also had a direct effect on PA for scheduling, coping and task efficacy (β = .20, .34 and .30, respectively). Task, coping and scheduling efficacy explained a significant portion of the variance in PA behaviour. Overall, SCT appears to have merit as a model for understanding PA in individuals with prediabetes. Further evaluative inquiry is needed to establish support for the use of the SCT as a framework for developing, implementing and evaluating PA behaviour change interventions in this population.

  17. Individual differences in children's understanding of inversion and arithmetical skill.

    Science.gov (United States)

    Gilmore, Camilla K; Bryant, Peter

    2006-06-01

    Background and aims. In order to develop arithmetic expertise, children must understand arithmetic principles, such as the inverse relationship between addition and subtraction, in addition to learning calculation skills. We report two experiments that investigate children's understanding of the principle of inversion and the relationship between their conceptual understanding and arithmetical skills. A group of 127 children from primary schools took part in the study. The children were from 2 age groups (6-7 and 8-9 years). Children's accuracy on inverse and control problems in a variety of presentation formats and in canonical and non-canonical forms was measured. Tests of general arithmetic ability were also administered. Children consistently performed better on inverse than control problems, which indicates that they could make use of the inverse principle. Presentation format affected performance: picture presentation allowed children to apply their conceptual understanding flexibly regardless of the problem type, while word problems restricted their ability to use their conceptual knowledge. Cluster analyses revealed three subgroups with different profiles of conceptual understanding and arithmetical skill. Children in the 'high ability' and 'low ability' groups showed conceptual understanding that was in-line with their arithmetical skill, whilst a 3rd group of children had more advanced conceptual understanding than arithmetical skill. The three subgroups may represent different points along a single developmental path or distinct developmental paths. The discovery of the existence of the three groups has important consequences for education. It demonstrates the importance of considering the pattern of individual children's conceptual understanding and problem-solving skills.

  18. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  19. Same-sex attraction: a model to aid nurses' understanding.

    Science.gov (United States)

    Richardson, Brian

    2009-12-01

    Young people attracted to people of their own sex are at risk of bullying and discrimination. It is often difficult for them to find support. Either emotionally or in relation to their health needs. This article explores a model to aid nurses in understanding the process individuals go through before coming to terms with their sexuality. The model also outlines the steps that nurses can take to enhance the care they provide for this vulnerable group of patients and clients.

  20. Socially Vulnerable Young People in Flemish Sports Clubs: Investigating Youth Experiences

    Science.gov (United States)

    Haudenhuyse, Reinhard; Theeboom, Marc; Nols, Zeno; Coussée, Filip

    2014-01-01

    Sport appears to present a powerful tool for engaging socially vulnerable youth in an organised context, which offers an opportunity to work with them. However, we have little understanding regarding participation of socially vulnerable young people in the "traditional" sport sector (i.e. sports clubs). Nor do we have sufficient insights…

  1. Assessing local vulnerability to climate change in Ecuador.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.

  2. Specific vulnerability of face perception to noise: a similar effect in schizophrenia patients and healthy individuals.

    Science.gov (United States)

    Chen, Yue; McBain, Ryan; Norton, Daniel

    2015-02-28

    Face perception plays a foundational role in the social world. This perceptual ability is deficient in schizophrenia. A noise-filtering mechanism is essential for perceptual processing. It remains unclear as to whether a specific noise-filtering mechanism is implicated in the face perception problem or a general noise-filtering mechanism is involved which also mediates non-face visual perception problems associated with this psychiatric disorder. This study examined and compared the effects of external noise on the performance of face discrimination and car discrimination in schizophrenia patients (n=25) and healthy controls (n=27). Superimposing the external visual noise on face or car stimuli elevated perceptual thresholds (i.e. degraded performance levels) for both face and car discrimination. However, the effect of noise was significantly larger on face than on car discrimination, both in patients and controls. This pattern of results suggests specific vulnerability of face processing to noise in healthy individuals and those with schizophrenia. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  3. Sources of Individual Differences in Children’s Understanding of Fractions

    OpenAIRE

    Vukovic, Rose K.; Fuchs, Lynn S.; Geary, David C.; Jordan, Nancy C.; Gersten, Russell; Siegler, Robert S.

    2014-01-01

    Longitudinal associations of domain-general and numerical competencies with individual differences in children’s understanding of fractions were investigated. Children (n = 163) were assessed at 6 years of age on domain-general (nonverbal reasoning, language, attentive behavior, executive control, visual-spatial memory) and numerical (number knowledge) competencies; at 7 years on whole-number arithmetic computations and number line estimation; and at 10 years on fraction concepts. Mediation a...

  4. Exploring vulnerability and adaptation to climate change of communities in the forest zone of Cameroon.

    NARCIS (Netherlands)

    Bele, M.Y.; Tiani, A.M.; Somorin, O.A.; Sonwa, D.J.

    2013-01-01

    Understanding vulnerability to the impacts of global environmental change and identifying adaptation measures to cope with these impacts require localized investigations that can help find actual and exact answers to the questions about who and what are vulnerable, to what are they vulnerable, how

  5. The double tragedy of agriculture vulnerability to climate variability in Africa: How vulnerable is smallholder agriculture to rainfall variability in Ghana?

    Directory of Open Access Journals (Sweden)

    Emmanuel K. Derbile

    2016-04-01

    Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana

  6. How Should We Treat the Vulnerable?: Qualitative Study of Authoritative Ethics Documents.

    Science.gov (United States)

    Zagorac, Ivana

    2016-01-01

    The aim of this study is to explore what actual guidance is provided by authoritative ethics documents regarding the recognition and protection of the vulnerable. The documents included in this analysis are the Belmont Report, the Declaration of Helsinki, The Council for International Organizations of Medical Sciences (CIOMS) Guidelines, and the UNESCO Universal Declaration on Bioethics and Human Rights, including its supplementary report on vulnerability. A qualitative analysis of these documents was conducted in light of three questions: what is vulnerability, who are the vulnerable, and how should the vulnerable be protected? The results show significant differences among the documents regarding the first two questions. None of the documents provides any guidance on the third question (how to protect the vulnerable). These results suggest a great discrepancy between the acknowledged importance of the concept of vulnerability and a general understanding of the scope, content, and practical implications of vulnerability.

  7. Aging and depression vulnerability interaction results in decreased serotonin innervation associated with reduced BDNF levels in hippocampus of rats bred for learned helplessness

    DEFF Research Database (Denmark)

    Aznar, Susana; Klein, Anders B; Santini, Martin A

    2010-01-01

    . These observations indicate that aging should be taken into account when studying the neurobiological factors behind the vulnerability for depression and that understanding the effect of aging on genetically predisposed individuals may contribute to a better understanding of the pathophysiology behind depression....... Brains from young (5 months old) and old (13 months old) congenital Learned Helplessness rats (cLH), and congenital Non Learned Helplessness rats (cNLH) were immunohistochemically stained for the serotonin transporter and subsequently stereologically quantified for estimating hippocampal serotonin fiber...

  8. Vulnerability to Climate Change in Rural Nicaragua

    Science.gov (United States)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  9. Training approach-avoidance of smiling faces affects emotional vulnerability in socially anxious individuals

    Science.gov (United States)

    Rinck, Mike; Telli, Sibel; Kampmann, Isabel L.; Woud, Marcella L.; Kerstholt, Merel; te Velthuis, Sarai; Wittkowski, Matthias; Becker, Eni S.

    2013-01-01

    Previous research revealed an automatic behavioral bias in high socially anxious individuals (HSAs): although their explicit evaluations of smiling faces are positive, they show automatic avoidance of these faces. This is reflected by faster pushing than pulling of smiling faces in an Approach-Avoidance Task (AAT; Heuer et al., 2007). The current study addressed the causal role of this avoidance bias for social anxiety. To this end, we used the AAT to train HSAs, either to approach smiling faces or to avoid them. We examined whether such an AAT training could change HSAs' automatic avoidance tendencies, and if yes, whether AAT effects would generalize to a new approach task with new facial stimuli, and to mood and anxiety in a social threat situation (a video-recorded self-presentation). We found that HSAs trained to approach smiling faces did indeed approach female faces faster after the training than HSAs trained to avoid smiling faces. Moreover, approach-faces training reduced emotional vulnerability: it led to more positive mood and lower anxiety after the self-presentation than avoid-faces training. These results suggest that automatic approach-avoidance tendencies have a causal role in social anxiety, and that they can be modified by a simple computerized training. This may open new avenues in the therapy of social phobia. PMID:23970862

  10. Training Approach-Avoidance of Smiling Faces Affects Emotional Vulnerability in Socially Anxious Individuals

    Directory of Open Access Journals (Sweden)

    Mike eRinck

    2013-08-01

    Full Text Available Previous research revealed an automatic behavioral bias in high socially anxious individuals (HSAs: Although their explicit evaluations of smiling faces are positive, they show automatic avoidance of these faces. This is reflected by faster pushing than pulling of smiling faces in an Approach-Avoidance Task (AAT; Heuer, Rinck, & Becker, 2007. The current study addressed the causal role of this avoidance bias for social anxiety. To this end, we used the AAT to train HSAs, either to approach smiling faces or to avoid them. We examined whether such an AAT training could change HSAs’ automatic avoidance tendencies, and if yes, whether AAT effects would generalize to a new approach task with new facial stimuli, and to mood and anxiety in a social threat situation (a video-recorded self-presentation. We found that HSAs trained to approach smiling faces did indeed approach female faces faster after the training than HSAs trained to avoid smiling faces. Moreover, approach-faces training reduced emotional vulnerability: It led to more positive mood and lower anxiety after the self-presentation than avoid-faces training. These results suggest that automatic approach-avoidance tendencies have a causal role in social anxiety, and that they can be modified by a simple computerized training. This may open new avenues in the therapy of social phobia.

  11. Decision Vulnerability Analysis (DVA) Program

    Science.gov (United States)

    2014-05-01

    31 14 Graphical Representation of the Summary Judgments of the Effectiveness, Vulnerability, and Understanding of the Subsystems’ as Judged by...posed several challenges. Numerous organizational typologies have been suggested over the years ( Robbins , 1994), and these typologies are often based...structure and functioning from a typology perspective ( Robbins , 1994), excerpts from a task analysis that described how the analysts currently performed

  12. Review Article: A comparison of flood and earthquake vulnerability assessment indicators

    Science.gov (United States)

    de Ruiter, Marleen C.; Ward, Philip J.; Daniell, James E.; Aerts, Jeroen C. J. H.

    2017-07-01

    In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

  13. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Science.gov (United States)

    Stanturf, John A; Goodrick, Scott L; Warren, Melvin L; Charnley, Susan; Stegall, Christie M

    2015-01-01

    The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  14. Evolution of Sex Differences in Trait- and Age-Specific Vulnerabilities.

    Science.gov (United States)

    Geary, David C

    2016-11-01

    Traits that facilitate competition for reproductive resources or that influence mate choice generally have a heightened sensitivity to stressors. They have evolved to signal resilience to infectious disease and nutritional and social stressors, and they are compromised by exposure to man-made toxins. Although these traits can differ from one species or sex to the next, an understanding of the dynamics of competition and choice can in theory be used to generate a priori predictions about sex-, age-, and trait-specific vulnerabilities for any sexually reproducing species. I provide a review of these dynamics and illustrate associated vulnerabilities in nonhuman species. The age- and sex-specific vulnerability of such traits is then illustrated for stressor-related disruptions of boys' and girls' physical growth and play behavior, as well as for aspects of boys' and girls' and men's and women's personality, language, and spatial abilities. There is much that remains to be determined, but enough is now known to reframe trait sensitivity in ways that will allow scientists and practitioners to better identify and understand vulnerable human traits, and eventually ameliorate or prevent their expression. © The Author(s) 2016.

  15. The right to health care and vulnerability

    Directory of Open Access Journals (Sweden)

    João Carlos Loureiro

    2017-10-01

    Full Text Available The article seeks to clarify the concept of vulnerability, by taking structural and epochal frailty into account. To understand the right to health care, the author reflects about the fundamental goods, and he then examines how that same right is present in the Portuguese and the Spanish constitutions. The association between vulnerability and the law is also tackled, with a special reference –in dialogue with Herbert Hart– to its fundamental level and to other links between both terms in the field of health. The article closes with a few remarks on posthumanist attempts at saying goodbye to human frailty.

  16. Applying a Comprehensive Contextual Climate Change Vulnerability Framework to New Zealand's Tourism Industry.

    Science.gov (United States)

    Hopkins, Debbie

    2015-03-01

    Conceptualisations of 'vulnerability' vary amongst scholarly communities, contributing to a wide variety of applications. Research investigating vulnerability to climate change has often excluded non-climatic changes which may contribute to degrees of vulnerability perceived or experienced. This paper introduces a comprehensive contextual vulnerability framework which incorporates physical, social, economic and political factors which could amplify or reduce vulnerability. The framework is applied to New Zealand's tourism industry to explore its value in interpreting a complex, human-natural environment system with multiple competing vulnerabilities. The comprehensive contextual framework can inform government policy and industry decision making, integrating understandings of climate change within the broader context of internal and external social, physical, economic, and institutional stressors.

  17. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  18. Support for research towards understanding the population health vulnerabilities to vector-borne diseases: increasing resilience under climate change conditions in Africa.

    Science.gov (United States)

    Ramirez, Bernadette

    2017-12-12

    Diseases transmitted to humans by vectors account for 17% of all infectious diseases and remain significant public health problems. Through the years, great strides have been taken towards combatting vector-borne diseases (VBDs), most notably through large scale and coordinated control programmes, which have contributed to the decline of the global mortality attributed to VBDs. However, with environmental changes, including climate change, the impact on VBDs is anticipated to be significant, in terms of VBD-related hazards, vulnerabilities and exposure. While there is growing awareness on the vulnerability of the African continent to VBDs in the context of climate change, there is still a paucity of research being undertaken in this area, and impeding the formulation of evidence-based health policy change. One way in which the gap in knowledge and evidence can be filled is for donor institutions to support research in this area. The collaboration between the WHO Special Programme for Research and Training in Tropical Diseases (TDR) and the International Centre for Research and Development (IDRC) builds on more than 10 years of partnership in research capacity-building in the field of tropical diseases. From this partnership was born yet another research initiative on VBDs and the impact of climate change in the Sahel and sub-Saharan Africa. This paper lists the projects supported under this research initiative and provides a brief on some of the policy and good practice recommendations emerging from the ongoing implementation of the research projects. Data generated from the research initiative are expected to be uptaken by stakeholders (including communities, policy makers, public health practitioners and other relevant partners) to contribute to a better understanding of the impacts of social, environmental and climate change on VBDs(i.e. the nature of the hazard, vulnerabilities, exposure), and improve the ability of African countries to adapt to and reduce the

  19. Support for research towards understanding the population health vulnerabilities to vector-borne diseases: increasing resilience under climate change conditions in Africa

    Institute of Scientific and Technical Information of China (English)

    Bernadette Ramirez

    2017-01-01

    Background:Diseases transmitted to humans by vectors account for 17% of all infectious diseases and remain significant public health problems.Through the years,great strides have been taken towards combatting vectorborne diseases (VBDs),most notably through large scale and coordinated control programmes,which have contributed to the decline of the global mortality attributed to VBDs.However,with environmental changes,including climate change,the impact on VBDs is anticipated to be significant,in terms of VBD-related hazards,vulnerabilities and exposure.While there is growing awareness on the vulnerability of the African continent to VBDs in the context of climate change,there is still a paucity of research being undertaken in this area,and impeding the formulation of evidence-based health policy change.Main body:One way in which the gap in knowledge and evidence can be filled is for donor institutions to support research in this area.The collaboration between the WHO Special Programme for Research and Training in Tropical Diseases (TDR) and the International Centre for Research and Development (IDRC) builds on more than 10 years of partnership in research capacity-building in the field of tropical diseases.From this partnership was born yet another research initiative on VBDs and the impact of climate change in the Sahel and sub-Saharan Africa.This paper lists the projects supported under this research initiative and provides a brief on some of the policy and good practice recommendations emerging from the ongoing implementation of the research projects.Conclusion:Data generated from the research initiative are expected to be uptaken by stakeholders (including communities,policy makers,public health practitioners and other relevant partners) to contribute to a better understanding of the impacts of social,environmental and climate change on VBDs(i.e.the nature of the hazard,vulnerabilities,exposure),and improve the ability of African countries to adapt to and

  20. Guilt and Proneness to Shame: Unethical Behaviour in Vulnerable and Grandiose Narcissism.

    Science.gov (United States)

    Poless, Pauline Georgees; Torstveit, Linda; Lugo, Ricardo Gregorio; Andreassen, Marita; Sütterlin, Stefan

    2018-03-01

    Narcissists are described as individuals with dysfunctional personality traits such as lack of psychological awareness and empathy. Theories of ethical behaviour assume that unethical actions trigger moral emotions of guilt and shame. Currently, there is a lack of knowledge on moral emotions as dispositional traits and their potential influences on behaviour in individuals with narcissistic traits. The present study examined vulnerable and grandiose narcissism's differences in the propensity to experience guilt and shame as a proneness, across a range of personal transgressions. Guilt proneness was measured by negative evaluation of unethical behaviour, and whether this evaluation could influence reparation of tendencies of unethical action in vulnerable and grandiose narcissism. Shame proneness was investigated by negative evaluation of the self, and then whether the previous tendency could affect unethical decision making and behaviour (e.g., hiding), in vulnerable and grandiose narcissism. Two hundred and sixteen participants responded to the Guilt and Shame Proneness Scale, the Narcissistic Personality Inventory Scale and the Hypersensitive Narcissism Scale in an online questionnaire. Findings indicate that grandiose narcissism was negatively associated with guilt proneness, and the relation between the vulnerable narcissism and guilt proneness was negative. Additionally, the results confirm a negative association between grandiose narcissism and shame proneness, especially related to the subscale 'shame negative self-evaluation'. Furthermore, guilt and shame proneness explained 20% of the variance in vulnerable narcissism and 11% in grandiose narcissism. This research indicates that both vulnerable and grandiose narcissism have the tendency to make unethical decisions, and they are more likely to enact in unethical behaviour. These findings are relevant for the detection of narcissistic individual's propensity to act unethically in social context.

  1. Vulnerable populations: cultural and spiritual direction.

    Science.gov (United States)

    Quest, Tammie E; Franks, Nicole M

    2006-08-01

    Cultural, spiritual, and religious diversity of emergency department patients is increasing while that of emergency physicians in particular remains predominantly homogeneous. With a discordance of cultural, race, and ethnicity exist, in the case of ethical conflict -resolution becomes that much more difficult. Patients may feel vulnerable when their emergency care provider does not understand his or her cultural, spiritual, and religious uniqueness as it relates to the patient-doctor interaction and health care decision making. This review will examine (1) language differences; (2) cultural, religious, and spiritual differences between patient and provider; (3) differing explanatory models of disease between patient and provider; and (4) diverse bioethical models of decision making of differing cultures in an effort to reduce vulnerabilities.

  2. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  3. Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2017-03-01

    Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.

  4. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore.

    Science.gov (United States)

    Rayl, Nathaniel D; Bastille-Rousseau, Guillaume; Organ, John F; Mumma, Matthew A; Mahoney, Shane P; Soulliere, Colleen E; Lewis, Keith P; Otto, Robert D; Murray, Dennis L; Waits, Lisette P; Fuller, Todd K

    2018-05-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator-prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves). During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined. As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per-capita rate at which bears killed calves followed a type-I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves. Our results reveal that generalist

  5. From the streets to assisted living: perceptions of a vulnerable population.

    Science.gov (United States)

    Decker, Susan; Cary, Patricia; Krautscheid, Lorretta

    2006-06-01

    The rapid growth of assisted-living facilities is paralleled by the necessity to understand the needs of the people living in them. A hallmark challenge for individuals who are poor and disabled, and often marginalized from mainstream society, is maintaining integrity and being a whole person, rather than a sum of broken parts. A key to maintaining this integrity is the ability to find stable housing and support systems. The inner-city assisted-living facility in this study is unique in that all of its residents are funded by Medicaid. The residents have complex needs related to histories of homelessness, mental illness, drug and/or alcohol addiction, and chronic illness. The purpose of this study was to explore the needs of this vulnerable population as they adapt to a new home and a new concept of assisted, yet independent, living. Structured interviews with key informants and oral survey questionnaires with residents provided quantitative and qualitative data about physical and mental health status, social support, perception of control, psychological wellbeing, and life satisfaction. This study provided valuable insights into the challenges inherent in providing a high quality of life in assisted living for a vulnerable population with diverse needs.

  6. Climate volatility deepens poverty vulnerability in developing countries

    Science.gov (United States)

    Ahmed, Syud A.; Diffenbaugh, Noah S.; Hertel, Thomas W.

    2009-07-01

    Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample—particularly in Bangladesh, Mexico, Indonesia, and Africa—with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.

  7. Climate volatility deepens poverty vulnerability in developing countries

    International Nuclear Information System (INIS)

    Ahmed, Syud A; Diffenbaugh, Noah S; Hertel, Thomas W

    2009-01-01

    Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample-particularly in Bangladesh, Mexico, Indonesia, and Africa-with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.

  8. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  9. Dependence and Vulnerability in the moral philosophy of Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Javier de la Torre Díaz

    2017-10-01

    Full Text Available We are all dependent persons and from this limitation and human condition we can find some deep insights to better understand vulnerability as a principle of bioethics. This article introduces the concept of dependence as outlined by the Scottish philosopher, settled in the United States since 1971, Alasdair MacIntyre in his work Dependent Rational Animals. From this work, we want to rehabilitate the importance of dependency in the life of every living being and we want to propose some basic ideas so as to gain a better understanding of the principle of vulnerability.

  10. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Directory of Open Access Journals (Sweden)

    John A Stanturf

    Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  11. Social vulnerability indicators as a sustainable planning tool

    International Nuclear Information System (INIS)

    Lee, Yung-Jaan

    2014-01-01

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  12. Social vulnerability indicators as a sustainable planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study

  13. Rare species support vulnerable functions in high-diversity ecosystems.

    Science.gov (United States)

    Mouillot, David; Bellwood, David R; Baraloto, Christopher; Chave, Jerome; Galzin, Rene; Harmelin-Vivien, Mireille; Kulbicki, Michel; Lavergne, Sebastien; Lavorel, Sandra; Mouquet, Nicolas; Paine, C E Timothy; Renaud, Julien; Thuiller, Wilfried

    2013-01-01

    Around the world, the human-induced collapses of populations and species have triggered a sixth mass extinction crisis, with rare species often being the first to disappear. Although the role of species diversity in the maintenance of ecosystem processes has been widely investigated, the role of rare species remains controversial. A critical issue is whether common species insure against the loss of functions supported by rare species. This issue is even more critical in species-rich ecosystems where high functional redundancy among species is likely and where it is thus often assumed that ecosystem functioning is buffered against species loss. Here, using extensive datasets of species occurrences and functional traits from three highly diverse ecosystems (846 coral reef fishes, 2,979 alpine plants, and 662 tropical trees), we demonstrate that the most distinct combinations of traits are supported predominantly by rare species both in terms of local abundance and regional occupancy. Moreover, species that have low functional redundancy and are likely to support the most vulnerable functions, with no other species carrying similar combinations of traits, are rarer than expected by chance in all three ecosystems. For instance, 63% and 98% of fish species that are likely to support highly vulnerable functions in coral reef ecosystems are locally and regionally rare, respectively. For alpine plants, 32% and 89% of such species are locally and regionally rare, respectively. Remarkably, 47% of fish species and 55% of tropical tree species that are likely to support highly vulnerable functions have only one individual per sample on average. Our results emphasize the importance of rare species conservation, even in highly diverse ecosystems, which are thought to exhibit high functional redundancy. Rare species offer more than aesthetic, cultural, or taxonomic diversity value; they disproportionately increase the potential breadth of functions provided by ecosystems across

  14. Individual variation in resisting temptation: implications for addiction.

    Science.gov (United States)

    Saunders, Benjamin T; Robinson, Terry E

    2013-11-01

    When exposed to the sights, sounds, smells and/or places that have been associated with rewards, such as food or drugs, some individuals have difficulty resisting the temptation to seek out and consume them. Others have less difficulty restraining themselves. Thus, Pavlovian reward cues may motivate maladaptive patterns of behavior to a greater extent in some individuals than in others. We are just beginning to understand the factors underlying individual differences in the extent to which reward cues acquire powerful motivational properties, and therefore, the ability to act as incentive stimuli. Here we review converging evidence from studies in both human and non-human animals suggesting that a subset of individuals are more "cue reactive", in that certain reward cues are more likely to attract these individuals to them and motivate actions to get them. We suggest that those individuals for whom Pavlovian reward cues become especially powerful incentives may be more vulnerable to impulse control disorders, such as binge eating and addiction. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Web vulnerability study of online pharmacy sites.

    Science.gov (United States)

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  16. An intersectional approach for understanding the vulnerabilities of English-speaking heterosexual Caribbean youth to HIV/AIDS and sexually transmitted infections: Prevention and intervention strategies

    Science.gov (United States)

    Sutherland, Marcia Elizabeth

    2016-01-01

    Caribbean youth comprise about 30 percent of the English-speaking Caribbean population, and about 81,000 Caribbean and Latin American youth are HIV infected. AIDS is the leading cause of death for 15- to 24-year-old English-speaking Caribbean youth. This article relies on intersectionality theory in the assessment of the macro-level, or structural variables, and micro-level, or individual level, variables that influence the risk-taking sexual behaviors of heterosexual English-speaking Caribbean youth and increase their vulnerability to HIV/sexually transmitted infections. This article offers macro- and micro-level prevention/intervention strategies for reducing the prevalence of sexually transmitted infections in English-speaking Caribbean youth, including the promotion of condom use, voluntary male circumcision, and HIV testing and counseling. Suggestions are offered for future research investigations to explore the contributing factors to youth’s vulnerability to sexually transmitted infections and to empirically verify the relationship between and among variables that account for desired outcomes, including decreases in risky sexual behaviors. PMID:28070411

  17. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    -Cold War era: the search for an analytical framework that will help us understand this turbulent and chaotic period in human history. His lucid and visionary analysis rests on the concept of mutual vulnerability: that in an increasingly ...

  18. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  19. Which Stratum of Urban Elderly Is Most Vulnerable for Dementia?

    Science.gov (United States)

    2016-01-01

    Many factors associated with a patient's lifestyle may disrupt timely access to dementia diagnosis and management. The aim of this study was to compare characteristics of lifestyle factors at the time of initial evaluation for dementia across degrees of dementia, and to identify risk factors relating to late detection of dementia, in order to understand the various lifestyle barriers to timely recognition of the disease. We reviewed medical records of 1,409 subjects who were diagnosed as dementia among 35,723 inhabitants of Gwangjin-gu. Dementia severity was divided into three degrees. Age, sex, education, income, smoking, heavy drinking, physical activity, religion, and living conditions were evaluated. There was a significantly greater proportion of individuals who were old age, female, less educated, who had never smoked or drank heavily, without physical activity, with no religious activity and living with family other than spouse in the severe dementia group. The lifestyle risks of late detection were old age, lower education, less social interactions, less physical activity or living with family. We can define this group of patients as the vulnerable stratum to dementia evaluation. Health policy or community health services might find ways to better engage patients in this vulnerable stratum to dementia. PMID:27550494

  20. Reflections on attitudes, experiences, and vulnerability of intimate partner violence among Southeast Asian college women living in United States.

    Science.gov (United States)

    Thongpriwan, Vipavee; Buseh, Aaron; Arunothong, Wachiraporn

    2015-12-01

    To provide culturally sensitive intimate partner violence (IPV) prevention programs for ethnic groups, a basic foundational understanding of Southeast Asian (SEA) women living in the United States is vital. The purpose of this study was to describe SEA college women's perceptions of IPV and how the women recognize their vulnerability to such violent situations. Qualitative methods using focus group discussions were employed to elicit participants' perceptions. Participants included 18 SEA college women, ages 18-34 (Mean=22; SD=7.22). Transcriptions were analyzed using a content analysis approach. Five themes emerged: recognition of IPV; perception of individual vulnerability to IPV; experience and responses to IPV; help seeking and support system; and strategies used for prevention of IPV. Findings yielded an understanding of intertwined issues of cultural norms associated with IPV, social and economic disparities, and challenges for IPV prevention in SEA communities. Culturally sensitive prevention programs will be more effective by reforming cultural values, while at the same time promoting non-violent relationships and increasing access to services. Published by Elsevier B.V.

  1. Leveraging social capital: multilevel stigma, associated HIV vulnerabilities, and social resilience strategies among transgender women in Lima, Peru.

    Science.gov (United States)

    Perez-Brumer, Amaya G; Reisner, Sari L; McLean, Sarah A; Silva-Santisteban, Alfonso; Huerta, Leyla; Mayer, Kenneth H; Sanchez, Jorge; Clark, Jesse L; Mimiaga, Matthew J; Lama, Javier R

    2017-02-28

    In Peru, transgender women (TW) experience unique vulnerabilities for HIV infection due to factors that limit access to, and quality of, HIV prevention, treatment and care services. Yet, despite recent advances in understanding factors associated with HIV vulnerability among TW globally, limited scholarship has examined how Peruvian TW cope with this reality and how existing community-level resilience strategies are enacted despite pervasive social and economic exclusion facing the community. Addressing this need, our study applies the understanding of social capital as a social determinant of health and examines its relationship to HIV vulnerabilities to TW in Peru. Using qualitative methodology to provide an in-depth portrait, we assessed (1) intersections between social marginalization, social capital and HIV vulnerabilities; and (2) community-level resilience strategies employed by TW to buffer against social marginalization and to link to needed HIV-related services in Peru. Between January and February 2015, 48 TW participated (mean age = 29, range = 18-44) in this study that included focus group discussions and demographic surveys. Analyses were guided by an immersion crystallization approach and all coding was conducted using Dedoose Version 6.1.18. Themes associated with HIV vulnerability included experiences of multilevel stigma and limited occupational opportunities that placed TW at risk for, and limited their engagement with, existing HIV services. Emergent resiliency-based strategies included peer-to-peer and intergenerational knowledge sharing, supportive clinical services (e.g. group-based clinic attendance) and emotional support through social cohesion (i.e. feeling part of a community). This study highlights the importance of TW communities as support structures that create and deploy social resiliency-based strategies aimed at deterring and mitigating the impact of social vulnerabilities to discrimination, marginalization and HIV risk for

  2. Participatory flood vulnerability assessment: a multi-criteria approach

    Science.gov (United States)

    Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian

    2018-01-01

    This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  3. [Hegemonic masculinity, vulnerability and the prevention of HIV/AIDS].

    Science.gov (United States)

    Marques, Joilson Santana; Gomes, Romeu; do Nascimento, Elaine Ferreira

    2012-02-01

    The study aims to examine the relationship between masculinity, vulnerability and the prevention of HIV/AIDS, based on reports from young men from the so-called urban working classes, taking into account not only the meanings attributed to prevention by these subjects, but also considering the dialectical relationship between the individual and society. The conceptual framework encompasses the three main aspects of hegemonic masculinity, prevention and vulnerability. This involves qualitative research based on the perspective of dialectical hermeneutics that uses the method of interpretation of meanings. The analysis yielded two main results, namely hegemonic masculinity as a vulnerability factor, and myths and prejudices as factors of vulnerability to HIV/AIDS. By way of conclusion, it reinforces the need for discussion of prevention encompassing the need to put on the agenda the construction of the sex/gender system around which to articulate the social meanings of masculinity and femininity that influence the structural plan of affective sexual relations in general and HIV/AIDS in particular.

  4. Hydrologic vulnerability of tribal reservation lands across the U.S.

    Science.gov (United States)

    Jones, C., Jr.; Leibowitz, S. G.; Sawicz, K. A.; Comeleo, R. L.; Stratton, L. E.

    2017-12-01

    We apply the hydrologic landscapes (HL) concept to assess the hydrologic vulnerability to climate of the United States (U.S.) with special emphasis on tribal lands. The basic assumption of the HL approach is that catchments that share similar physical and climatic characteristics are expected to have similar hydrologic characteristics. We map climate vulnerability by integrating a retrospective analysis of historical climate and hydrology into the HL approach, comparing this baseline of variability with future projections of temperature, precipitation, potential evapotranspiration, snow accumulation, climatic moisture, surplus water, and seasonality of the water surplus. Projections that are not within two standard deviations of the historical decadal average contribute to the vulnerability index for each metric. This allows stakeholders and/or water resource managers to understand the potential impacts of future conditions. The resulting vulnerability maps show that temperature and potential evapotranspiration are consistently projected to have high vulnerability indices across the U.S. including all tribal reservations. Precipitation vulnerability is not as spatially-uniform as temperature. Most areas with snow are projected to experience significant changes in future snow accumulation. The seasonality vulnerability map shows that mountainous areas in the West are most prone to changes in seasonality. This paper illustrates how the HL approach can help assess climatic and hydrologic vulnerability for disadvantaged groups across the U.S. By combining the HL concept and climate vulnerability analyses, we provide an approach that can assist tribal resource managers to perform vulnerability assessments and adaptation plans, which is a major priority for the tribes nationwide.

  5. Hardships of the Great Recession and health: Understanding varieties of vulnerability

    Directory of Open Access Journals (Sweden)

    Julie A Kirsch

    2016-05-01

    Full Text Available The Great Recession of 2007–2009 is regarded as the most severe economic downturn since World War II. This study examined relationships between reported recession hardships and physical health in a national survey of American adults ( N  = 1275. Furthermore, education and psychological resources (perceived control, purpose in life, and conscientiousness were tested as moderators of the health impacts of the recession. A greater number of hardships predicted poorer health, especially among the less educated. Psychological resources interacted with education and hardships to predict health outcomes. Although typically viewed as protective factors, such resources became vulnerabilities among educationally disadvantaged adults experiencing greater recession hardships.

  6. Hardships of the Great Recession and health: Understanding varieties of vulnerability.

    Science.gov (United States)

    Kirsch, Julie A; Ryff, Carol D

    2016-01-01

    The Great Recession of 2007-2009 is regarded as the most severe economic downturn since World War II. This study examined relationships between reported recession hardships and physical health in a national survey of American adults ( N  = 1275). Furthermore, education and psychological resources (perceived control, purpose in life, and conscientiousness) were tested as moderators of the health impacts of the recession. A greater number of hardships predicted poorer health, especially among the less educated. Psychological resources interacted with education and hardships to predict health outcomes. Although typically viewed as protective factors, such resources became vulnerabilities among educationally disadvantaged adults experiencing greater recession hardships.

  7. Mapping social-ecological vulnerability to inform local decision making.

    Science.gov (United States)

    Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim

    2018-04-01

    An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory

  8. Tsunami vulnerability assessment in the western coastal belt in Sri Lanka

    Science.gov (United States)

    Ranagalage, M. M.

    2017-12-01

    26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

  9. Genomic tools for behavioural ecologists to understand repeatable individual differences in behaviour.

    Science.gov (United States)

    Bengston, Sarah E; Dahan, Romain A; Donaldson, Zoe; Phelps, Steven M; van Oers, Kees; Sih, Andrew; Bell, Alison M

    2018-06-01

    Behaviour is a key interface between an animal's genome and its environment. Repeatable individual differences in behaviour have been extensively documented in animals, but the molecular underpinnings of behavioural variation among individuals within natural populations remain largely unknown. Here, we offer a critical review of when molecular techniques may yield new insights, and we provide specific guidance on how and whether the latest tools available are appropriate given different resources, system and organismal constraints, and experimental designs. Integrating molecular genetic techniques with other strategies to study the proximal causes of behaviour provides opportunities to expand rapidly into new avenues of exploration. Such endeavours will enable us to better understand how repeatable individual differences in behaviour have evolved, how they are expressed and how they can be maintained within natural populations of animals.

  10. The Cannabis Pathway to Non-Affective Psychosis may Reflect Less Neurobiological Vulnerability

    Science.gov (United States)

    Løberg, Else-Marie; Helle, Siri; Nygård, Merethe; Berle, Jan Øystein; Kroken, Rune A.; Johnsen, Erik

    2014-01-01

    There is a high prevalence of cannabis use reported in non-affective psychosis. Early prospective longitudinal studies conclude that cannabis use is a risk factor for psychosis, and neurochemical studies on cannabis have suggested potential mechanisms for this effect. Recent advances in the field of neuroscience and genetics may have important implications for our understanding of this relationship. Importantly, we need to better understand the vulnerability × cannabis interaction to shed light on the mediators of cannabis as a risk factor for psychosis. Thus, the present study reviews recent literature on several variables relevant for understanding the relationship between cannabis and psychosis, including age of onset, cognition, brain functioning, family history, genetics, and neurological soft signs (NSS) in non-affective psychosis. Compared with non-using non-affective psychosis, the present review shows that there seem to be fewer stable cognitive deficits in patients with cannabis use and psychosis, in addition to fewer NSS and possibly more normalized brain functioning, indicating less neurobiological vulnerability for psychosis. There are, however, some familiar and genetic vulnerabilities present in the cannabis psychosis group, which may influence the cannabis pathway to psychosis by increasing sensitivity to cannabis. Furthermore, an earlier age of onset suggests a different pathway to psychosis in the cannabis-using patients. Two alternative vulnerability models are presented to integrate these seemingly paradoxical findings PMID:25477825

  11. The cannabis pathway to non-affective psychosis may reflect less neurobiological vulnerability

    Directory of Open Access Journals (Sweden)

    Else-Marie eLøberg

    2014-11-01

    Full Text Available There is a high prevalence of cannabis use reported in non-affective psychosis. Early prospective longitudinal studies conclude that cannabis use is a risk factor for psychosis, and neurochemical studies on cannabis have suggested potential mechanisms for this effect. Recent advances in the field of neuroscience and genetics may have important implications for our understanding of this relationship. Importantly, we need to better understand the vulnerability x cannabis interaction to shed light on the mediators of cannabis as a risk factor for psychosis. Thus, the present study reviews recent literature on several variables relevant for understanding the relationship between cannabis and psychosis, including age of onset, cognition, brain functioning, family history, genetics and neurological soft signs (NSS in non-affective psychosis. Compared with non-using non-affective psychosis, the present review shows that there seem to be fewer stable cognitive deficits in patients with cannabis use and psychosis, in addition to fewer NSS and possibly more normalized brain functioning, indicating less neurobiological vulnerability for psychosis. There are, however, some familiar and genetic vulnerabilities present in the cannabis psychosis group which may influence the cannabis pathway to psychosis by increasing sensitivity to cannabis. Furthermore, an earlier age of onset suggests a different pathway to psychosis in the cannabis-using patients. Two alternative vulnerability models are presented to integrate these seemingly paradoxical findings.

  12. Community vulnerability to climate change in the context of other exposure-sensitivities in Kugluktuk, Nunavut

    Directory of Open Access Journals (Sweden)

    Laura Tozer

    2011-07-01

    Full Text Available Climate change in the Canadian north is, and will be, managed by communities that are already experiencing social, political, economic and other environmental changes. Hence, there is a need to understand vulnerability to climate change in the context of multiple exposure-sensitivities at the community level. This article responds to this perceived knowledge need based on a case study of the community of Kugluktuk in Nunavut, Canada. An established approach for vulnerability assessment is used to identify current climatic and non-climatic exposure-sensitivities along with their associated contemporary adaptation strategies. This assessment of current vulnerability is used as a basis to consider Kugluktuk's possible vulnerability to climatic change in the future. Current climate-related exposure-sensitivities in Kugluktuk relate primarily to subsistence harvesting and community infrastructure. Thinner and less stable ice conditions and unpredictable weather patterns are making travel and harvesting more dangerous and some community infrastructure is sensitive to permafrost melt and extreme weather events (e.g., flash floods. The ability of individuals and households to adapt to these and other climatic exposure-sensitivities is influenced by non-climatic factors that condition adaptive capacity including substance abuse, the erosion of traditional knowledge and youth suicide. These and other non-climatic factors often underpin adaptive capacity to deal with and adapt to changing conditions and must be considered in an assessment of vulnerability. This research argues that Northern communities are challenged by multiple exposure-sensitivities—beyond just those posed by climate—and effective adaptation to climate change requires consideration if not resolution of socio-economic and other issues in communities.

  13. A neurogenetics approach to understanding individual differences in brain, behavior, and risk for psychopathology.

    Science.gov (United States)

    Bogdan, R; Hyde, L W; Hariri, A R

    2013-03-01

    Neurogenetics research has begun to advance our understanding of how genetic variation gives rise to individual differences in brain function, which, in turn, shapes behavior and risk for psychopathology. Despite these advancements, neurogenetics research is currently confronted by three major challenges: (1) conducting research on individual variables with small effects, (2) absence of detailed mechanisms, and (3) a need to translate findings toward greater clinical relevance. In this review, we showcase techniques and developments that address these challenges and highlight the benefits of a neurogenetics approach to understanding brain, behavior and psychopathology. To address the challenge of small effects, we explore approaches including incorporating the environment, modeling epistatic relationships and using multilocus profiles. To address the challenge of mechanism, we explore how non-human animal research, epigenetics research and genome-wide association studies can inform our mechanistic understanding of behaviorally relevant brain function. Finally, to address the challenge of clinical relevance, we examine how neurogenetics research can identify novel therapeutic targets and for whom treatments work best. By addressing these challenges, neurogenetics research is poised to exponentially increase our understanding of how genetic variation interacts with the environment to shape the brain, behavior and risk for psychopathology.

  14. Socio-economic vulnerability to natural hazards - proposal for an indicator-based model

    Science.gov (United States)

    Eidsvig, U.; McLean, A.; Vangelsten, B. V.; Kalsnes, B.; Ciurean, R. L.; Argyroudis, S.; Winter, M.; Corominas, J.; Mavrouli, O. C.; Fotopoulou, S.; Pitilakis, K.; Baills, A.; Malet, J. P.

    2012-04-01

    Vulnerability assessment, with respect to natural hazards, is a complex process that must consider multiple dimensions of vulnerability, including both physical and social factors. Physical vulnerability refers to conditions of physical assets, and may be modeled by the intensity and magnitude of the hazard, the degree of physical protection provided by the natural and built environment, and the physical robustness of the exposed elements. Social vulnerability refers to the underlying factors leading to the inability of people, organizations, and societies to withstand impacts from the natural hazards. Social vulnerability models can be used in combination with physical vulnerability models to estimate both direct losses, i.e. losses that occur during and immediately after the impact, as well as indirect losses, i.e. long-term effects of the event. Direct impact of a landslide typically includes casualties and damages to buildings and infrastructure while indirect losses may e.g. include business closures or limitations in public services. The direct losses are often assessed using physical vulnerability indicators (e.g. construction material, height of buildings), while indirect losses are mainly assessed using social indicators (e.g. economical resources, demographic conditions). Within the EC-FP7 SafeLand research project, an indicator-based method was proposed to assess relative socio-economic vulnerability to landslides. The indicators represent the underlying factors which influence a community's ability to prepare for, deal with, and recover from the damage associated with landslides. The proposed model includes indicators representing demographic, economic and social characteristics as well as indicators representing the degree of preparedness and recovery capacity. Although the model focuses primarily on the indirect losses, it could easily be extended to include more physical indicators which account for the direct losses. Each indicator is individually

  15. Development of a heat vulnerability index for New York State.

    Science.gov (United States)

    Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A

    2017-12-01

    The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could

  16. A Framework for Disaster Vulnerability in a Small Island in the Southwest Pacific: A Case Study of Emae Island, Vanuatu

    Institute of Scientific and Technical Information of China (English)

    Guy Jackson; Karen McNamara; Bradd Witt

    2017-01-01

    The societal costs of disasters around the world are continuing to increase and Pacific Island countries are considered some of the most vulnerable.This is primarily due to a combination of high hazard exposure coupled with a range of social,economic,physical,and political vulnerabilities.This article contributes to the growing body of work that aims to understand the causal factors of disaster vulnerability,but with a specific focus on small island developing states.The article first develops a framework for understanding disaster vulnerability,drawing on extensive literature and the well-established Methods for the Improvement of Vulnerability in Europe (MOVE) framework,and second,applies this adapted framework using empirically-derived data from fieldwork on Emae Island,Vanuatu to provide a working understanding of the causal elements of disaster vulnerability.Drawn from a significant body of scholarship at the time,the MOVE framework was primarily developed as a heuristic tool in which disaster vulnerability is considered to be a function of exposure,susceptibility (socially,economically,physically,culturally,environmentally,institutionally),and a lack of resilience.We posit that this adapted framework for small islands should also include historical susceptibility,and we prefer livelihood resilience (as capabilities,social capital,knowledge,participation,and human rights) over lack of resilience.We maintain that understanding disaster vulnerability holistically,which is inclusive of both strengths and drawbacks,is crucial to ensure that limited resources can target the causal factors that produce vulnerability and help safeguard and improve livelihoods in both the short and long term.

  17. Losing ground, losing sleep: Local economic conditions, economic vulnerability, and sleep.

    Science.gov (United States)

    Perales, Francisco; Plage, Stefanie

    2017-02-01

    Medical research shows that healthy sleep has benefits for human wellbeing. We contribute to the emerging social-epidemiological literature on the social determinants of sleep by considering how living in an area with poor economic circumstances can result in sleep loss through financial worry, uncertainty and stress. We use multilevel regression models and nationally-representative data from the Household, Income and Labour Dynamics in Australia Survey (n = 9181) and find that individuals who live in areas with high unemployment rates or experience individual-level economic vulnerability sleep less than comparable individuals in areas with low unemployment rates, or who do not experience financial hardships. The negative association between local economic conditions and sleep duration is substantially stronger amongst economically vulnerable individuals. This highlights the importance of considering multiple levels in the analysis of health inequalities, as status and location can intersect to produce and reproduce disadvantage systems. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Quantifying the vulnerability of well fields towards anthropogenic pollution: The Netherlands as an example

    NARCIS (Netherlands)

    Mendizabal, I.; Stuijfzand, P.J.; Wiersma, A.

    2011-01-01

    A new method is presented to asses the vulnerability of public supply well fields (PSWFs), other well fields or individual wells. The Intrinsic Vulnerability Index towards Pollution (VIP) is based on the age, redox level, alkalinity (or acidity), and surface water fraction of the pumped water,

  19. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    Science.gov (United States)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  20. Imaging genetics and the neurobiological basis of individual differences in vulnerability to addiction.

    Science.gov (United States)

    Sweitzer, Maggie M; Donny, Eric C; Hariri, Ahmad R

    2012-06-01

    Addictive disorders are heritable, but the search for candidate functional polymorphisms playing an etiological role in addiction is hindered by complexity of the phenotype and the variety of factors interacting to impact behavior. Advances in human genome sequencing and neuroimaging technology provide an unprecedented opportunity to explore the impact of functional genetic variants on variability in behaviorally relevant neural circuitry. Here, we present a model for merging these technologies to trace the links between genes, brain, and addictive behavior. We describe imaging genetics and discuss the utility of its application to addiction. We then review data pertaining to impulsivity and reward circuitry as an example of how genetic variation may lead to variation in behavioral phenotype. Finally, we present preliminary data relating the neural basis of reward processing to individual differences in nicotine dependence. Complex human behaviors such as addiction can be traced to their basic genetic building blocks by identifying intermediate behavioral phenotypes, associated neural circuitry, and underlying molecular signaling pathways. Impulsivity has been linked with variation in reward-related activation in the ventral striatum (VS), altered dopamine signaling, and functional polymorphisms of DRD2 and DAT1 genes. In smokers, changes in reward-related VS activation induced by smoking abstinence may be associated with severity of nicotine dependence. Variation in genes related to dopamine signaling may contribute to heterogeneity in VS sensitivity to reward and, ultimately, to addiction. These findings illustrate the utility of the imaging genetics approach for investigating the neurobiological basis for vulnerability to addiction. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  1. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  2. Business continuity, emergency planning and special needs: How to protect the vulnerable.

    Science.gov (United States)

    Reilly, Daniel

    2015-01-01

    Emergencies and disasters affect all segments of the population. Some segments are more at risk during the emergency response and recovery efforts owing to vulnerabilities that increase the risk of harm. These vulnerabilities are due to individuals' disabilities, which must be incorporated into emergency and business continuity planning. Some disabilities are obvious, such as impaired vision, hearing or mobility, while other are less evident, but equally disabling, such as cognitive disorders, geographical or language isolation, and numerous age-related factors. Taken together when creating emergency or business continuity plans, the issues identified as disabilities can be grouped by functionality and termed as special needs. This paper will detail the identification of special needs populations, explain how these persons are vulnerable during the emergency or disaster response and recovery process, and provide examples of how to partner with individuals within identified special needs populations to improve the planning process.

  3. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  4. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  5. AGING AND INDIVIDUAL VULNERABILITY: A PANORAMA OF OLDER ADULTS ATTENDED BY THE FAMILY HEALTH STRATEGY

    Directory of Open Access Journals (Sweden)

    Keylla Talitha Fernandes Barbosa

    2017-01-01

    Full Text Available Objetivo: identificar las condiciones de vulnerabilidad individuales en los ancianos y investigar la relación con los indicadores de salud a través de una encuesta de hogares. Método: diseño descriptivo, transversal, realizado con 368 ancianos asistidos por la Estrategia Salud de la Familia. La recolección de datos se realizó a través de una entrevista estructurada, con el apoyo de instrumentos, incluyendo los indicadores sociodemográficos, de salud y Vulnerable Elderly Survey. También llevó a cabo el análisis descriptivo y la prueba de chi-cuadrado de Pearson. Resultados: existe una prevalencia de 52,2% de la vulnerabilidad individual entre los ancianos, así como una asociación con problemas de salud, la salud autopercepción negativa, dificultad en la movilidad y el desempeño de las actividades de la vida diaria. Conclusión: la vulnerabilidad de la identificación de los ancianos es una iniciativa importante para la adecuación de las políticas y programas de salud que se centran en la promoción del envejecimiento con el mantenimiento de la capacidad funcional.

  6. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    Science.gov (United States)

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  7. Development of a security vulnerability assessment process for the RAMCAP chemical sector

    International Nuclear Information System (INIS)

    Moore, David A.; Fuller, Brad; Hazzan, Michael; Jones, J. William

    2007-01-01

    The Department of Homeland Security (DHS), Directorate of Information Analysis and Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors:*Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. *Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  8. Identifying Population Vulnerable to Extreme Heat Events in San Jose, California.

    Science.gov (United States)

    Rivera, A. L.

    2016-12-01

    The extreme heat days not only make cities less comfortable for living but also they are associated with increased morbidity and mortality. Mapping studies have demonstrated spatial variability in heat vulnerability. A study conducted between 2000 and 2011 in New York City shows that deaths during heat waves was more likely to occur in black individuals, at home in census tracts which received greater public assistance. This map project intends to portray areas in San Jose California that are vulnerable to extreme heat events. The variables considered to build a vulnerability index are: land surface temperature, vegetated areas (NDVI), and people exposed to these area (population density).

  9. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  10. Between Autonomy and Vulnerability : the Space of Movement

    OpenAIRE

    Kevin McDonald

    2011-01-01

    Analyses of the contemporary alterglobalization movement increasingly emphasize dimensions of autonomy, whose ultimate origins lie in theories of agency understood as sovereignty. This paper argues that critical dimensions of the alterglobalization movement involve practices of embodied action and forms of responsibility that point beyond autonomy, to a paradigm of relational vulnerability. Recognising this is central to understanding ethics, agency, and subjectivity and to understanding move...

  11. Integrating Social Science, Environmental Science, and Engineering to Understand Vulnerability and Resilience to Environmental Hazards in the Bengal Delta

    Science.gov (United States)

    Gilligan, J. M.; Ackerly, B.; Goodbred, S. L.

    2013-12-01

    the delta. Assessing the impacts of climate change and other environmental stresses on delta populations and designing effective responses will require understanding interactions between the physical and human environments at multiple scales. As part of a multidisciplinary research project drawing on sedimentology, hydrology, remote-sensing, engineering, political science, sociology, psychology, and anthropology we are studying the interactions of human and natural systems in coastal Bangladesh to understand conditions that contribute to vulnerability and resilience at both the household and the community level. Building on Elinor Ostrom's socioecological systems approach, we have developed a theoretical framework for studying vulnerability and resilience when coupled human-natural systems are subject to significant changes and exogenous forcings. We will report on this framework using examples of successful and unsuccessful interventions to manage or mitigate exposure to environmental hazards, and we will also report on progress toward using our framework to identify and understand factors that contribute to the success or failure of such projects.

  12. The Vulnerability Assessment Code for Physical Protection System

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2007-01-01

    To neutralize the increasing terror threats, nuclear facilities have strong physical protection system (PPS). PPS includes detectors, door locks, fences, regular guard patrols, and a hot line to a nearest military force. To design an efficient PPS and to fully operate it, vulnerability assessment process is required. Evaluating PPS of a nuclear facility is complicate process and, hence, several assessment codes have been developed. The estimation of adversary sequence interruption (EASI) code analyzes vulnerability along a single intrusion path. To evaluate many paths to a valuable asset in an actual facility, the systematic analysis of vulnerability to intrusion (SAVI) code was developed. KAERI improved SAVI and made the Korean analysis of vulnerability to intrusion (KAVI) code. Existing codes (SAVI and KAVI) have limitations in representing the distance of a facility because they use the simplified model of a PPS called adversary sequence diagram. In adversary sequence diagram the position of doors, sensors and fences is described just as the locating area. Thus, the distance between elements is inaccurate and we cannot reflect the range effect of sensors. In this abstract, we suggest accurate and intuitive vulnerability assessment based on raster map modeling of PPS. The raster map of PPS accurately represents the relative position of elements and, thus, the range effect of sensor can be easily incorporable. Most importantly, the raster map is easy to understand

  13. An intersectional approach for understanding the vulnerabilities of English-speaking heterosexual Caribbean youth to HIV/AIDS and sexually transmitted infections: Prevention and intervention strategies

    Directory of Open Access Journals (Sweden)

    Marcia Elizabeth Sutherland

    2016-11-01

    Full Text Available Caribbean youth comprise about 30 percent of the English-speaking Caribbean population, and about 81,000 Caribbean and Latin American youth are HIV infected. AIDS is the leading cause of death for 15- to 24-year-old English-speaking Caribbean youth. This article relies on intersectionality theory in the assessment of the macro-level, or structural variables, and micro-level, or individual level, variables that influence the risk-taking sexual behaviors of heterosexual English-speaking Caribbean youth and increase their vulnerability to HIV/sexually transmitted infections. This article offers macro- and micro-level prevention/intervention strategies for reducing the prevalence of sexually transmitted infections in English-speaking Caribbean youth, including the promotion of condom use, voluntary male circumcision, and HIV testing and counseling. Suggestions are offered for future research investigations to explore the contributing factors to youth’s vulnerability to sexually transmitted infections and to empirically verify the relationship between and among variables that account for desired outcomes, including decreases in risky sexual behaviors.

  14. Sex-driven vulnerability in stress and drug abuse.

    Science.gov (United States)

    Berry, Alessandra; Raggi, Carla; Borgi, Marta; Cirulli, Francesca

    2016-01-01

    A growing body of literature shows that a link exists between substance abuse and stress and that the crosstalk of sex hormones with the neuroendocrine system might differently prime vulnerability to drug addiction in male and female subjects. Thus, understanding the neurobiological mechanisms of addiction and the identification of sex-driven determinants in vulnerability to drug abuse may help to better devise and/or implement strategic (pharmacological, behavioural, social) interventions to prevent or face the issue of addiction. Differences between sexes can be found at all stages of life (in both the animal model and human studies) and may account for genetic, epigenetic and environmental/hormonal factors that in turn affect the functionality of the whole organism leading also to a sex-driven differential vulnerability or resilience to non-communicable pathologies. These include the onset and precipitation of stress-related psychiatric disorders as well as "substance-related and addictive disorders" (as defined in the DSM-V). This paper reviews the scientific literature highlighting significant differences in male and female subjects in stress and neuroendocrine function and the implications for sex-dependent differential vulnerability to drug addiction.

  15. Individual Differences in Animal Stress Models: Considering Resilience, Vulnerability, and the Amygdala in Mediating the Effects of Stress and Conditioned Fear on Sleep.

    Science.gov (United States)

    Wellman, Laurie L; Fitzpatrick, Mairen E; Hallum, Olga Y; Sutton, Amy M; Williams, Brook L; Sanford, Larry D

    2016-06-01

    To examine the REM sleep response to stress and fearful memories as a potential marker of stress resilience and vulnerability and to assess the role of the basolateral amygdala (BLA) in mediating the effects of fear memory on sleep. Outbred Wistar rats were surgically implanted with electrodes for recording EEG and EMG and with bilateral guide cannulae directed at the BLA. Data loggers were placed intraperitoneally to record core body temperature. After recovery from surgery, the rats received shock training (ST: 20 footshocks, 0.8 mA, 0.5-s duration, 60-s interstimulus interval) and afterwards received microinjections of the GABAA agonist muscimol (MUS; 1.0 μM) to inactivate BLA or microinjections of vehicle (VEH) alone. Subsequently, the rats were separated into 4 groups (VEH-vulnerable (VEH-Vul; n = 14), VEH-resilient (VEH-Res; n = 13), MUS-vulnerable (MUS-Vul; n = 8), and MUS-resilient (MUS-Res; n = 11) based on whether or not REM was decreased, compared to baseline, during the first 4 h following ST. We then compared sleep, freezing, and the stress response (stress-induced hyperthermia, SIH) across groups to determine the effects of ST and fearful context re-exposure alone (CTX). REM was significantly reduced on the ST day in both VEH-Vul and MUS-Vul rats; however, post-ST MUS blocked the reduction in REM on the CTX day in the MUS-Vul group. The VEH-Res and MUS-Res rats showed similar levels of REM on both ST and CTX days. The effects of post-ST inactivation of BLA on freezing and SIH were minimal. Outbred Wistar rats can show significant individual differences in the effects of stress on REM that are mediated by BLA. These differences in REM can be independent of behavioral fear and the peripheral stress response, and may be an important biomarker of stress resilience and vulnerability. © 2016 Associated Professional Sleep Societies, LLC.

  16. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model) and the Social Vulnerability Index (SoVI model) - a case study for Bucharest, Romania

    Science.gov (United States)

    Armaş, I.; Gavriş, A.

    2013-06-01

    In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model) and the spatial multi-criteria social vulnerability index (SEVI model). Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA). This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  17. [Empowerment, stress vulnerability and burnout among Portuguese nursing staff].

    Science.gov (United States)

    Orgambídez-Ramos, Alejandro; Borrego-Alés, Yolanda; Ruiz-Frutos, Carlos

    2018-01-01

    The work environment in Portuguese hospitals, characterized by economic cutbacks, can lead to higher levels of burnout experienced by nursing staff. Furthermore, vulnerability to stress can negatively affect the perception of burnout in the workplace. However, structural empowerment is an organizational process that can prevent and decrease burnout among nurses. Consequently, the aim of the study was to examine to what extent structural empowerment and vulnerability to stress can play a predictive role in core burnout in a sample of Portuguese nurses. A convenience sample of 297 nursing staff members from Portuguese hospitals was used in this study. Core burnout was negatively and significantly related to all the dimensions of structural empowerment, and it was positively and significantly related to vulnerability to stress. Regression models showed that core burnout was significantly predicted by access to funds, access to opportunities and vulnerability to stress. Organizational administrations must make every effort in designing interventions focused on structural empowerment, as well as interventions focused on individual interventions that enhance skills for coping with stress.

  18. An Assessment of the radiological vulnerability for Spanish soils

    International Nuclear Information System (INIS)

    Trueba, C.; Millan, R.; Schimid, T.; Lago, C.; Gutierrez, J.

    2000-01-01

    A methodology is presented to assess the radiological vulnerability of soils, based exclusively on their pedagogical properties. The radiological vulnerability defined as the potential capacity of soils to fix or transfer deposited radiocaesium and radiostrontium to plants, is represented in terms of vulnerability indexes. Two pathways are considered, the external irradiation and their transfer through the food chain, where the top horizon and a critical depth of 60 cm is taken into account, respectively, Partial vulnerability indexes are considered for each pathway, which allows a qualitative prediction of the behaviour of the contaminants in soils Global indexes have been obtained as the sum of the partial indexes. The methodology has been applied and validated using a data base consisting of more than 2000 soil profiles selected from all over Spain. This included a pedagogical characterisation and normalisation of the different soil profiles. Results have been obtained for individual soil profiles and with the aid of a GIS, the distribution of the partial and global indexes have been presented for the most representative soil types. (Author)

  19. Concurrent Disorders and Health Care Utilization Among Homeless and Vulnerably Housed Persons in Canada.

    Science.gov (United States)

    Zhang, Linda; Norena, Monica; Gadermann, Anne; Hubley, Anita; Russell, Lara; Aubry, Tim; To, Matthew J; Farrell, Susan; Hwang, Stephen; Palepu, Anita

    2018-03-01

    Individuals who are homeless or vulnerably housed have a higher prevalence of concurrent disorders, defined as having a mental health diagnosis and problematic substance use, compared to the general housed population. The study objective was to investigate the effect of having concurrent disorders on health care utilization among homeless or vulnerably housed individuals, using longitudinal data from the Health and Housing in Transition Study. In 2009, 1190 homeless or vulnerably housed adults were recruited in Ottawa, Toronto, and Vancouver, Canada. Participants completed baseline interviews and four annual follow-up interviews, providing data on sociodemographics, housing history, mental health diagnoses, problematic drug use with the Drug Abuse Screening Test (DAST-10), problematic alcohol use with the Alcohol Use Disorders Identification Test (AUDIT), chronic health conditions, and utilization of the following health care services: emergency department (ED), hospitalization, and primary care. Concurrent disorders were defined as the participant having ever received a mental health diagnosis at baseline and having problematic substance use (i.e., DAST-10 ≥ 6 and/or AUDIT ≥ 20) at any time during the study period. Three generalized mixed effects logistic regression models were used to examine the independent association of having concurrent disorders and reporting ED use, hospitalization, or primary care visits in the past 12 months. Among our sample of adults who were homeless or vulnerably housed, 22.6% (n = 261) reported having concurrent disorders at baseline. Individuals with concurrent disorders had significantly higher odds of ED use (adjusted odds ratio [AOR] = 1.71; 95% confidence interval [CI], 1.4-2.11), hospitalization (AOR = 1.45; 95% CI, 1.16-1.81), and primary care visits (AOR = 1.34; 95% CI, 1.05-1.71) in the past 12 months over the four-year follow-up period, after adjusting for potential confounders. Concurrent disorders were associated with

  20. Sex hormones play a role in vulnerability to sleep loss on emotion processing tasks

    Directory of Open Access Journals (Sweden)

    K.A. Lustig

    2018-06-01

    Full Text Available The central aim of this study was to investigate hormones as a predictor of individual vulnerability or resiliency on emotion processing tasks following one night of sleep restriction. The restriction group was instructed to sleep 3 a.m.–7 a.m. (13 men, 13 women in follicular phase, 10 women in luteal phase of menstrual cycle, and a control group slept 11 p.m.–7 a.m. (12 men, 12 follicular women, 12 luteal women. Sleep from home was verified with actigraphy. Saliva samples were collected on the evening prior to restriction, and in the morning and afternoon following restriction, to measure testosterone, estradiol, and progesterone. In the laboratory, event-related potentials (ERPs were recorded during presentation of images and faces to index neural processing of emotional stimuli. Compared to controls, sleep-restricted participants had a larger amplitude Late Positive Potential (LPP ERP to positive vs neutral images, reflecting greater motivated attention towards positive stimuli. Sleep-restricted participants were also less accurate categorizing sad faces and exhibited a larger N170 to sad faces, reflecting greater neural reactivity. Sleep-restricted luteal women were less accurate categorizing all images compared to control luteal women, and progesterone was related to several outcomes. Morning testosterone in men was lower in the sleep-restricted group compared to controls; lower testosterone was associated with lower accuracy to positive images, a greater difference between positive vs neutral LPP amplitude, and lower accuracy to sad and fearful faces. In summary, women higher in progesterone and men lower in testosterone were more vulnerable to the effects of sleep restriction on emotion processing tasks. This study highlights a role for sex and sex hormones in understanding individual differences in vulnerability to sleep loss. Keywords: Sleep restriction, Emotion processing, Testosterone, Progesterone, Estradiol

  1. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  2. Northeast and Midwest regional species and habitats at greatest risk and most vulnerable to climate impacts

    Science.gov (United States)

    Staudinger, Michelle D.; Hilberg, Laura; Janowiak, Maria; Swanton, C.O.

    2016-01-01

    The objectives of this Chapter are to describe climate change vulnerability, it’s components, the range of assessment methods being implemented regionally, and examples of training resources and tools. Climate Change Vulnerability Assessments (CCVAs) have already been conducted for numerous Regional Species of Greatest Conservation Need and their dependent 5 habitats across the Northeast and Midwest. This chapter provides a synthesis of different assessment frameworks, information on the locations (e.g., States) where vulnerability assessments were conducted, lists of individual species and habitats with their respective vulnerability rankings, and a comparison of how vulnerability rankings were determined among studies.

  3. Mapping the Drivers of Climate Change Vulnerability for Australia's Threatened Species.

    Directory of Open Access Journals (Sweden)

    Jasmine R Lee

    Full Text Available Effective conservation management for climate adaptation rests on understanding the factors driving species' vulnerability in a spatially explicit manner so as to direct on-ground action. However, there have been only few attempts to map the spatial distribution of the factors driving vulnerability to climate change. Here we conduct a species-level assessment of climate change vulnerability for a sample of Australia's threatened species and map the distribution of species affected by each factor driving climate change vulnerability across the continent. Almost half of the threatened species assessed were considered vulnerable to the impacts of climate change: amphibians being the most vulnerable group, followed by plants, reptiles, mammals and birds. Species with more restricted distributions were more likely to show high climate change vulnerability than widespread species. The main factors driving climate change vulnerability were low genetic variation, dependence on a particular disturbance regime and reliance on a particular moisture regime or habitat. The geographic distribution of the species impacted by each driver varies markedly across the continent, for example species impacted by low genetic variation are prevalent across the human-dominated south-east of the country, while reliance on particular moisture regimes is prevalent across northern Australia. Our results show that actions to address climate adaptation will need to be spatially appropriate, and that in some regions a complex suite of factors driving climate change vulnerability will need to be addressed. Taxonomic and geographic variation in the factors driving climate change vulnerability highlights an urgent need for a spatial prioritisation of climate adaptation actions for threatened species.

  4. Participatory flood vulnerability assessment: a multi-criteria approach

    Directory of Open Access Journals (Sweden)

    M. M. de Brito

    2018-01-01

    Full Text Available This paper presents a participatory multi-criteria decision-making (MCDM approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP and analytical network process (ANP multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  5. Vulnerability Analysis of Physical Protection System at Hypothetical Facility

    International Nuclear Information System (INIS)

    Jung, Won Moog; Lee, Ho Jin; Yu, Dong Han; Min, Gyung Sik

    2006-01-01

    Since the 9/11 event in the U.S.A, International terror possibilities has been increasing for nuclear facilities including nuclear power plants(NPPs). It is necessary to evaluate the performance of an existing physical protection system(PPS) at nuclear facilities based on such malevolent acts. A PPS is a complex configuration of detection, delay, and response elements. Detection, delay, and response elements are all important to the analysis and evaluation of a PPS and its effectiveness. Methods are available to analyze a PPS and evaluate its effectiveness. Sandia National Laboratory(SNL) in the U.S.A was developed a System Analysis of Vulnerability to Intrusion (SAVI) computer code for evaluating the effectiveness of PPS against outsider threats. This study presents the vulnerability analysis of the PPS at hypothetical facility using SAVI code that the basic input parameters are from PPS of Hanaro Research Reactor at Korea Atomic Energy Research Institution. It is understand that PPS of research reactor and critical assemblies are deficient that that of NPP and nuclear materials of RRCAS are compact to transport For analysis, first, the site-specific Adversary Sequence Diagrams(ASDs) of the PPS is constructed. It helps to understand the functions of the existing PPS composed of physical areas and Protection Elements(PEs). Then, the most vulnerable path of an ASD as a measure of effectiveness is determined. The results in the analysis can used to suggest the possible PPS upgrades to the most vulnerable paths for the system like research reactor

  6. Why friendships end up? An analysis from the Goffman sense of vulnerability

    Directory of Open Access Journals (Sweden)

    Mauro Koury

    2015-05-01

    Full Text Available This paper aims to discuss the friendship through the vulnerabilities that relations between friends are exposed indaily life. Therefore, in the analysis of vulnerabilities in the relationship between friends aims to understand whysome come to an end. At first, try to establish an approximate relationship between falling in love, love and friendship,to then discuss the social and moral relations produced in a process of friendship and love between friends,and vulnerabilities that discuss, complicate and tighten some relationships and lead others to a close. The analysisis full of comments taken from interviews conducted over several years in all Brazilian state capitals, and who claimthe existence of friendships so intense that felt as eternal, or so that desired look. I try to understand the startlesome interviewees when they having experienced long friendships, suddenly, one day, these relational if it strangeand everything built together lost or seems to lose meaning, and comes to an end.

  7. Rare species support vulnerable functions in high-diversity ecosystems.

    Directory of Open Access Journals (Sweden)

    David Mouillot

    Full Text Available Around the world, the human-induced collapses of populations and species have triggered a sixth mass extinction crisis, with rare species often being the first to disappear. Although the role of species diversity in the maintenance of ecosystem processes has been widely investigated, the role of rare species remains controversial. A critical issue is whether common species insure against the loss of functions supported by rare species. This issue is even more critical in species-rich ecosystems where high functional redundancy among species is likely and where it is thus often assumed that ecosystem functioning is buffered against species loss. Here, using extensive datasets of species occurrences and functional traits from three highly diverse ecosystems (846 coral reef fishes, 2,979 alpine plants, and 662 tropical trees, we demonstrate that the most distinct combinations of traits are supported predominantly by rare species both in terms of local abundance and regional occupancy. Moreover, species that have low functional redundancy and are likely to support the most vulnerable functions, with no other species carrying similar combinations of traits, are rarer than expected by chance in all three ecosystems. For instance, 63% and 98% of fish species that are likely to support highly vulnerable functions in coral reef ecosystems are locally and regionally rare, respectively. For alpine plants, 32% and 89% of such species are locally and regionally rare, respectively. Remarkably, 47% of fish species and 55% of tropical tree species that are likely to support highly vulnerable functions have only one individual per sample on average. Our results emphasize the importance of rare species conservation, even in highly diverse ecosystems, which are thought to exhibit high functional redundancy. Rare species offer more than aesthetic, cultural, or taxonomic diversity value; they disproportionately increase the potential breadth of functions provided by

  8. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model and the Social Vulnerability Index (SoVI model – a case study for Bucharest, Romania

    Directory of Open Access Journals (Sweden)

    I. Armaș

    2013-06-01

    Full Text Available In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model and the spatial multi-criteria social vulnerability index (SEVI model. Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA. This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  9. Community perspectives on research consent involving vulnerable children in Western Kenya.

    Science.gov (United States)

    Vreeman, Rachel; Kamaara, Eunice; Kamanda, Allan; Ayuku, David; Nyandiko, Winstone; Atwoli, Lukoye; Ayaya, Samuel; Gisore, Peter; Scanlon, Michael; Braitstein, Paula

    2012-10-01

    Involving vulnerable pediatric populations in international research requires culturally appropriate ethical protections. We sought to use mabaraza, traditional East African community assemblies, to understand how a community in western Kenya viewed participation of children in health research and informed consent and assent processes. Results from 108 participants revealed generally positive attitudes towards involving vulnerable children in research, largely because they assumed children would directly benefit. Consent from parents or guardians was understood as necessary for participation while gaining child assent was not. They felt other caregivers, community leaders, and even community assemblies could participate in the consent process. Community members believed research involving orphans and street children could benefit these vulnerable populations, but would require special processes for consent.

  10. An atmospheric vulnerability assessment framework for environment management and protection based on CAMx.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-02-01

    This paper presents an atmospheric vulnerability assessment framework based on CAMx that should be helpful to assess potential impacts of changes in human, atmospheric environment, and social economic elements of atmospheric vulnerability. It is also a useful and effective tool that can provide policy-guidance for environmental protection and management to reduce the atmospheric vulnerability. The developed framework was applied to evaluate the atmospheric environment vulnerability of 13 cities in the Beijing-Tianjin-Hebei (BTH) region for verification. The results indicated that regional disparity of the atmospheric vulnerability existed in the study site. More specifically, the central and southern regions show more atmospheric environment vulnerability than the northern regions. The impact factors of atmospheric environment vulnerability in the BTH region mainly derived from increasing population press, frequently unfavorable meteorological conditions, extensive economic growth of secondary industry, increased environmental pollution, and accelerating population aging. The framework shown in this paper is an interpretative and heuristic tool for a better understanding of atmospheric vulnerability. This framework can also be replicated at different spatial and temporal scales using context-specific datasets to straightly support environmental managers with decision-making. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. The origins of cognitive vulnerability in early childhood: mechanisms linking early attachment to later depression.

    Science.gov (United States)

    Morley, Tara E; Moran, Greg

    2011-11-01

    This paper examines the theory and research linking attachment relationships to cognitive vulnerability to depression and assesses evidence that early attachment experiences contribute to the development of these cognitive processes. Most research in this area has involved adult participants using self-report measures of both attachment and depressive vulnerabilities and thus cannot convincingly speak to the existence of such a developmental pathway. Several studies, however, have followed individuals from infancy and examined the emergence of self-esteem and responses to failure throughout childhood and adolescence. These studies suggest that early experiences in non-secure attachment relationships place an individual at-risk for developing a cognitive framework that increases their vulnerability to depression following stressful life events. The paper concludes with a discussion of how future research might best explore specific mechanisms through which distinct attachment relationships may lead to divergent developmental pathways sharing the common outcome of cognitive processes that place individuals at risk for depression. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Guilt and Proneness to Shame: Unethical Behaviour in Vulnerable and Grandiose Narcissism

    Science.gov (United States)

    Poless, Pauline Georgees; Torstveit, Linda; Lugo, Ricardo Gregorio; Andreassen, Marita; Sütterlin, Stefan

    2018-01-01

    Narcissists are described as individuals with dysfunctional personality traits such as lack of psychological awareness and empathy. Theories of ethical behaviour assume that unethical actions trigger moral emotions of guilt and shame. Currently, there is a lack of knowledge on moral emotions as dispositional traits and their potential influences on behaviour in individuals with narcissistic traits. The present study examined vulnerable and grandiose narcissism’s differences in the propensity to experience guilt and shame as a proneness, across a range of personal transgressions. Guilt proneness was measured by negative evaluation of unethical behaviour, and whether this evaluation could influence reparation of tendencies of unethical action in vulnerable and grandiose narcissism. Shame proneness was investigated by negative evaluation of the self, and then whether the previous tendency could affect unethical decision making and behaviour (e.g., hiding), in vulnerable and grandiose narcissism. Two hundred and sixteen participants responded to the Guilt and Shame Proneness Scale, the Narcissistic Personality Inventory Scale and the Hypersensitive Narcissism Scale in an online questionnaire. Findings indicate that grandiose narcissism was negatively associated with guilt proneness, and the relation between the vulnerable narcissism and guilt proneness was negative. Additionally, the results confirm a negative association between grandiose narcissism and shame proneness, especially related to the subscale ‘shame negative self-evaluation’. Furthermore, guilt and shame proneness explained 20% of the variance in vulnerable narcissism and 11% in grandiose narcissism. This research indicates that both vulnerable and grandiose narcissism have the tendency to make unethical decisions, and they are more likely to enact in unethical behaviour. These findings are relevant for the detection of narcissistic individual’s propensity to act unethically in social context.

  13. Guilt and Proneness to Shame: Unethical Behaviour in Vulnerable and Grandiose Narcissism

    Directory of Open Access Journals (Sweden)

    Pauline Georgees Poless

    2018-03-01

    Full Text Available Narcissists are described as individuals with dysfunctional personality traits such as lack of psychological awareness and empathy. Theories of ethical behaviour assume that unethical actions trigger moral emotions of guilt and shame. Currently, there is a lack of knowledge on moral emotions as dispositional traits and their potential influences on behaviour in individuals with narcissistic traits. The present study examined vulnerable and grandiose narcissism’s differences in the propensity to experience guilt and shame as a proneness, across a range of personal transgressions. Guilt proneness was measured by negative evaluation of unethical behaviour, and whether this evaluation could influence reparation of tendencies of unethical action in vulnerable and grandiose narcissism. Shame proneness was investigated by negative evaluation of the self, and then whether the previous tendency could affect unethical decision making and behaviour (e.g., hiding, in vulnerable and grandiose narcissism. Two hundred and sixteen participants responded to the Guilt and Shame Proneness Scale, the Narcissistic Personality Inventory Scale and the Hypersensitive Narcissism Scale in an online questionnaire. Findings indicate that grandiose narcissism was negatively associated with guilt proneness, and the relation between the vulnerable narcissism and guilt proneness was negative. Additionally, the results confirm a negative association between grandiose narcissism and shame proneness, especially related to the subscale ‘shame negative self-evaluation’. Furthermore, guilt and shame proneness explained 20% of the variance in vulnerable narcissism and 11% in grandiose narcissism. This research indicates that both vulnerable and grandiose narcissism have the tendency to make unethical decisions, and they are more likely to enact in unethical behaviour. These findings are relevant for the detection of narcissistic individual’s propensity to act unethically in

  14. Assessing vulnerability to drought: identifying underlying factors across Europe

    Science.gov (United States)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    data from the European Drought Impact Report Inventory. For specific hotpots vulnerability factors are presented also through spider diagrams in order to allow policy and decision makers to identify underlying sources of vulnerability in the European context. This assessment offers an overall picture at a European level that strives to contribute to enhance the understanding of drought vulnerability across Europe.

  15. Community vulnerability to health impacts of wildland fire ...

    Science.gov (United States)

    Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on factors known to increase the risks of health effects from air pollution and wildfire smoke exposures. These factors included county prevalence rates for asthma in children and adults, chronic obstructive pulmonary disease, hypertension, diabetes, obesity, percent of population 65 years of age and older, and indicators of socioeconomic status including poverty, education, income and unemployment. Using air quality simulated for the period between 2008 and 2012 over the continental U.S. we also characterized the population size at risk with respect to the level and duration of exposure to fire-originated fine particulate matter (fire-PM2.5) and CHVI. We estimate that 10% of the population (30.5 million) lived in the areas where the contribution of fire-PM2.5 to annual average ambient PM2.5 was high (>1.5 µg m3) and that 10.3 million individuals experienced unhealthy air quality levels for more than 10 days due to smoke. Using CHVI we identified the most vulnerable counties and determined that these communities experience more smoke exposures in comparison to less vulnerable communities. We describe the development of an index of community vulnerability for the health effects of smoke based o

  16. Mapping fires and American Red Cross aid using demographic indicators of vulnerability.

    Science.gov (United States)

    Lue, Evan; Wilson, John P

    2017-04-01

    Social vulnerability indicators can assist with informing disaster relief preparation. Certain demographic segments of a population may suffer disproportionately during disaster events, and a geographical understanding of them can help to determine where to place strategically logistical assets and to target disaster-awareness outreach endeavours. Records of house fire events and American Red Cross aid provision over a five-year period were mapped for the County of Los Angeles, California, United States, to examine the congruence between actual events and expectations of risk based on vulnerability theory. The geographical context provided by the data was compared with spatially-explicit indicators of vulnerability, such as age, race, and wealth. Fire events were found to occur more frequently in more vulnerable areas, and Red Cross aid was found to have an even stronger relationship to those places. The findings suggest that these indicators speak beyond vulnerability and relate to patterns of fire risk. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  17. Vulnerability assessment of the Toluca Valley aquifer combining a parametric approach and advective transport

    International Nuclear Information System (INIS)

    Gárfias, J.; Llanos, H.; Franco, R.; Martel, R.

    2017-01-01

    Groundwater vulnerability assessment is an important task in water resources and land management. Depending on the availability of data and the complexity of the hydrogeological conditions, different approaches can be adopted. As an alternative, this study involves the use of a combined approach based on vulnerability methods and advective particle tracking to better understand the susceptibility to contamination in the Toluca valley aquifer. An intrinsic vulnerability map (DRASTIC) was used to identify areas that are more susceptible to ground water contamination. To estimate advective particle tracking, we developed a 3D flow model using VisualModflow and MODPATH to describe the regional flow of groundwater. The vulnerability map demonstrates the problematic application and interpretation of qualitative the vulnerability method of the parametric system group, which indicates a difference of approximately 23% when compared with the modified vulnerability map. Potential contamination sources based on landfill sites were comparatively high; approximately 76% are located in areas that could be susceptible to contamination through vertical infiltration, especially those that are located along the Lerma system of wells. Industrial parks located in the centre of the valley (83%), where continuous extraction of groundwater and land subsidence occurs, have been classified as high vulnerability zones, increasing the risk of contaminants from surface sources reaching the groundwater. In order to understand the susceptibility to contamination in the aquifer, various delineation approaches should be adopted and all the results that validate each other should be considered, thus making a good strategy for implementing different degrees of protection measures. [es

  18. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  19. Between Autonomy and Vulnerability : the Space of Movement

    Directory of Open Access Journals (Sweden)

    Kevin McDonald

    2011-03-01

    Full Text Available Analyses of the contemporary alterglobalization movement increasingly emphasize dimensions of autonomy, whose ultimate origins lie in theories of agency understood as sovereignty. This paper argues that critical dimensions of the alterglobalization movement involve practices of embodied action and forms of responsibility that point beyond autonomy, to a paradigm of relational vulnerability. Recognising this is central to understanding ethics, agency, and subjectivity and to understanding movements as a space of experience.

  20. Vulnerability for cocaine dependence / Involvement of µ-opioid receptors

    NARCIS (Netherlands)

    Lesscher, Heidi Maria Bonifacio

    2004-01-01

    Drug dependence is a major health issue worldwide, which is characterised by its persistence and high rates of relapse. Individual differences exist in the vulnerability for drug dependence after first exposure to drugs of abuse like cocaine. A likely risk factor for drug dependence is the

  1. Pregnancy-associated plasma protein-A and the vulnerable plaque

    DEFF Research Database (Denmark)

    Jespersen, Camilla H B; Vestergaard, Kirstine R; Schou, Morten

    2014-01-01

    For more than a decade, pregnancy-associated plasma protein-A (PAPP-A) has been examined for its relation to acute coronary syndrome (ACS) and the vulnerable plaque. This review summarizes the current knowledge of plasma PAPP-A in relation to nonpregnant individuals focusing on patients with ACS...

  2. Adolescent Anxiety : Development, Individual Vulnerability, and Social Relationships

    NARCIS (Netherlands)

    Nelemans, S.|info:eu-repo/dai/nl/357399722

    2015-01-01

    The general aim of this dissertation was to extend current knowledge on the development of adolescent anxiety in the general population, by (1) examining developmental patterns of anxiety and individual differences in these patterns from childhood throughout adolescence, as well as concurrent

  3. Mobile population dynamics and malaria vulnerability: a modelling study in the China-Myanmar border region of Yunnan Province, China.

    Science.gov (United States)

    Chen, Tian-Mu; Zhang, Shao-Sen; Feng, Jun; Xia, Zhi-Gui; Luo, Chun-Hai; Zeng, Xu-Can; Guo, Xiang-Rui; Lin, Zu-Rui; Zhou, Hong-Ning; Zhou, Shui-Sen

    2018-04-29

    The China-Myanmar border region presents a great challenge in malaria elimination in China, and it is essential to understand the relationship between malaria vulnerability and population mobility in this region. A community-based, cross-sectional survey was performed in five villages of Yingjiang county during September 2016. Finger-prick blood samples were obtained to identify asymptomatic infections, and imported cases were identified in each village (between January 2013 and September 2016). A stochastic simulation model (SSM) was used to test the relationship between population mobility and malaria vulnerability, according to the mechanisms of malaria importation. Thirty-two imported cases were identified in the five villages, with a 4-year average of 1 case/year (range: 0-5 cases/year). No parasites were detected in the 353 blood samples from 2016. The median density of malaria vulnerability was 0.012 (range: 0.000-0.033). The average proportion of mobile members of the study population was 32.56% (range: 28.38-71.95%). Most mobile individuals lived indoors at night with mosquito protection. The SSM model fit the investigated data (χ 2  = 0.487, P = 0.485). The average probability of infection in the members of the population that moved to Myanmar was 0.011 (range: 0.0048-0.1585). The values for simulated vulnerability increased with greater population mobility in each village. A high proportion of population mobility was associated with greater malaria vulnerability in the China-Myanmar border region. Mobile population-specific measures should be used to decrease the risk of malaria re-establishment in China.

  4. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  5. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1

    International Nuclear Information System (INIS)

    Kahal, E.J.; Murphy, S.L.; Salaymeh, S.R.

    1994-09-01

    As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilities identified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

  6. Aging and depression vulnerability interaction results in decreased serotonin innervation associated with reduced BDNF levels in hippocampus of rats bred for learned helplessness.

    Science.gov (United States)

    Aznar, Susana; Klein, Anders B; Santini, Martin A; Knudsen, Gitte M; Henn, Fritz; Gass, Peter; Vollmayr, Barbara

    2010-07-01

    Epidemiological studies have revealed a strong genetic contribution to the risk for depression. Both reduced hippocampal serotonin neurotransmission and brain-derived neurotrophic factor (BDNF) levels have been associated with increased depression vulnerability and are also regulated during aging. Brains from young (5 months old) and old (13 months old) congenital Learned Helplessness rats (cLH), and congenital Non Learned Helplessness rats (cNLH) were immunohistochemically stained for the serotonin transporter and subsequently stereologically quantified for estimating hippocampal serotonin fiber density. Hippocampal BDNF protein levels were measured by ELISA. An exacerbated age-related loss of serotonin fiber density specific for the CA1 area was observed in the cLH animals, whereas reduced hippocampal BDNF levels were seen in young and old cLH when compared with age-matched cNLH controls. These observations indicate that aging should be taken into account when studying the neurobiological factors behind the vulnerability for depression and that understanding the effect of aging on genetically predisposed individuals may contribute to a better understanding of the pathophysiology behind depression, particularly in the elderly.

  7. Selective neuronal vulnerability to oxidative stress in the brain

    Directory of Open Access Journals (Sweden)

    Xinkun Wang

    2010-03-01

    Full Text Available Oxidative stress (OS, caused by the imbalance between the generation and detoxification of reactive oxygen and nitrogen species (ROS/RNS, plays an important role in brain aging, neurodegenerative diseases, and other related adverse conditions, such as ischemia. While ROS/RNS serve as signaling molecules at physiological levels, an excessive amount of these molecules leads to oxidative modification and, therefore, dysfunction of proteins, nucleic acids, and lipids. The response of neurons to this pervasive stress, however, is not uniform in the brain. While many brain neurons can cope with a rise in OS, there are select populations of neurons in the brain that are vulnerable. Because of their selective vulnerability, these neurons are usually the first to exhibit functional decline and cell death during normal aging, or in age-associated neurodegenerative diseases, such as Alzheimer’s disease. Understanding the molecular and cellular mechanisms of selective neuronal vulnerability (SNV to OS is important in the development of future intervention approaches to protect such vulnerable neurons from the stresses of the aging process and the pathological states that lead to neurodegeneration. In this review, the currently known molecular and cellular factors that contribute to SNV to OS are summarized. Included among the major underlying factors are high intrinsic OS, high demand for ROS/RNS-based signaling, low ATP production, mitochondrial dysfunction, and high inflammatory response in vulnerable neurons. The contribution to the selective vulnerability of neurons to OS by other intrinsic or extrinsic factors, such as deficient DNA damage repair, low calcium-buffering capacity, and glutamate excitotoxicity, are also discussed.

  8. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

    Science.gov (United States)

    Williams, Patricia Ah; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.

  9. Living in Harmony with Disaster: Exploring Volcanic Hazard Vulnerability in Indonesia

    Directory of Open Access Journals (Sweden)

    Sea Eun Cho

    2016-08-01

    Full Text Available This article illustrates the multi-faceted notion of hazard vulnerability and the complicated relations a community has with a hazardous area based on a joint urban planning and design studio between Seoul National University and Diponegoro University in 2014. The study focused on an area in Central Java, Indonesia, surrounded by four active volcanic mountains, and explored the economic, environmental and social vulnerability associated with the site. Although initially the study focused on drawing up and improving the relocation plan, it was soon discovered that eliminating environmental vulnerability by relocating residents to new sites may in fact increase their economic vulnerability. This led the study to embrace the concept of living in harmony with disaster. In conclusion, the results of the study are discussed in terms recognizing environmental hazards as a vehicle for understanding local perceptions, and utilizing these perceptions to suggest mitigation measures that are more responsive to the site at risk.

  10. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

    Science.gov (United States)

    Williams, Patricia AH; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513

  11. Sources of Individual Differences in Children’s Understanding of Fractions

    Science.gov (United States)

    Vukovic, Rose K.; Fuchs, Lynn S.; Geary, David C.; Jordan, Nancy C.; Gersten, Russell; Siegler, Robert S.

    2014-01-01

    Longitudinal associations of domain-general and numerical competencies with individual differences in children’s understanding of fractions were investigated. Children (n = 163) were assessed at 6 years of age on domain-general (nonverbal reasoning, language, attentive behavior, executive control, visual-spatial memory) and numerical (number knowledge) competencies; at 7 years on whole-number arithmetic computations and number line estimation; and at 10 years on fraction concepts. Mediation analyses controlling for general mathematics ability and general academic ability revealed that numerical and mathematical competencies were direct predictors of fraction concepts whereas domain-general competencies supported the acquisition of fraction concepts via whole-number arithmetic computations or number line estimation. Results indicate multiple pathways to fraction competence. PMID:24433246

  12. A framework for the selection and ensemble development of flood vulnerability models

    Science.gov (United States)

    Figueiredo, Rui; Schröter, Kai; Kreibich, Heidi; Martina, Mario

    2017-04-01

    Effective understanding and management of flood risk requires comprehensive risk assessment studies that consider not only the hazard component, but also the impacts that the phenomena may have on the built environment, economy and society. This integrated approach has gained importance over recent decades, and with it so has the scientific attention given to flood vulnerability models describing the relationships between flood intensity metrics and damage to physical assets, also known as flood loss models. Despite considerable progress in this field, many challenges persist. Flood damage mechanisms are complex and depend on multiple variables, which can have different degrees of importance depending on the application setting. In addition, data required for the development and validation of such models tend to be scarce, particularly in data poor regions. These issues are reflected in the large amount of flood vulnerability models that are available in the literature today, as well as in their high heterogeneity: they are built with different modelling approaches, in different geographic contexts, utilizing different explanatory variables, and with varying levels of complexity. Notwithstanding recent developments in this area, uncertainty remains high, and large disparities exist among models. For these reasons, identifying which model or models, given their properties, are appropriate for a given context is not straightforward. In the present study, we propose a framework that guides the structured selection of flood vulnerability models and enables ranking them according to their suitability for a certain application, based on expert judgement. The approach takes advantage of current state of the art and most up-to-date knowledge on flood vulnerability processes. Given the heterogeneity and uncertainty currently present in flood vulnerability models, we propose the use of a model ensemble. With this in mind, the proposed approach is based on a weighting scheme

  13. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  14. Natural and environmental vulnerability analysis through remote sensing and GIS techniques: a case study of Indigirka River basin, Eastern Siberia, Russia

    Science.gov (United States)

    Boori, Mukesh S.; Choudhary, Komal; Kupriyanov, Alexander; Sugimoto, Atsuko; Evers, Mariele

    2016-10-01

    The aim of this research work is to understand natural and environmental vulnerability situation and its cause such as intensity, distribution and socio-economic effect in the Indigirka River basin, Eastern Siberia, Russia. This paper identifies, assess and classify natural and environmental vulnerability using landscape pattern from multidisciplinary approach, based on remote sensing and Geographical Information System (GIS) techniques. A model was developed by following thematic layers: land use/cover, vegetation, wetland, geology, geomorphology and soil in ArcGIS 10.2 software. According to numerical results vulnerability classified into five levels: low, sensible, moderate, high and extreme vulnerability by mean of cluster principal. Results are shows that in natural vulnerability maximum area covered by moderate (29.84%) and sensible (38.61%) vulnerability and environmental vulnerability concentrated by moderate (49.30%) vulnerability. So study area has at medial level vulnerability. The results found that the methodology applied was effective enough in the understanding of the current conservation circumstances of the river basin in relation to their environment with the help of remote sensing and GIS. This study is helpful for decision making for eco-environmental recovering and rebuilding as well as predicting the future development.

  15. Understanding how individuals perceive carbon dioxide. Implications for acceptance of carbon dioxide capture and storage

    Energy Technology Data Exchange (ETDEWEB)

    Itaoka, K.; Saito, A. [Mizuho Information and Research Institute, Tokyo (Japan); Paukovic, M.; De Best-Waldhober, M. [ECN Policy Studies, Petten (Netherlands); Dowd, A.M.; Jeanneret, T.; Ashworth, P.; James, M. [The Global CCS Institute, Canberra (Australia)

    2012-06-15

    Carbon dioxide capture and storage (CCS) presents one potential technological solution for mitigating the atmospheric emission of carbon dioxide sources. However, CCS is a relatively new technology with associated uncertainties and perceived risks. For this reason, a growing body of research now focuses on public perceptions and potential for societal acceptance of CCS technology. Almost all explanations of CCS technology make reference to carbon dioxide, with an assumption that the general public understands CO2. It has become apparent that the general public’s knowledge and understanding of CO2’s properties influences how they engage with CO2 emitting industries and CCS technologies. However, surprisingly little research has investigated public perceptions, knowledge, and understanding of CO2. This investigation attempts to fill that gap. This report describes an investigation of how citizens of three countries (Japan, Australia, and the Netherlands) perceive CO2. Furthermore, it attempts to relate individual perceptions of CO2 to perceptions of CCS, and to determine how information provision about the underlying properties and characteristics of CO2 influences individual attitudes towards low carbon energy options, particularly CCS. In brief, the research had four ultimate aims. It aimed to: Explore the public’s knowledge and understanding of the properties of CO2; Examine the influence of that knowledge on their perceptions of CO2 and CCS; Investigate how information provision about the underlying properties and characteristics of CO2 influences individual attitudes towards CCS; and Identify if any differences between countries exist in relation to values and beliefs, knowledge of CO2’s properties, and CCS perceptions.

  16. Addressing the vulnerabilities of pass-thoughts

    Science.gov (United States)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  17. Key Stakeholders' Perceptions of Motivators for Research Participation Among Individuals Who Are Incarcerated.

    Science.gov (United States)

    Hanson, Bridget L; Faulkner, Sherilyn A; Brems, Christiane; Corey, Staci L; Eldridge, Gloria D; Johnson, Mark E

    2015-10-01

    Understanding motivations of research participants is crucial for developing ethical research protocols, especially for research with vulnerable populations. Through interviews with 92 institutional review board members, prison administrators, research ethicists, and researchers, we explored key stakeholders' perceptions of what motivates incarcerated individuals to participate in research. Primary motivators identified were a desire to contribute to society, gaining knowledge and health care, acquiring incentives, and obtaining social support. The potential for undue influence or coercion were also identified as motivators. These results highlight the need for careful analysis of what motivates incarcerated individuals to participate in research as part of developing or reviewing ethically permissible and responsible research protocols. Future research should expand this line of inquiry to directly include perspectives of incarcerated individuals. © The Author(s) 2015.

  18. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  19. Conservation genetics of the vulnerable Treur River barb, Barbus ...

    African Journals Online (AJOL)

    At present there are only two populations of the vulnerable Treur River barb, Barbus treurensis, in existence; a founder population in the upper Blyde River and a translocated population in the Treur River where the species became extinct. The translocated population was derived from individuals from the upper Blyde River ...

  20. International Student-Workers in Australia: A New Vulnerable Workforce

    Science.gov (United States)

    Nyland, Chris; Forbes-Mewett, Helen; Marginson, Simon; Ramia, Gaby; Sawir, Erlenawati; Smith, Sharon

    2009-01-01

    In the period immediately preceding the 2007 Australian election, much attention was accorded to the impact of the nation's labour laws on vulnerable employees. This debate centred on specific groups including women, youth, migrants and workers on individual employment contracts. International students, by contrast, were ignored in the debate.…

  1. Preventive practices in the elderly and vulnerability to HIV

    Directory of Open Access Journals (Sweden)

    Valéria Peixoto Bezerra

    Full Text Available Objective: To know the vulnerability of the elderly to the HIV infection in the context of preventive practices. Method: Exploratory qualitative study, lead from December 2012 to May 2013, with 37 nursing Coexistence Groups in João Pessoa - Paraiba. The Focus Group was elected as the research technique, and the empirical material obtained was subjected to a Content Analysis Technique, thematic modality. Results: The elderly recognize the importance of preventive practices, but they face difficulties in its use when their emotional relationships with their partners do not favor preventive behavior, resulting in vulnerability. The elderly showed the population groups most vulnerable to HIV and do not recognize themselves as such. Conclusion: The complexity of the various contexts experienced by the elderlies of this study indicate the need for more research that allows advances in the understanding of subjectivity imposed in relations that underlie the aging process and the experience of sexuality in this age group.

  2. Human vulnerability in volcanic environments: the case of Furnas, São Miguel, Azores

    Science.gov (United States)

    Dibben, Christopher; Chester, David K.

    1999-09-01

    The need to examine the vulnerability of people to natural hazards, in addition to the long-established requirement to study extreme events of nature, is being increasingly recognised within disaster research. Following a discussion of the nature of human vulnerability, we propose a framework for its analysis within the context of volcanic activity and we exemplify our approach by a detailed study of Furnas, a village located at the centre of a volcano with the same name on the island of São Miguel in the Azores. The methods used included in-depth interviews with permanent residents ( n=50), analysis of census records and an examination of the socio-economic history of the town. The vulnerability of an individual to volcanic hazards involves a complex interaction of elements which, in addition to the usual factors taken into account in programmes of hazard reduction (e.g., the nature of the physical threat, location and economic situation), also comprises his or her social context and a number of physiological and psychological considerations. It is argued, further, that both generally and in the case of Furnas, the root causes of vulnerability lie in the history and development of society. Individual decision making is fundamental but takes place within and cannot be separated from this social context. Vulnerability analysis allows the identification of points where intervention may be successful in reducing the likelihood of suffering in a society. It avoids the problem of people's unexpected reactions to invention leading to a changing or even increasing level of vulnerability, by studying society rather than just one aspect of volcanic hazard in isolation.

  3. Economic and hydrogeologic disparities govern the vulnerability of shared groundwater to strategic overdraft

    Science.gov (United States)

    Mullen, C.; Muller, M. F.

    2017-12-01

    Groundwater resources are depleting globally at an alarming rate. When the resource is shared, exploitation by individual users affects groundwater levels and increases pumping costs to all users. This incentivizes individual users to strategically over-pump, an effect that is challenging to keep in check because the underground nature of the resource often precludes regulations from being effectively implemented. As a result, shared groundwater resources are prone to tragedies of the commons that exacerbate their rapid depletion. However, we showed in a recent study that the vulnerability of aquifer systems to strategic overuse is strongly affected by local economic and physical characteristics, which suggests that not all shared aquifers are subject to tragedies of the commons. Building on these findings, we develop a vulnerability index based on coupled game theoretical and groundwater flow models. We show that vulnerability to strategic overdraft is driven by four intuitively interpretable adimensional parameters that describe economic and hydrogeologic disparities between the agents exploiting the aquifer. This suggests a scale-independent relation between the vulnerability of groundwater systems to common-pool overdraft and their economic and physical characteristics. We investigate this relation for a sample of existing aquifer systems and explore implications for enforceable groundwater agreements that would effectively mitigate strategic overdraft.

  4. Developing Social Interaction and Understanding in Individuals with Autism Spectrum Disorder: A Groupwork Intervention

    Science.gov (United States)

    MacKay, Tommy; Knott, Fiona; Dunlop, Aline-Wendy

    2007-01-01

    Background: Difficulties with social interaction and understanding lie at the heart of the communication disorder that characterises the autism spectrum. This study sought to improve social communication for individuals with autism spectrum disorder (ASD) by means of a groupwork intervention focusing on social and emotional perspective-taking,…

  5. How useful are Swiss flood insurance data for flood vulnerability assessments?

    Science.gov (United States)

    Röthlisberger, Veronika; Bernet, Daniel; Zischg, Andreas; Keiler, Margreth

    2015-04-01

    The databases of Swiss flood insurance companies build a valuable but to date rarely used source of information on physical flood vulnerability. Detailed insights into the Swiss flood insurance system are crucial for using the full potential of the different databases for research on flood vulnerability. Insurance against floods in Switzerland is a federal system, the modalities are manly regulated on cantonal level. However there are some common principles that apply throughout Switzerland. First of all coverage against floods (and other particular natural hazards) is an integral part of every fire insurance policy for buildings or contents. This coupling of insurance as well as the statutory obligation to insure buildings in most of the cantons and movables in some of the cantons lead to a very high penetration. Second, in case of damage, the reinstatement costs (value as new) are compensated and third there are no (or little) deductible and co-pay. High penetration and the fact that the compensations represent a large share of the direct, tangible losses of the individual policy holders make the databases of the flood insurance companies a comprehensive and therefore valuable data source for flood vulnerability research. Insurance companies not only store electronically data about losses (typically date, amount of claims payment, cause of damage, identity of the insured object or policyholder) but also about insured objects. For insured objects the (insured) value and the details on the policy and its holder are the main feature to record. On buildings the insurance companies usually computerize additional information such as location, volume, year of construction or purpose of use. For the 19 (of total 26) cantons with a cantonal monopoly insurer the data of these insurance establishments have the additional value to represent (almost) the entire building stock of the respective canton. Spatial referenced insurance data can be used for many aspects of

  6. Vulnerability of wives of Nepalese labor migrants to HIV infection

    DEFF Research Database (Denmark)

    Thapa, Subash; Bista, Nirmala; Hannes, Karin

    2016-01-01

    HIV risk is determined by the interaction between social and individual risk factors, but information about such factors among Nepalese women is not yet understood. Therefore, to assess the risk factors and vulnerability of the wives of Nepalese labor migrants to HIV infection, the authors...

  7. Vulnerability analysis in terms of food insecurity and poverty using GIS and remote sensing technology applied to Sri Lanka

    Science.gov (United States)

    Shahriar, Pervez M.; Ramachandran, Mahadevan; Mutuwatte, Lal

    2003-03-01

    It is becoming increasingly recognized that computer methods such as models and Geographic Information Systems (GIS) can be valuable tools for analyzing a geographical area in terms of it's hazards vulnerability, Vulnerability is an important aspect of households' experience of poverty. The measurement and analysis of poverty, inequality and vulnerability are crucial for cognitive purposes (to know what the situation is), for analytical purposes (to understand the factors determining this situation), for policy making purposes (to design interventions best adapted to the issues), and for monitoring and evaluation purposes (to assess whether current policies are effective, and whether the situation is changing). Here vulnerability defined as the probability or risk today of being in poverty - or falling deeper into poverty - in the future. Vulnerability is a key dimension of well being since it affects individuals' behavior (in terms of investment, production patterns, coping strategies) and their perception of their own situation. This study has been conducted with the joint collaboration of World Food Programme (WFP) and International Water Management Institute (IWMI) in Sri Lanka for identifying regions and population which are food insecure, for analyzing the reasons for vulnerability to food insecurity in order to provide decision-makers with information to identify possible sectors of intervention and for identifying where and for whom food aid can be best utilized in Sri Lanka. This new approach integrates GIS and Remote sensing with other statistical packages to allow consideration of more spatial/physical parameters like accessibility to economic resources, particularly land and the assets of the built environment, creating employment, and attracting investment in order to improve the quality and quantity of goods and services for the analysis which leads the analysis to represent the real scenario. For this study a detailed topographic data are being used

  8. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  9. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  10. Lessons from Red Data Books: Plant Vulnerability Increases with Floral Complexity.

    Science.gov (United States)

    Stefanaki, Anastasia; Kantsa, Aphrodite; Tscheulin, Thomas; Charitonidou, Martha; Petanidou, Theodora

    2015-01-01

    The architectural complexity of flower structures (hereafter referred to as floral complexity) may be linked to pollination by specialized pollinators that can increase the probability of successful seed set. As plant-pollinator systems become fragile, a loss of such specialized pollinators could presumably result in an increased likelihood of pollination failure. This is an issue likely to be particularly evident in plants that are currently rare. Using a novel index describing floral complexity we explored whether this aspect of the structure of flowers could be used to predict vulnerability of plant species to extinction. To do this we defined plant vulnerability using the Red Data Book of Rare and Threatened Plants of Greece, a Mediterranean biodiversity hotspot. We also tested whether other intrinsic (e.g. life form, asexual reproduction) or extrinsic (e.g. habitat, altitude, range-restrictedness) factors could affect plant vulnerability. We found that plants with high floral complexity scores were significantly more likely to be vulnerable to extinction. Among all the floral complexity components only floral symmetry was found to have a significant effect, with radial-flower plants appearing to be less vulnerable. Life form was also a predictor of vulnerability, with woody perennial plants having significantly lower risk of extinction. Among the extrinsic factors, both habitat and maximum range were significantly associated with plant vulnerability (coastal plants and narrow-ranged plants are more likely to face higher risk). Although extrinsic and in particular anthropogenic factors determine plant extinction risk, intrinsic traits can indicate a plant's proneness to vulnerability. This raises the potential threat of declining global pollinator diversity interacting with floral complexity to increase the vulnerability of individual plant species. There is potential scope for using plant-pollinator specializations to identify plant species particularly at

  11. Vulnerability to AIDS among the elderly in an urban center in central Brazil

    Directory of Open Access Journals (Sweden)

    Marta Driemeier

    2012-01-01

    Full Text Available OBJECTIVE: As the world population ages with an improved quality of life and sexual longevity, the prevalence of AIDS is rising among the elderly. The purpose of this study was to estimate the vulnerability to AIDS among individuals attending senior community centers in Campo Grande, Mato Grosso do Sul, Brazil. METHOD: This descriptive, exploratory investigation included 329 subjects selected in a probabilistic manner. Individuals with scores on the Mini-Mental State Examination indicating cognitive impairment were excluded from the analyses. Barthel's and Lawton's functional assessment scales were applied. Interviews were conducted to evaluate the presence of cognitive and behavioral factors associated with HIV transmission. RESULTS: Most subjects were non-dependent, fell within the 60- to 69-year age bracket and were female. A majority of individuals reported having knowledge about AIDS and were aware that the elderly are vulnerable to the disease. More than a quarter (26.9% of the sample reported previous HIV testing. No participants reported drug use, homosexual orientation, or alcohol abuse. A minority of participants reported using medication for erectile dysfunction. Casual and multiple partners accounted for 12% and 34% of reported intercourse experiences, respectively. Condom use was reported by 14% of respondents. CONCLUSION: Unprotected sex was the primary factor accounting for vulnerability to AIDS among the elderly.

  12. Differing HIV vulnerability among female sex workers in a high HIV burden Indian state.

    Science.gov (United States)

    Mamulwar, Megha; Godbole, Sheela; Bembalkar, Shilpa; Kamble, Pranil; Dulhani, Nisha; Yadav, Rajesh; Kadu, Chitra; Kumar, Pradeep; Lalikar, Shivraj; Acharya, Shrikala; Gangakhedkar, Raman; Risbud, Arun; Venkatesh, Srinivas

    2018-01-01

    The HIV sentinel surveillance [HSS] conducted in 2010-11 among female sex workers [FSW] in the state of Maharashtra, India provided an opportunity to assess characteristics of different types of FSWs and their HIV risk. It is important for India's National AIDS Control Program, to understand the differences in vulnerability among these FSW, in order to define more specific and effective risk reduction intervention strategies. Therefore, we analyzed data from HSS with the objective of understanding the HIV vulnerability among different types of FSW in Maharashtra. Cross sectional data collected as a part of HSS among FSWs in year 2010-11 from 21 sentinel sites in the state of Maharashtra were analyzed to understand the vulnerability and characteristics of different types of female sex workers based on their place of solicitation using multinomial logistic regression. While the HIV prevalence was 6.6% among all FSWs, it was 9.9% among brothel based [BB], 9% among street based [SB] and 3.1% and 3.7% among home based [HB], and bar based [Bar-B] sex workers respectively. SB FSWs were least likely to be located in HIV low burden districts [ANC] [ARRR: 0.61[95% CI: 0.49, 0.77

  13. Urban vulnerability and climate change in Africa a multidisciplinary approach

    CERN Document Server

    Coly, Adrien; Fohlmeister, Sandra; Gasparini, Paolo; Jørgensen, Gertrud; Kabisch, Sigrun; Kombe, Wilbard; Lindley, Sarah; Simonis, Ingo; Yeshitela, Kumelachew

    2015-01-01

    The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

  14. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  15. Does Aquaculture Support the Needs of Nutritionally Vulnerable Nations?

    Directory of Open Access Journals (Sweden)

    Christopher D. Golden

    2017-05-01

    Full Text Available Aquaculture now supplies half of the fish consumed directly by humans. We evaluate whether aquaculture, given current patterns of production and distribution, supports the needs of poor and food-insecure populations throughout the world. We begin by identifying 41 seafood-reliant nutritionally vulnerable nations (NVNs, and ask whether aquaculture meets human nutritional demand directly via domestic production or trade, or indirectly via purchase of nutritionally rich dietary substitutes. We find that a limited number of NVNs have domestically farmed seafood, and of those, only specific aquaculture approaches (e.g., freshwater in some locations have the potential to benefit nutritionally vulnerable populations. While assessment of aquaculture's direct contribution via trade is constrained by data limitations, we find that it is unlikely to contribute substantially to human nutrition in vulnerable groups, as most exported aquaculture consists of high-value species for international markets. We also determine that subpopulations who benefit from aquaculture profits are likely not the same subpopulations who are nutritionally vulnerable, and more research is needed to understand the impacts of aquaculture income gains. Finally, we discuss the relationship of aquaculture to existing trends in capture fisheries in NVNs, and suggest strategies to create lasting solutions to nutritional security, without exacerbating existing challenges in access to food and land resources.

  16. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  17. Perspectives on social vulnerability and ways to improve community resilience

    Directory of Open Access Journals (Sweden)

    Chicoș Alina

    2017-06-01

    Full Text Available Scientific recognition of the resilience concept is becoming compelling in extending the way contemporary spatial systems are analysed as well as in defining a new approach in establishing spatial planning principles and policies. In this view, our study emphasises the issue of spatial development in areas prone to earthquakes, floods and landslides. Therefore, resilience requires the assessment of vulnerable spatial components. Local governance interventions are more or less focused on risk management measures. Moreover, building safer communities through risk governance relies on different variables. Making a distinction between risk components and the predictors of increased resilience could shed light on the local decision-making process. In this paper, vulnerability addresses the lack of safety in terms of individual, household and community wellbeing when the issue of environmental restrictions emerge. In order to reduce the vulnerability of communities living in natural risk prone areas, spatial planning often turns to interdisciplinary analysis methods that allow an in-depth perspective on the interplay between social and natural elements. As such, spatial planning stands as the first step in reducing social vulnerability and should approach the less explored advantages of participatory mapping and local knowledge systems.

  18. Millstone Unit 1 plant vulnerabilities during postulated severe nuclear accidents

    International Nuclear Information System (INIS)

    Khalil, Y.F.

    1993-01-01

    Generic Letter 88-20, Supplement No. 1 (Ref. 1), issued by the Nuclear Regulatory Commission (NRC) requested all licensees holding operating licenses and construction permits for nuclear power reactor facilities to perform Individual Plant Examinations (IPE) of their plant(s) for severe accident vulnerabilities and to submit the results to the Commission. This paper summarizes the major Front-End (Level-1 PRA) and Back-End (Level-2 PRA) insights gained from the Millstone Unit 1 (MP-1) IPE study. No major plant vulnerabilities have been identified from a Front-End perspective. The Back-End analysis, however, has identified two potential containment vulnerabilities during postulated events that progress beyond the Design Basis Accidents (DBAs), namely, (1) MP-1 is dominated by early source term releases that would occur within a six-hour time frame from time of accident initiation, or reactor trip, and (2) MP-1 containment is somewhat vulnerable to leak-type failure through the drywell head. As a result of the second finding, a recommendation currently under evaluation, has been made to increase the drywell head bolt's preload from 54 Kips to resist the containment design pressure value (62 psig)

  19. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  20. Questioning Complacency: Climate Change Impacts, Vulnerability, and Adaptation in Norway

    International Nuclear Information System (INIS)

    O'Brien, Karen; Eriksen, Siri; Sygna, Linda; Naess, Lars Otto

    2006-01-01

    Most European assessments of climate change impacts have been carried out on sectors and ecosystems, providing a narrow understanding of what climate change really means for society. Furthermore, the main focus has been on technological adaptations, with less attention paid to the process of climate change adaptation. In this article, we present and analyze findings from recent studies on climate change impacts, vulnerability, and adaptation in Norway, with the aim of identifying the wider social impacts of climate change. Three main lessons can be drawn. First, the potential thresholds and indirect effects may be more important than the direct, sectoral effects. Second, highly sensitive sectors, regions, and communities combine with differential social vulnerability to create both winners and losers. Third, high national levels of adaptive capacity mask the barriers and constraints to adaptation, particularly among those who are most vulnerable to climate change. Based on these results, we question complacency in Norway and other European countries regarding climate change impacts and adaptation. We argue that greater attention needs to be placed on the social context of climate change impacts and on the processes shaping vulnerability and adaptation

  1. What if quality of damage data is poor: an Entity-Vulnerability approach for flood vulnerability assessment

    Science.gov (United States)

    Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.

    2015-04-01

    for inundations of both short and long duration. At the same time we defined the classes of the variable Entity in function of both buildings' asset value and their importance for society. Once the buildings of different typologies are grouped, a GIS-based tool (using hazard information obtained from hydraulic modelling, building parcels, vulnerability curves and entity classes) is used to collocate each element at risk inside an Entity-Vulnerability matrix. The construction of a E-V matrix allow both to understand the actual situation of flood-prone area (and the possible consequences of a flood event) and to study the effectiveness of non-structural measures, just studying how their implementation modifies the distribution of elements at risk inside it. The proposed approach can be useful for authorities responsible for development and periodical review of adaptive flood risk management plans.

  2. Health related vulnerability due to chronic diseases: Impact on clinical services across emergency shelters in mass disasters

    Science.gov (United States)

    Koleva, Yordanka Nikolova

    Chronic diseases are increasingly recognized as major contributors to the global burden of disease. Individuals with chronic disease are particularly vulnerable during mass emergencies as they may suffer an interruption in their therapeutic programs, leading to life-threatening conditions and complications. Based on the individual and community risk factors framework, three categories are defined as the most vulnerable to extreme natural events: physically, psychologically, and socially vulnerable. Complex emergencies that occurred in the recent decade have provided evidence that these groups suffer more pronounced effects than others. Individuals seeking community support during emergencies have been predominantly medically dependent, elderly, children, people with chronic health conditions, and lower socioeconomic status. The purpose of this study was to investigate the effect of health-related vulnerability on shelter operations, and to estimate the burden of chronic disease on community resources following catastrophic events. A comprehensive survey data collection conducted by the United States Public Health Service in 2005 was used to evaluate clinical services for populations with health conditions accommodated by Louisiana temporary disaster shelters. Correlation and multiple regression analyses determined the relationship between shelter characteristics and the factors predicting shelters' needs for short-term assistance. Significant predictors were identified in all three explored domains: structural shelter characteristics (sponsor, interpreter needed); clinical characteristics (access to health providers, clinic on site, staff had no days off); population characteristics (census, compromised mental health alone, or in combination with chronic conditions and diseases with epidemic potential). Shelters sponsored by faith-based organizations were less likely to be in risk of rapid resource depletion. Shelters with large census demonstrated association with

  3. Improving the role of vulnerability assessments In decision support for effective climate adaptation

    Science.gov (United States)

    Linda A. Joyce; Constance I. Millar

    2014-01-01

    Vulnerability assessments (VA) have been proposed as an initial step in a process to develop and implement adaptation management for climate change in forest ecosystems. Scientific understanding of the effects of climate change is an ever-accumulating knowledge base. Synthesizing information from this knowledge base in the context of our understanding of ecosystem...

  4. A multi-dimensional assessment of urban vulnerability to climate change in Sub-Saharan Africa

    DEFF Research Database (Denmark)

    Herslund, Lise Byskov; Jalyer, Fatameh; Jean-Baptiste, Nathalie

    2016-01-01

    In this paper, we develop and apply a multi-dimensional vulnerability assessment framework for understanding the impacts of climate change-induced hazards in Sub- Saharan African cities. The research was carried out within the European/African FP7 project CLimate change and Urban Vulnerability...... in Africa, which investigated climate change-induced risks, assessed vulnerability and proposed policy initiatives in five African cities. Dar es Salaam (Tanzania) was used as a main case with a particular focus on urban flooding. The multi-dimensional assessment covered the physical, institutional...... encroachment on green and flood-prone land). Scenario modeling suggests that vulnerability will continue to increase strongly due to the expected loss of agricultural land at the urban fringes and loss of green space within the city. However, weak institutional commitment and capacity limit the potential...

  5. Adolescent Social Isolation as a Model of Heightened Vulnerability to Comorbid Alcoholism and Anxiety Disorders.

    Science.gov (United States)

    Butler, Tracy R; Karkhanis, Anushree N; Jones, Sara R; Weiner, Jeffrey L

    2016-06-01

    Individuals diagnosed with anxiety-related illnesses are at increased risk of developing alcoholism, exhibit a telescoped progression of this disease and fare worse in recovery, relative to alcoholics that do not suffer from a comorbid anxiety disorder. Similarly, preclinical evidence supports the notion that stress and anxiety represent major risk factors for the development of alcohol use disorder (AUD). Despite the importance of understanding the link between anxiety and alcoholism, much remains unknown about the neurobiological substrates underlying this relationship. One stumbling block has been the lack of animal models that reliably reproduce the spectrum of behaviors associated with increased vulnerability to these diseases. Here, we review the literature that has examined the behavioral and neurobiological outcomes of a simple rodent adolescent social isolation procedure and discuss its validity as a model of vulnerability to comorbid anxiety disorders and alcoholism. Recent studies have provided strong evidence that adolescent social isolation of male rats leads to the expression of a variety of behaviors linked with increased vulnerability to anxiety and/or AUD, including deficits in sensory gating and fear extinction, and increases in anxiety measures and ethanol drinking. Neurobiological studies are beginning to identify mesolimbic adaptations that may contribute to the behavioral phenotype engendered by this model. Some of these changes include increased excitability of ventral tegmental area dopamine neurons and pyramidal cells in the basolateral amygdala and significant alterations in baseline and stimulated catecholamine signaling. A growing body of evidence suggests that adolescent social isolation may represent a reliable rodent model of heightened vulnerability to anxiety disorders and alcoholism in male rats. These studies provide initial support for the face, construct, and predictive validity of this model and highlight its utility in

  6. Measurement of traffic network vulnerability for Mississippi coastal region : final research report.

    Science.gov (United States)

    2017-08-15

    Natural disasters such as a hurricane can cause great damages to the transportation networks and significantly affect the evacuation trip operations. An accurate understanding and measurement of the network vulnerability can enhance the evacuees p...

  7. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  8. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  9. Structural Vulnerability and Health: Latino Migrant Laborers in the United States

    Science.gov (United States)

    Quesada, James; Hart, Laurie K.; Bourgois, Philippe

    2011-01-01

    Latino immigrants in the United States constitute a paradigmatic case of a population group subject to structural violence. Their subordinated location in the global economy and their culturally depreciated status in the United States are exacerbated by legal persecution. Medical Anthropology Volume 30, issues 4 and 5, include a series of ethnographic analyses of the processes that render undocumented Latino immigrants structurally vulnerable to ill-health. We hope to extend the social science concept of ‘structural vulnerability’ to make it a useful tool for health care. Defined as a positionality that imposes physical/emotional suffering on specific population groups and individuals in patterned ways, structural vulnerability is a product of two complementary forces: (1) class-based economic exploitation and cultural, gender/sexual, and racialized discrimination; and (2) processes of symbolic violence and subjectivity formation that have increasingly legitimized punitive neoliberal discourses of individual unworthiness. PMID:21777121

  10. Hierarchical Status Predicts Behavioral Vulnerability and Nucleus Accumbens Metabolic Profile Following Chronic Social Defeat Stress.

    Science.gov (United States)

    Larrieu, Thomas; Cherix, Antoine; Duque, Aranzazu; Rodrigues, João; Lei, Hongxia; Gruetter, Rolf; Sandi, Carmen

    2017-07-24

    Extensive data highlight the existence of major differences in individuals' susceptibility to stress [1-4]. While genetic factors [5, 6] and exposure to early life stress [7, 8] are key components for such neurobehavioral diversity, intriguing observations revealed individual differences in response to stress in inbred mice [9-12]. This raised the possibility that other factors might be critical in stress vulnerability. A key challenge in the field is to identify non-invasively risk factors for vulnerability to stress. Here, we investigated whether behavioral factors, emerging from preexisting dominance hierarchies, could predict vulnerability to chronic stress [9, 13-16]. We applied a chronic social defeat stress (CSDS) model of depression in C57BL/6J mice to investigate the predictive power of hierarchical status to pinpoint which individuals will exhibit susceptibility to CSDS. Given that the high social status of dominant mice would be the one particularly challenged by CSDS, we predicted and found that dominant individuals were the ones showing a strong susceptibility profile as indicated by strong social avoidance following CSDS, while subordinate mice were not affected. Data from 1 H-NMR spectroscopy revealed that the metabolic profile in the nucleus accumbens (NAc) relates to social status and vulnerability to stress. Under basal conditions, subordinates show lower levels of energy-related metabolites compared to dominants. In subordinates, but not dominants, levels of these metabolites were increased after exposure to CSDS. To the best of our knowledge, this is the first study that identifies non-invasively the origin of behavioral risk factors predictive of stress-induced depression-like behaviors associated with metabolic changes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Transnational infrastructure vulnerability : the historical shaping of the 2006 European 'blackout'

    NARCIS (Netherlands)

    Vleuten, van der E.B.A.; Lagendijk, V.C.

    2010-01-01

    The "European Blackout" of 4 November 2006 is a key reference in current debates on transnational electricity infrastructure vulnerability and governance. Several commentators have observed that to understand what happened, one must look at history. Our paper answers this call and demonstrates how

  12. Predicting ecosystem vulnerability to biodiversity loss from community composition.

    Science.gov (United States)

    Heilpern, Sebastian A; Weeks, Brian C; Naeem, Shahid

    2018-05-01

    Ecosystems vary widely in their responses to biodiversity change, with some losing function dramatically while others are highly resilient. However, generalizations about how species- and community-level properties determine these divergent ecosystem responses have been elusive because potential sources of variation (e.g., trophic structure, compensation, functional trait diversity) are rarely evaluated in conjunction. Ecosystem vulnerability, or the likely change in ecosystem function following biodiversity change, is influenced by two types of species traits: response traits that determine species' individual sensitivities to environmental change, and effect traits that determine a species' contribution to ecosystem function. Here we extend the response-effect trait framework to quantify ecosystem vulnerability and show how trophic structure, within-trait variance, and among-trait covariance affect ecosystem vulnerability by linking extinction order and functional compensation. Using in silico trait-based simulations we found that ecosystem vulnerability increased when response and effect traits positively covaried, but this increase was attenuated by decreasing trait variance. Contrary to expectations, in these communities, both functional diversity and trophic structure increased ecosystem vulnerability. In contrast, ecosystem functions were resilient when response and effect traits covaried negatively, and variance had a positive effect on resiliency. Our results suggest that although biodiversity loss is often associated with decreases in ecosystem functions, such effects are conditional on trophic structure, and the variation within and covariation among response and effect traits. Taken together, these three factors can predict when ecosystems are poised to lose or gain function with ongoing biodiversity change. © 2018 by the Ecological Society of America.

  13. Coping Styles: A Better Understanding of Stress and Anxiety in Individuals With Autism Spectrum Conditions Through Sport and Exercise Models

    Directory of Open Access Journals (Sweden)

    Irina Roncaglia

    2014-10-01

    Full Text Available The aim of this paper is to present an understanding of the coping mechanisms and coping styles adopted by individuals on the Autism Spectrum Conditions (ASC by looking to draw parallels with sports performance psychology and how different sources of stress and anxiety can lead to the adoption of different coping styles. Firstly, an overview of current understanding of what constitute a stressor and how this can affect an individual is presented from sport and exercise psychology literature. Secondly, a model of coping styles is illustrated with the aim to shed light at how different perceptions of levels of stress and anxiety are managed both on an individual and group level. Thirdly, within the context of this understanding, some examples about how to support individuals on the ASC will be illustrated. Finally, implications for future research and reflection will be presented by highlighting the importance of teaching and learning coping and tolerance skills as part of a comprehensive and holistic psycho-educational program.

  14. Heat waves and cold spells: an analysis of policy response and perceptions of vulnerable populations in the UK

    OpenAIRE

    Johanna Wolf; W Neil Adger; Irene Lorenzoni

    2010-01-01

    Heat waves and cold spells pose ongoing seasonal risks to the health and well-being of vulnerable individuals. Current attempts to address these risks in the UK are implemented through fuel-poverty strategies and heat-wave planning. This paper examines evidence from the UK on whether heat waves and cold spells are addressed differently by public policy in the UK given that risks are mediated by similar perceptions that shape behavioural responses by vulnerable individuals. It is based on a re...

  15. Amphetamine-induced psychosis - a separate diagnostic entity or primary psychosis triggered in the vulnerable?

    Directory of Open Access Journals (Sweden)

    Bramness Jørgen G

    2012-12-01

    Full Text Available Abstract Use of amphetamine and methamphetamine is widespread in the general population and common among patients with psychiatric disorders. Amphetamines may induce symptoms of psychosis very similar to those of acute schizophrenia spectrum psychosis. This has been an argument for using amphetamine-induced psychosis as a model for primary psychotic disorders. To distinguish the two types of psychosis on the basis of acute symptoms is difficult. However, acute psychosis induced by amphetamines seems to have a faster recovery and appears to resolve more completely compared to schizophrenic psychosis. The increased vulnerability for acute amphetamine induced psychosis seen among those with schizophrenia, schizotypal personality and, to a certain degree other psychiatric disorders, is also shared by non-psychiatric individuals who previously have experienced amphetamine-induced psychosis. Schizophrenia spectrum disorder and amphetamine-induced psychosis are further linked together by the finding of several susceptibility genes common to both conditions. These genes probably lower the threshold for becoming psychotic and increase the risk for a poorer clinical course of the disease. The complex relationship between amphetamine use and psychosis has received much attention but is still not adequately explored. Our paper reviews the literature in this field and proposes a stress-vulnerability model for understanding the relationship between amphetamine use and psychosis.

  16. Amphetamine-induced psychosis - a separate diagnostic entity or primary psychosis triggered in the vulnerable?

    Science.gov (United States)

    2012-01-01

    Use of amphetamine and methamphetamine is widespread in the general population and common among patients with psychiatric disorders. Amphetamines may induce symptoms of psychosis very similar to those of acute schizophrenia spectrum psychosis. This has been an argument for using amphetamine-induced psychosis as a model for primary psychotic disorders. To distinguish the two types of psychosis on the basis of acute symptoms is difficult. However, acute psychosis induced by amphetamines seems to have a faster recovery and appears to resolve more completely compared to schizophrenic psychosis. The increased vulnerability for acute amphetamine induced psychosis seen among those with schizophrenia, schizotypal personality and, to a certain degree other psychiatric disorders, is also shared by non-psychiatric individuals who previously have experienced amphetamine-induced psychosis. Schizophrenia spectrum disorder and amphetamine-induced psychosis are further linked together by the finding of several susceptibility genes common to both conditions. These genes probably lower the threshold for becoming psychotic and increase the risk for a poorer clinical course of the disease. The complex relationship between amphetamine use and psychosis has received much attention but is still not adequately explored. Our paper reviews the literature in this field and proposes a stress-vulnerability model for understanding the relationship between amphetamine use and psychosis. PMID:23216941

  17. Toward Understanding Dynamics in Shifting Biomes: An Individual Based Modeling Approach to Characterizing Drought and Mortality in Central Western Canada

    Science.gov (United States)

    Armstrong, A. H.; Foster, A.; Rogers, B. M.; Hogg, T.; Michaelian, M.; Shuman, J. K.; Shugart, H. H., Jr.; Goetz, S. J.

    2017-12-01

    The Arctic-Boreal zone is known be warming at an accelerated rate relative to other biomes. Persistent warming has already affected the high northern latitudes, altering vegetation productivity, carbon sequestration, and many other ecosystem processes and services. The central-western Canadian boreal forests and aspen parkland are experiencing a decade long drought, and rainfall has been identified as a key factor controlling the location of the boundary between forest and prairie in this region. Shifting biome with related greening and browning trends are readily measureable with remote sensing, but the dynamics that create and result from them are not well understood. In this study, we use the University of Virginia Forest Model Enhanced (UVAFME), an individual-based forest model, to simulate the changes that are occurring across the southern boreal and parkland forests of west-central Canada. We present a parameterization of UVAFME for western central Canadian forests, validated with CIPHA data (Climate Change Impacts on the Productivity and Health of Aspen), and improved mortality. In order to gain a fine-scale understanding of how climate change and specifically drought will continue to affect the forests of this region, we simulated forest conditions following CMIP5 climate scenarios. UVAFME predictions were compared with statistical models and satellite observations of productivity across the landscape. Changes in forest cover, forest type, aboveground biomass, and mortality and recruitment dynamics are presented, highlighting the high vulnerability of this region to vegetation transitions associated with future droughts.

  18. Combining landscape variables and species traits can improve the utility of climate change vulnerability assessments

    Science.gov (United States)

    Nadeau, Christopher P.; Fuller, Angela K.

    2016-01-01

    Conservation organizations worldwide are investing in climate change vulnerability assessments. Most vulnerability assessment methods focus on either landscape features or species traits that can affect a species vulnerability to climate change. However, landscape features and species traits likely interact to affect vulnerability. We compare a landscape-based assessment, a trait-based assessment, and an assessment that combines landscape variables and species traits for 113 species of birds, herpetofauna, and mammals in the northeastern United States. Our aim is to better understand which species traits and landscape variables have the largest influence on assessment results and which types of vulnerability assessments are most useful for different objectives. Species traits were most important for determining which species will be most vulnerable to climate change. The sensitivity of species to dispersal barriers and the species average natal dispersal distance were the most important traits. Landscape features were most important for determining where species will be most vulnerable because species were most vulnerable in areas where multiple landscape features combined to increase vulnerability, regardless of species traits. The interaction between landscape variables and species traits was important when determining how to reduce climate change vulnerability. For example, an assessment that combines information on landscape connectivity, climate change velocity, and natal dispersal distance suggests that increasing landscape connectivity may not reduce the vulnerability of many species. Assessments that include landscape features and species traits will likely be most useful in guiding conservation under climate change.

  19. Obstacles to preventive care for individuals with disability: Implications for nurse practitioners.

    Science.gov (United States)

    Marrocco, Anna; Krouse, Helene J

    2017-05-01

    Individuals with disabilities have been identified as a population with a significantly lower usage of preventive services. Nurse practitioners (NPs) provide a key access point in the healthcare delivery system for preventive services for vulnerable populations such as those with disabilities. It is essential to understand existing barriers that prohibit access to effective preventive care for this vulnerable population. Systematic search and review of Cumulative Index of Nursing and Allied Health Literature (CINAHL), Medline, PubMed, Google Scholar, and government reports and World Health Organizations reports. Twenty-six articles were included in the review. This literature review confirmed previous notions that people with disabilities are receiving much fewer preventive services than the general population. The studies reviewed identified four major barriers that contributed to the lack of preventive care. These barriers included physical environment and system, transportation, provider knowledge and attitude, and financial. Recognition of the obstacles that this subpopulation faces in accessing preventive care services is the first step to effectively remedying this problem. Preventive services have been identified as one of the cornerstones to improving health and quality of life. By understanding the circumstances that restrict those with disabilities from accessing preventive services, NPs can provide meaningful and effective solutions. ©2017 American Association of Nurse Practitioners.

  20. Modulation of the Genome and Epigenome of Individuals Susceptible to Autism by Environmental Risk Factors

    Directory of Open Access Journals (Sweden)

    Costas Koufaris

    2015-04-01

    Full Text Available Diverse environmental factors have been implicated with the development of autism spectrum disorders (ASD. Genetic factors also underlie the differential vulnerability to environmental risk factors of susceptible individuals. Currently the way in which environmental risk factors interact with genetic factors to increase the incidence of ASD is not well understood. A greater understanding of the metabolic, cellular, and biochemical events involved in gene x environment interactions in ASD would have important implications for the prevention and possible treatment of the disorder. In this review we discuss various established and more alternative processes through which environmental factors implicated in ASD can modulate the genome and epigenome of genetically-susceptible individuals.

  1. [Vulnerability to HIV infection in serodiscordant couples in Rio de Janeiro, Brazil].

    Science.gov (United States)

    Fernandes, Nilo Martinez; Hennington, Élida Azevedo; Bernardes, Jefferson de Souza; Grinsztejn, Beatriz G

    2017-06-01

    A new era in HIV/AIDS treatment began in 1996 with the advent of highly active antiretroviral therapy (HAART). The advent of these new medicines expanded the treatment resources and improved life expectancy and quality of life for persons living with HIV and AIDS, favoring the maintenance and initiation of relationships between partners with discordant HIV serological status. The main objective of this study with serodiscordant couples was to understand the three dimensions of vulnerability - programmatic, social, and individual - in these couples. The study, belonging to the field of social constructionism, used analysis of discursive practices and production of meanings. Forty in-depth interviews were conducted with couples followed in a clinical research institute. The main results include the lack of information on sexuality in the family and in schools, distorted knowledge on HIV prevention and transmission, inadequacies in HIV testing, and flaws in communicating test results.

  2. Childlessness and vulnerability of older people in China.

    Science.gov (United States)

    Feng, Zhixin

    2018-03-01

    the number of childless older people is increasing in China, but relatively little is known about the role of childlessness in health outcomes. This study investigates the relationship between childlessness and three health outcomes: difficulty with Instrumental Activities of Daily Living (IADLs), self-rated health and depression. this study includes 13,171 individuals aged 50 and above from national survey data of the second wave of the China Family Panel Study (2012). Binary/multinomial logistic and ordinary least squares regression models are presented. childless individuals whose children have all died exhibit worse health outcomes than individuals with children, but this effect is influenced by demographic characteristics, socio-economic status and social security. On the other hand, individuals who are childless due to other reasons (involuntary or voluntary) are less likely to report difficulty with IADLs and to report depression than older people with all children alive after controlling for demographic and socio-economic and social security factors. the death of a child has an adverse effect on people's health for both childless people whose children have all died and those who have lost a child but have other children alive. These two groups are in the most vulnerable position, which could also suggest that their children have died because they grew up in a vulnerable family. The government needs to improve the social security for these two groups and provide social services (particularly mental health services) to older people who have lost a child; these could contribute to alleviating some of the adverse effects of the death of a child. © The Author 2017. Published by Oxford University Press on behalf of the British Geriatrics Society.

  3. Differing HIV vulnerability among female sex workers in a high HIV burden Indian state.

    Directory of Open Access Journals (Sweden)

    Megha Mamulwar

    Full Text Available The HIV sentinel surveillance [HSS] conducted in 2010-11 among female sex workers [FSW] in the state of Maharashtra, India provided an opportunity to assess characteristics of different types of FSWs and their HIV risk. It is important for India's National AIDS Control Program, to understand the differences in vulnerability among these FSW, in order to define more specific and effective risk reduction intervention strategies. Therefore, we analyzed data from HSS with the objective of understanding the HIV vulnerability among different types of FSW in Maharashtra.Cross sectional data collected as a part of HSS among FSWs in year 2010-11 from 21 sentinel sites in the state of Maharashtra were analyzed to understand the vulnerability and characteristics of different types of female sex workers based on their place of solicitation using multinomial logistic regression.While the HIV prevalence was 6.6% among all FSWs, it was 9.9% among brothel based [BB], 9% among street based [SB] and 3.1% and 3.7% among home based [HB], and bar based [Bar-B] sex workers respectively. SB FSWs were least likely to be located in HIV low burden districts [ANC] [ARRR: 0.61[95% CI: 0.49, 0.77

  4. Differing HIV vulnerability among female sex workers in a high HIV burden Indian state

    Science.gov (United States)

    Godbole, Sheela; Bembalkar, Shilpa; Kamble, Pranil; Dulhani, Nisha; Yadav, Rajesh; Kadu, Chitra; Kumar, Pradeep; Lalikar, Shivraj; Acharya, Shrikala; Gangakhedkar, Raman; Risbud, Arun; Venkatesh, Srinivas

    2018-01-01

    Introduction The HIV sentinel surveillance [HSS] conducted in 2010–11 among female sex workers [FSW] in the state of Maharashtra, India provided an opportunity to assess characteristics of different types of FSWs and their HIV risk. It is important for India’s National AIDS Control Program, to understand the differences in vulnerability among these FSW, in order to define more specific and effective risk reduction intervention strategies. Therefore, we analyzed data from HSS with the objective of understanding the HIV vulnerability among different types of FSW in Maharashtra. Material and methods Cross sectional data collected as a part of HSS among FSWs in year 2010–11 from 21 sentinel sites in the state of Maharashtra were analyzed to understand the vulnerability and characteristics of different types of female sex workers based on their place of solicitation using multinomial logistic regression. Results While the HIV prevalence was 6.6% among all FSWs, it was 9.9% among brothel based [BB], 9% among street based [SB] and 3.1% and 3.7% among home based [HB], and bar based [Bar-B] sex workers respectively. SB FSWs were least likely to be located in HIV low burden districts [ANC] [ARRR: 0.61[95% CI: 0.49, 0.77

  5. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  6. Community Resilience: Increasing Public Understanding of Risk and Vulnerability to Natural Hazards through Informal Education

    Science.gov (United States)

    Salna, E.

    2017-12-01

    The Extreme Events Institute's (EEI) International Hurricane Research Center (IHRC) at Florida International University (FIU) in Miami, Florida, as a NOAA Weather-Ready Nation Ambassador, is dedicated to make South Florida, Ready, Responsive and Resilient. IHRC with funding from the Florida Division of Emergency Management (FDEM) has developed several museum exhibits and events. This includes the hands-on FIU Wall of Wind exhibit for the National Building Museum in Washington, DC, the Frost Science Museum in Miami, Florida, and the Museum of Discovery and Science (MODS) in Fort Lauderdale, Florida. The exhibit teaches the public about hurricane wind engineering research, enhanced building codes, and the importance of protecting your home's windows and doors with code-approved shutters. In addition, IHRC and MODS facilitate Eye of the Storm, a free-of-charge, community event with interactive hurricane science, and preparedness activities, including the entertaining Owlie Skywarn live theater show and live air cannon missile impact demonstrations. This annual event includes many local, state and federal partners, including NOAA and NWS. The IHRC also developed the FIU Wall of Wind Mitigation Challenge. As the next generation of engineers to address natural hazards and extreme weather, this STEM education event features a competition between high school teams to develop innovative wind mitigation concepts and real-life human safety and property protection solutions. IHRC and MODS are also developing a new exhibit of a Hazard/Risk Equation that will "come to life," through virtual reality (VR) technology in a state-of-the art 7D theater. The exhibit will provide a better public understanding of how changes in exposures and vulnerabilities will determine whether a community experiences an emergency, disaster or catastrophe. It will raise public consciousness and drive home the point that communities need not passively accept natural hazard risks. Ultimately, if we raise

  7. Age-related physical and psychological vulnerability as pathways to problem gambling in older adults.

    Science.gov (United States)

    Parke, Adrian; Griffiths, Mark; Pattinson, Julie; Keatley, David

    2018-03-01

    Background To inform clinical treatment and preventative efforts, there is an important need to understand the pathways to late-life gambling disorder. Aims This study assesses the association between age-related physical health, social networks, and problem gambling in adults aged over 65 years and assesses the mediating role of affective disorders in this association. Methods The sample comprised 595 older adults (mean age: 74.4 years, range: 65-94 years; 77.1% female) who were interviewed using a structured questionnaire to assess physical frailty, geriatric pain, loneliness, geriatric depression, geriatric anxiety, and problem gambling. Results Pathway analysis demonstrated associations between these variables and gambling problems, providing a good fit for the data, but that critically these relationships were mediated by both anxiety and depression symptoms. Conclusions This study indicates that late-life problem gambling may develop as vulnerable individuals gamble to escape anxiety and depression consequent to deteriorating physical well-being and social support. When individuals develop late-life problem gambling, it is recommended that the treatment primarily focuses upon targeting and replacing avoidant coping approaches.

  8. Assessing the Impacts of Decadal Socio-Agro-Hydro Climatic Variations on Agricultural Vulnerability over India

    Science.gov (United States)

    Mohanty, M. P.; Sharma, T.; Ghosh, S.; Karmakar, S.

    2017-12-01

    Among both rice and wheat producing countries, India holds one of the major global shares in terms of production. However, with rising population, economic variability, and increasing food demand, it has become indispensable to strategically assess the food security of the nation, particularly under changing climatic conditions. This can be achieved by improving knowledge on the impacts of climate change on crop growth and yield through understanding the current status of agricultural vulnerability and quantifying its decadal changes. The present research focuses on assessing the observed decadal changes in agricultural vulnerability over India, at a district-scale. In the study, the deliberation of multiple climatic, hydrologic, agricultural indicators will majorly facilitate evaluating their direct/indirect influence on the crop production. In addition, a set of socio-economic indicators will also be considered to understand the attribution of these factors on the change in agricultural vulnerability. Here, these indicators will be integrated into a multivariate data envelopment analysis (DEA) framework to derive relative efficiency of each unit or district in crop production, which will be further transformed into a well-grounded agricultural vulnerability map. It has become essential to understand the influence of these indicators on agriculture, given that the extended periods of excessive/no rainfall or high/low temperature can alter the water cycle and hence cause stress on the agroecosystem. Likewise, change in the population density, main and marginal cultivators, main and marginal agriculture labours, improvement in management practices, or increase in power supply for agricultural use, can directly affect the food security of the region. Hence, this study will undoubtedly assist the decision-makers/strategists by highlighting the agriculturally vulnerable regions over India. Consequently, it will reassure the farmers to define bottom-up approaches in

  9. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  10. The standard centrifuge method accurately measures vulnerability curves of long-vesselled olive stems.

    Science.gov (United States)

    Hacke, Uwe G; Venturas, Martin D; MacKinnon, Evan D; Jacobsen, Anna L; Sperry, John S; Pratt, R Brandon

    2015-01-01

    The standard centrifuge method has been frequently used to measure vulnerability to xylem cavitation. This method has recently been questioned. It was hypothesized that open vessels lead to exponential vulnerability curves, which were thought to be indicative of measurement artifact. We tested this hypothesis in stems of olive (Olea europea) because its long vessels were recently claimed to produce a centrifuge artifact. We evaluated three predictions that followed from the open vessel artifact hypothesis: shorter stems, with more open vessels, would be more vulnerable than longer stems; standard centrifuge-based curves would be more vulnerable than dehydration-based curves; and open vessels would cause an exponential shape of centrifuge-based curves. Experimental evidence did not support these predictions. Centrifuge curves did not vary when the proportion of open vessels was altered. Centrifuge and dehydration curves were similar. At highly negative xylem pressure, centrifuge-based curves slightly overestimated vulnerability compared to the dehydration curve. This divergence was eliminated by centrifuging each stem only once. The standard centrifuge method produced accurate curves of samples containing open vessels, supporting the validity of this technique and confirming its utility in understanding plant hydraulics. Seven recommendations for avoiding artefacts and standardizing vulnerability curve methodology are provided. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  11. Socio-economic vulnerability of coastal communities in southern Thailand: the development of adaptation strategies

    Science.gov (United States)

    Willroth, P.; Massmann, F.; Wehrhahn, R.; Revilla Diez, J.

    2012-08-01

    The tsunami of December 2004 impacted large areas of Thailand's coastline and caused severe human and economic losses. The recovery period revealed differences in the vulnerabilities of communities affected. An understanding of the causal factors of vulnerability is crucial for minimising the negative effects of future threats and developing adaptive capacities. This paper analyses the vulnerabilities and the development of adaptation strategies in the booming tourist area of Khao Lak and in the predominantly fishing and agricultural area of Ban Nam Khem through a comprehensive vulnerability framework. The results show that social networks played a crucial role in coping with the disaster. Social cohesion is important for strengthening the community and developing successful adaptation strategies. The development of tourism and the turning away from traditional activities have a significant positive influence on the income situation, but create a dependency on a single business sector. It could be shown that households generating their income in the tourism sector were vulnerable unless they had diversified their income previously. Income diversification decreased the vulnerability in the study areas. Adaptation strategies and processes developed in the aftermath clearly address these issues.

  12. Is a clean river fun for all? Recognizing social vulnerability in watershed planning.

    Science.gov (United States)

    Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  13. Is a clean river fun for all? Recognizing social vulnerability in watershed planning

    Science.gov (United States)

    Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  14. A GIS Approach to Identifying Socially and Medically Vulnerable Older Adult Populations in South Florida.

    Science.gov (United States)

    Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira

    2017-11-10

    We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal

    Science.gov (United States)

    Matin, M. A.; Chitale, V. S.

    2016-12-01

    Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few

  16. Health literacy on tuberculosis amongst vulnerable segment of population: special reference to Saharia tribe in central India.

    Science.gov (United States)

    Muniyandi, M; Rao, V G; Bhat, J; Yadav, R; Sharma, R K; Bhondeley, M K

    2015-05-01

    Health literacy on tuberculosis (TB) is an understanding about TB to perform activities with regard to prevention, diagnosis and treatment. We undertook a study to assess the health literacy on TB among one of the vulnerable tribal groups (Saharia) in central India. In this cross-sectional study, 2721 individuals aged >15 yr from two districts of Madhya Pradesh State of India were interviewed at their residence during December 2012-July 2013. By using a short-form questionnaire, health literacy on cause, symptoms, mode of transmission, diagnosis, treatment and prevention of TB was assessed. Of the 2721 (Gwalior 1381; Shivpuri 1340) individuals interviewed; 76 per cent were aged literacy rate was 19 per cent, and 22 per cent had >7 members in a house. Of the 2721 respondents participated, 52 per cent had never heard of TB; among them 8 per cent mentioned cough as a symptom, 64 per cent mentioned coughing up blood, and 91 per cent knew that TB diagnosis, and treatment facilities were available in both government and private hospitals. Health literacy score among participants who had heard of TB was 60 per cent among 8 per cent of respondents. The finding that nearly half of the respondents had not heard of TB indicated an important gap in education regarding TB in this vulnerable population. There is an urgent need to implement targeted interventions to educate this group for better TB control.

  17. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

    Directory of Open Access Journals (Sweden)

    Williams PAH

    2015-07-01

    Full Text Available Patricia AH Williams, Andrew J Woodward eHealth Research Group and Security Research Institute, Edith Cowan University, Perth, WA, Australia Abstract: The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. Keywords: cybersecurity, security, safety, wireless, risk, medical devices

  18. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  19. Behaviour as a Lever of Ecological Transition? Understanding and Acting on Individual Behaviour and Collective Dynamics

    International Nuclear Information System (INIS)

    Martin, Solange; Gaspard, Albane

    2017-01-01

    Beyond broad policy declarations, the implementation of ecological transition - which consists mainly in curbing consumption of energy and raw materials in our societies - requires substantial behavioural change at the collective, but also, quite obviously, the individual level. Yet, though there is general consensus around the principle of embarking on the path to transition, things get more complicated when it comes to changing our practices and habits. Can we act on individual behaviour and collective dynamics in respect of this particular aim of ecological transition, and, if so, how are we to go about it? Solange Martin and Albane Gaspard have examined this question for the French Environment and Energy Management Agency (ADEME) and offer us the fruit of their labours here. They show, for example, how the social and human sciences help to understand behaviour both at the individual level and in its collective dimensions, and they outline different possible lines of action to modify it. But, given the entanglement between various levels, it is essential, if we are to act effectively on behaviour, to combine approaches, tools and actors, and to analyse and understand social practices thoroughly before implementing political projects or measures

  20. Understanding the Self in Individuals with Autism Spectrum Disorders (ASD: A Review of Literature

    Directory of Open Access Journals (Sweden)

    Ann X. Huang

    2017-08-01

    Full Text Available When the system of self is explored in individuals with Autism Spectrum Disorders (ASDs, it is important to measure it via both their own perceptions of the self and their understanding of others’ perceptions on themselves at a multidimensional level. This paper reviews existing research in this area using a three-dimension approach. Researchers have found that impairments in the self-system are usually correlated with these individuals’ social and cognitive functioning levels: high functioning individuals with ASD who have higher IQ are found to have better awareness of their limitations in social and communication domains than those with lower IQ. Many researchers believe that there are impairments in the psychological (but not physical self in individuals with ASD, such as theory of mind deficits due to social and communicative impairments. On the other hand, some researchers argue that individuals with ASD have selective rather than global impairments in the self. In other words, the impairment usually lies in a specific aspect of functioning in individuals with ASD. Insights from the review of existing literature on this topic may be able to shed some lights on the development of effective intervention programs to improve social communication deficits in this population.

  1. Spatial Supermarket Redlining and Neighborhood Vulnerability: A Case Study of Hartford, Connecticut.

    Science.gov (United States)

    Zhang, Mengyao; Debarchana, Ghosh

    2016-02-01

    The disinclination of chain supermarkets to locate or pull out existing stores from impoverished neighborhoods is termed as "supermarket redlining". This paper attempts to map and understand the spatial effects of potential supermarket redlining on food vulnerability in urban disadvantaged neighborhoods of Hartford, Connecticut. Using a combination of statistical and spatial analysis functions, we first, built a Supermarket Redlining Index (SuRI) from five indicators such as sales volume, employee count, accepts food coupons from federally assisted programs, and size and population density of the service area to rank supermarkets in the order of their importance. Second, to understand the effect of redlining, a Supermarket Redlining Impact Model (SuRIM) was built with eleven indicators describing both the socioeconomic and food access vulnerabilities. The interaction of these vulnerabilities would identify the final outcome: neighborhoods where the impact of supermarket redlining would be critical. Results mapped critical areas in the inner-city of Hartford where if a nearby supermarket closes or relocates to a suburb with limited mitigation efforts to gill the grocery gap, a large number of minority, poor, and disadvantaged residents will experience difficulties to access healthy food leading to food insecurity or perhaps a food desert. We also suggest mitigation efforts to reduce the impact of large supermarket closures.

  2. Hierarchical statistical modeling of xylem vulnerability to cavitation.

    Science.gov (United States)

    Ogle, Kiona; Barber, Jarrett J; Willson, Cynthia; Thompson, Brenda

    2009-01-01

    Cavitation of xylem elements diminishes the water transport capacity of plants, and quantifying xylem vulnerability to cavitation is important to understanding plant function. Current approaches to analyzing hydraulic conductivity (K) data to infer vulnerability to cavitation suffer from problems such as the use of potentially unrealistic vulnerability curves, difficulty interpreting parameters in these curves, a statistical framework that ignores sampling design, and an overly simplistic view of uncertainty. This study illustrates how two common curves (exponential-sigmoid and Weibull) can be reparameterized in terms of meaningful parameters: maximum conductivity (k(sat)), water potential (-P) at which percentage loss of conductivity (PLC) =X% (P(X)), and the slope of the PLC curve at P(X) (S(X)), a 'sensitivity' index. We provide a hierarchical Bayesian method for fitting the reparameterized curves to K(H) data. We illustrate the method using data for roots and stems of two populations of Juniperus scopulorum and test for differences in k(sat), P(X), and S(X) between different groups. Two important results emerge from this study. First, the Weibull model is preferred because it produces biologically realistic estimates of PLC near P = 0 MPa. Second, stochastic embolisms contribute an important source of uncertainty that should be included in such analyses.

  3. Machine learning algorithm accurately detects fMRI signature of vulnerability to major depression.

    Science.gov (United States)

    Sato, João R; Moll, Jorge; Green, Sophie; Deakin, John F W; Thomaz, Carlos E; Zahn, Roland

    2015-08-30

    Standard functional magnetic resonance imaging (fMRI) analyses cannot assess the potential of a neuroimaging signature as a biomarker to predict individual vulnerability to major depression (MD). Here, we use machine learning for the first time to address this question. Using a recently identified neural signature of guilt-selective functional disconnection, the classification algorithm was able to distinguish remitted MD from control participants with 78.3% accuracy. This demonstrates the high potential of our fMRI signature as a biomarker of MD vulnerability. Crown Copyright © 2015. Published by Elsevier Ireland Ltd. All rights reserved.

  4. South African Risk and Vulnerability Atlas: Understanding the Social & Environmental Implications of Global Change. 2nd edition

    CSIR Research Space (South Africa)

    Mambo, Julia

    2017-12-01

    Full Text Available The success of the first edition of the South African Risk and Vulnerability Atlas (SARVA), both as a publication and at COP17 (17th meeting of the ‘Conference of the Parties’ of the international treaty known as the United Nations Framework...

  5. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  6. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  7. A review of vulnerability and risks for schizophrenia: Beyond the two hit hypothesis

    Science.gov (United States)

    Davis, Justin; Eyre, Harris; Jacka, Felice N; Dodd, Seetal; Dean, Olivia; McEwen, Sarah; Debnath, Monojit; McGrath, John; Maes, Michael; Amminger, Paul; McGorry, Patrick D; Pantelis, Christos; Berk, Michael

    2016-01-01

    Schizophrenia risk has often been conceptualized using a model which requires two hits in order to generate the clinical phenotype—the first as an early priming in a genetically predisposed individual and the second a likely environmental insult. The aim of this paper was to review the literature and reformulate this binary risk-vulnerability model. We sourced the data for this narrative review from the electronic database PUBMED. Our search terms were not limited by language or date of publication. The development of schizophrenia may be driven by genetic vulnerability interacting with multiple vulnerability factors including lowered prenatal vitamin D exposure, viral infections, smoking intelligence quotient, social cognition cannabis use, social defeat, nutrition and childhood trauma. It is likely that these genetic risks, environmental risks and vulnerability factors are cumulative and interactive with each other and with critical periods of neurodevelopmental vulnerability. The development of schizophrenia is likely to be more complex and nuanced than the binary two hit model originally proposed nearly thirty years ago. Risk appears influenced by a more complex process involving genetic risk interfacing with multiple potentially interacting hits and vulnerability factors occurring at key periods of neurodevelopmental activity, which culminate in the expression of disease state. These risks are common across a number of neuropsychiatric and medical disorders, which might inform common preventive and intervention strategies across non-communicable disorders. PMID:27073049

  8. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  9. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  10. Recreational fishing selectively captures individuals with the highest fitness potential.

    Science.gov (United States)

    Sutter, David A H; Suski, Cory D; Philipp, David P; Klefoth, Thomas; Wahl, David H; Kersten, Petra; Cooke, Steven J; Arlinghaus, Robert

    2012-12-18

    Fisheries-induced evolution and its impact on the productivity of exploited fish stocks remains a highly contested research topic in applied fish evolution and fisheries science. Although many quantitative models assume that larger, more fecund fish are preferentially removed by fishing, there is no empirical evidence describing the relationship between vulnerability to capture and individual reproductive fitness in the wild. Using males from two lines of largemouth bass (Micropterus salmoides) selectively bred over three generations for either high (HV) or low (LV) vulnerability to angling as a model system, we show that the trait "vulnerability to angling" positively correlates with aggression, intensity of parental care, and reproductive fitness. The difference in reproductive fitness between HV and LV fish was particularly evident among larger males, which are also the preferred mating partners of females. Our study constitutes experimental evidence that recreational angling selectively captures individuals with the highest potential for reproductive fitness. Our study further suggests that selective removal of the fittest individuals likely occurs in many fisheries that target species engaged in parental care. As a result, depending on the ecological context, angling-induced selection may have negative consequences for recruitment within wild populations of largemouth bass and possibly other exploited species in which behavioral patterns that determine fitness, such as aggression or parental care, also affect their vulnerability to fishing gear.

  11. The ethics of conducting a co-operative inquiry with vulnerable people.

    Science.gov (United States)

    Tee, Stephen R; Lathlean, Judith A

    2004-09-01

    Mental health services users have been calling for greater participation in clinical research. Participation in this context means research 'with' rather than 'on' groups of people. Conducting a co-operative inquiry involving the participation of vulnerable individuals as co-researchers, in particular those with a history of mental health problems, places an obligation on researchers to articulate and justify sound ethical procedures. The aim of this paper is to consider how the ethical issues encountered when conducting participative research with vulnerable people can be addressed in the implementation of a co-operative inquiry with users of mental health services. The study was based on personal reflection and a critical review of associated literature obtained from a database search using Boolean logic. The findings, presented under the headings of the four prima facie moral principles, suggest the need for researchers using participative approaches to demonstrate the humanistic attributes required for engaging and working with people over a period of time. These include building and maintaining trusting relationships, assessing competence to participate, managing interpersonal and group dynamics and making complex collaborative decisions about participants' continued participation in a study. When using a co-operative inquiry approach involving vulnerable individuals, researchers need to demonstrate clearly how a balance between autonomy and paternalism will be achieved, how risks will be anticipated and managed and how fairness will be maintained throughout all procedures. Researchers using participative approaches need to have developed a level of personal insight and self-awareness through access to supervision which focuses on sources of unintended manipulation and interpersonal dynamics that may arise at the inception of a study and throughout its course. Researchers and ethics committees have a shared responsibility to ensure that vulnerable people are

  12. Let's Stop Trying to Quantify Household Vulnerability: The Problem With Simple Scales for Targeting and Evaluating Economic Strengthening Programs.

    Science.gov (United States)

    Moret, Whitney M

    2018-03-21

    Economic strengthening practitioners are increasingly seeking data collection tools that will help them target households vulnerable to HIV and poor child well-being outcomes, match households to appropriate interventions, monitor their status, and determine readiness for graduation from project support. This article discusses efforts in 3 countries to develop simple, valid tools to quantify and classify economic vulnerability status. In Côte d'Ivoire, we conducted a cross-sectional survey with 3,749 households to develop a scale based on the definition of HIV-related economic vulnerability from the U.S. President's Emergency Plan for AIDS Relief (PEPFAR) for the purpose of targeting vulnerable households for PEPFAR-funded programs for orphans and vulnerable children. The vulnerability measures examined did not cluster in ways that would allow for the creation of a small number of composite measures, and thus we were unable to develop a scale. In Uganda, we assessed the validity of a vulnerability index developed to classify households according to donor classifications of economic status by measuring its association with a validated poverty measure, finding only a modest correlation. In South Africa, we developed monitoring and evaluation tools to assess economic status of individual adolescent girls and their households. We found no significant correlation with our validation measures, which included a validated measure of girls' vulnerability to HIV, a validated poverty measure, and subjective classifications generated by the community, data collector, and respondent. Overall, none of the measures of economic vulnerability used in the 3 countries varied significantly with their proposed validation items. Our findings suggest that broad constructs of economic vulnerability cannot be readily captured using simple scales to classify households and individuals in a way that accounts for a substantial amount of variance at locally defined vulnerability levels. We

  13. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  14. Social Capital and Vulnerability from the Family, Neighborhood, School, and Community Perspectives

    Science.gov (United States)

    Williams, Bonita; Le Menestrel, Suzanne M.

    2013-01-01

    This article reviews research and offers program examples for developing social capital in youth with a range of vulnerabilities: emotional, physical, social, and developmental. Protective factors provided by developing social capital at the individual level include access to support networks, transition to employment, and community connectedness.…

  15. Family obligation values as a protective and vulnerability factor among low-income adolescent girls.

    Science.gov (United States)

    Milan, Stephanie; Wortel, Sanne

    2015-06-01

    Adolescents' beliefs about family obligation often reflect cultural variations in their family context, and thus are important for understanding development among diverse youth. In this study, we test hypotheses about the role of family obligation values in risk behavior and mental health in a sample of 194 low-income adolescent girls (mean age = 15.2; 58% Latina, 28% African-American/Black). We hypothesized that family obligation values can be both a protective and vulnerability factor, depending on the type of outcome and the presence of other risk factors. Across the sample, higher family obligation values tended to occur with indicators of positive family functioning (e.g., more frequent communication, less maternal hostility) based on mother and adolescent reports. As hypothesized, family obligation values moderated the relationship between established risk factors and adjustment in distinct ways, such that high family obligation values decreased risk in some domains (i.e., a protective factor) but increased risk in other domains (i.e., a vulnerability factor). Specifically, high family obligation values diminished the relationship between peer norms for risky behavior (sex and substance use) and individual engagement in those behaviors. At the same time, high family obligation values magnified the relationship between exposure to negative life events and poor mental health (PTSD and depressive symptoms). The results suggest that family obligation is an important but complex aspect of development among diverse adolescent girls.

  16. Family Obligation Values as a Protective and Vulnerability Factor among Low-Income Adolescent Girls

    Science.gov (United States)

    Milan, Stephanie; Wortel, Sanne

    2014-01-01

    Adolescents’ beliefs about family obligation often reflect cultural variations in their family context, and thus are important for understanding development among diverse youth. In this study, we test hypotheses about the role of family obligation values in risk behavior and mental health in a sample of 194 low-income adolescent girls (Mean age = 15.2; 58% Latina, 28% African-American/Black). We hypothesized that family obligation values can be both a protective and vulnerability factor, depending on the type of outcome and the presence of other risk factors. Across the sample, higher family obligation values tended to occur with indicators of positive family functioning (e.g., more frequent communication, less maternal hostility) based on mother and adolescent reports. As hypothesized, family obligation values moderated the relationship between established risk factors and adjustment in distinct ways, such that high family obligation values decreased risk in some domains (i.e., a protective factor) but increased risk in other domains (i.e., a vulnerability factor). Specifically, high family obligation values diminished the relationship between peer norms for risky behavior (sex and substance use) and individual engagement in those behaviors. At the same time, high family obligation values magnified the relationship between exposure to negative life events and poor mental health (PTSD and depressive symptoms). The results suggest that family obligation is an important but complex aspect of development among diverse adolescent girls. PMID:25351163

  17. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  18. Animal Ownership Among Vulnerable Populations in Regional South Australia: Implications for Natural Disaster Preparedness and Resilience.

    Science.gov (United States)

    Thompson, Kirrilly; Trigg, Joshua; Smith, Bradley

    Few studies have examined the prevalence of animal ownership among populations likely to be at greater risk from disaster events within a bushfire context. To investigate the proportion of vulnerable community members keeping animals and the types of animals kept, as well as perceived risk of harm to pets, and their inclusion in bushfire survival planning. Statewide anonymous online survey in 2014 of adult South Australian animal owners threatened by bushfire in January 2014. Respondents were asked about animal ownership, their bushfire risk perception, and household survival planning. Descriptive statistics are presented for 5 groups considered likely to contribute to increased risk of harm for households: linguistically diverse, older adults, families with young children, physically frail, and self-identifying disabled, as well as individuals with mental health considerations. An opt-in purposively targeted sample of anonymous South Australians living in high fire-risk locations. Adult South Australian animal owners threatened or directly impacted by bushfire events, including individuals matching 1 of the 5 vulnerable groups. Self-reported details of animal ownership, perceived fire risk, survival planning, and vulnerability characteristics. Animal ownership was found to be more prevalent in these 5 populations than in the wider South Australian population. Perceived risk to pets was low to moderately low in these individuals. Variation was observed in the role of animals generally and pets specifically as motivators for preparing bushfire survival plans. Emergency services and associated agencies need to consider how the unique needs of vulnerable populations that keep animals, and their potential differences in risk perception, relate to their bushfire survival planning and preparedness requirements.

  19. Is procrastination a vulnerability factor for hypertension and cardiovascular disease? Testing an extension of the procrastination-health model.

    Science.gov (United States)

    Sirois, Fuschia M

    2015-06-01

    Personality is an important epidemiological factor for understanding health outcomes. This study investigated the associations of trait procrastination with hypertension and cardiovascular disease (HT/CVD) and maladaptive coping by testing an extension of the procrastination-health model among individuals with and without HT/CVD. Individuals with self-reported HT/CVD (N = 182) and healthy controls (N = 564), from a community sample, completed an online survey including measures of personality, coping, and health outcomes. Logistic regression analysis controlling for demographic and higher order personality factors found that older age, lower education level and higher procrastination scores were associated with HT/CVD. Moderated mediation analyses with bootstrapping revealed that procrastination was more strongly associated with maladaptive coping behaviours in participants with HT/CVD than the healthy controls, and the indirect effects on stress through maladaptive coping were larger for the HT/CVD sample. Results suggest procrastination is a vulnerability factor for poor adjustment to and management of HT/CVD.

  20. Dark and vulnerable personality trait correlates of dimensions of criminal behavior among adult offenders.

    Science.gov (United States)

    Edwards, Bethany G; Albertson, Emily; Verona, Edelyn

    2017-10-01

    Given the high-level impact of crime, empirical work is needed to identify personality traits, or overarching factors of personality pathology, that may leave individuals more prone to engage in criminal behaviors. This study empirically tested the distinction between the dark personality and vulnerable dark personality spectra (Miller et al., 2010) in a large offender sample and aimed to test how these personality factors relate to criminal dimensions and individual types of crime. Self-report and public record data verified criminal behaviors for 493 (34.7% women) adult offenders, and features of the 2 personality spectra were assessed using the Psychopathy Checklist: Screening Version, Narcissistic Personality Inventory-16, Hypersensitive Narcissism Scale, and Personality Assessment Inventory: Borderline Scale. Factor analyses supported the distinction between dark and vulnerable dark personality spectra and 3 dimensions of crime (i.e., crimes against property and persons, and drug-related crimes). Findings broadly pointed to trait vulnerabilities within the dark spectra (e.g., callousness) as relevant for criminal versatility and violent crimes against persons (e.g., assault, murder), and impulsive/reactive tendencies within the dark spectra (vulnerable dark) appeared to be particularly important for impulsive property crimes (e.g., theft, robbery) and drug offenses. Results may lend themselves well to refining offender intervention techniques and warrant further examination of the extent to which dark personality spectra coalesce as expected or similarly predict high-impact behaviors. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Vulnerable Populations Perceive Their Health as at Risk from Climate Change.

    Science.gov (United States)

    Akerlof, Karen L; Delamater, Paul L; Boules, Caroline R; Upperman, Crystal R; Mitchell, Clifford S

    2015-12-04

    Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change's health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change-due to social vulnerability, health susceptibility, and exposure to hazards-already feel they are at risk. In a 2013 survey we measured Maryland residents' climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126). We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages.

  2. Vulnerable Populations Perceive Their Health as at Risk from Climate Change

    Directory of Open Access Journals (Sweden)

    Karen L. Akerlof

    2015-12-01

    Full Text Available Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change’s health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change—due to social vulnerability, health susceptibility, and exposure to hazards—already feel they are at risk. In a 2013 survey we measured Maryland residents’ climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126. We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages.

  3. Vulnerable Populations Perceive Their Health as at Risk from Climate Change

    Science.gov (United States)

    Akerlof, Karen L.; Delamater, Paul L.; Boules, Caroline R.; Upperman, Crystal R.; Mitchell, Clifford S.

    2015-01-01

    Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change’s health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change—due to social vulnerability, health susceptibility, and exposure to hazards—already feel they are at risk. In a 2013 survey we measured Maryland residents’ climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126). We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages. PMID:26690184

  4. AIDS, individual behaviour and the unexplained remaining variation.

    Science.gov (United States)

    Katz, Alison

    2002-01-01

    From the start of the AIDS pandemic, individual behaviour has been put forward, implicitly or explicitly, as the main explanatory concept for understanding the epidemiology of HIV infection and in particular for the rapid spread and high prevalence in sub-Saharan Africa. This has had enormous implications for the international response to AIDS and has heavily influenced public health policy and strategy and the design of prevention and care interventions at national, community and individual level. It is argued that individual behaviour alone cannot possibly account for the enormous variation in HIV prevalence between population groups, countries and regions and that the unexplained remaining variation has been neglected by the international AIDS community. Biological vulnerability to HIV due to seriously deficient immune systems has been ignored as a determinant of the high levels of infection in certain populations. This is in sharp contrast to well proven public health approaches to other infectious diseases. In particular, it is argued that poor nutrition and co-infection with the myriad of other diseases of poverty including tuberculosis, malaria, leishmaniasis and parasitic infections, have been neglected as root causes of susceptibility, infectiousness and high rates of transmission of HIV at the level of populations. Vulnerability in terms of non-biological factors such as labour migration, prostitution, exchange of sex for survival, population movements due to war and violence, has received some attention but the solutions proposed to these problems are also inappropriately focused on individual behaviour and suffer from the same neglect of economic and political root causes. As the foundation for the international community's response to the AIDS pandemic, explanations of HIV/AIDS epidemiology in terms of individual behaviour are not only grossly inadequate, they are highly stigmatising and may in some cases, be racist. They have diverted attention from

  5. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  6. Unknowing Researcher’s Vulnerability: Re-searching Inequality on an Uneven Playing Field

    Directory of Open Access Journals (Sweden)

    Siew Fang Law

    2016-08-01

    Full Text Available This article engages in critical reflexivity to investigate the researcher’s own sense of vulnerability when conducting research on social inequality. Using a disruptive experience in an immersive theatrical storytelling performance as a catalyst to deconstruct and raise consciousness about the author’s privilege and her own role in research, this article seeks to unpack the politics at play in qualitative research in social and political psychology. The extent to which our privileged role and our identity as researchers are nested in history, in systems, and in structures is explored, and the risk that this shields us from being able to truly understand the reality, or epistemology, of the vulnerable groups we are seeking to investigate, is examined. The notion of unknowing the researcher’s vulnerability in research is discussed, along with the ways in which systems and structures have allowed researchers to maintain emotional control and dominance in knowledge production. Moreover, through othering vulnerable emotions and legitimising a researcher’s position as emotion-free, value-free, neutral, and objective, we may continue to engender epistemological injustice. Finally, the author emphasizes the importance of reflexivity and re-searching researchers’ humility as ways to address this challenge.

  7. "Too Withdrawn" or "Too Friendly": Considering Social Vulnerability in Two Neuro-Developmental Disorders

    Science.gov (United States)

    Jawaid, A.; Riby, D. M.; Owens, J.; White, S. W.; Tarar, T.; Schulz, P. E.

    2012-01-01

    In some neuro-developmental disorders, the combined effect of intellectual disability and atypicalities of social cognition may put individuals at increased vulnerability in their social environment. The neuro-developmental disorders Williams syndrome, characterised by "hypersociability", and autism spectrum disorders, characterised by "social…

  8. Predicting PTSD: pre-existing vulnerabilities in glucocorticoid-signaling and implications for preventive interventions

    NARCIS (Netherlands)

    van Zuiden, Mirjam; Kavelaars, Annemieke; Geuze, Elbert; Olff, Miranda; Heijnen, Cobi J.

    2013-01-01

    Posttraumatic stress disorder (PTSD) is an anxiety disorder that may develop in response to a traumatic event. Approximately 10% of trauma-exposed individuals subsequently develop PTSD. It is hypothesized that the development of PTSD is associated with biological vulnerability factors, which are

  9. Care Wounds: Precarious Vulnerability and the Potential of Exposure.

    Science.gov (United States)

    Cubellis, Lauren

    2018-04-07

    What does it mean to offer care when the act of caring is wounding to its giver? For peer specialists-individuals with lived experience as patients in the psychiatric system-this question shapes how they use their own histories to provide support for individuals experiencing psychiatric crisis. Peer support is unique in the way it draws on empathetic resonance and depends on carefully deployed vulnerability; where one connects with others through the recognition of shared experience and mutual hurt. For peers, care works when this guidance, reassurance, and "being with"-all of which draw upon their own stories of traumatic history and variegated suffering-mitigate the present crisis being experienced by another. Drawing on twenty-eight months of fieldwork with a peer-staffed crisis respite center in the eastern United States, I argue that the peer specialist becomes the embodiment of a novel intersection of intimacy and compensation; one that poses vulnerability not as a consequence, casualty, or risk factor in the commodification of care, but as its principle vector of resonance and the assumption on which it is based. For peers, care that works-in that it creates a mutual resonance for the recipient-becomes simultaneously care that wounds its giver.

  10. Responses to Novelty and Vulnerability to Cocaine Addiction: Contribution of a Multi-Symptomatic Animal Model

    Science.gov (United States)

    Belin, David; Deroche-Gamonet, Véronique

    2012-01-01

    Epidemiological studies have revealed striking associations between several distinct behavioral/personality traits and drug addiction, with a large emphasis on the sensation-seeking trait and the associated impulsive dimension of personality. However, in human studies, it is difficult to identify whether personality/behavioral traits actually contribute to increased vulnerability to drug addiction or reflect psychobiological adaptations to chronic drug exposure. Here we show how animal models, including the first multi-symptomatic model of addiction in the rat, have contributed to a better understanding of the relationships between different subdimensions of the sensation-seeking trait and different stages of the development of cocaine addiction, from vulnerability to initiation of cocaine self-administration to the transition to compulsive drug intake. We argue that sensation seeking predicts vulnerability to use cocaine, whereas novelty seeking, akin to high impulsivity, predicts instead vulnerability to shift from controlled to compulsive cocaine use, that is, addiction. PMID:23125204

  11. Microtremor survey to investigate seismic vulnerability around the Seulimum Fault, Aceh Besar-Indonesia

    Science.gov (United States)

    Simanjuntak, Andrean V. H.; Muksin, Umar; Rahmayani, Febrina

    2018-05-01

    The Seulimeum Fault has generated inland earthquake with magnitude larger than M 6.5 that destroyed houses in the Lamteuba and Krueng Raya Villages. Earthquakes along the Seulimeum Fault are mostly right lateral strike-slip characterizing the Fault. The understanding of the seismic vulnerability around the highly populated Banda Aceh City and the villages in Aceh Besar is therefore very important since the city, and the villages are very close to the Seulimeum Fault. A microtremor survey has been conducted to investigate seismic vulnerability in the area closed to the Seulimeum Fault. The waveforms of the microtremor have been recorded in Lamteuba and Kreung Raya villages, Aceh Besar at 20 sites for 7 days from August 14, 2017 with the interval of measurement of 1 km. The waveforms recorded for 30 minutes at each site by using one Taurus Seismometer in miniseed format. The data has been analyzing by using Geopsy to obtain the Horizontal-Vertical Spectral Ratio for each site. The seismic vulnerability is considered to be high if the value of the Horizontal-Vertical Spectral Ratio is high. The HVSR values are then interpolated to obtain the seismic vulnerability map. The preliminary result shows high seismic vulnerability in the area around the first site.

  12. A review of vulnerability and risks for schizophrenia: Beyond the two hit hypothesis.

    Science.gov (United States)

    Davis, Justin; Eyre, Harris; Jacka, Felice N; Dodd, Seetal; Dean, Olivia; McEwen, Sarah; Debnath, Monojit; McGrath, John; Maes, Michael; Amminger, Paul; McGorry, Patrick D; Pantelis, Christos; Berk, Michael

    2016-06-01

    Schizophrenia risk has often been conceptualized using a model which requires two hits in order to generate the clinical phenotype-the first as an early priming in a genetically predisposed individual and the second a likely environmental insult. The aim of this paper was to review the literature and reformulate this binary risk-vulnerability model. We sourced the data for this narrative review from the electronic database PUBMED. Our search terms were not limited by language or date of publication. The development of schizophrenia may be driven by genetic vulnerability interacting with multiple vulnerability factors including lowered prenatal vitamin D exposure, viral infections, smoking intelligence quotient, social cognition cannabis use, social defeat, nutrition and childhood trauma. It is likely that these genetic risks, environmental risks and vulnerability factors are cumulative and interactive with each other and with critical periods of neurodevelopmental vulnerability. The development of schizophrenia is likely to be more complex and nuanced than the binary two hit model originally proposed nearly thirty years ago. Risk appears influenced by a more complex process involving genetic risk interfacing with multiple potentially interacting hits and vulnerability factors occurring at key periods of neurodevelopmental activity, which culminate in the expression of disease state. These risks are common across a number of neuropsychiatric and medical disorders, which might inform common preventive and intervention strategies across non-communicable disorders. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Dynamic vulnerability assessment and intelligent control for sustainable power systems

    CERN Document Server

    Gonzalez-Longatt, Francisco

    2018-01-01

    Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...

  14. LA INVESTIGACIÓN BIOMÉDICA Y EL CONSENTIMIENTO INFORMADO EN EL ÁMBITO DE LAS POBLACIONES E INDIVIDUOS VULNERABLES A PESQUISA BIOMÉDICA E O CONSENTIMENTO INFORMADO NO ÂMBITO DAS POPULAÇÕES E INDIVÍDUOS VULNERÁVEIS BIOMEDICAL INVESTIGATION AND INFORMED CONSENT IN VULNERABLE POPULATIONS AND INDIVIDUALS

    Directory of Open Access Journals (Sweden)

    Susana la Rocca

    2005-01-01

    Full Text Available El contexto de transnacionalidad económica y política en el que se desarrollan las actuales investigaciones biomédicas favorece el fenómeno conocido como "medicalización" de la vida y promueve la vulnerabilidad tanto de países como de individuos. Si tenemos en cuenta que es responsabilidad asumida por la bioética la preocupación por proteger al sujeto de investigación y, de manera especial, a los más vulnerables, estos aspectos deben ser objeto de una atenta consideración y evaluación que tienda hacia la corrección de los mismos. El artículo plantea también una estrategia a través de la ética del discurso y presenta objeciones a su eficacia procedimentalO contexto de transnacionalidade econômica e política em que se desenvolvem as atuais pesquisas biomédicas, favorece o conhecido fenômeno denominado medicalização" da vida e promove a vulnerabilidade, tanto dos países como dos indivíduos. Se levarmos em conta, que é responsabilidade assumida pela bioética, proteger o sujeito da pesquisa, e de maneira especial os mais vulneráveis, estes aspectos devem ser objeto de uma atenta consideração e avaliação, que vise a correção dos mesmosThe economical and political transnationality context inside which today's biomedical investigations take place favours the phenomenon known as life's medicalization and raises both countries' and individuals' vulnerability. If we assume that the need to protect the subjects of investigation is bioethics' accepted responsibility, and, first of all, of the most vulnerable ones, these aspects should be taken into special consideration and evaluation in order to correct them, if needed

  15. A Case-Only Study of Vulnerability to Heat Wave-Related Mortality in New York City (2000-2011).

    Science.gov (United States)

    Madrigano, Jaime; Ito, Kazuhiko; Johnson, Sarah; Kinney, Patrick L; Matte, Thomas

    2015-07-01

    As a result of climate change, the frequency of extreme temperature events is expected to increase, and such events are associated with increased morbidity and mortality. Vulnerability patterns, and corresponding adaptation strategies, are most usefully conceptualized at a local level. We used a case-only analysis to examine subject and neighborhood characteristics that modified the association between heat waves and mortality. All deaths of New York City residents from 2000 through 2011 were included in this analysis. Meteorological data were obtained from the National Climatic Data Center. Modifying characteristics were obtained from the death record and geographic data sets. A total of 234,042 adult deaths occurred during the warm season of our study period. Compared with other warm-season days, deaths during heat waves were more likely to occur in black (non-Hispanic) individuals than other race/ethnicities [odds ratio (OR) = 1.08; 95% CI: 1.03, 1.12], more likely to occur at home than in institutions and hospital settings (OR = 1.11; 95% CI: 1.06, 1.16), and more likely among those living in census tracts that received greater public assistance (OR = 1.05; 95% CI: 1.01, 1.09). Finally, deaths during heat waves were more likely among residents in areas of the city with higher relative daytime summer surface temperature and less likely among residents living in areas with more green space. Mortality during heat waves varies widely within a city. Understanding which individuals and neighborhoods are most vulnerable can help guide local preparedness efforts.

  16. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  17. Vulnerable self, poor understanding of others' minds, threat anticipation and cognitive biases as triggers for delusional experience in schizophrenia: a theoretical model.

    Science.gov (United States)

    Salvatore, Giampaolo; Lysaker, Paul H; Popolo, Raffaele; Procacci, Michele; Carcione, Antonino; Dimaggio, Giancarlo

    2012-01-01

    It remains unclear what processes lead to the establishment of persecutory delusions in acute phases of schizophrenia. Recently, it has been argued that persecutory delusions arise from an interaction among a range of emotional, cognitive and social factors. In this work, we explored this possibility by first discussing the relevant aspects of recent theoretical models of the causes of persecutory delusions. Then, we offered an analysis of the literature, illustrated with clinical observations suggesting that persecutory delusions are triggered during stressful intersubjective transactions by the interactions of (a) an alteration in empathetic perspective taking and in pragmatic understanding of others' minds; (b) a perception/representation of the self as vulnerable or subordinate and of the other as dominant and threatening; and (c) a hyperfunctioning of the threat/self-protection system when faced with perceived danger. Implications for future research and treatment of people suffering from this symptom are discussed. Copyright © 2011 John Wiley & Sons, Ltd.

  18. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  19. Investigating the effectiveness of response strategies for vulnerabilities to corruption in the chinese public construction sector.

    Science.gov (United States)

    Shan, Ming; Chan, Albert P C; Le, Yun; Hu, Yi

    2015-06-01

    Response strategy is a key for preventing widespread corruption vulnerabilities in the public construction sector. Although several studies have been devoted to this area, the effectiveness of response strategies has seldom been evaluated in China. This study aims to fill this gap by investigating the effectiveness of response strategies for corruption vulnerabilities through a survey in the Chinese public construction sector. Survey data obtained from selected experts involved in the Chinese public construction sector were analyzed by factor analysis and partial least squares-structural equation modeling. Analysis results showed that four response strategies of leadership, rules and regulations, training, and sanctions, only achieved an acceptable level in preventing corruption vulnerabilities in the Chinese public construction sector. This study contributes to knowledge by improving the understanding of the effectiveness of response strategies for corruption vulnerabilities in the public construction sector of developing countries.

  20. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  1. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    Science.gov (United States)

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  2. Vulnerability of Europe and Its Economy to Energy Crises (Preliminary Executive Summary)

    International Nuclear Information System (INIS)

    World Energy Council

    2007-01-01

    The rapid change of the economic environment requires the energy sector to develop new concepts and policies to respond better to security requirements and energy supply. Energy security is defined as an uninterruptible supply of energy, in terms of quantities required to meet demand at affordable process. Energy security means: reduced vulnerability to transient or longer term physical disruptions to import supplies, and availability of local and imported resources to meet the growing demand for energy over a period of time and at affordable prices. The vulnerability of an energy system can be measured by its ability to cope with adverse events. This is defined in the context of the increasing energy imported to Europe and the increase of energy prices over recent years. The study tries to enhance the understanding of the conceptual viewpoint of vulnerability that the European energy markets mights face in an unpredictable future, characterised by uncertainty, difficulties, danger or anxiety

  3. Barriers to Prescription Medication Adherence Among Homeless and Vulnerably Housed Adults in Three Canadian Cities.

    Science.gov (United States)

    Hunter, Charlotte E; Palepu, Anita; Farrell, Susan; Gogosis, Evie; O'Brien, Kristen; Hwang, Stephen W

    2015-07-01

    Medication adherence is an important determinant of successful medical treatment. Marginalized populations, such as homeless and vulnerably housed individuals, may face substantial barriers to medication adherence. This study aimed to determine the prevalence of, reasons for, and factors associated with medication nonadherence among homeless and vulnerably housed individuals. Additionally, we examined the association between medication nonadherence and subsequent emergency department utilization during a 1-year follow-up period. Data were collected as part of the Health and Housing in Transition study, a prospective cohort study tracking the health and housing status of 595 homeless and 596 vulnerably housed individuals in 3 Canadian cities. Logistic regression was used to identify factors associated with medication nonadherence, as well as the association between medication nonadherence at baseline and subsequent emergency department utilization. Among 716 participants who had been prescribed a medication, 189 (26%) reported nonadherence. Being ≥40 years old was associated with decreased likelihood of nonadherence (adjusted odds ratio [AOR] = 0.59; 95% confidence interval [CI] = 0.41-0.84), as was having a primary care provider (AOR = 0.49; 95% CI = 0.34-0.71). Having a positive screen on the AUDIT (Alcohol Use Disorders Identification Test; an indication of harmful or hazardous drinking) was associated with increased likelihood of nonadherence (AOR = 1.86; 95% CI = 1.31-2.63). Common reasons for nonadherence included side effects, cost, and lack of access to a physician. Self-reported nonadherence at baseline was significantly associated with frequent emergency department use (≥3 visits) over the follow-up period at the bivariate level (OR = 1.55; 95% CI = 1.02-2.35) but was not significant in a multivariate model (AOR = 1.49; 95% CI = 0.96-2.32). Homeless and vulnerably housed individuals face significant barriers to medication adherence. Health care

  4. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  5. Classifying vulnerability to sleep deprivation using baseline measures of psychomotor vigilance.

    Science.gov (United States)

    Patanaik, Amiya; Kwoh, Chee Keong; Chua, Eric C P; Gooley, Joshua J; Chee, Michael W L

    2015-05-01

    To identify measures derived from baseline psychomotor vigilance task (PVT) performance that can reliably predict vulnerability to sleep deprivation. Subjects underwent total sleep deprivation and completed a 10-min PVT every 1-2 h in a controlled laboratory setting. Participants were categorized as vulnerable or resistant to sleep deprivation, based on a median split of lapses that occurred following sleep deprivation. Standard reaction time, drift diffusion model (DDM), and wavelet metrics were derived from PVT response times collected at baseline. A support vector machine model that incorporated maximum relevance and minimum redundancy feature selection and wrapper-based heuristics was used to classify subjects as vulnerable or resistant using rested data. Two academic sleep laboratories. Independent samples of 135 (69 women, age 18 to 25 y), and 45 (3 women, age 22 to 32 y) healthy adults. In both datasets, DDM measures, number of consecutive reaction times that differ by more than 250 ms, and two wavelet features were selected by the model as features predictive of vulnerability to sleep deprivation. Using the best set of features selected in each dataset, classification accuracy was 77% and 82% using fivefold stratified cross-validation, respectively. In both datasets, DDM measures, number of consecutive reaction times that differ by more than 250 ms, and two wavelet features were selected by the model as features predictive of vulnerability to sleep deprivation. Using the best set of features selected in each dataset, classification accuracy was 77% and 82% using fivefold stratified cross-validation, respectively. Despite differences in experimental conditions across studies, drift diffusion model parameters associated reliably with individual differences in performance during total sleep deprivation. These results demonstrate the utility of drift diffusion modeling of baseline performance in estimating vulnerability to psychomotor vigilance decline

  6. Population dynamics, delta vulnerability and environmental change: comparison of the Mekong, Ganges–Brahmaputra and Amazon delta regions

    OpenAIRE

    Szabo, S.; Brondizio, E.; Renaud, F.G.; Hetrick, S.; Nicholls, R.; Matthews, Z.; Tessler, Z; Tejedor, A; Sebesvari, Z; Foufoula-Georgiou, E; da Costa, S; Dearing, J.A.

    2016-01-01

    Tropical delta regions are at risk of multiple threats including relative sea level rise and human alterations, making them more and more vulnerable to extreme floods, storms, surges, salinity intrusion, and other hazards which could also increase in magnitude and frequency with a changing climate. Given the environmental vulnerability of tropical deltas, understanding the interlinkages between population dynamics and environmental change in these regions is crucial for ensuring efficient pol...

  7. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  8. Spatial-temporal eco-environmental vulnerability assessment and its influential factors based on Landsat data

    Science.gov (United States)

    Anh, N. K.; Liou, Y. A.; Ming-Hsu, L.

    2016-12-01

    Regional land use/land cover (LULC) changes lead to various changes in ecological processes and, in turn, alter regional micro-climate. To understand eco-environmental responses to LULC changes, eco-environmental evaluation is thus required with aims to identify vulnerable regions and influential factors, so that practical measures for environmental protection and management may be proposed. The Thua Thien - Hue Province has been experiencing urbanization at a rapid rate in both population and physical size. The urban land, agricultural land, and aquaculture activities have been invasively into natural space and caused eco-environment deterioration by land desertification, soil erosion, shrinking forest resources,…etc. In this study, an assessment framework that is composed by 11 variables with 9 of them constructed from Landsat time series is proposed to serve as basis to examine eco-environmental vulnerability in the Thua Thien - Hue Province in years 1989, 2003, and 2014. An eco-environmental vulnerability map is assorted into six vulnerability levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities. Result shows that there is an increasing trend in eco-environmental vulnerability in general with expected evolving distributions in heavy and very heavy vulnerability levels, which mainly lying on developed land, bare land, semi bare land, agricultural land, and poor and recovery forests. In contrast, there is a significant decline in potential vulnerability level. The contributing factors of an upward trend in medium, heavy, and very heavy levels include: (i) a large natural forest converted to plantation forest and agriculture land; and (ii) significant expansion of developed land leading to difference in thermal signatures in urban areas as compared with those of the surrounding areas. It is concluded that anthropogenic processes with transformation on LULC has amplified the vulnerability of eco-environment in the study

  9. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    Energy Technology Data Exchange (ETDEWEB)

    Moss, R. H. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Blohm, A. J. [Univ. of Maryland, College Park, MD (United States); Delgado, A. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Henriques, J. J. [James Madison Univ., Harrisonburg, VA (United States); Malone, E L. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  10. Bayesian spatial models of the association between interpersonal violence, animal abuse and social vulnerability in São Paulo, Brazil.

    Science.gov (United States)

    Baquero, Oswaldo Santos; Ferreira, Fernando; Robis, Marcelo; Neto, José Soares Ferreira; Onell, Jason Ardila

    2018-04-01

    Animal abuse adversely affects animal health and welfare and has been associated with interpersonal violence in studies of individuals. However, if that association also depends on sociocultural contexts and can be detected on a geographic scale, a wider source of data can be used to identify risk areas to support the surveillance of both types of violence. In this study, we evaluated the association between interpersonal violence notifications, animal abuse notifications and an index of social vulnerability in São Paulo City, on a geographic scale, using Bayesian spatial models. The social vulnerability index was a risk factor for the number of interpersonal violence notifications and presented a dose-response pattern. The number of animal abuse notifications was also a risk factor for the number of interpersonal violence notifications, even after controlling for the social vulnerability index. The incorporation of spatial effects produced marked improvements in model performance metrics and allowed the identification of excess risk clusters. Geographical data on notifications on either animal abuse or interpersonal violence should be considered incitement for investigations and interventions of both types of violence. We suggest that notifications of animal abuse be based on an explicit definition and classification, as well as on objective measurements that allow a better understanding of the species and type of abuse involved, the animal health consequences, and the context in which they occurred. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

    Directory of Open Access Journals (Sweden)

    John Patrick Barrowclough

    2018-01-01

    Full Text Available The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a data breaches and (b weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT applications and identify the vulnerabilities that enabled them.

  12. Assessment of groundwater vulnerability in the coastal region of Oman using DRASTIC index method in GIS environment.

    Science.gov (United States)

    Jamrah, Ahmad; Al-Futaisi, Ahmed; Rajmohan, Natarajan; Al-Yaroubi, Saif

    2008-12-01

    A study was carried out to develop a vulnerability map for Barka region in the North Batina of Oman using DRASTIC vulnerability index method in GIS environment. DRASTIC layers were created using data from published reports and the seven DRASTIC layers were processed by the ArcGIS geographic information system. Finally, DRASTIC maps were created for 1995 and 2004 to understand the long-term changes in the vulnerability index. DRASTIC vulnerability maps were evaluated using groundwater quality data such as chemical and biological parameters. DRASTIC vulnerability maps of 1995 and 2004 indicate that the northern part of Barka is more vulnerable to pollution than southern part and the central part of Barka also shows high relative vulnerability which is mostly related to the high conductivity values. Moreover, the changes in water level due to high abstraction rate of groundwater reflect in the vulnerability maps and low vulnerability area is increased in the southern part during 2004 compared to 1995. Moreover, regional distribution maps of nitrate, chloride and total and fecal coliforms are well correlated with DRASTIC vulnerability maps. In contrast to this, even though DRASTIC method predicted the central part of the study region is highly vulnerable, both chemical and biological parameters show lower concentrations in this region compared to coastal belt, which is mainly due to agricultural and urban development. In Barka, urban development and agricultural activities are very high in coastal region compared to southern and central part of the study area. Hence, this study concluded that DRASTIC method is also applicable in coastal region having ubiquitous contamination sources.

  13. Climatic vulnerability of the world’s freshwater and marine fishes

    Science.gov (United States)

    Comte, Lise; Olden, Julian D.

    2017-10-01

    Climate change is a mounting threat to biological diversity, compromising ecosystem structure and function, and undermining the delivery of essential services worldwide. As the magnitude and speed of climate change accelerates, greater understanding of the taxonomy and geography of climatic vulnerability is critical to guide effective conservation action. However, many uncertainties remain regarding the degree and variability of climatic risk within entire clades and across vast ecosystem boundaries. Here we integrate physiological estimates of thermal sensitivity for 2,960 ray-finned fishes with future climatic exposure, and demonstrate that global patterns of vulnerability differ substantially between freshwater and marine realms. Our results suggest that climatic vulnerability for freshwater faunas will be predominantly determined by elevated levels of climatic exposure predicted for the Northern Hemisphere, whereas marine faunas in the tropics will be the most at risk, reflecting their higher intrinsic sensitivity. Spatial overlap between areas of high physiological risk and high human impacts, together with evidence of low past rates of evolution in upper thermal tolerance, highlights the urgency of global conservation actions and policy initiatives if harmful climate effects on the world’s fishes are to be mitigated in the future.

  14. Livelihoods, vulnerability and adaptation to climate change in Morogoro, Tanzania

    International Nuclear Information System (INIS)

    Paavola, Jouni

    2008-01-01

    This article examines farmers' livelihood responses and vulnerability to climate variability and other stressors in Morogoro, Tanzania, to understand their implications for adaptation to climate change by agricultural households in developing world more generally. In Morogoro, agricultural households have extended cultivation, intensified agriculture, diversified livelihoods and migrated to gain access to land, markets and employment as a response to climatic and other stressors. Some of these responses have depleted and degraded natural resources such as forest, soil and water resources, which will complicate their living with climate change in the future. This will be particularly problematic to vulnerable groups such as women, children and pastoralists who have limited access to employment, markets and public services. In this light, fair adaptation to climate change by agricultural households in Morogoro and elsewhere in developing countries requires several complementary responses. Adaptation efforts should involve effective governance of natural resources because they function as safety nets to vulnerable groups. In addition, strengthening of national markets by infrastructure investments and institutional reforms is needed to give incentives to intensification and diversification in agriculture. Market participation also demands enhancement of human capital by public programs on health, education and wellbeing

  15. Developing new methodology for nuclear power plants vulnerability assessment

    International Nuclear Information System (INIS)

    Kostadinov, Venceslav

    2011-01-01

    new methodology and solution methods for vulnerability assessment can help the overall national energy sector to identify and understand the terrorist threats to and vulnerabilities of its critical infrastructure. Moreover, adopted methodology could help national regulators and agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security and a safe operation of the entire energy infrastructure. New methods can also assist nuclear power plants to develop, validate, and disseminate assessment and surveys of new efficient countermeasures. Consequently, concise description of developed new quantitative method and adapted new methodology for nuclear regulatory vulnerability assessment of nuclear power plants are presented.

  16. Defining Population Health Vulnerability Following an Extreme Weather Event in an Urban Pacific Island Environment: Honiara, Solomon Islands

    Science.gov (United States)

    Natuzzi, Eileen S.; Joshua, Cynthia; Shortus, Matthew; Reubin, Reginald; Dalipanda, Tenneth; Ferran, Karen; Aumua, Audrey; Brodine, Stephanie

    2016-01-01

    Extreme weather events are common and increasing in intensity in the southwestern Pacific region. Health impacts from cyclones and tropical storms cause acute injuries and infectious disease outbreaks. Defining population vulnerability to extreme weather events by examining a recent flood in Honiara, Solomon Islands, can help stakeholders and policymakers adapt development to reduce future threats. The acute and subacute health impacts following the April 2014 floods were defined using data obtained from hospitals and clinics, the Ministry of Health and in-country World Health Organization office in Honiara. Geographical information system (GIS) was used to assess morbidity and mortality, and vulnerability of the health system infrastructure and households in Honiara. The April flash floods were responsible for 21 acute deaths, 33 injuries, and a diarrhea outbreak that affected 8,584 people with 10 pediatric deaths. A GIS vulnerability assessment of the location of the health system infrastructure and households relative to rivers and the coastline identified 75% of the health infrastructure and over 29% of Honiara's population as vulnerable to future hydrological events. Honiara, Solomon Islands, is a rapidly growing, highly vulnerable urban Pacific Island environment. Evaluation of the mortality and morbidity from the April 2014 floods as well as the infectious disease outbreaks that followed allows public health specialists and policy makers to understand the health system and populations vulnerability to future shocks. Understanding the negative impacts natural disaster have on people living in urban Pacific environments will help the government as well as development partners in crafting resilient adaptation development. PMID:27091867

  17. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  18. Modeling the Connectedness Between best Management Practices and Vulnerability Assessments

    Science.gov (United States)

    Anandhi, A.; Bailey, N.; Thomas, M.; Bartnick, B.

    2015-12-01

    The overall goal of this study is to better understand the connectedness between Best management practices (BMPs) and vulnerability assessments (VA) in a changing landuse. Developing this connectedness will help understand key vulnerabilities and improve adaptive capacity important for ecosystem sustainability. BMPs are practical management practices or systems designed and installed in watersheds to provide a wide range of effects to protect or restore the physical, chemical, and biological condition of waterbodies (e.g. changing hydrology; improving vegetative habitat; mitigate adverse environmental change). VAs can be defined as "the degree to which the system is susceptible to and is unable to cope with adverse effects of change" and are often characterized as a function of exposure, sensitivity and adaptive capacity. There are many variables and factors used in calculating the impact of BMPs and VAs. The event mean concentration or load (e.g. nutrient, sediment,) associated with the specific landuse is an important variable. There is much data that predicts the loads associated with the major landuses (urban, agricultural). Loads greatly vary with region; rainfall characteristics (e.g. rainfall intensity, rainfall frequency); soil characteristics (e.g. soil type, hydrologic soil groups); hydrologic characteristics (e.g. runoff potential). A concern also exists that possibly all of the variables associated with changes in an individual land use have not been identified and distinguished for their impact on land use. For example, the loads associated with a high density residential with much green space may be more similar to medium density than loads associated with high rise apartment buildings. Other factors may include age of construction, % of families with children, % of families with pets, level of transiency, and construction activity The objective of our study is to develop an initial framework using multiple variables and factors to represent the

  19. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  20. Vulnerabilities faced by the children of sex workers in two Mexico-US border cities: a retrospective study on sexual violence, substance use and HIV risk.

    Science.gov (United States)

    Servin, Argentina E; Strathdee, Steffanie; Muñoz, Fatima A; Vera, Alicia; Rangel, Gudelia; Silverman, Jay G

    2015-01-01

    Most studies of female sex workers (FSWs) conducted in the Mexico-US border region have focused on individual HIV risk, centered on sexual behaviors and substance abuse patterns. Little attention has been drawn to the reality that sex workers are often parents whose children potentially face vulnerabilities unique to their family situation. The objective of the present study was to identify the vulnerabilities faced by the children of FSWs in two Mexican-US border cities. From 2008 to 2010, 628 FSW-injection drug users underwent interviewer-administered surveys and HIV/STI testing. Approximately one in five participants (20%) reported having a parent involved in sex work and majority referred it was their mother (88%). Close to one-third of participants (31%) reported first injecting drugs prostitute <18 years of age. First drinking alcohol <18 years old (AOR = 1.87, 95%CI: 1.13-3.08), lifetime cocaine use (AOR = 1.76, 95%CI: 1.09-2.84), ever being forced or coerced into non-consensual sex as a minor (<18 years of age; AOR = 1.54, 95%CI: 1.01-2.35), and injecting drugs with used syringes in the prior month (AOR = 1.63, 95%CI: 1.07-2.49) were the factors associated with having had a parent involved in sex work. These findings begin to lay the groundwork for understanding the potential vulnerabilities faced by the children of sex workers. Understanding these potential needs is necessary for creating relevant, evidence-based interventions focused on supporting these women.

  1. Stereotype Threat Vulnerability: A Psychometric Investigation of the Social Identities and Attitudes Scale

    Science.gov (United States)

    Smith, Leann V.; Cokley, Kevin

    2016-01-01

    The authors investigated the psychometric properties of the Social Identities and Attitudes Scale developed by Picho and Brown, which captures an individual's vulnerability to Stereotype Threat effects. Confirmatory factor analyses and group invariance tests conducted on a diverse sample of 516 college students revealed adequate reliability and…

  2. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    Science.gov (United States)

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  3. Drinking water vulnerability to climate change and alternatives for adaptation in coastal South and South East Asia

    OpenAIRE

    Hoque, M. A.; Scheelbeek, P. F. D.; Vineis, P.; Khan, A. E.; Ahmed, K. M.; Butler, A. P.

    2016-01-01

    Drinking water in much of Asia, particularly in coastal and rural settings, is provided by a variety of sources, which are widely distributed and frequently managed at an individual or local community level. Coastal and near-inland drinking water sources in South and South East (SSE) Asia are vulnerable to contamination by seawater, most dramatically from tropical cyclone induced storm surges. This paper assesses spatial vulnerabilities to salinisation of drinking water sources due to meteoro...

  4. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  5. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  6. Predictors of homelessness among vulnerably housed adults in 3 Canadian cities: a prospective cohort study.

    Science.gov (United States)

    To, Matthew J; Palepu, Anita; Aubry, Tim; Nisenbaum, Rosane; Gogosis, Evie; Gadermann, Anne; Cherner, Rebecca; Farrell, Susan; Misir, Vachan; Hwang, Stephen W

    2016-10-03

    Homelessness is a major concern in many urban communities across North America. Since vulnerably housed individuals are at risk of experiencing homelessness, it is important to identify predictive factors linked to subsequent homelessness in this population. The objectives of this study were to determine the probability of experiencing homelessness among vulnerably housed adults over three years and factors associated with higher risk of homelessness. Vulnerably housed adults were recruited in three Canadian cities. Data on demographic characteristics, chronic health conditions, and drug use problems were collected through structured interviews. Housing history was obtained at baseline and annual follow-up interviews. Generalized estimating equations were used to characterize associations between candidate predictors and subsequent experiences of homelessness during each follow-up year. Among 561 participants, the prevalence of homelessness was 29.2 % over three years. Male gender (AOR = 1.59, 95 % CI: 1.14-2.21) and severe drug use problems (AOR = 1.98, 95 % CI: 1.22-3.20) were independently associated with experiencing homelessness during the follow-up period. Having ≥3 chronic conditions (AOR = 0.55, 95 % CI: 0.33-0.94) and reporting higher housing quality (AOR = 0.99, 95 % CI: 0.97-1.00) were protective against homelessness. Vulnerably housed individuals are at high risk for experiencing homelessness. The study has public health implications, highlighting the need for enhanced access to addiction treatment and improved housing quality for this population.

  7. Vulnerabilities to climate change of Massachusetts animal species of greatest conservation need

    Science.gov (United States)

    Galbraith, Hector; Morelli, Toni L.

    2017-01-01

    Over the last decade, the Commonwealth of Massachusetts has addressed the potential and actual impacts of climate change on state flora and fauna. The state’s involvement began in 2007 when, led by the Division of Fisheries and Wildlife (DFW) and assisted by Manomet Center for Con-servation Research, it carried out one of the first habitat vulnerability assessments in North America (Manomet, 2010). The new methods and processes that resulted were later applied to vulnerability assessments in North America and elsewhere. In 2011, the state assisted the North-eastern Association of Fish and Wildlife Agencies (NEAFWA) in organizing and leading a pio-neering three-year, thirteen-state research effort to evaluate the vulnerabilities of fish and wild-life habitats to climate change in the northeast, from Maine south to West Virginia (NEAFWA, 2012). This focus on climate change vulnerabilities led to three important early realizations: (1) simply categorizing and scoring vulnerabilities might not lead to better conservation outcomes. It was vital to also understand why some resources were more or less vulnerable to climate change in order to identify potential intervention points on which conservation actions and strategies could be based. (2) simply producing research results was not enough; these results had to be cast as specific conservation actions. Moreover (3), these actions needed to be communicated in a useful form to conservation “actors”, such as state agencies, land trusts, land managers, etc. These real-izations led to the next step on the Commonwealth’s journey to effective conservation in an age of climate change - the Massachusetts Wildlife Climate Action Tool (CAT).

  8. A Bayesian method to mine spatial data sets to evaluate the vulnerability of human beings to catastrophic risk.

    Science.gov (United States)

    Li, Lianfa; Wang, Jinfeng; Leung, Hareton; Zhao, Sisi

    2012-06-01

    Vulnerability of human beings exposed to a catastrophic disaster is affected by multiple factors that include hazard intensity, environment, and individual characteristics. The traditional approach to vulnerability assessment, based on the aggregate-area method and unsupervised learning, cannot incorporate spatial information; thus, vulnerability can be only roughly assessed. In this article, we propose Bayesian network (BN) and spatial analysis techniques to mine spatial data sets to evaluate the vulnerability of human beings. In our approach, spatial analysis is leveraged to preprocess the data; for example, kernel density analysis (KDA) and accumulative road cost surface modeling (ARCSM) are employed to quantify the influence of geofeatures on vulnerability and relate such influence to spatial distance. The knowledge- and data-based BN provides a consistent platform to integrate a variety of factors, including those extracted by KDA and ARCSM to model vulnerability uncertainty. We also consider the model's uncertainty and use the Bayesian model average and Occam's Window to average the multiple models obtained by our approach to robust prediction of the risk and vulnerability. We compare our approach with other probabilistic models in the case study of seismic risk and conclude that our approach is a good means to mining spatial data sets for evaluating vulnerability. © 2012 Society for Risk Analysis.

  9. Paternal genetic contribution influences fetal vulnerability to maternal alcohol consumption in a rat model of fetal alcohol spectrum disorder.

    Directory of Open Access Journals (Sweden)

    Laura J Sittig

    2010-04-01

    Full Text Available Fetal alcohol exposure causes in the offspring a collection of permanent physiological and neuropsychological deficits collectively termed Fetal Alcohol Spectrum Disorder (FASD. The timing and amount of exposure cannot fully explain the substantial variability among affected individuals, pointing to genetic influences that mediate fetal vulnerability. However, the aspects of vulnerability that depend on the mother, the father, or both, are not known.Using the outbred Sprague-Dawley (SD and inbred Brown Norway (BN rat strains as well as their reciprocal crosses, we administered ethanol (E, pair-fed (PF, or control (C diets to the pregnant dams. The dams' plasma levels of free thyroxine (fT4, triiodothyronine (T3, free T3 (fT3, and thyroid stimulating hormone (TSH were measured to elucidate potential differences in maternal thyroid hormonal environment, which affects specific aspects of FASD. We then compared alcohol-exposed, pair fed, and control offspring of each fetal strain on gestational day 21 (G21 to identify maternal and paternal genetic effects on bodyweight and placental weight of male and female fetuses.SD and BN dams exhibited different baseline hypothalamic-pituitary-thyroid function. Moreover, the thyroid function of SD dams was more severely affected by alcohol consumption while that of BN dams was relatively resistant. This novel finding suggests that genetic differences in maternal thyroid function are one source of maternal genetic effects on fetal vulnerability to FASD. The fetal vulnerability to decreased bodyweight after alcohol exposure depended on the genetic contribution of both parents, not only maternal contribution as previously thought. In contrast, the effect of maternal alcohol consumption on placental weight was consistent and not strain-dependent. Interestingly, placental weight in fetuses with different paternal genetic contributions exhibited opposite responses to caloric restriction (pair feeding. In summary

  10. Exclusion as a Criterion for Selecting Socially Vulnerable Population Groups

    Directory of Open Access Journals (Sweden)

    Aleksandra Anatol’evna Shabunova

    2016-05-01

    characterized by the situation and state of exception that is linked to social status and self-perception of human rights and expressed through the senses of inferiority, anger, fear, despair, depression, shame. The status of social exclusion has many criteria: poverty, limited opportunities for employment and education, lack of access to social and community networks and activities, inability to plan one’s own life. The explanatory concept of social exclusion is based on the construction of the attitude toward socially vulnerable layers as the devalued social status. The barrier of social inclusion consists in the formation of a negative image of a representative of this category of the population in the eyes of more secure population groups; and the reason for this phenomenon lies in individual characteristics of an individual: lack of purpose, apathy, laziness, low motivation to labor and training, and bad habits. The prevailing social stereotype contributes to the stratification of entire families, including children, who are in advance deprived of the most important economic, political and cultural resources of society, and have no opportunities for the upward mobility. If no measures are taken to overcome social exclusion, it can lead to the fact that part of the population will fall out of social development and slip into a state of stagnation and complete social dependence. The concept of social inclusion shifts the priorities of state social policy from the allocation of social transfers to actively changing the mindset in society

  11. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  12. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  13. Combining analytical frameworks to assess livelihood vulnerability to climate change and analyse adaptation options.

    Science.gov (United States)

    Reed, M S; Podesta, G; Fazey, I; Geeson, N; Hessel, R; Hubacek, K; Letson, D; Nainggolan, D; Prell, C; Rickenbach, M G; Ritsema, C; Schwilch, G; Stringer, L C; Thomas, A D

    2013-10-01

    Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change.

  14. Public policies for adolescents in vulnerable áreas

    Directory of Open Access Journals (Sweden)

    Mara Rejane Barroso Barcelos

    2010-09-01

    Full Text Available Objective: To characterize the cross-sector policies aimed at the teenager, from the following analytical variables: adolescence, interdisciplinary, intersectionality and Health System; vulnerability and territory, healthy municipalities and communities. Methods: A documental literature review, in which we sought the meaning of adolescence, the ratio of public investment in this segment and a discussion on the social norm and the state apparatus for their support. We used as categories of analysis: intersectionality, systemic complexity of health, territory of vulnerability, spatial delimitation of policy, social network and healthy spaces. Results: Public policies integrated into healthy spaces have been implemented in several places having adolescence as a focal object. Policies aimed at teenagers, whose symbolic representation considers them more independent and positive in social reality, tend to create more meaningful opportunities and empowerment of individuals. Conclusion: In Brazilian State, new spaces of sociability of the adolescent are welcome, serving as socializing agencies, contributing to the construction of the subjectivity of the adolescent, based in the recovery of social values and preparing for life as from an ethical and civicconsciousness.

  15. A method proposal for cumulative environmental impact assessment based on the landscape vulnerability evaluation

    International Nuclear Information System (INIS)

    Pavlickova, Katarina; Vyskupova, Monika

    2015-01-01

    Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impact significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process

  16. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  17. Understanding human behavior in times of war.

    Science.gov (United States)

    Vetter, Stefan

    2007-12-01

    The Third Geneva Convention reflects on the values of humanism, declaring the rights of humaneness, honor, and protection before torture and final discharge of war prisoners after the end of a war. These days, the occurrences in Baghdad Central Detention Center (formerly known as Abu Ghraib Prison), the actions of British soldiers in Basra, and the inflamed public discussion of whether torture might be an appropriate method to obtain crucial information from terrorists put the Third Geneva Convention back in the spotlight. The aforementioned occurrences raise questions regarding the psychological mass phenomena that make us vulnerable to think and to act against our education, habits, and beliefs. Only an understanding of these phenomena will help us to act against behavior we condemn. This article is an attempt to show how cognition of societies and individuals slowly changes during longer conflicts. Furthermore, it tries to summarize the possibilities we have to confront these tendencies.

  18. Association Between Cognitive Complaints and Vulnerability to Environmental Distraction in Multiple Sclerosis.

    Science.gov (United States)

    Randolph, John J; Randolph, Jennifer S; Wishart, Heather A

    2017-02-01

    Individuals with multiple sclerosis (MS) often report cognitive dysfunction, although neuropsychological evaluation findings may not correlate with subjective concerns. One factor that may explain this lack of correspondence is the controlled testing environment, which differs from busier settings where cognitive lapses are noted to occur. This study used a novel environmental manipulation to determine whether individuals with MS who report cognitive dysfunction are more vulnerable to the effects of auditory distraction during neuropsychological testing. Twenty-four individuals with clinically definite MS or clinically isolated syndrome were administered a cognitive battery during two counterbalanced auditory conditions: quiet/standard condition, and distraction condition with random office background noise. Participants were divided into high versus low cognitive complaint groups using a median split analysis of Perceived Deficits Questionnaire responses. Participants with more cognitive complaints showed a decrement in performance on the oral Symbol Digit Modalities Test during the distraction condition while those with fewer cognitive complaints demonstrated stable performance across conditions. These findings remained significant after controlling for education, premorbid intellect, fatigue, and depressed mood. These results suggest that individuals with MS with more cognitive complaints are vulnerable to environmental distraction, particularly regarding processing speed. Incorporating random environmental noise or other distraction conditions during selected measures may enhance the ecological validity of neuropsychological evaluation results in MS. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. Northern Great Basin Seasonal Lakes: Vulnerability to Climate Change.

    Science.gov (United States)

    Russell, M.; Eitel, J.

    2017-12-01

    Seasonal alkaline lakes in southeast Oregon, northeast California, and northwest Nevada serve as important habitat for migrating birds utilizing the Pacific Flyway, as well as local plant and animal communities. Despite their ecological importance, and anecdotal suggestions that these lakes are becoming less reliable, little is known about the vulnerability of these lakes to climate change. Our research seeks to understand the vulnerability of Northern Great Basin seasonal lakes to climate change. For this, we will be using historical information from the European Space Agency's Global Surface Water Explorer and the University of Idaho's gridMET climate product, to build a model that allows estimating surface water extent and timing based on climate variables. We will then utilize downscaled future climate projections to model surface water extent and timing in the coming decades. In addition, an unmanned aerial system (UAS) will be utilized at a subset of dried basins to obtain precise 3D bathymetry and calculate water volume hypsographs, a critical factor in understanding the likelihood of water persistence and biogeochemical habitat suitability. These results will be incorporated into decision support tools that land managers can utilize in water conservation, wildlife management, and climate mitigation actions. Future research may pair these forecasts with animal movement data to examine fragmentation of migratory corridors and species-specific impacts.

  20. Vulnerable to HIV / AIDS. Migration.

    Science.gov (United States)

    Fernandez, I

    1998-01-01

    This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.

  1. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  2. Auditory and Cognitive Factors Underlying Individual Differences in Aided Speech-Understanding among Older Adults

    Directory of Open Access Journals (Sweden)

    Larry E. Humes

    2013-10-01

    Full Text Available This study was designed to address individual differences in aided speech understanding among a relatively large group of older adults. The group of older adults consisted of 98 adults (50 female and 48 male ranging in age from 60 to 86 (mean = 69.2. Hearing loss was typical for this age group and about 90% had not worn hearing aids. All subjects completed a battery of tests, including cognitive (6 measures, psychophysical (17 measures, and speech-understanding (9 measures, as well as the Speech, Spatial and Qualities of Hearing (SSQ self-report scale. Most of the speech-understanding measures made use of competing speech and the non-speech psychophysical measures were designed to tap phenomena thought to be relevant for the perception of speech in competing speech (e.g., stream segregation, modulation-detection interference. All measures of speech understanding were administered with spectral shaping applied to the speech stimuli to fully restore audibility through at least 4000 Hz. The measures used were demonstrated to be reliable in older adults and, when compared to a reference group of 28 young normal-hearing adults, age-group differences were observed on many of the measures. Principal-components factor analysis was applied successfully to reduce the number of independent and dependent (speech understanding measures for a multiple-regression analysis. Doing so yielded one global cognitive-processing factor and five non-speech psychoacoustic factors (hearing loss, dichotic signal detection, multi-burst masking, stream segregation, and modulation detection as potential predictors. To this set of six potential predictor variables were added subject age, Environmental Sound Identification (ESI, and performance on the text-recognition-threshold (TRT task (a visual analog of interrupted speech recognition. These variables were used to successfully predict one global aided speech-understanding factor, accounting for about 60% of the variance.

  3. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  4. Building capacity and wellbeing in vulnerable/marginalised mothers: A qualitative study.

    Science.gov (United States)

    Balaam, Marie-Clare; Thomson, Gill

    2018-01-19

    The persistence of health inequalities in pregnancy and infancy amongst vulnerable/marginalised groups in the UK. During pregnancy and early motherhood some women experience severe and multiple psychosocial and economic disadvantages that negatively affect their wellbeing and make them at increased risk of poor maternal and infant health outcomes. To explore vulnerable/marginalised women's views and experiences of receiving targeted support from a specialist midwifery service and/or a charity. A mixed-methods study was undertaken that involved analysis of routinely collected birth-related/outcome data and interviews with a sample of vulnerable/marginalised women who had/had not received targeted support from a specialist midwifery service and/or a charity. In this paper we present in-depth insights from the 11 women who had received targeted support. Four key themes were identified; 'enabling needs-led care and support', 'empowering through knowledge, trust and acceptance', 'the value of a supportive presence' and 'developing capabilities, motivation and confidence'. Support provided by a specialist midwifery service and/or charity improved the maternity and parenting experiences of vulnerable/marginalised women. This was primarily achieved by developing a provider-woman relationship built on mutual trust and understanding and through which needs-led care and support was provided - leading to improved confidence, skills and capacities for positive parenting and health. The collaborative, multiagency, targeted intervention provides a useful model for further research and development. It offers a creative, salutogenic and health promoting approach to provide support for the most vulnerable/marginalised women as they make the journey into parenthood. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  5. Understanding Health Information Seeking from an Actor-Centric Perspective

    Directory of Open Access Journals (Sweden)

    Simon Batchelor

    2015-07-01

    Full Text Available This paper presents a conceptual approach for discussing health information seeking among poor households in Africa and Asia. This approach is part of a larger research endeavor aimed at understanding how health systems are adapting; with possibilities and constraints emerging. These health systems can be found in a context of the changing relationships between states, markets and civil society in low and middle income countries. The paper starts from an understanding of the health sector as a “health knowledge economy”, organized to provide people with access to knowledge and advice. The use of the term “health knowledge economy” draws attention to the ways the health sector is part of a broader knowledge economy changing the way individuals and households obtain and use specialist information. The paper integrates an actor centric approach with the theory of planned behavior. It seeks to identify the actors engaged in the health knowledge economy as a precursor to longer term studies on the uptake of innovations integrating health services with mobile phones, commonly designated as mHealth, contributing to an understanding of the potential vulnerabilities of poor people, and highlighting possible dangers if providers of health information and advice are strongly influenced by interest groups.

  6. Spatial vulnerability of Australian urban populations to extreme heat events

    Science.gov (United States)

    Loughnan, Margaret; Tapper, Nigel; Phan, Thu; Lynch, Kellie; McInnes, Judith

    2013-04-01

    Extreme heat events pose a risk to the health of all individuals, especially the elderly and the chronically ill, and are associated with an increased demand for healthcare services. In order to address this problem, policy makers' need information about temperatures above which mortality and morbidity of the exposed population is likely to increase, where the vulnerable groups in the community are located, and how the risks from extreme heat events are likely to change in the future. This study identified threshold temperatures for all Australian capital cities, developed a spatial index of population vulnerability, and used climate model output to predict changes in the number of days exceeding temperature thresholds in the future, as well as changes in risk related to changes in urban density and an ageing population. The study has shown that daily maximum and minimum temperatures from the Bureau of Meteorology forecasts can be used to calculate temperature thresholds for heat alert days. The key risk factors related to adverse health outcomes were found to be areas with intense urban heat islands, areas with higher proportions of older people, and areas with ethnic communities. Maps of spatial vulnerability have been developed to provide information to assist emergency managers, healthcare professionals, and ancillary services develop heatwave preparedness plans at a local scale that target vulnerable groups and address heat-related health risks. The numbers of days exceeding current heat thresholds are predicted to increase over the next 20 to 40 years in all Australian capital cities.

  7. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  8. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    International Nuclear Information System (INIS)

    Suski, N.; Wuest, C.

    2011-01-01

    -Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release

  9. From Vulnerability to Dignity: The RN Declaration of Self-Esteem.

    Science.gov (United States)

    Janzen, Katherine J; Mitchell, Maureen; Renton, Lesley J; Currie, Genevieve; Nordstrom, Pamela M

    2015-11-04

    Registered nurses (RNs) experience vulnerability from a variety of sources in today's healthcare organizations. While RN vulnerability can be associated with positive outcomes with patients and clients, vulnerability can also be dangerous to RNs as they struggle with outside forces that many feel they have no control over. The study aims to maintain and enhance the dignity of RNs and provide a beacon to RNs who may have become wounded in the healthcare setting and/or their own profession. The study was conducted in a conference entitled "Advancing Nursing Practice Through Change, Innovation and Creativity" held at a midsized university in western Canada. The participants were 115 administrators, members of RN regulatory bodies, nursing faculty, nurse educators, and staff nurses. An activity entitled "Wild Thinking" gave participants an opportunity to reflect upon the conference and their personal experiences of change, innovation, and creativity they wished to see within the workplace. All responses were collected at the end of the activity, transcribed verbatim, and analyzed for themes. Arising from 16 themes, the RN Declaration of Self-Esteem was created. The RN Declaration of Self-Esteem may be helpful in promoting empowerment at the individual RN level as well as in the collective professional level. © 2015 Wiley Periodicals, Inc.

  10. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments.

    Directory of Open Access Journals (Sweden)

    Robert S Rempel

    Full Text Available Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna, wood thrush (Hylocichla mustelina, and hooded warbler (Setophaga citrina. We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species.

  11. Challenges and Responses to the Vulnerability of Families in a Preschool Context

    Directory of Open Access Journals (Sweden)

    Nada Turnšek

    2016-12-01

    Full Text Available Problems in vulnerable families are multilayered and include the intersection of physical, psychosocial and other forms of distress. The multidimensional nature of the problems of these families is closely linked to the fact that there are many institutions in the field of education, social welfare, health care and others, in which treatment and support are not satisfactory or adapted to their needs. The article presents the partial results of a large-scale qualitative research study, results that refer to the position of vulnerable families in the context of preschool education. The study examined how vulnerability is experienced by parents of preschool children, how the expert workers in the preschools involved in the study responded to the parents’ vulnerability, and how they cooperated with experts from other services outside the preschool. A qualitative research method was used in the study. Data was collected partly through semi-structured interviews with various expert workers employed in two preschools, as well as with the parents of children in the preschools; the interviews were conducted individually and in focus groups. Using thematic analysis (Braun & Clarke, 2006, we have identified four representative themes: amongst parents, the two recurring themes can be subsumed under the headings “from door to door” and “adaptation/flexibility”, and amongst experts, under the headings “powerlessness/ incompetence/lack of information” and “power/innovation/ sensitivity”. The study finds that the ability to effectively contend with vulnerability presumes a reconceptualisation of the attitude of institutional preschool education towards the family, including a change in the professional role of preschool teachers.

  12. Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

    Directory of Open Access Journals (Sweden)

    Yongliang Deng

    2017-01-01

    Full Text Available Vulnerability analysis of network models has been widely adopted to explore the potential impacts of random disturbances, deliberate attacks, and natural disasters. However, almost all these models are based on a fixed topological structure, in which the physical properties of infrastructure components and their interrelationships are not well captured. In this paper, a new research framework is put forward to quantitatively explore and assess the complexity and vulnerability of critical infrastructure systems. Then, a case study is presented to prove the feasibility and validity of the proposed framework. After constructing metro physical network (MPN, Pajek is employed to analyze its corresponding topological properties, including degree, betweenness, average path length, network diameter, and clustering coefficient. With a comprehensive understanding of the complexity of MPN, it would be beneficial for metro system to restrain original near-miss or accidents and support decision-making in emergency situations. Moreover, through the analysis of two simulation protocols for system component failure, it is found that the MPN turned to be vulnerable under the condition that the high-degree nodes or high-betweenness edges are attacked. These findings will be conductive to offer recommendations and proposals for robust design, risk-based decision-making, and prioritization of risk reduction investment.

  13. Correlation between nitrate concentration in groundwater and parameters affecting aquifer intrinsic vulnerability

    Science.gov (United States)

    Debernardi, Laura; de Luca, Domenico Antonio; Lasagna, Manuela

    2008-08-01

    This paper is the result of a study which was carried out in order to verify if the traditional methods to evaluate the intrinsic vulnerability or vulnerability related parameters, are able to clarify the problem of nitrate pollution in groundwater. In particular, the aim was to evaluate limitations and problems connected to aquifer vulnerability methods applied to nitrate contamination prevision in groundwater. The investigation was carried out by comparing NO3 - concentrations, measured in March and November 2004 in the shallow aquifer, and the vulnerability classes, obtained by using GOD and TOT methods. Moreover, it deals with a comparison between NO3 - concentrations and single parameters (depth to water table, land use and nitrogen input). The study area is the plain sector of Piemonte (Northern Italy), where an unconfined aquifer nitrate contamination exists. In this area the anthropogenic presence is remarkable and the input of N-fertilizers and zootechnical effluents to the soil cause a growing amount of nitrates in groundwater. This approach, used in a large area (about 10,000 km2) and in several monitoring wells (about 500), allowed to compare the efficiency of different vulnerability methods and to verify the importance of every parameter on the nitrate concentrations in the aquifer. Furthermore it allowed to obtain interesting correlations in different hydrogeological situations. Correlations between depth to water table, land use and nitrogen input to the soil with nitrate concentrations in groundwater show unclear situations: in fact these comparisons describe the phenomenon trend and highlight the maximum nitrate concentrations for each circumstance but often show wide ranges of possible nitrate concentrations. The same situation could be observed by comparing vulnerability indexes and nitrate concentrations in groundwater. These results suggest that neither single parameters nor vulnerability methods (GOD and TOT) are able to describe individually

  14. Assessment of prey vulnerability through analysis of wolf movements and kill sites.

    Science.gov (United States)

    Bergman, Eric J; Garrott, Robert A; Creel, Scott; Borkowski, John J; Jaffe, Rosemary; Watson, E G R

    2006-02-01

    Within predator-prey systems behavior can heavily influence spatial dynamics, and accordingly, the theoretical study of how spatial dynamics relate to stability within these systems has a rich history. However, our understanding of these behaviors in large mammalian systems is poorly developed. To address the relationship between predator selection patterns, prey density, and prey vulnerability, we quantified selection patterns for two fine-scale behaviors of a recovering wolf (Canis lupus) population in Yellowstone National Park, Wyoming, USA. Wolf spatial data were collected between November and May from 1998-1999 until 2001-2002. Over four winters, 244 aerial locations, 522 ground-based telemetry locations, 1287 km of movement data from snow tracking, and the locations of 279 wolf kill sites were recorded. There was evidence that elk (Cervus elaphus) and bison (Bison bison) densities had a weak effect on the sites where wolves traveled and made kills. Wolf movements showed a strong selection for geothermal areas, meadows, and areas near various types of habitat edges. Proximity to edge and habitat class also had a strong influence on the locations where elk were most vulnerable to predation. There was little evidence that wolf kill sites differed from the places where wolves traveled, indicating that elk vulnerability influenced where wolves selected to travel. Our results indicate that elk are more vulnerable to wolves under certain conditions and that wolves are capable of selecting for these conditions. As such, vulnerability plays a central role in predator-prey behavioral games and can potentially impact the systems to which they relate.

  15. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  16. Vulnerability analysis and passenger source prediction in urban rail transit networks.

    Directory of Open Access Journals (Sweden)

    Junjie Wang

    Full Text Available Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT ODs (origin-destination matrix were estimated and the most vulnerable URT segments, those capable of causing the largest service interruptions, were identified. In both URT networks, a few highly vulnerable segments were observed. For this small group of vital segments, the impact of failure must be carefully evaluated. A bipartite URT usage network was developed and used to determine the inherent connections between urban rail transits and their passengers' travel demands. Although passengers' origins and destinations were easy to locate for a large number of URT segments, a few show very complicated spatial distributions. Based on the bipartite URT usage network, a new layer of the understanding of a URT segment's vulnerability can be achieved by taking the difficulty of addressing the failure of a given segment into account. Two proof-of-concept cases are described here: Possible transfer of passenger flow to the road network is here predicted in the cases of failures of two representative URT segments in San Francisco.

  17. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  18. Vulnerability of water supply from the Oregon Cascades to changing climate: linking science to users and policy

    Science.gov (United States)

    Kathleen A. Farley; Christina Tague; Gordon E. Grant

    2011-01-01

    Despite improvements in understanding biophysical response to climate change, a better understanding of how such changes will affect societies is still needed. We evaluated effects of climate change on the coupled human-environmental system of the McKenzie River watershed in the Oregon Cascades in order to assess its vulnerability. Published empirical and modeling...

  19. Ecosystem vulnerability to climate change in the southeastern United States

    Science.gov (United States)

    Cartwright, Jennifer M.; Costanza, Jennifer

    2016-08-11

    Two recent investigations of climate-change vulnerability for 19 terrestrial, aquatic, riparian, and coastal ecosystems of the southeastern United States have identified a number of important considerations, including potential for changes in hydrology, disturbance regimes, and interspecies interactions. Complementary approaches using geospatial analysis and literature synthesis integrated information on ecosystem biogeography and biodiversity, climate projections, vegetation dynamics, soil and water characteristics, anthropogenic threats, conservation status, sea-level rise, and coastal flooding impacts. Across a diverse set of ecosystems—ranging in size from dozens of square meters to thousands of square kilometers—quantitative and qualitative assessments identified types of climate-change exposure, evaluated sensitivity, and explored potential adaptive capacity. These analyses highlighted key gaps in scientific understanding and suggested priorities for future research. Together, these studies help create a foundation for ecosystem-level analysis of climate-change vulnerability to support effective biodiversity conservation in the southeastern United States.

  20. Predictors of homelessness among vulnerably housed adults in 3 Canadian cities: a prospective cohort study

    Directory of Open Access Journals (Sweden)

    Matthew J. To

    2016-10-01

    Full Text Available Abstract Background Homelessness is a major concern in many urban communities across North America. Since vulnerably housed individuals are at risk of experiencing homelessness, it is important to identify predictive factors linked to subsequent homelessness in this population. The objectives of this study were to determine the probability of experiencing homelessness among vulnerably housed adults over three years and factors associated with higher risk of homelessness. Methods Vulnerably housed adults were recruited in three Canadian cities. Data on demographic characteristics, chronic health conditions, and drug use problems were collected through structured interviews. Housing history was obtained at baseline and annual follow-up interviews. Generalized estimating equations were used to characterize associations between candidate predictors and subsequent experiences of homelessness during each follow-up year. Results Among 561 participants, the prevalence of homelessness was 29.2 % over three years. Male gender (AOR = 1.59, 95 % CI: 1.14–2.21 and severe drug use problems (AOR = 1.98, 95 % CI: 1.22–3.20 were independently associated with experiencing homelessness during the follow-up period. Having ≥3 chronic conditions (AOR = 0.55, 95 % CI: 0.33–0.94 and reporting higher housing quality (AOR = 0.99, 95 % CI: 0.97–1.00 were protective against homelessness. Conclusions Vulnerably housed individuals are at high risk for experiencing homelessness. The study has public health implications, highlighting the need for enhanced access to addiction treatment and improved housing quality for this population.

  1. Vulnerability assessment at a national level in Georgia

    Science.gov (United States)

    Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.

    2012-04-01

    . The long term usage of building is very complex. It relates to the reliability and durability of buildings. The long term usage and durability of a building is determined by the concept of depreciation. Depreciation of an entire building is calculated by summing the products of individual construction unit' depreciation rates and the corresponding value of these units within the building. This method of calculation is based on an assumption that depreciation is proportional to the building's (constructions) useful life. We used this methodology to create a matrix, which provides a way to evaluate the depreciation rates of buildings with different type and construction period and to determine their corresponding value. Finely some attempt was done to investigate how these structures were damaged by various hazards. In other words vulnerability curves were constrained on the basis on the relation between various hazard intensities and damage data.

  2. Vulnerability Situations associated with Flash Flood Casualties in the United States

    Science.gov (United States)

    Terti, G.; Ruin, I.; Anquetin, S.; Gourley, J. J.

    2015-12-01

    In the United States (U.S.) flash flooding (FF hereafter) is one of the leading cause of weather-related deaths. Because FF events can be distinguished from riverine floods by their fast response to rainfall and resulting impacts signature, analyzing FF-specific impact datasets seems a good way to identify the juxtaposition of social and physical circumstances leading to those impacts. This communication focuses on conceptual and methodological developments allowing testing hypotheses on FF-specific vulnerability factors through the analysis of human impact datasets. We hypothesize that the intersection of the spatio-temporal context of the FF phenomena with the distribution of people and their characteristics across space and time reveals various paths of vulnerability through the expression of different accidents' circumstances (i.e., vehicle-related, inside buildings, open-air, campsites). We argue that vulnerability and the resulting impacts vary dynamically throughout the day according to the location/situation under concern. In order to test FF-specific contextual vulnerability factors at the scale of the continental US, 1075 fatalities reported between 1996 and 2014 in the Storm Data publication of the U.S. National Climatic Data Center (NCDC) are analyzed to statistically explore the timing, the duration and the location of the FF event, and the age and gender of the victims and the circumstance (i.e. location/activity) of their death. In this objective, a re-classification of the individual fatality circumstances and a discretization of the time in qualitative time-steps are performed to obtain possible trends and patterns in the occurrence of fatalities in certain circumstances and time (e.g., day vs night). The findings highlight the importance of situation-specific assessment of FF fatalities to guide the development of FF-specific vulnerability and impacts prediction modeling. Such analysis can provide valuable knowledge when the National Weather

  3. Improvising in the Vulnerable Encounter: Using Improvised Participatory Theatre in Change for Healthcare Practice

    Science.gov (United States)

    Larsen, Henry; Friis, Preben; Heape, Chris

    2018-01-01

    Healthcare practitioners are often presented with vulnerable encounters where their professional experience is insufficient when dealing with patients who suffer from illnesses such as chronic pain. How can one otherwise understand chronic pain and develop practices whereby medical healthcare practitioners can experience alternative ways of doing…

  4. Promoting an egalitarian approach to research with vulnerable populations of women.

    Science.gov (United States)

    Mkandawire-Valhmu, Lucy; Rice, Elizabeth; Bathum, Mary Elizabeth

    2009-08-01

    This paper is a presentation of issues that arise when conducting research with women from vulnerable populations. Conducting research with ethnic minority populations has accentuated the challenges inherent in research, particularly when the populations participating are considered 'vulnerable' due to additional variables such as low levels of income. The paper is based on the experiences of three authors using feminist methods in separate but similar research trajectories that include (a) low-income women in the Southern African country of Malawi, (b) women diagnosed with schizophrenia in the United States of America, and (c) rural, indigenous Aymara women of the highlands of Peru. The data forming the basis of this paper were collected over 3- to 6-month periods between 2005 and 2006. We examine the impact of the researcher's power on the research process. Our research provides examples that illuminate the limitations of informed consent in research with vulnerable populations of women. We offer critical questions about and recommendations for nursing and other health care researchers, both in the third world and the western world, regarding appropriate research methods with vulnerable populations: methods that acknowledge the oppressive realities of the participants, methods that deliberately avoid further marginalization of participants, and methods that have the potential to improve the life situations of the women who participate in our research. These examples show the need for new methods to ensure that participants in research understand their role and the benefits they may expect to receive from research.

  5. A Preliminary Assessment of Social Vulnerability in Ganga-Brahmaputra-Meghna Delta

    Science.gov (United States)

    Hazra, Sugata; Islam, Nabiul

    2017-04-01

    The Ganga-Brahmaputra-Meghna (GBM) Delta has a high population density and is exposed to rapid environmental changes making it one of the most stressed deltas in the world. The low-lying coastal areas of the Ganga-Brahmaputra-Meghna (GBM) Delta comprise 19 coastal districts of Bangladesh and two districts in India with significant land areas within 5 meters of sea level has a population of more than 50 million people at an average population density of 1100 people/km2. This population is exposed to a range of hazards such as severe cyclones, coastal erosion, and salinization, exacerbated by climate change and subsidence which imply severe stress on the resource dependent community of this region. This situation is further complicated by poverty and limited social well-being such as poor access to education/ health/ drinking water/ sanitation facilities, and lack of food and energy security. Thus assessing social vulnerability can help to understand which communities are susceptible to environmental change and guide adaptation actions to address these threats. This preliminary study aims to construct a socio-economic index by assessing the social vulnerability of coastal communities of GBM Delta taking consistent and common secondary data from the Census of India and the Bangladesh Bureau of Statisticsand applyinga Principle Component Analysis(PCA) methodology. Several statistical tests like Kaiser-Meyer-Olkin (KMO) have also been used to assess the appropriateness of using PCA. Among the selected common indicators, five major components are found to explain majority of the total variation of social vulnerability across the delta: (1) poverty, (2) dependency ratio, (3) agriculture dependency, (4) lack of sanitation and (5) existence of mud houses. The most important observation is the existence of a social vulnerability gradient across the coast. In other words, socially marginalised and vulnerable communities are found on the Delta margin in both India and

  6. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  7. Prefrontal cortex and drug abuse vulnerability: translation to prevention and treatment interventions.

    Science.gov (United States)

    Perry, Jennifer L; Joseph, Jane E; Jiang, Yang; Zimmerman, Rick S; Kelly, Thomas H; Darna, Mahesh; Huettl, Peter; Dwoskin, Linda P; Bardo, Michael T

    2011-01-01

    Vulnerability to drug abuse is related to both reward seeking and impulsivity, two constructs thought to have a biological basis in the prefrontal cortex (PFC). This review addresses similarities and differences in neuroanatomy, neurochemistry and behavior associated with PFC function in rodents and humans. Emphasis is placed on monoamine and amino acid neurotransmitter systems located in anatomically distinct subregions: medial prefrontal cortex (mPFC); lateral prefrontal cortex (lPFC); anterior cingulate cortex (ACC); and orbitofrontal cortex (OFC). While there are complex interconnections and overlapping functions among these regions, each is thought to be involved in various functions related to health-related risk behaviors and drug abuse vulnerability. Among the various functions implicated, evidence suggests that mPFC is involved in reward processing, attention and drug reinstatement; lPFC is involved in decision-making, behavioral inhibition and attentional gating; ACC is involved in attention, emotional processing and self-monitoring; and OFC is involved in behavioral inhibition, signaling of expected outcomes and reward/punishment sensitivity. Individual differences (e.g., age and sex) influence functioning of these regions, which, in turn, impacts drug abuse vulnerability. Implications for the development of drug abuse prevention and treatment strategies aimed at engaging PFC inhibitory processes that may reduce risk-related behaviors are discussed, including the design of effective public service announcements, cognitive exercises, physical activity, direct current stimulation, feedback control training and pharmacotherapies. A major challenge in drug abuse prevention and treatment rests with improving intervention strategies aimed at strengthening PFC inhibitory systems among at-risk individuals. Copyright © 2010 Elsevier B.V. All rights reserved.

  8. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  9. Applying mixed reality to simulate vulnerable populations for practicing clinical communication skills.

    Science.gov (United States)

    Chuah, Joon Hao; Lok, Benjamin; Black, Erik

    2013-04-01

    Health sciences students often practice and are evaluated on interview and exam skills by working with standardized patients (people that role play having a disease or condition). However, standardized patients do not exist for certain vulnerable populations such as children and the intellectually disabled. As a result, students receive little to no exposure to vulnerable populations before becoming working professionals. To address this problem and thereby increase exposure to vulnerable populations, we propose using virtual humans to simulate members of vulnerable populations. We created a mixed reality pediatric patient that allowed students to practice pediatric developmental exams. Practicing several exams is necessary for students to understand how to properly interact with and correctly assess a variety of children. Practice also increases a student's confidence in performing the exam. Effective practice requires students to treat the virtual child realistically. Treating the child realistically might be affected by how the student and virtual child physically interact, so we created two object interaction interfaces - a natural interface and a mouse-based interface. We tested the complete mixed reality exam and also compared the two object interaction interfaces in a within-subjects user study with 22 participants. Our results showed that the participants accepted the virtual child as a child and treated it realistically. Participants also preferred the natural interface, but the interface did not affect how realistically participants treated the virtual child.

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  11. Does physical activity protect against drug abuse vulnerability?

    Science.gov (United States)

    Bardo, Michael T; Compton, Wilson M

    2015-08-01

    The current review examined recent literature to determine our state of knowledge about the potential ability of physical activity serve as a protectant against drug abuse vulnerability. Both preclinical and clinical studies were examined using either associational or random assignment study designs. In addition to examining drug use as an outcome variable, the potential neural mediators linking physical activity and drug abuse vulnerability were examined. Several important conclusions may be drawn. First, the preclinical evidence is solid in showing that physical activity in various forms is able to serve as both a preventive and treatment intervention that reduces drug use, although voluntary alcohol drinking appears to be an exception to this conclusion. Second, the clinical evidence provides some evidence, albeit mixed, to suggest a beneficial effect of physical activity on tobacco dependent individuals. In contrast, there exists only circumstantial evidence that physical activity may reduce use of drugs other than nicotine, and there is essentially no solid information from random control studies to know if physical activity may prevent initiation of problem use. Finally, both preclinical and clinical evidence shows that various brain systems are altered by physical activity, with the medial prefrontal cortex (mPFC) serving as one potential node that may mediate the putative link between physical activity and drug abuse vulnerability. It is concluded that novel neurobehavioral approaches taking advantage of novel techniques for assessing the physiological impact of physical activity are needed and can be used to inform the longitudinal random control studies that will answer definitively the question posed. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  12. Vulnerability studies and integrated assessments for hazard risk reduction in Pittsburgh, PA (Invited)

    Science.gov (United States)

    Klima, K.

    2013-12-01

    Today's environmental problems stretch beyond the bounds of most academic disciplines, and thus solutions require an interdisciplinary approach. For instance, the scientific consensus is changes in the frequency and severity of many types of extreme weather events are increasing (IPCC 2012). Yet despite our efforts to reduce greenhouse gases, we continue to experience severe weather events such as Superstorm Sandy, record heat and blizzards, and droughts. These natural hazards, combined with increased vulnerability and exposure, result in longer-lasting disruptions to critical infrastructure and business continuity throughout the world. In order to protect both our lives and the economy, we must think beyond the bounds of any one discipline to include an integrated assessment of relevant work. In the wake of recent events, New York City, Washington, DC, Chicago, and a myriad of other cities have turned to their academic powerhouses for assistance in better understanding their vulnerabilities. This talk will share a case study of the state of integrated assessments and vulnerability studies of energy, transportation, water, real estate, and other main sectors in Pittsburgh, PA. Then the talk will use integrated assessment models and other vulnerability studies to create coordinated sets of climate projections for use by the many public agencies and private-sector organizations in the region.

  13. Analysis of Zero-Day Vulnerabilities in Java

    OpenAIRE

    Marius Popa

    2013-01-01

    The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

  14. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    International Nuclear Information System (INIS)

    Kvaerner, Jens; Swensen, Grete; Erikstad, Lars

    2006-01-01

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended

  15. Race differences in depression vulnerability following Hurricane Katrina.

    Science.gov (United States)

    Ali, Jeanelle S; Farrell, Amy S; Alexander, Adam C; Forde, David R; Stockton, Michelle; Ward, Kenneth D

    2017-05-01

    This study investigated whether racial disparities in depression were present after Hurricane Katrina. Data were gathered from 932 New Orleans residents who were present when Hurricane Katrina struck, and who returned to New Orleans the following year. Multiple logistic regression models evaluated racial differences in screening positive for depression (a score ≥16 on the Center for Epidemiologic Studies Depression Scale), and explored whether differential vulnerability (prehurricane physical and mental health functioning and education level), differential exposure to hurricane-related stressors, and loss of social support moderated and/or reduced the association of race with depression. A univariate logistic regression analysis showed the odds for screening positive for depression were 86% higher for African Americans than for Caucasians (odds ratio [OR] = 1.86 [1.28-2.71], p = .0012). However, after controlling simultaneously for sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors, race was no longer a significant correlate for screening positive for depression (OR = 1.54 [0.95-2.48], p = .0771). The racial disparity in postdisaster depression seems to be confounded by sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors. Nonetheless, even after adjusting for these factors, there was a nonsignificant trend effect for race, which could suggest race played an important role in depression outcomes following Hurricane Katrina. Future studies should examine these associations prospectively, using stronger assessments for depression, and incorporate measures for discrimination and segregation, to further understand possible racial disparities in depression after Hurricane Katrina. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Differential strain vulnerability to binge eating behaviors in rats.

    Science.gov (United States)

    Hildebrandt, Britny A; Klump, Kelly L; Racine, Sarah E; Sisk, Cheryl L

    2014-03-29

    Binge eating is a significantly heritable phenotype, but efforts to detect specific risk genes have fallen short. Identification of animal strain differences in risk for binge eating could highlight genetic differences across individuals of the same species that can be exploited in future animal and molecular genetic research. The current study aimed to explore strain differences in risk for binge eating in Sprague-Dawley versus Wistar female rats using the Binge Eating Resistant/Binge Eating Prone model. A sample of male Sprague-Dawley rats, a known low-risk group for binge eating, was included as a comparison group. A total of 83 rats (23 Wistar females, 30 Sprague-Dawley females, 30 Sprague-Dawley males) completed a protocol of intermittently administered, palatable food. Binge eating prone (BEP) and binge eating resistant (BER) rats were identified using a tertile approach. Sprague-Dawley female rats consumed the highest amount of palatable food and were more likely to be classified as BEP compared to Wistar female and Sprague-Dawley male rats. Wistar female rats were not significantly different from Sprague-Dawley male rats in their palatable food intake and tendency to be classified as BER rather than BEP. Sprague-Dawley female rats appear to be a particularly vulnerable genotype for binge eating. Comparisons between this group and others could help identify specific genetic/biological factors that differentiate it from lower risk groups. The reward system, linked to binge eating in humans, is a possible candidate to explore. Strain differences in the reward system could help increase understanding of individual differences in risk for binge eating in humans. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. The Future of Risk Analysis: Operationalizing Living Vulnerability Assessments from the Cloud to the Street (and Back)

    Science.gov (United States)

    Tellman, B.; Schwarz, B.; Kuhn, C.; Pandey, B.; Schank, C.; Sullivan, J.; Mahtta, R.; Hammet, L.

    2016-12-01

    21 million people are exposed to flooding every year, and that number is expected to more than double by 2030 due to climate, land use, and demographic change. Cloud to Street, a mission driven science organization, is working to make big and real time data more meaningful to understand both biophysical and social vulnerability to flooding in this changing world. This talk will showcase the science and practice we have built of integrated social and biophysical flood vulnerability assessments based on our work in Uttarakhand, India and Senegal, in conjunction with nonprofits and development banks. We will show developments of our global historical flood database, detected from MODIS and Landsat satellites, used to power machine learning flood exposure models in Google Earth Engine's API. Demonstrating the approach, we will also showcase new approaches in social vulnerability science, from developing data-driven social vulnerability indices in India, to deriving predictive models that explain the social conditions that lead to disproportionate flood damage and fatality in the US. While this talk will draw on examples of completed vulnerability assessments, we will also discuss the possible future for place-based "living" flood vulnerability assessments that are updated each time satellites circle the earth or people add crowd-sourced observations about flood events and social conditions.

  18. Balance impairment in individuals with Wolfram syndrome.

    Science.gov (United States)

    Pickett, Kristen A; Duncan, Ryan P; Paciorkowski, Alex R; Permutt, M Alan; Marshall, Bess; Hershey, Tamara; Earhart, Gammon M

    2012-07-01

    Wolfram syndrome (WFS), a rare neurodegenerative disorder, is characterized by early onset insulin-dependent diabetes mellitus, optic atrophy, deafness, diabetes insipidus, and neurological abnormalities. Although previously unreported, we hypothesized that neurological complications may be detectable in relatively early stages of the disease. As the cerebellum and brainstem seem particularly vulnerable in WFS, we focused on balance functions critically dependent on these regions. The primary goal of this investigation was to compare balance in young individuals with WFS, in relatively early stages of the disease, to an age-matched cohort using a clinically applicable test. Balance was assessed via the mini-BESTest in 13 children, adolescents and young adults with WFS and 30 typically developing age-matched individuals. A significant difference was observed between groups in balance as well as in three of four subcomponents of the mini-BESTest and in two timed tasks related to balance. Mini-BESTest scores were correlated with age among typically developing individuals. In the WFS group, mini-BESTest scores were related to overall motor dysfunction, but not age. Impairments in balance in WFS may occur earlier in the disease process than previously recognized and appear to be related to overall neurological progression rather than chronological age. Recognizing balance impairments and understanding which balance systems contribute to balance deficits in those with WFS may allow for development of effective patient-centered treatment paradigms. Copyright © 2012 Elsevier B.V. All rights reserved.

  19. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    Energy Technology Data Exchange (ETDEWEB)

    Tidwell, Vincent C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wolfsberg, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Macknick, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Middleton, Richard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  20. A conceptual framework of stress vulnerability, depression, and health outcomes in women: potential uses in research on complementary therapies for depression.

    Science.gov (United States)

    Kinser, Patricia A; Lyon, Debra E

    2014-09-01

    Depression is a chronic mental health condition that affects millions of individuals worldwide. It is well-established that psychological stress plays an integral role in depression and that depression has numerous negative health outcomes. However, a closer look at components of stress vulnerabilities and depression is required to allow for the development and testing of appropriate interventions. This article describes a conceptual framework about the complex and bidirectional relationship between stress vulnerability, depression, and health outcomes in women. The authors elucidate how the framework can be applied in clinical research about cellular aging and on the mechanisms of complementary and alternative medicine (CAM) for depression, using yoga as an example of a CAM modality. The proposed conceptual framework may be helpful for adding depth to the body of knowledge about the use of mind-body therapies for individuals at high risk of stress vulnerability and/or depression.

  1. Seismic vulnerability assessment of an Italian historical masonry dry dock

    OpenAIRE

    Marco Zucca; Pietro Giuseppe Crespi; Nicola Longarini

    2017-01-01

    The paper presents the seismic vulnerability analysis of the military dry dock built in 1861 inside the Messina’s harbor. The study appears very important not only for the relevance of the dry dock itself, but also for its social, military and symbolic role. As a first step, the historical documentation about the dry dock delivered by the Military Technical Office, in charge of its maintenance, was thoroughly examined. This activity was fundamental to understand the construction methods, the ...

  2. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  3. Parental overprotection, perceived child vulnerability, and parenting stress: a cross-illness comparison.

    Science.gov (United States)

    Hullmann, Stephanie E; Wolfe-Christensen, Cortney; Ryan, Jamie L; Fedele, David A; Rambo, Philip L; Chaney, John M; Mullins, Larry L

    2010-12-01

    The current study sought to investigate differences in parenting capacity variables across four disease groups. Parents (N = 425), the majority of whom were mothers, of children with either cancer, asthma, Type 1 diabetes, or cystic fibrosis, completed measures of parental overprotection, perceived child vulnerability, and parenting stress. After controlling for significant demographic variables, parents of children with cystic fibrosis and asthma reported higher perceived child vulnerability than parents of children with either diabetes or cancer, while parents of children with asthma and diabetes reported higher parenting stress than parents of children with cancer or cystic fibrosis. No differences between disease groups were found for parental overprotection. The current study provides support for an illness-specific approach to understanding parenting capacity variables in the context of childhood chronic illnesses.

  4. Vulnerability of Thai rice production to simultaneous climate and socioeconomic changes: a double exposure analysis

    Science.gov (United States)

    Sangpenchan, R.

    2011-12-01

    This research explores the vulnerability of Thai rice production to simultaneous exposure by climate and socioeconomic change -- so-called "double exposure." Both processes influence Thailand's rice production system, but the vulnerabilities associated with their interactions are unknown. To understand this double exposure, I adopts a mixed-method, qualitative-quantitative analytical approach consisting of three phases of analysis involving a Vulnerability Scoping Diagram, a Principal Component Analysis, and the EPIC crop model using proxy datasets collected from secondary data sources at provincial scales.The first and second phases identify key variables representing each of the three dimensions of vulnerability -- exposure, sensitivity, and adaptive capacity indicating that the greatest vulnerability in the rice production system occurs in households and areas with high exposure to climate change, high sensitivity to climate and socioeconomic stress, and low adaptive capacity. In the third phase, the EPIC crop model simulates rice yields associated with future climate change projected by CSIRO and MIROC climate models. Climate change-only scenarios project the decrease in yields by 10% from the current productivity during 2016-2025 and 30% during 2045-2054. Scenarios applying both climate change and improved technology and management practices show that a 50% increase in rice production is possible, but requires strong collaboration between sectors to advance agricultural research and technology and requires strong adaptive capacity in the rice production system characterized by well-developed social capital, social networks, financial capacity, and infrastructure and household mobility at the local scale. The vulnerability assessment and climate and crop adaptation simulations used here provide useful information to decision makers developing vulnerability reduction plans in the face of concurrent climate and socioeconomic change.

  5. The drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment

    Science.gov (United States)

    Wang, Zhiqiang; Jiang, Jingyi; Ma, Qing

    2016-12-01

    Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of agricultural drought was conducted from the drought hazard intensity index and physical vulnerability curve. The probability distribution of drought hazard intensity index decreased from south-west to north-east and increased from south-east to north-west along the rainfall isoline. The physical vulnerability curve had a reduction effect in three parts of the farming-pastoral ecotone in Northern China, which helped to reduce drought hazard vulnerability on spring maize. The risk of yield loss ratio calculated based on physical vulnerability curve was lower compared with the drought hazard intensity index, which suggested that the capacity of spring maize to resist and adapt to drought is increasing. In conclusion, the farming-pastoral ecotone in Northern China is greatly sensitive to climate change and has a high probability of severe drought hazard. Risk assessment of physical vulnerability can help better understand the physical vulnerability to agricultural drought and can also promote measurements to adapt to climate change.

  6. Vulnerability of children: More than a question of age

    International Nuclear Information System (INIS)

    Hutton, D.

    2010-01-01

    The vulnerability of children in disasters is well-established. Children are at greater risk of the impacts of disasters because of both their age and level of physiological, anatomical, cognitive and emotional development. Frequently overlooked, however, is the influence of other social and health determinants. This article highlights the importance of family and household income in determining the ability of children to withstand the shocks of catastrophic events. Children raised in lower income families are made disadvantaged in multiple ways; by poor living and neighbourhood conditions, less stable home environments, as well as lower levels of education and health care. During disasters, lower income families and children suffer disproportionately, both because they are frequently the hardest hit but also because they have fewer resources with which to cope. The article emphasises not only the importance of understanding the vulnerability of children within a broader family context, but a continuing requirement for public health and emergency planners to integrate more fully the diverse needs of children and families into emergency preparedness policies and plans. (authors)

  7. Development and assessment of indices to determine stream fish vulnerability to climate change and habitat alteration

    Science.gov (United States)

    Sievert, Nicholas A.; Paukert, Craig P.; Tsang, Yin-Phan; Infante, Dana M.

    2016-01-01

    Understanding the future impacts of climate and land use change are critical for long-term biodiversity conservation. We developed and compared two indices to assess the vulnerability of stream fish in Missouri, USA based on species environmental tolerances, rarity, range size, dispersal ability and on the average connectivity of the streams occupied by each species. These two indices differed in how environmental tolerance was classified (i.e., vulnerability to habitat alteration, changes in stream temperature, and changes to flow regimes). Environmental tolerance was classified based on measured species responses to habitat alteration, and extremes in stream temperatures and flow conditions for one index, while environmental tolerance for the second index was based on species’ traits. The indices were compared to determine if vulnerability scores differed by index or state listing status. We also evaluated the spatial distribution of species classified as vulnerable to habitat alteration, changes in stream temperature, and change in flow regimes. Vulnerability scores were calculated for all 133 species with the trait association index, while only 101 species were evaluated using the species response index, because 32 species lacked data to analyze for a response. Scores from the trait association index were greater than the species response index. This is likely due to the species response index's inability to evaluate many rare species, which generally had high vulnerability scores for the trait association index. The indices were consistent in classifying vulnerability to habitat alteration, but varied in their classification of vulnerability due to increases in stream temperature and alterations to flow regimes, likely because extremes in current climate may not fully capture future conditions and their influence on stream fish communities. Both indices showed higher mean vulnerability scores for listed species than unlisted species, which provided a coarse

  8. Vulnerability to extreme-heat-associated hospitalization in three counties in Michigan, USA, 2000-2009

    Science.gov (United States)

    Ogbomo, Adesuwa S.; Gronlund, Carina J.; O'Neill, Marie S.; Konen, Tess; Cameron, Lorraine; Wahl, Robert

    2017-05-01

    With climate change, extreme heat (EH) events are increasing, so it is important to understand who is vulnerable to heat-associated morbidity. We determined the association between EH and hospitalizations for all natural causes; cardiovascular, respiratory, and renal diseases; diabetes mellitus; and acute myocardial infarction in Michigan, USA, at different intensities and durations. We assessed confounding by ozone and how individual characteristics and health insurance payer (a proxy for income) modified these associations. We obtained Michigan Inpatient Database, National Climatic Data Center, and US Environmental Protection Agency ozone data for May-September, 2000-2009 for three Michigan counties. We employed a case-crossover design and modeled EH as an indicator for temperature above the 95th, 97th, or 99th percentile thresholds for 1, 2, 3, or 4 days. We examined effect modification by patient age, race, sex, and health insurance payer and pooled the county results. Among non-whites, the pooled odds ratio for hospitalization on EH (97th percentile threshold) vs. non-EH days for renal diseases was 1.37 (95 % CI = 1.13-1.66), which increased with increasing EH intensity, but was null among whites (OR = 1.00, 95 % CI = 0.81, 1.25). We observed a null association between EH and cardiovascular hospitalization. EH (99th percentile threshold) was associated with myocardial infarction hospitalizations. Confounding by ozone was minimal. EH was associated with hospitalizations for renal disease among non-whites. This information on vulnerability to heat-associated morbidity helps characterize the public health burden of EH and target interventions including patient education.

  9. Vulnerability assessment to Drought in Various Provinces, approach towards risk management in the country

    Directory of Open Access Journals (Sweden)

    F. Nasrnia

    2016-05-01

    Full Text Available Introduction: The water crisis is one of the main challenges of the current century. Drought is one of the most costly natural disasters in Iran. During the past 40 years, our country has experienced 27 droughts. It seems a necessary step to deal with the consequences of drought and reducing its effects, thorough understanding and knowledge of each region's vulnerability, which is neglected in our country, unfortunately. It is necessary to study the influencing factors in determining vulnerability and makes it visible. On the other hand, due to the continuing drought conditions intensified in recent years and its impact on different economic sectors, especially the agricultural sector in the country need to assess vulnerability to drought in the country will double. Materials and Methods: Fuzzy AHP method based on the concept of fuzzy sets introduced by LotfeiZadeh. There are several ways to use fuzzy theory and hierarchical structure proposed merger. Cheng in 1996 suggested a new approach to solve problems using Fuzzy AHP calibration values within the membership and (TFNs. Extent Analysis Method proposed by Chang is one of the common ways to solve problems. In this study, we developed a method based on fuzzy analytic hierarchy Chang that has been developed by Zhu et al. and Van Alhag. Results and Discussion: Vulnerability to drought conditions is determined by factors such as economic, social and physical sensitivity to the damaging effects of drought increases. This study is designed in the hierarchy. The purpose of this study is assessing the vulnerability of the country to drought. Vulnerability of this study includes economic vulnerability, social vulnerability and physical vulnerability. Economic vulnerability to drought indicates that the economy is vulnerable to external shocks due to drought and the inability of the economy to withstand the effects of the event and recover the situation. Social vulnerability determines the capacity to

  10. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  11. Drinking water vulnerability to climate change and alternatives for adaptation in coastal South and South East Asia.

    Science.gov (United States)

    Hoque, M A; Scheelbeek, P F D; Vineis, P; Khan, A E; Ahmed, K M; Butler, A P

    Drinking water in much of Asia, particularly in coastal and rural settings, is provided by a variety of sources, which are widely distributed and frequently managed at an individual or local community level. Coastal and near-inland drinking water sources in South and South East (SSE) Asia are vulnerable to contamination by seawater, most dramatically from tropical cyclone induced storm surges. This paper assesses spatial vulnerabilities to salinisation of drinking water sources due to meteorological variability and climate change along the (ca. 6000 km) coastline of SSE Asia. The risks of increasing climatic stresses are first considered, and then maps of relative vulnerability along the entire coastline are developed, using data from global scale land surface models, along with an overall vulnerability index. The results show that surface and near-surface drinking water in the coastal areas of the mega-deltas in Vietnam and Bangladesh-India are most vulnerable, putting more than 25 million people at risk of drinking 'saline' water. Climate change is likely to exacerbate this problem, with adverse consequences for health, such as prevalence of hypertension and cardiovascular diseases. There is a need for identifying locations that are most at risk of salinisation in order for policy makers and local officials to implement strategies for reducing these health impacts. To counter the risks associated with these vulnerabilities, possible adaptation measures are also outlined. We conclude that detailed and fine scale vulnerability assessments may become crucial for planning targeted adaptation programmes along these coasts.

  12. Land Use, Livelihoods, Vulnerabilities, and Resilience in Coastal Bangladesh

    Science.gov (United States)

    Gilligan, J. M.; Ackerly, B.; Goodbred, S. L., Jr.; Wilson, C.

    2014-12-01

    The densely populated, low-lying coast of Bangladesh is famously associated with vulnerability to sea-level rise, storms, and flooding. Simultaneously, land-use change has significantly altered local sediment transport, causing elevation loss and degradation of drainage. The rapid growth of shrimp aquaculture has also affected soil chemistry in former agricultural areas and the stock of riverine fisheries through intense larval harvesting. To understand the net impact of these environmental changes on the region's communities, it is necessary to examine interactions across scale - from externally driven large scale environmental change to smaller scale, but often more intense, local change - and also between the physical environment and social, political, and economic conditions. We report on a study of interactions between changing communities and changing environment in coastal Bangladesh, exploring the role of societal and physical factors in shaping the different outcomes and their effects on people's lives. Land reclamation projects in the 1960s surrounded intertidal islands with embankments. This allowed rice farming to expand, but also produced significant elevation loss, which rendered many islands vulnerable to waterlogging and flooding from storm surges. The advent of large-scale shrimp aquaculture added environmental, economic, social, and political stresses, but also brought much export revenue to a developing nation. Locally, attempts to remedy environmental stresses have produced mixed results, with similar measures succeeding in some communities and failing in others. In this context, we find that people are continually adapting to changing opportunities and constraints for food, housing, and income. Niches that support different livelihood activities emerge and dwindle, and their occupants' desires affect the political context. Understanding and successfully responding to the impacts of environmental change requires understanding not only the

  13. Interactive exploration of the vulnerability of the human infrastructure: an approach using simultaneous display of similar locations

    Science.gov (United States)

    Ceré, Raphaël; Kaiser, Christian

    2015-04-01

    Currently, three quarters of the Swiss population is living in urban areas. The total population is still increasing, and urbanized space is increasing event faster. Consequently, the intensity of use has decreased but the exposure of the urban space to natural events has grown along with the cost related to the impact of hazards. In line with this fact, during the 20th century there has been a noticeable increase of natural disasters accompanied by the rapid increase of the world population, leading to higher costs. Additionally to the fact that more people are exposed to natural hazards, the value of goods globally has increased more than proportionally. Consequently, the vulnerability of urban space is, more than ever before, a major issue for socio-economic development. Here, vulnerability is defined as the potential human loss or loss of infrastructure caused by a hazardous event. It encompasses factors of urban infrastructure, population and the environment, which increase the susceptibility of a location to the impact of hazards. This paper describes a novel method for improving the interactive use of exploratory data analysis in the context of minimizing vulnerability and disaster risk by prevention or mitigation. This method is used to assess the similarity between different locations with respect to several characteristics relevant to vulnerability at different scales, allowing for automatic display of multiple locations similar to the one under investigation by an expert. Visualizing vulnerability simultaneously for several locations allows for analyzing and comparing of metric characteristics between multiple places and at different scales. The interactivity aspect is also useful for understanding vulnerability patterns and it facilitates disaster risk management and decisions on global preventive measures in urban spaces. Metrics for vulnerability assessment can be extracted from extensive geospatial datasets such as high-resolution digital elevation

  14. Groundwater vulnerability to climate change: A review of the assessment methodology.

    Science.gov (United States)

    Aslam, Rana Ammar; Shrestha, Sangam; Pandey, Vishnu Prasad

    2018-01-15

    Impacts of climate change on water resources, especially groundwater, can no longer be hidden. These impacts are further exacerbated under the integrated influence of climate variability, climate change and anthropogenic activities. The degree of impact varies according to geographical location and other factors leading systems and regions towards different levels of vulnerability. In the recent past, several attempts have been made in various regions across the globe to quantify the impacts and consequences of climate and non-climate factors in terms of vulnerability to groundwater resources. Firstly, this paper provides a structured review of the available literature, aiming to critically analyse and highlight the limitations and knowledge gaps involved in vulnerability (of groundwater to climate change) assessment methodologies. The effects of indicator choice and the importance of including composite indicators are then emphasised. A new integrated approach for the assessment of groundwater vulnerability to climate change is proposed to successfully address those limitations. This review concludes that the choice of indicator has a significant role in defining the reliability of computed results. The effect of an individual indicator is also apparent but the consideration of a combination (variety) of indicators may give more realistic results. Therefore, in future, depending upon the local conditions and scale of the study, indicators from various groups should be chosen. Furthermore, there are various assumptions involved in previous methodologies, which limit their scope by introducing uncertainty in the calculated results. These limitations can be overcome by implementing the proposed approach. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Tobacco Use among Individuals with Intellectual or Developmental Disabilities: A Brief Review

    Science.gov (United States)

    Steinberg, Marc L.; Heimlich, Laura; Williams, Jill M.

    2009-01-01

    Tobacco use is the leading preventable cause of death in the United States. Although few tobacco control efforts target individuals with intellectual and/or developmental disabilities, this population may be especially vulnerable to the deleterious effects of tobacco use and dependence. Individuals with intellectual and developmental disabilities…

  16. Siblings of individuals with first-episode psychosis: understanding their experiences and needs.

    Science.gov (United States)

    Sin, Jacqueline; Moone, Nicki; Harris, Paul

    2008-06-01

    The growth of early intervention in psychosis services (EIPS) has prompted needed research to provide a robust evidence base to underpin practice. The typical service model embraces key psychosocial interventions, including family interventions. A literature review revealed a number of relevant studies that recognized the role of siblings in families affected by severe mental illness or mental impairment, but little was found about the impact of first-episode psychosis on siblings. To address this apparent oversight, we conducted a study to gain an understanding of sibling experiences. Ten siblings (ages 16 to 30) with a brother or sister diagnosed with first-episode psychosis took part in individual semi-structured interviews. The key findings were grouped in regard to emotional impact, relationships in the family, and siblings' roles and coping patterns. The study also revealed that families are able to identify positive gains out of a fundamentally negative experience.

  17. Technological solution for vulnerable communities: Questioning the sustainability of Appropriate Technology

    International Nuclear Information System (INIS)

    Sianipar, C P M; Dowaki, K; Yudoko, G

    2015-01-01

    Vulnerability eradication has become an emerging concern in today's society following the increasing uncertainties in achieving societal resilience, particularly in vulnerable communities. Furthermore, incorporating technological solution, especially appropriate technology (AT), into such concern requires interdisciplinary understandings to achieve a holistic eradication based on the particularities of each community. This study aims to briefly reveal existing scholarly discourses and investigate potential gap(s) between previous researches. Literatures, particularly consisting meta-analysis on previous scholarly discussions, are surveyed. The findings reveal three progress among scientific discourses. The first one is the paradigm shift of developmental purposes from typical development to empowerment. Next, concerns in technology development indicate the parallel movement toward empowerment. Then, previous methodological developments, including approach in sustaining AT, indicate the needs to assess the future based on sustainability. Therefore, a new research is proposed to develop an assessment framework on AT for vulnerability eradication on the basis of empowerment paradigm, extended focuses in technology development, and extended coverage of future changes in dynamic matter. The framework needs to be developed based on the combination of positivist-deductive-qualitative research paradigms. This is intended to generalize the framework for being used in different cases, to build an applicative framework as an integral part of existing body of knowledge, and to develop an enriched and flexible construction of framework. Looking at existing researches, this brief study proposes insights to move scientific progress toward a more holistic vulnerability eradication using AT solution both in conceptual and practical levels

  18. Population-level associations between preschool vulnerability and grade-four basic skills.

    Directory of Open Access Journals (Sweden)

    Amedeo D'Angiulli

    2009-11-01

    Full Text Available This is a predictive validity study examining the extent to which developmental vulnerability at kindergarten entry (as measured by the Early Development Instrument, EDI is associated with children's basic skills in 4th grade (as measured by the Foundation Skills Assessment, FSA.Relative risk analysis was performed on a large database linking individual-level EDI ratings to the scores the same children obtained on a provincial assessment of academic skills (FSA--Foundation Skills Assessment four years later. We found that early vulnerability in kindergarten is associated with the basic skills that underlie populations of children's academic achievement in reading, writing and math, indicating that the Early Development Instrument permits to predict achievement-related skills four years in advance.The EDI can be used to predict children's educational trends at the population level and can help select early prevention and intervention programs targeting pre-school populations at minimum cost.

  19. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  20. Estimating vegetation vulnerability to detect areas prone to land degradation in the Mediterranean basin

    Science.gov (United States)

    Imbrenda, Vito; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria; Simoniello, Tiziana

    2013-04-01

    Vegetation is one of the key components to study land degradation vulnerability because of the complex interactions and feedbacks that link it to soil. In the Mediterranean region, degradation phenomena are due to a mix of predisposing factors (thin soil horizons, low soil organic matter, increasing aridity, etc.) and bad management practices (overgrazing, deforestation, intensification of agriculture, tourism development). In particular, in areas threatened by degradation processes but still covered by vegetation, large scale soil condition evaluation is a hard task and the detection of stressed vegetation can be useful to identify on-going soil degradation phenomena and to reduce their impacts through interventions for recovery/rehabilitation. In this context the use of satellite time series can increase the efficacy and completeness of the land degradation assessment, providing precious information to understand vegetation dynamics. In order to estimate vulnerability levels in Basilicata (a Mediterranean region of Southern Italy) in the framework of PRO-LAND project (PO-FESR Basilicata 2007-2013), we crossed information on potential vegetation vulnerability with information on photosynthetic activity dynamics. Potential vegetation vulnerability represents the vulnerability related to the type of present cover in terms of fire risk, erosion protection, drought resistance and plant cover distribution. It was derived from an updated land cover map by separately analyzing each factor, and then by combining them to obtain concise information on the possible degradation exposure. The analysis of photosynthetic activity dynamics provides information on the status of vegetation, that is fundamental to discriminate the different vulnerability levels within the same land cover, i.e. the same potential vulnerability. For such a purpose, we analyzed a time series (2000-2010) of a satellite vegetation index (MODIS NDVI) with 250m resolution, available as 16-day composite

  1. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    Energy Technology Data Exchange (ETDEWEB)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  2. Mental vulnerability as a risk factor for depression

    DEFF Research Database (Denmark)

    Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold

    2012-01-01

    Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....

  3. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf.

    Directory of Open Access Journals (Sweden)

    Jonathan A Hare

    Full Text Available Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region. These

  4. A Vulnerability Assessment of Fish and Invertebrates to Climate Change on the Northeast U.S. Continental Shelf

    Science.gov (United States)

    Hare, Jonathan A.; Morrison, Wendy E.; Nelson, Mark W.; Stachura, Megan M.; Teeters, Eric J.; Griffis, Roger B.; Alexander, Michael A.; Scott, James D.; Alade, Larry; Bell, Richard J.; Chute, Antonie S.; Curti, Kiersten L.; Curtis, Tobey H.; Kircheis, Daniel; Kocik, John F.; Lucey, Sean M.; McCandless, Camilla T.; Milke, Lisa M.; Richardson, David E.; Robillard, Eric; Walsh, Harvey J.; McManus, M. Conor; Marancik, Katrin E.; Griswold, Carolyn A.

    2016-01-01

    Climate change and decadal variability are impacting marine fish and invertebrate species worldwide and these impacts will continue for the foreseeable future. Quantitative approaches have been developed to examine climate impacts on productivity, abundance, and distribution of various marine fish and invertebrate species. However, it is difficult to apply these approaches to large numbers of species owing to the lack of mechanistic understanding sufficient for quantitative analyses, as well as the lack of scientific infrastructure to support these more detailed studies. Vulnerability assessments provide a framework for evaluating climate impacts over a broad range of species with existing information. These methods combine the exposure of a species to a stressor (climate change and decadal variability) and the sensitivity of species to the stressor. These two components are then combined to estimate an overall vulnerability. Quantitative data are used when available, but qualitative information and expert opinion are used when quantitative data is lacking. Here we conduct a climate vulnerability assessment on 82 fish and invertebrate species in the Northeast U.S. Shelf including exploited, forage, and protected species. We define climate vulnerability as the extent to which abundance or productivity of a species in the region could be impacted by climate change and decadal variability. We find that the overall climate vulnerability is high to very high for approximately half the species assessed; diadromous and benthic invertebrate species exhibit the greatest vulnerability. In addition, the majority of species included in the assessment have a high potential for a change in distribution in response to projected changes in climate. Negative effects of climate change are expected for approximately half of the species assessed, but some species are expected to be positively affected (e.g., increase in productivity or move into the region). These results will inform

  5. All for one and one for all: understanding health professionals' experience in individual versus collaborative online learning.

    Science.gov (United States)

    MacNeill, Heather; Telner, Deanna; Sparaggis-Agaliotis, Alexandra; Hanna, Elizabeth

    2014-01-01

    Computer-supported collaborative learning (CSCL) may facilitate continuing interprofessional education while overcoming barriers of time and place for busy health care professionals. The purpose of this study was to understand the experiences, advantages, and challenges of group versus individual online learning. Fifteen multidisciplinary health professionals participated in a 12-week online course on either diabetes or traumatic brain injury. This consisted of background e-modules and a longitudinal build-a-case exercise, done either individually or as a group. Focus group sessions exploring participants' experiences after course completion and at 4 months were conducted, transcribed, and analyzed for recurring themes. Participant reflection homework and video-recorded group sessions were used for triangulation of results. Individual learners appreciated the flexibility and control, but experienced decreased motivation. Group learners appreciated the immediate feedback from their co-learners and felt social pressure to come to the weekly sessions prepared but expressed challenges in determining group goal-setting for the session. Both groups felt they learned about interprofessional roles; however, group learners described a richer learning experience and understanding of interprofessional roles through the online collaboration exercise. The intense resources necessary for interprofessional CSCL, including time, faculty development, and technological issues, are described. CSCL is a valuable educational strategy in online learning. While individual online learning may be better suited for short and simple educational interventions such as knowledge acquisition, CSCL seems to allow for richer and deeper learning in complex and interprofessional educational experiences. However, strategies, resources, and faculty development required to enhance CSCL need to be addressed carefully. © 2014 The Alliance for Continuing Education in the Health Professions, the Society

  6. Vulnerability and adaptation to severe weather events in the American southwest

    OpenAIRE

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-01-01

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling loc...

  7. 'Race' and HIV vulnerability in a transnational context: the case of Chinese immigrants to Canada.

    Science.gov (United States)

    Zhou, Yanqiu Rachel

    2017-06-01

    Although immigrants' sustained connections with their homelands are well documented, so far we know little about how 'race' - in particular, conceptions of race back home - influences the HIV vulnerability of racialised immigrants to Western countries. Drawing on data from a multi-sited, qualitative study of Chinese immigrants to Canada, this paper presents a contextualised understanding of the impacts of race on HIV risk faced by these individuals in a transnational context. Data were collected from four study sites in Canada and China as part of a study investigating the relationship between HIV risk and transnationalism. Although race appears to have bearing on their risk perceptions and sexual practices, immigrants' understandings of race are not necessarily consistent with dominant discourses of race in Canada, but are also mediated by their racial habitus developed in China. Findings reveal the complex power dynamics - not just power asymmetries but also power fluidity - around race from a transnational perspective and thus challenge the assumed dichotomy of dominance and subordination underpinning traditional explanations of the relationship between race and HIV risk. In the context of transnationalism, researchers should go beyond a nation-bound concept of society (i.e. the host society) and take into account the simultaneous influence of both host and home countries on immigrant health.

  8. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  9. Stress and Intelligence: Understanding and Encouraging the ...

    African Journals Online (AJOL)

    Human beings display a vast range of intellectual abilities and the greater the degree of a person's intellectual difference, the greater the discomfort, such an intellect seems to bring to his or her world, and the world responds by creating discomfort for the individual. Thus, the gifted learners are vulnerable in a society that ...

  10. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  11. Vulnerability of Forests in India: A National Scale Assessment.

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  12. Vulnerability Analysis for Physical Protection System at Hypothetical Facility of a Different Type Reactor

    International Nuclear Information System (INIS)

    Jung, Won-Moog; Kim, Jung-Soo; Kim, Jae-Kwang; Yoo, Ho-Sik; Kwak, Sung-Ho; Jang, Sung-Soon

    2007-01-01

    Since the 9/11 event in the U.S.A, International terror possibilities has been increased for nuclear facilities including nuclear power plants(NPPs). It is necessary to evaluate the performance of an existing physical protection system(PPS) at nuclear facilities based on such malevolent acts. Detection, delay, and response elements are all important to PPS. They are used for the analysis and evaluation of a PPS and its effectiveness. Methods are available to analyze a PPS and evaluate its effectiveness. Sandia National Laboratory(SNL) in the U.S.A developed a System Analysis of Vulnerability to Intrusion (SAVI) computer code for evaluating the effectiveness of PPS against outsider threats. This study presents the vulnerability analysis of the PPS at hypothetical facility of a different type using SAVI code that the basic input parameters are from PPS of a different type. For analysis, first, the site-specific Adversary Sequence Diagrams(ASDs) of the PPS is designed. It helps to understand the functions of the existing PPS composed of physical areas and Protection Elements(PEs). Then, the most vulnerable path of an ASD as a measure of effectiveness is determined. The results in the analysis can compare with the most vulnerable paths at a different type

  13. The relation among perfectionism, obsessive-compulsive personality disorder and obsessive-compulsive disorder in individuals with eating disorders.

    Science.gov (United States)

    Halmi, Katherine A; Tozzi, Federica; Thornton, Laura M; Crow, Scott; Fichter, Manfred M; Kaplan, Allan S; Keel, Pamela; Klump, Kelly L; Lilenfeld, Lisa R; Mitchell, James E; Plotnicov, Katherine H; Pollice, Christine; Rotondo, Alessandro; Strober, Michael; Woodside, D Blake; Berrettini, Wade H; Kaye, Walter H; Bulik, Cynthia M

    2005-12-01

    Perfectionism and obsessionality are core features of eating disorders (ED), yet the nature of their relation remains unknown. Understanding the relation between these traits may enhance our ability to identify relevant behavioral endophenotypes for ED. Six-hundred seven individuals with anorexia and bulimia nervosa from the International Price Foundation Genetic Study were assessed for perfectionism, obsessive-compulsive personality disorder (OCPD), and obsessive-compulsive disorder (OCD). No differences were found across ED subtypes in the prevalence of OCPD and OCD, nor with the association between OCD and OCPD. Perfectionism scores were highest in individuals with OCPD whether alone or in combination with OCD. Perfectionism appears to be more closely associated with obsessive-compulsive personality symptoms rather than OCD. The pairing of perfectionism with OCPD may be a relevant core behavioral feature underlying vulnerability to ED. Copyright 2005 by Wiley Periodicals, Inc.

  14. Enhanced eyeblink conditioning in behaviorally inhibited individuals is disrupted by proactive interference following US alone pre-exposures.

    Directory of Open Access Journals (Sweden)

    Michael Todd Allen

    2016-03-01

    Full Text Available Anxiety vulnerable individuals exhibit enhanced acquisition of conditioned eyeblinks as well as enhanced proactive interference from CS or US alone pre-exposures (Holloway et al., 2012. US alone pre-exposures disrupt subsequent CR acquisition to CS-US paired trials as compared to context pre-exposure controls. While Holloway et al., (2012 reported enhanced acquisition in high trait anxiety individuals in the context condition, anxiety vulnerability effects were not reported for the US alone pre-exposure group. It appears from the published data that there were no differences between high and low anxiety individuals in the US alone condition. In the work reported here, we sought to extend the findings of enhanced proactive interference with US alone pre-exposures to determine if the enhanced conditioning was disrupted by proactive interference procedures. We also were interested in the spontaneous eyeblinks during the pre-exposure phase of training. We categorized individuals as anxiety vulnerability or non-vulnerable individuals based scores on the Adult Measure of Behavioural Inhibition (AMBI. Sixty six participants received 60 trials consisting of 30 US alone or context alone pre-exposures followed by 30 CS-US trials. US alone pre-exposures not only disrupted CR acquisition overall, but behaviorally inhibited (BI individuals exhibited enhanced proactive interference as compared to non-inhibited (NI individuals. In addition, US alone pre-exposures disrupted the enhanced acquisition observed in BI individuals as compared to NI individuals following context alone pre-exposures. Differences were also found in rates of spontaneous eyeblinks between BI and NI individuals during context pre-exposure. Our findings will be discussed in the light of the neural substrates of eyeblink conditioning as well as possible factors such as hypervigilance in the amygdala and hippocampal systems, and possible learned helplessness. Applications of these findings of

  15. Enhanced Eyeblink Conditioning in Behaviorally Inhibited Individuals is Disrupted by Proactive Interference Following US Alone Pre-exposures.

    Science.gov (United States)

    Allen, Michael Todd; Miller, Daniel P

    2016-01-01

    Anxiety vulnerable individuals exhibit enhanced acquisition of conditioned eyeblinks as well as enhanced proactive interference from conditioned stimulus (CS) or unconditioned stimulus (US) alone pre-exposures (Holloway et al., 2012). US alone pre-exposures disrupt subsequent conditioned response (CR) acquisition to CS-US paired trials as compared to context pre-exposure controls. While Holloway et al. (2012) reported enhanced acquisition in high trait anxiety individuals in the context condition, anxiety vulnerability effects were not reported for the US alone pre-exposure group. It appears from the published data that there were no differences between high and low anxiety individuals in the US alone condition. In the work reported here, we sought to extend the findings of enhanced proactive interference with US alone pre-exposures to determine if the enhanced conditioning was disrupted by proactive interference procedures. We also were interested in the spontaneous eyeblinks during the pre-exposure phase of training. We categorized individuals as anxiety vulnerability or non-vulnerable individuals based scores on the Adult Measure of Behavioral Inhibition (AMBI). Sixty-six participants received 60 trials consisting of 30 US alone or context alone pre-exposures followed by 30 CS-US trials. US alone pre-exposures not only disrupted CR acquisition overall, but behaviorally inhibited (BI) individuals exhibited enhanced proactive interference as compared to non-inhibited (NI) individuals. In addition, US alone pre-exposures disrupted the enhanced acquisition observed in BI individuals as compared to NI individuals following context alone pre-exposures. Differences were also found in rates of spontaneous eyeblinks between BI and NI individuals during context pre-exposure. Our findings will be discussed in the light of the neural substrates of eyeblink conditioning as well as possible factors such as hypervigilance in the amygdala and hippocampal systems, and possible

  16. Understanding stakeholder preferences for flood adaptation alternatives with natural capital implications

    Directory of Open Access Journals (Sweden)

    Jonathon R. Loos

    2016-09-01

    Full Text Available Inland flood risks are defined by a range of environmental and social factors, including land use and floodplain management. Shifting patterns of storm intensity and precipitation, attributed to climate change, are exacerbating flood risk in regions across North America. Strategies for adapting to growing flood risks and climate change must account for a community's specific vulnerabilities, and its local economic, environmental, and social conditions. Through a stakeholder-engaged methodology, we designed an interactive decision exercise to enable stakeholders to evaluate alternatives for addressing specific community flood vulnerabilities. We used a multicriteria framework to understand what drives stakeholder preferences for flood mitigation and adaptation alternatives, including ecosystem-based projects. Results indicated strong preferences for some ecosystem-based projects that utilize natural capital, generated a useful discussion on the role of individual values in driving decisions and a critique of local environmental and hazard planning procedure, and uncovered support for a river management alternative that had previously been considered socially infeasible. We conclude that a multicriteria decision framework may help ensure that the multiple benefit qualities of natural capital projects are considered by decision makers. Application of a utility function can demonstrate the role of individual decision-maker values in decision outcomes and help illustrate why one alternative may be a better choice than another. Although designing an efficient and accurate multicriteria exercise is quite challenging and often data intensive, we imagine that this method is applicable elsewhere. It may be especially suitable to group decisions that involve varying levels of expertise and competing values, as is often the case in planning for the ecological and human impacts of climate change.

  17. Psychosocial Support for Orphans and Vulnerable Children in Public Primary Schools: Challenges and Intervention Strategies

    Science.gov (United States)

    Mwoma, Teresa; Pillay, Jace

    2015-01-01

    Much has been written about orphans and vulnerable children (OVC) with regard to their education and living. However, relatively few studies have documented the psychosocial support provided for OVC in public primary schools to enhance their psychosocial well-being. This study therefore contributes to the understanding of the challenges…

  18. Social vulnerability from a social ecology perspective: a cohort study of older adults from the National Population Health Survey of Canada

    Science.gov (United States)

    2014-01-01

    Background Numerous social factors, generally studied in isolation, have been associated with older adults’ health. Even so, older people’s social circumstances are complex and an approach which embraces this complexity is desirable. Here we investigate many social factors in relation to one another and to survival among older adults using a social ecology perspective to measure social vulnerability among older adults. Methods 2740 adults aged 65 and older were followed for ten years in the Canadian National Population Health Survey (NPHS). Twenty-three individual-level social variables were drawn from the 1994 NPHS and five Enumeration Area (EA)-level variables were abstracted from the 1996 Canadian Census using postal code linkage. Principal Component Analysis (PCA) was used to identify dimensions of social vulnerability. All social variables were summed to create a social vulnerability index which was studied in relation to ten-year mortality. Results The PCA was limited by low variance (47%) explained by emergent factors. Seven dimensions of social vulnerability emerged in the most robust, yet limited, model: social support, engagement, living situation, self-esteem, sense of control, relations with others and contextual socio-economic status. These dimensions showed complex inter-relationships and were situated within a social ecology framework, considering spheres of influence from the individual through to group, neighbourhood and broader societal levels. Adjusting for age, sex, and frailty, increasing social vulnerability measured using the cumulative social vulnerability index was associated with increased risk of mortality over ten years in a Cox regression model (HR 1.04, 95% CI:1.01-1.07, p = 0.01). Conclusions Social vulnerability has important independent influence on older adults’ health though relationships between contributing variables are complex and do not lend themselves well to fragmentation into a small number of discrete factors. A

  19. Climate Change Vulnerability Analysis of Baluran National Park

    Directory of Open Access Journals (Sweden)

    Beny Harjadi

    2016-12-01

    Full Text Available Every ecosystem has a different level of susceptibility to environmental disturbances it receives, both from natural factors or anthropogenic disturbance. National Park (NP Baluran is one national park that has a representation of a complete ecosystem that includes upland forest ecosystems, lowland forests, coastal forests, mangroves, savanna and evergreen forest. The objective of this study is to get a formula calculation of vulnerability analysis of constant and dynamic factors. Baluran NP vulnerability assessment to climate change done by looking at the dynamic and fixed factors. Vulnerability remains a vulnerability factor to the condition of the original (control, whereas vulnerability is the vulnerability of the dynamic change factors which affected the condition from the outside. Constant Vulnerability (CV in  Baluran NP dominated resistant conditions (61%, meaning that the geomorphology and other fixed factors (slope and slope direction/aspect, then the condition in Baluran NP sufficiently resilient to climate change. Dynamic Vulnerability (DV is the vulnerability of an area or areas that change because of pressure from external factors. DV is influenced by climatic factors (WI = Wetness Index, soil (SBI = Soil Brightness Index, and vegetation (GI = Greenness Index. DV in  Baluran NP from 1999 to 2010 shifted from the original category of being (84.76% and shifted to the susceptible (59.88%.  The role of remote sensing for the analysis of raster digital system, while the geographic information system to display the results of cartographic maps.

  20. Geochemistry and the Understanding of Groundwater Systems

    Science.gov (United States)

    Glynn, P. D.; Plummer, L. N.; Weissmann, G. S.; Stute, M.

    2009-12-01

    Geochemical techniques and concepts have made major contributions to the understanding of groundwater systems. Advances continue to be made through (1) development of measurement and characterization techniques, (2) improvements in computer technology, networks and numerical modeling, (3) investigation of coupled geologic, hydrologic, geochemical and biologic processes, and (4) scaling of individual observations, processes or subsystem models into larger coherent model frameworks. Many applications benefit from progress in these areas, such as: (1) understanding paleoenvironments, in particular paleoclimate, through the use of groundwater archives, (2) assessing the sustainability (recharge and depletion) of groundwater resources, and (3) their vulnerability to contamination, (4) evaluating the capacity and consequences of subsurface waste isolation (e.g. geologic carbon sequestration, nuclear and chemical waste disposal), (5) assessing the potential for mitigation/transformation of anthropogenic contaminants in groundwater systems, and (6) understanding the effect of groundwater lag times in ecosystem-scale responses to natural events, land-use changes, human impacts, and remediation efforts. Obtaining “representative” groundwater samples is difficult and progress in obtaining “representative” samples, or interpreting them, requires new techniques in characterizing groundwater system heterogeneity. Better characterization and simulation of groundwater system heterogeneity (both physical and geochemical) is critical to interpreting the meaning of groundwater “ages”; to understanding and predicting groundwater flow, solute transport, and geochemical evolution; and to quantifying groundwater recharge and discharge processes. Research advances will also come from greater use and progress (1) in the application of environmental tracers to ground water dating and in the analysis of new geochemical tracers (e.g. compound specific isotopic analyses, noble gas